CINXE.COM
(PDF) The State Secrets Privilege in the Post-9/11 Era | Steven D. Schwinn - Academia.edu
<!DOCTYPE html> <html > <head> <meta charset="utf-8"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <meta content="width=device-width, initial-scale=1" name="viewport"> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs"> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="kQFWevObwC6uBHLuzWLEX795KPGZaPmnJFIIbwZZ5h0+sJYC2OMjHjac97XIDszQnISNjQW9uf58uF3awI+IWw==" /> <meta name="citation_title" content="The State Secrets Privilege in the Post-9/11 Era" /> <meta name="citation_publication_date" content="2010/03/31" /> <meta name="citation_journal_title" content="Pace Law Review" /> <meta name="citation_author" content="Steven D. Schwinn" /> <meta name="citation_volume" content="30" /> <meta name="citation_issue" content="2" /> <meta name="citation_firstpage" content="778" /> <meta name="citation_issn" content="2331-3528" /> <meta name="twitter:card" content="summary" /> <meta name="twitter:url" content="https://www.academia.edu/94991884/The_State_Secrets_Privilege_in_the_Post_9_11_Era" /> <meta name="twitter:title" content="The State Secrets Privilege in the Post-9/11 Era" /> <meta name="twitter:description" content="Academia.edu is a platform for academics to share research papers." /> <meta name="twitter:image" content="http://a.academia-assets.com/images/twitter-card.jpeg" /> <meta property="fb:app_id" content="2369844204" /> <meta property="og:type" content="article" /> <meta property="og:url" content="https://www.academia.edu/94991884/The_State_Secrets_Privilege_in_the_Post_9_11_Era" /> <meta property="og:title" content="The State Secrets Privilege in the Post-9/11 Era" /> <meta property="og:image" content="http://a.academia-assets.com/images/open-graph-icons/fb-paper.gif" /> <meta property="og:description" content="The State Secrets Privilege in the Post-9/11 Era" /> <meta property="article:author" content="https://uic.academia.edu/StevenDSchwinn" /> <meta name="description" content="The State Secrets Privilege in the Post-9/11 Era" /> <title>(PDF) The State Secrets Privilege in the Post-9/11 Era | Steven D. Schwinn - Academia.edu</title> <link rel="canonical" href="https://www.academia.edu/94991884/The_State_Secrets_Privilege_in_the_Post_9_11_Era" /> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "single_work", 'action': "show", 'controller_action': 'single_work#show', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script> var $controller_name = 'single_work'; var $action_name = "show"; var $rails_env = 'production'; var $app_rev = '65a690de66ffd0e9f9c3f528feae2fde26a171eb'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.require = { config: function() { return function() {} } } </script> <script> window.Aedu = window.Aedu || {}; window.Aedu.hit_data = null; window.Aedu.serverRenderTime = new Date(1732718755000); window.Aedu.timeDifference = new Date().getTime() - 1732718755000; </script> <script type="application/ld+json">{"@context":"https://schema.org","@type":"ScholarlyArticle","abstract":null,"author":[{"@context":"https://schema.org","@type":"Person","name":"Steven D. Schwinn"}],"contributor":[],"dateCreated":"2023-01-14","dateModified":null,"datePublished":"2010-03-31","headline":"The State Secrets Privilege in the Post-9/11 Era","inLanguage":"en","keywords":["Law","Art","Terrorism","Political Science","National Security Law","State Secrets","Social Science Research Network","Separation of Powers"],"locationCreated":null,"publication":"Pace Law Review","publisher":{"@context":"https://schema.org","@type":"Organization","name":null},"image":null,"thumbnailUrl":null,"url":"https://www.academia.edu/94991884/The_State_Secrets_Privilege_in_the_Post_9_11_Era","sourceOrganization":[{"@context":"https://schema.org","@type":"EducationalOrganization","name":"uic"}]}</script><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/single_work_page/loswp-102fa537001ba4d8dcd921ad9bd56c474abc201906ea4843e7e7efe9dfbf561d.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/body-8d679e925718b5e8e4b18e9a4fab37f7eaa99e43386459376559080ac8f2856a.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/button-3cea6e0ad4715ed965c49bfb15dedfc632787b32ff6d8c3a474182b231146ab7.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/text_button-73590134e40cdb49f9abdc8e796cc00dc362693f3f0f6137d6cf9bb78c318ce7.css" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&family=Gupter:wght@400;500;700&family=IBM+Plex+Mono:wght@300;400&family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-10fa40af19d25203774df2d4a03b9b5771b45109c2304968038e88a81d1215c5.css" /> </head> <body> <div id='react-modal'></div> <div class="js-upgrade-ie-banner" style="display: none; text-align: center; padding: 8px 0; background-color: #ebe480;"><p style="color: #000; font-size: 12px; margin: 0 0 4px;">Academia.edu no longer supports Internet Explorer.</p><p style="color: #000; font-size: 12px; margin: 0;">To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to <a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.querySelector('.js-upgrade-ie-banner').style.display = 'block'; }</script> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span ="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "78ecf44d6315ffa1c2c998e0a0efba6c91fa855873d281ba3d8f6ee2136669f3", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="yXWspVTto+XwgmPi9Np3YfwL0rjftPm9U0ylSdTW0FZmxGzdf5VA1Wga5rnxtn/u3/Z3xENhueQLpvD8EgC+EA==" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://www.academia.edu/94991884/The_State_Secrets_Privilege_in_the_Post_9_11_Era" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="U3YAIkweIwJ/GZdUu5BnouYlMj2AJYiKNr1E/mvbtcP8x8BaZ2bAMueBEg++/G8txdiXQRzwyNNuVxFLrQ3bhQ==" autocomplete="off" /><p>Enter the email address you signed up with and we'll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><input class="btn btn-primary btn-block g-recaptcha js-password-reset-submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" type="submit" value="Email me a link" /></form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account? <a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script> <div class="header--container" id="main-header-container"><div class="header--inner-container header--inner-container-ds2"><div class="header-ds2--left-wrapper"><div class="header-ds2--left-wrapper-inner"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="hide-on-desktop-redesign" style="height: 24px; width: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hide-on-mobile-redesign" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a><div class="header--search-container header--search-container-ds2"><form class="js-SiteSearch-form select2-no-default-pills" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><svg style="width: 14px; height: 14px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="search" class="header--search-icon svg-inline--fa fa-search fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z"></path></svg><input class="header--search-input header--search-input-ds2 js-SiteSearch-form-input" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" /></form></div></div></div><nav class="header--nav-buttons header--nav-buttons-ds2 js-main-nav"><a class="ds2-5-button ds2-5-button--secondary js-header-login-url header-button-ds2 header-login-ds2 hide-on-mobile-redesign" href="https://www.academia.edu/login" rel="nofollow">Log In</a><a class="ds2-5-button ds2-5-button--secondary header-button-ds2 hide-on-mobile-redesign" href="https://www.academia.edu/signup" rel="nofollow">Sign Up</a><button class="header--hamburger-button header--hamburger-button-ds2 hide-on-desktop-redesign js-header-hamburger-button"><div class="icon-bar"></div><div class="icon-bar" style="margin-top: 4px;"></div><div class="icon-bar" style="margin-top: 4px;"></div></button></nav></div><ul class="header--dropdown-container js-header-dropdown"><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/login" rel="nofollow">Log In</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/signup" rel="nofollow">Sign Up</a></li><li class="header--dropdown-row js-header-dropdown-expand-button"><button class="header--dropdown-button">more<svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="caret-down" class="header--dropdown-button-icon svg-inline--fa fa-caret-down fa-w-10" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 320 512"><path fill="currentColor" d="M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z"></path></svg></button></li><li><ul class="header--expanded-dropdown-container"><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/about">About</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/press">Press</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://medium.com/@academia">Blog</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/documents">Papers</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/terms">Terms</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/privacy">Privacy</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/copyright">Copyright</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/hiring"><svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="header--dropdown-row-icon svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg>We're Hiring!</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://support.academia.edu/"><svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="header--dropdown-row-icon svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg>Help Center</a></li><li class="header--dropdown-row js-header-dropdown-collapse-button"><button class="header--dropdown-button">less<svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="caret-up" class="header--dropdown-button-icon svg-inline--fa fa-caret-up fa-w-10" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 320 512"><path fill="currentColor" d="M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z"></path></svg></button></li></ul></li></ul></div> <script src="//a.academia-assets.com/assets/webpack_bundles/fast_loswp-bundle-d651820c1939e5287fa830883d89f986bbe9f35a9f42a5371043c36c78a32b4f.js" defer="defer"></script><script>window.loswp = {}; window.loswp.author = 180672309; window.loswp.bulkDownloadFilterCounts = {}; window.loswp.hasDownloadableAttachment = true; window.loswp.hasViewableAttachments = true; // TODO: just use routes for this window.loswp.loginUrl = "https://www.academia.edu/login?post_login_redirect_url=https%3A%2F%2Fwww.academia.edu%2F94991884%2FThe_State_Secrets_Privilege_in_the_Post_9_11_Era%3Fauto%3Ddownload"; window.loswp.translateUrl = "https://www.academia.edu/login?post_login_redirect_url=https%3A%2F%2Fwww.academia.edu%2F94991884%2FThe_State_Secrets_Privilege_in_the_Post_9_11_Era%3Fshow_translation%3Dtrue"; window.loswp.previewableAttachments = [{"id":97297429,"identifier":"Attachment_97297429","shouldShowBulkDownload":false}]; window.loswp.shouldDetectTimezone = true; window.loswp.shouldShowBulkDownload = true; window.loswp.showSignupCaptcha = false window.loswp.willEdgeCache = false; window.loswp.work = {"work":{"id":94991884,"created_at":"2023-01-14T16:58:07.905-08:00","from_world_paper_id":225315337,"updated_at":"2024-08-19T23:08:03.682-07:00","_data":{"publication_date":"2010,3,31","publication_name":"Pace Law Review"},"document_type":"paper","pre_hit_view_count_baseline":null,"quality":"high","language":"en","title":"The State Secrets Privilege in the Post-9/11 Era","broadcastable":true,"draft":null,"has_indexable_attachment":true,"indexable":true}}["work"]; window.loswp.workCoauthors = [180672309]; window.loswp.locale = "en"; window.loswp.countryCode = "SG"; window.loswp.cwvAbTestBucket = ""; window.loswp.designVariant = "ds_vanilla"; window.loswp.fullPageMobileSutdModalVariant = "full_page_mobile_sutd_modal"; window.loswp.useOptimizedScribd4genScript = false; window.loswp.appleClientId = 'edu.academia.applesignon';</script><script defer="" src="https://accounts.google.com/gsi/client"></script><div class="ds-loswp-container"><div class="ds-work-card--grid-container"><div class="ds-work-card--container js-loswp-work-card"><div class="ds-work-card--cover"><div class="ds-work-cover--wrapper"><div class="ds-work-cover--container"><button class="ds-work-cover--clickable js-swp-download-button" data-signup-modal="{"location":"swp-splash-paper-cover","attachmentId":97297429,"attachmentType":"pdf"}"><img alt="First page of “The State Secrets Privilege in the Post-9/11 Era”" class="ds-work-cover--cover-thumbnail" src="https://0.academia-photos.com/attachment_thumbnails/97297429/mini_magick20230115-1-1wn9n10.png?1673744330" /><img alt="PDF Icon" class="ds-work-cover--file-icon" src="//a.academia-assets.com/assets/single_work_splash/adobe.icon-574afd46eb6b03a77a153a647fb47e30546f9215c0ee6a25df597a779717f9ef.svg" /><div class="ds-work-cover--hover-container"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">download</span><p>Download Free PDF</p></div><div class="ds-work-cover--ribbon-container">Download Free PDF</div><div class="ds-work-cover--ribbon-triangle"></div></button></div></div></div><div class="ds-work-card--work-information"><h1 class="ds-work-card--work-title">The State Secrets Privilege in the Post-9/11 Era</h1><div class="ds-work-card--work-authors ds-work-card--detail"><a class="ds-work-card--author js-wsj-grid-card-author ds2-5-body-md ds2-5-body-link" data-author-id="180672309" href="https://uic.academia.edu/StevenDSchwinn"><img alt="Profile image of Steven D. Schwinn" class="ds-work-card--author-avatar" src="//a.academia-assets.com/images/s65_no_pic.png" />Steven D. Schwinn</a></div><div class="ds-work-card--detail"><p class="ds-work-card--detail ds2-5-body-sm">2010, Pace Law Review</p></div><div class="ds-work-card--button-container"><button class="ds2-5-button js-swp-download-button" data-signup-modal="{"location":"continue-reading-button--work-card","attachmentId":97297429,"attachmentType":"pdf","workUrl":"https://www.academia.edu/94991884/The_State_Secrets_Privilege_in_the_Post_9_11_Era"}">See full PDF</button><button class="ds2-5-button ds2-5-button--secondary js-swp-download-button" data-signup-modal="{"location":"download-pdf-button--work-card","attachmentId":97297429,"attachmentType":"pdf","workUrl":"https://www.academia.edu/94991884/The_State_Secrets_Privilege_in_the_Post_9_11_Era"}"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">download</span>Download PDF</button></div></div></div></div><div data-auto_select="false" data-client_id="331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b" data-doc_id="97297429" data-landing_url="https://www.academia.edu/94991884/The_State_Secrets_Privilege_in_the_Post_9_11_Era" data-login_uri="https://www.academia.edu/registrations/google_one_tap" data-moment_callback="onGoogleOneTapEvent" id="g_id_onload"></div><div class="ds-top-related-works--grid-container"><div class="ds-related-content--container ds-top-related-works--container"><h2 class="ds-related-content--heading">Related papers</h2><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="0" data-entity-id="94991883" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/94991883/The_State_Secrets_Privilege_in_the_Post_9_11_Era_30_Pace_L_Rev_778_2010_">The State Secrets Privilege in the Post-9/11 Era, 30 Pace L. Rev. 778 (2010)</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="180672309" href="https://uic.academia.edu/StevenDSchwinn">Steven D. Schwinn</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2010</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The State Secrets Privilege in the Post-9/11 Era, 30 Pace L. Rev. 778 (2010)","attachmentId":97297430,"attachmentType":"pdf","work_url":"https://www.academia.edu/94991883/The_State_Secrets_Privilege_in_the_Post_9_11_Era_30_Pace_L_Rev_778_2010_","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/94991883/The_State_Secrets_Privilege_in_the_Post_9_11_Era_30_Pace_L_Rev_778_2010_"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="1" data-entity-id="69964853" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/69964853/When_the_Curtain_Must_Be_Drawn_American_Experience_with_Proceedings_Involving_Information_That_for_Reasons_of_National_Security_Cannot_Be_Disclosed">When the Curtain Must Be Drawn: American Experience with Proceedings Involving Information That, for Reasons of National Security, Cannot Be Disclosed</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="78020527" href="https://independent.academia.edu/PeterStrauss1">Peter Strauss</a></div><p class="ds-related-work--metadata ds2-5-body-xs">SSRN Electronic Journal</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"When the Curtain Must Be Drawn: American Experience with Proceedings Involving Information That, for Reasons of National Security, Cannot Be Disclosed","attachmentId":79864008,"attachmentType":"pdf","work_url":"https://www.academia.edu/69964853/When_the_Curtain_Must_Be_Drawn_American_Experience_with_Proceedings_Involving_Information_That_for_Reasons_of_National_Security_Cannot_Be_Disclosed","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/69964853/When_the_Curtain_Must_Be_Drawn_American_Experience_with_Proceedings_Involving_Information_That_for_Reasons_of_National_Security_Cannot_Be_Disclosed"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="2" data-entity-id="92826700" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/92826700/Aspects_of_the_Executives_Power_Over_National_Security_Matters_Secrecy_Classifications_and_Foreign_Intelligence_Wiretaps">Aspects of the Executive's Power Over National Security Matters: Secrecy Classifications and Foreign Intelligence Wiretaps</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="33851455" href="https://independent.academia.edu/CharlesNesson">Charles Nesson</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Indiana Law Journal, 1974</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Aspects of the Executive's Power Over National Security Matters: Secrecy Classifications and Foreign Intelligence Wiretaps","attachmentId":95732528,"attachmentType":"pdf","work_url":"https://www.academia.edu/92826700/Aspects_of_the_Executives_Power_Over_National_Security_Matters_Secrecy_Classifications_and_Foreign_Intelligence_Wiretaps","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/92826700/Aspects_of_the_Executives_Power_Over_National_Security_Matters_Secrecy_Classifications_and_Foreign_Intelligence_Wiretaps"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="3" data-entity-id="11832133" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/11832133/_Dis_Informing_the_Peoples_Discretion_Judicial_Deference_Under_the_National_Security_Exemption_of_the_Freedom_of_Information_Act">[Dis-]Informing the People's Discretion: Judicial Deference Under the National Security Exemption of the Freedom of Information Act</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="3808603" href="https://chicago.academia.edu/TomGinsburg">Tom Ginsburg</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"[Dis-]Informing the People's Discretion: Judicial Deference Under the National Security Exemption of the Freedom of Information Act","attachmentId":37235145,"attachmentType":"pdf","work_url":"https://www.academia.edu/11832133/_Dis_Informing_the_Peoples_Discretion_Judicial_Deference_Under_the_National_Security_Exemption_of_the_Freedom_of_Information_Act","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/11832133/_Dis_Informing_the_Peoples_Discretion_Judicial_Deference_Under_the_National_Security_Exemption_of_the_Freedom_of_Information_Act"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="4" data-entity-id="71230851" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/71230851/Secret_Evidence_Is_Slowly_Eroding_the_Adversary_System_CIPA_and_FISA_in_the_Courts">Secret Evidence Is Slowly Eroding the Adversary System: CIPA and FISA in the Courts</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="60004501" href="https://independent.academia.edu/ellenyaroshefsky">ellen yaroshefsky</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Hofstra Law Review, 2006</p><p class="ds-related-work--abstract ds2-5-body-sm">The Bush administration is reportedly the most secretive in United States history. 1 The unprecedented scope of secrecy in intelligence gathering, detentions, decision-making, data collection, and legislative implementation has recently received public scrutiny. 2 Often justified as essential to preserve national security, enhanced secrecy is a steady evisceration of the transparency and accountability essential to a functioning democracy. While of a different dimension, concerns about transparency and accountability exist within the judicial system by the government’s use of secret evidence in federal criminal prosecutions—that is, information</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Secret Evidence Is Slowly Eroding the Adversary System: CIPA and FISA in the Courts","attachmentId":80665986,"attachmentType":"pdf","work_url":"https://www.academia.edu/71230851/Secret_Evidence_Is_Slowly_Eroding_the_Adversary_System_CIPA_and_FISA_in_the_Courts","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/71230851/Secret_Evidence_Is_Slowly_Eroding_the_Adversary_System_CIPA_and_FISA_in_the_Courts"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="5" data-entity-id="68364327" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/68364327/Alert_and_alarmed_the_National_Security_Information_Act_Cth_2004">Alert and alarmed: the National Security Information Act (Cth) 2004</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="30878773" href="https://usq.academia.edu/AnthonyGray">Anthony Gray</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2007</p><p class="ds-related-work--abstract ds2-5-body-sm">This article highlights the Federal Government&#39;s controversial new regime applicable in respect of trials where evidence might relate to national security. It considers whether the provisions of the Act are consistent with fundamental human rights and established constitutional principles.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Alert and alarmed: the National Security Information Act (Cth) 2004","attachmentId":78864882,"attachmentType":"pdf","work_url":"https://www.academia.edu/68364327/Alert_and_alarmed_the_National_Security_Information_Act_Cth_2004","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/68364327/Alert_and_alarmed_the_National_Security_Information_Act_Cth_2004"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="6" data-entity-id="17771154" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/17771154/Coming_to_Terms_with_Secret_Law_7_Harvard_National_Security_Journal_241_2015_">Coming to Terms with Secret Law, 7 Harvard National Security Journal 241 (2015)</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="35887535" href="https://independent.academia.edu/DakotaRudesill">Dakota S Rudesill</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2015</p><p class="ds-related-work--abstract ds2-5-body-sm">This study evaluates the claim that all three branches of the U.S. federal government are producing secret law. It conducts an empirical analysis of the classified legislative addenda through which Congress regulates classified intelligence programs. It distinguishes secret law from secret fact, constructs normative options, and recommends principles for governing secret law, starting with the cardinal principle of public law’s supremacy over secret law.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Coming to Terms with Secret Law, 7 Harvard National Security Journal 241 (2015)","attachmentId":44511309,"attachmentType":"pdf","work_url":"https://www.academia.edu/17771154/Coming_to_Terms_with_Secret_Law_7_Harvard_National_Security_Journal_241_2015_","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/17771154/Coming_to_Terms_with_Secret_Law_7_Harvard_National_Security_Journal_241_2015_"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="7" data-entity-id="85604128" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/85604128/The_Case_of_Binyam_Mohamed_National_Security_or_National_Embarrassment">The Case of Binyam Mohamed: National Security or National Embarrassment?</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="5773398" href="https://independent.academia.edu/DianeWebber">Diane Webber</a></div><p class="ds-related-work--metadata ds2-5-body-xs">SSRN Electronic Journal, 2009</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Case of Binyam Mohamed: National Security or National Embarrassment?","attachmentId":90250247,"attachmentType":"pdf","work_url":"https://www.academia.edu/85604128/The_Case_of_Binyam_Mohamed_National_Security_or_National_Embarrassment","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/85604128/The_Case_of_Binyam_Mohamed_National_Security_or_National_Embarrassment"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="8" data-entity-id="105529566" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/105529566/The_Constitutionality_of_the_NSA_Surveillance_Program_A_Letter_to_the_House_Judiciary_Committee">The Constitutionality of the NSA Surveillance Program: A Letter to the House Judiciary Committee</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="272873631" href="https://independent.academia.edu/JohnEastman9">John Eastman</a></div><p class="ds-related-work--metadata ds2-5-body-xs">SSRN Electronic Journal, 2006</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Constitutionality of the NSA Surveillance Program: A Letter to the House Judiciary Committee","attachmentId":104959212,"attachmentType":"pdf","work_url":"https://www.academia.edu/105529566/The_Constitutionality_of_the_NSA_Surveillance_Program_A_Letter_to_the_House_Judiciary_Committee","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/105529566/The_Constitutionality_of_the_NSA_Surveillance_Program_A_Letter_to_the_House_Judiciary_Committee"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="9" data-entity-id="6616758" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/6616758/_A_New_Era_of_Openness_Disclosing_Intelligence_to_Congress_under_Obama">“A New Era of Openness?”: Disclosing Intelligence to Congress under Obama</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="4957205" href="https://wustl.academia.edu/KathleenClark">Kathleen Clark</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Constitutional Commentary, 2010</p><p class="ds-related-work--abstract ds2-5-body-sm">As a candidate, Barack Obama promised “a new era of openness,” and his administration has taken some significant steps to increase transparency in the executive branch. But it has also continued the Bush administration’s policy of invoking the state secrets privilege to avoid judicial scrutiny of controversial warrantless surveillance and torture programs. Many commentators have noted the parallels between the Bush and Obama policies on disclosing sensitive information to courts, but they have paid little attention to how the Obama administration compares with the Bush administration in disclosing sensitive information to Congress. This essay fills that gap, and looks in detail at the Bush and Obama administration responses to legislative proposals for expanding intelligence disclosures to Congress. It reviews both the Bush and Obama administration positions on legislation that would require intelligence disclosure to Congress, and finds that there are substantial similarities - though not identity - between the Bush and Obama administrations. Both administrations have opposed disclosure of covert actions to the full intelligence committees as well as mandated disclosure of internal executive branch legal advice. On these most sensitive intelligence issues, we will see increased disclosure to Congress only over the objection of President Barack Obama.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"“A New Era of Openness?”: Disclosing Intelligence to Congress under Obama","attachmentId":33359213,"attachmentType":"pdf","work_url":"https://www.academia.edu/6616758/_A_New_Era_of_Openness_Disclosing_Intelligence_to_Congress_under_Obama","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/6616758/_A_New_Era_of_Openness_Disclosing_Intelligence_to_Congress_under_Obama"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div></div></div><div class="ds-sticky-ctas--wrapper js-loswp-sticky-ctas hidden"><div class="ds-sticky-ctas--grid-container"><div class="ds-sticky-ctas--container"><button class="ds2-5-button js-swp-download-button" data-signup-modal="{"location":"continue-reading-button--sticky-ctas","attachmentId":97297429,"attachmentType":"pdf","workUrl":null}">See full PDF</button><button class="ds2-5-button ds2-5-button--secondary js-swp-download-button" data-signup-modal="{"location":"download-pdf-button--sticky-ctas","attachmentId":97297429,"attachmentType":"pdf","workUrl":null}"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">download</span>Download PDF</button></div></div></div><div class="ds-below-fold--grid-container"><div class="ds-work--container js-loswp-embedded-document"><div class="attachment_preview" data-attachment="Attachment_97297429" style="display: none"><div class="js-scribd-document-container"><div class="scribd--document-loading js-scribd-document-loader" style="display: block;"><img alt="Loading..." src="//a.academia-assets.com/images/loaders/paper-load.gif" /><p>Loading Preview</p></div></div><div style="text-align: center;"><div class="scribd--no-preview-alert js-preview-unavailable"><p>Sorry, preview is currently unavailable. You can download the paper by clicking the button above.</p></div></div></div></div><div class="ds-sidebar--container js-work-sidebar"><div class="ds-related-content--container"><h2 class="ds-related-content--heading">Related papers</h2><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="0" data-entity-id="101123262" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/101123262/Access_to_Classified_Information_Constitutional_and_Statutory_Dimensions">Access to Classified Information: Constitutional and Statutory Dimensions</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="267411737" href="https://independent.academia.edu/FeinBruce">Bruce Fein</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Wm. & Mary L. Rev., 1984</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Access to Classified Information: Constitutional and Statutory Dimensions","attachmentId":101750338,"attachmentType":"pdf","work_url":"https://www.academia.edu/101123262/Access_to_Classified_Information_Constitutional_and_Statutory_Dimensions","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/101123262/Access_to_Classified_Information_Constitutional_and_Statutory_Dimensions"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="1" data-entity-id="95852376" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/95852376/Secret_Evidence_and_its_Alternatives">Secret Evidence and its Alternatives</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="10989842" href="https://utoronto.academia.edu/KentRoach">Kent Roach</a></div><p class="ds-related-work--metadata ds2-5-body-xs">SSRN Electronic Journal, 2011</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Secret Evidence and its Alternatives","attachmentId":97918043,"attachmentType":"pdf","work_url":"https://www.academia.edu/95852376/Secret_Evidence_and_its_Alternatives","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/95852376/Secret_Evidence_and_its_Alternatives"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="2" data-entity-id="75502906" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/75502906/White_House_Lies_Why_the_Public_Must_Compel_the_Courts_to_Hold_the_President_Accountable_for_National_Security_Abuses">White (House) Lies: Why the Public Must Compel the Courts to Hold the President Accountable for National Security Abuses</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="130852460" href="https://independent.academia.edu/YamamotoEric">Eric Yamamoto</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Law and Contemporary Problems</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"White (House) Lies: Why the Public Must Compel the Courts to Hold the President Accountable for National Security Abuses","attachmentId":83522333,"attachmentType":"pdf","work_url":"https://www.academia.edu/75502906/White_House_Lies_Why_the_Public_Must_Compel_the_Courts_to_Hold_the_President_Accountable_for_National_Security_Abuses","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/75502906/White_House_Lies_Why_the_Public_Must_Compel_the_Courts_to_Hold_the_President_Accountable_for_National_Security_Abuses"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="3" data-entity-id="5186718" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/5186718/FOREWORD_THE_NSA_AND_THE_LEGAL_REGIME_FOR_FOREIGN_INTELLIGENCE_SURVEILLANCE">FOREWORD: THE NSA AND THE LEGAL REGIME FOR FOREIGN INTELLIGENCE SURVEILLANCE</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="33534" href="https://osu.academia.edu/PeterShane">Peter M Shane</a></div><p class="ds-related-work--metadata ds2-5-body-xs">I/S: A Journal of Law and Policy for the Information Society, 2014</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"FOREWORD: THE NSA AND THE LEGAL REGIME FOR FOREIGN INTELLIGENCE SURVEILLANCE","attachmentId":53999206,"attachmentType":"pdf","work_url":"https://www.academia.edu/5186718/FOREWORD_THE_NSA_AND_THE_LEGAL_REGIME_FOR_FOREIGN_INTELLIGENCE_SURVEILLANCE","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/5186718/FOREWORD_THE_NSA_AND_THE_LEGAL_REGIME_FOR_FOREIGN_INTELLIGENCE_SURVEILLANCE"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="4" data-entity-id="75467812" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/75467812/Symposium_Secret_Evidence_and_the_Courts_in_the_Age_of_National_Security">Symposium: Secret Evidence and the Courts in the Age of National Security</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="60004501" href="https://independent.academia.edu/ellenyaroshefsky">ellen yaroshefsky</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2006</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Symposium: Secret Evidence and the Courts in the Age of National Security","attachmentId":83225093,"attachmentType":"pdf","work_url":"https://www.academia.edu/75467812/Symposium_Secret_Evidence_and_the_Courts_in_the_Age_of_National_Security","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/75467812/Symposium_Secret_Evidence_and_the_Courts_in_the_Age_of_National_Security"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="5" data-entity-id="23593534" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/23593534/Secrecy_and_the_Right_to_Know">Secrecy and the Right to Know</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="9484028" href="https://opensocietyfoundations.academia.edu/MortonHalperin">Morton H Halperin</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Law and Contemporary Problems, 1976</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Secrecy and the Right to Know","attachmentId":44014036,"attachmentType":"pdf","work_url":"https://www.academia.edu/23593534/Secrecy_and_the_Right_to_Know","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/23593534/Secrecy_and_the_Right_to_Know"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="6" data-entity-id="1644623" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/1644623/Rays_of_Sunlight_in_a_Shadow_War_FOIA_the_Abuses_of_Anti_Terrorism_and_the_Strategy_of_Transparency">Rays of Sunlight in a Shadow War: FOIA, the Abuses of Anti-Terrorism, and the Strategy of Transparency</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="1925180" href="https://upenn.academia.edu/SethKreimer">Seth Kreimer</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Lewis & Clark L. Rev., 2007</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Rays of Sunlight in a Shadow War: FOIA, the Abuses of Anti-Terrorism, and the Strategy of Transparency","attachmentId":17486623,"attachmentType":"pdf","work_url":"https://www.academia.edu/1644623/Rays_of_Sunlight_in_a_Shadow_War_FOIA_the_Abuses_of_Anti_Terrorism_and_the_Strategy_of_Transparency","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/1644623/Rays_of_Sunlight_in_a_Shadow_War_FOIA_the_Abuses_of_Anti_Terrorism_and_the_Strategy_of_Transparency"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="7" data-entity-id="31348283" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/31348283/National_Security_Letters_A_Controversial_FBI_Tool_to_Fight_Terrorism_Internal_Security_Volume_2015_7_2_pp_71_90">National Security Letters — A Controversial FBI Tool to Fight Terrorism, „Internal Security”, Volume 2015; 7(2), pp. 71–90.</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="59641500" href="https://uwb.academia.edu/EwelinaWa%C5%9BkoOwsiejczuk">Ewelina Waśko-Owsiejczuk</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"National Security Letters — A Controversial FBI Tool to Fight Terrorism, „Internal Security”, Volume 2015; 7(2), pp. 71–90.","attachmentId":51730787,"attachmentType":"pdf","work_url":"https://www.academia.edu/31348283/National_Security_Letters_A_Controversial_FBI_Tool_to_Fight_Terrorism_Internal_Security_Volume_2015_7_2_pp_71_90","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/31348283/National_Security_Letters_A_Controversial_FBI_Tool_to_Fight_Terrorism_Internal_Security_Volume_2015_7_2_pp_71_90"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="8" data-entity-id="78783621" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/78783621/The_Opinions_by_the_Attorney_General_and_the_Office_of_Legal_Counsel_How_and_Why_They_Are_Significant">The Opinions by the Attorney General and the Office of Legal Counsel: How and Why They Are Significant</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="33236865" href="https://kutztown.academia.edu/ArthurGarrison">Arthur Garrison</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2012</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Opinions by the Attorney General and the Office of Legal Counsel: How and Why They Are Significant","attachmentId":85706859,"attachmentType":"pdf","work_url":"https://www.academia.edu/78783621/The_Opinions_by_the_Attorney_General_and_the_Office_of_Legal_Counsel_How_and_Why_They_Are_Significant","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/78783621/The_Opinions_by_the_Attorney_General_and_the_Office_of_Legal_Counsel_How_and_Why_They_Are_Significant"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="9" data-entity-id="10123018" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/10123018/NATIONAL_SECURITY_AND_SECRET_EVIDENCE_IN_LEGISLATION_AND_BEFORE_THE_COURTS_EXPLORING_THE_CHALLENGES">NATIONAL SECURITY AND SECRET EVIDENCE IN LEGISLATION AND BEFORE THE COURTS: EXPLORING THE CHALLENGES</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="4345421" href="https://independent.academia.edu/AmandineScherrer">Amandine Scherrer</a><span>, </span><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="3176145" href="https://kcl.academia.edu/didierbigo">didier bigo</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"NATIONAL SECURITY AND SECRET EVIDENCE IN LEGISLATION AND BEFORE THE COURTS: EXPLORING THE CHALLENGES","attachmentId":36238336,"attachmentType":"pdf","work_url":"https://www.academia.edu/10123018/NATIONAL_SECURITY_AND_SECRET_EVIDENCE_IN_LEGISLATION_AND_BEFORE_THE_COURTS_EXPLORING_THE_CHALLENGES","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/10123018/NATIONAL_SECURITY_AND_SECRET_EVIDENCE_IN_LEGISLATION_AND_BEFORE_THE_COURTS_EXPLORING_THE_CHALLENGES"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="10" data-entity-id="112107776" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/112107776/National_Security_Evidence_Enhancing_Fairness_in_View_of_the_Non_Disclosure_Regime_of_the_Rome_Statute">National Security Evidence: Enhancing Fairness in View of the Non-Disclosure Regime of the Rome Statute</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="61737272" href="https://independent.academia.edu/ArielZemach">Ariel Zemach</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Israel Law Review, 2014</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"National Security Evidence: Enhancing Fairness in View of the Non-Disclosure Regime of the Rome Statute","attachmentId":109440134,"attachmentType":"pdf","work_url":"https://www.academia.edu/112107776/National_Security_Evidence_Enhancing_Fairness_in_View_of_the_Non_Disclosure_Regime_of_the_Rome_Statute","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/112107776/National_Security_Evidence_Enhancing_Fairness_in_View_of_the_Non_Disclosure_Regime_of_the_Rome_Statute"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="11" data-entity-id="57918623" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/57918623/National_Security_Letters_the_USA_PATRIOT_Act_and_the_Constitution_The_tensions_">National Security Letters, the USA PATRIOT Act, and the Constitution: The tensions …</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="87727788" href="https://independent.academia.edu/UrsulaGorhamOscilowski">Ursula Gorham-Oscilowski</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Government Information Quarterly</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"National Security Letters, the USA PATRIOT Act, and the Constitution: The tensions …","attachmentId":72582021,"attachmentType":"pdf","work_url":"https://www.academia.edu/57918623/National_Security_Letters_the_USA_PATRIOT_Act_and_the_Constitution_The_tensions_","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/57918623/National_Security_Letters_the_USA_PATRIOT_Act_and_the_Constitution_The_tensions_"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="12" data-entity-id="85271818" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/85271818/FISA_s_Significant_Purpose_Requirement_and_the_Government_s_Ability_to_Protect_National_Security">FISA’s Significant Purpose Requirement and the Government’s Ability to Protect National Security</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="117112944" href="https://lltlab.academia.edu/ScottGlick">Scott Glick</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"FISA’s Significant Purpose Requirement and the Government’s Ability to Protect National Security","attachmentId":90020905,"attachmentType":"pdf","work_url":"https://www.academia.edu/85271818/FISA_s_Significant_Purpose_Requirement_and_the_Government_s_Ability_to_Protect_National_Security","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/85271818/FISA_s_Significant_Purpose_Requirement_and_the_Government_s_Ability_to_Protect_National_Security"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="13" data-entity-id="100751704" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/100751704/Judicial_Scrutiny_of_National_Security_Executive_Restrictions_of_Civil_Liberties_When_Fears_and_Prejudices_Are_Aroused">Judicial Scrutiny of National Security: Executive Restrictions of Civil Liberties When Fears and Prejudices Are Aroused</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="267140644" href="https://independent.academia.edu/TaniaCruz256">Tania Cruz</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Seattle J. Soc. Just., 2003</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Judicial Scrutiny of National Security: Executive Restrictions of Civil Liberties When Fears and Prejudices Are Aroused","attachmentId":101484442,"attachmentType":"pdf","work_url":"https://www.academia.edu/100751704/Judicial_Scrutiny_of_National_Security_Executive_Restrictions_of_Civil_Liberties_When_Fears_and_Prejudices_Are_Aroused","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/100751704/Judicial_Scrutiny_of_National_Security_Executive_Restrictions_of_Civil_Liberties_When_Fears_and_Prejudices_Are_Aroused"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="14" data-entity-id="69635518" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/69635518/The_Unreasonable_Rise_of_Reasonable_Suspicion_Terrorist_Watchlists_and_Terry_V_Ohio">The Unreasonable Rise of Reasonable Suspicion: Terrorist Watchlists and Terry V. Ohio</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="44033548" href="https://independent.academia.edu/JeffreyKahn">Jeffrey Kahn</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2017</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Unreasonable Rise of Reasonable Suspicion: Terrorist Watchlists and Terry V. Ohio","attachmentId":79654606,"attachmentType":"pdf","work_url":"https://www.academia.edu/69635518/The_Unreasonable_Rise_of_Reasonable_Suspicion_Terrorist_Watchlists_and_Terry_V_Ohio","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/69635518/The_Unreasonable_Rise_of_Reasonable_Suspicion_Terrorist_Watchlists_and_Terry_V_Ohio"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="15" data-entity-id="93246888" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/93246888/Encyclopedia_of_the_Fourth_Amendment">Encyclopedia of the Fourth Amendment</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="187461382" href="https://independent.academia.edu/JohnVile">John Vile</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2013</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Encyclopedia of the Fourth Amendment","attachmentId":96036851,"attachmentType":"pdf","work_url":"https://www.academia.edu/93246888/Encyclopedia_of_the_Fourth_Amendment","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/93246888/Encyclopedia_of_the_Fourth_Amendment"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="16" data-entity-id="30310257" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/30310257/Privacy_and_Civil_Liberties_Oversight_Board_Public_Hearing_on_Section_702_of_the_FISA_Amendments_Act">Privacy and Civil Liberties Oversight Board Public Hearing on Section 702 of the FISA Amendments Act</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="57768957" href="https://independent.academia.edu/%D0%90%D1%81%D1%81%D0%BE%D1%86%D0%B8%D0%B0%D1%86%D0%B8%D1%8F%D0%9F%D0%BE%D0%B1%D0%B5%D0%B4%D0%B8%D1%82%D0%B5%D0%BB%D0%B5%D0%B9%D0%9E%D0%BB%D0%B8%D0%BC%D0%BF%D0%B8%D0%B0%D0%B4">Ассоциация Победителей Олимпиад</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Privacy and Civil Liberties Oversight Board Public Hearing on Section 702 of the FISA Amendments Act","attachmentId":50766967,"attachmentType":"pdf","work_url":"https://www.academia.edu/30310257/Privacy_and_Civil_Liberties_Oversight_Board_Public_Hearing_on_Section_702_of_the_FISA_Amendments_Act","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/30310257/Privacy_and_Civil_Liberties_Oversight_Board_Public_Hearing_on_Section_702_of_the_FISA_Amendments_Act"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="17" data-entity-id="27017729" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/27017729/The_Power_to_Detain_Detention_of_Terrorism_Suspects_After_9_11">The Power to Detain: Detention of Terrorism Suspects After 9/11</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="51058264" href="https://independent.academia.edu/SirineShebaya">Sirine Shebaya</a><span>, </span><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="51046098" href="https://yaleisp.academia.edu/OonaHathaway">Oona Hathaway</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2013</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Power to Detain: Detention of Terrorism Suspects After 9/11","attachmentId":47276686,"attachmentType":"pdf","work_url":"https://www.academia.edu/27017729/The_Power_to_Detain_Detention_of_Terrorism_Suspects_After_9_11","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/27017729/The_Power_to_Detain_Detention_of_Terrorism_Suspects_After_9_11"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="18" data-entity-id="5672425" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/5672425/The_Constitution_and_National_Security_Covert_Action_In_The_Age_of_Intelligence_Oversight">The Constitution & National Security: Covert Action In The Age of Intelligence Oversight</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="7761400" href="https://american.academia.edu/DFagelson">David Fagelson</a></div><p class="ds-related-work--metadata ds2-5-body-xs"> Journal of Law And Politics, 1989</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Constitution \u0026 National Security: Covert Action In The Age of Intelligence Oversight","attachmentId":95327667,"attachmentType":"pdf","work_url":"https://www.academia.edu/5672425/The_Constitution_and_National_Security_Covert_Action_In_The_Age_of_Intelligence_Oversight","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/5672425/The_Constitution_and_National_Security_Covert_Action_In_The_Age_of_Intelligence_Oversight"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="19" data-entity-id="1848743" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/1848743/State_Wiretaps_and_Electronic_Surveillance_After_September_11">State Wiretaps and Electronic Surveillance After September 11</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="2283514" href="https://osu.academia.edu/PeterSwire">Peter Swire</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Hastings Lj, 2002</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"State Wiretaps and Electronic Surveillance After September 11","attachmentId":25909669,"attachmentType":"pdf","work_url":"https://www.academia.edu/1848743/State_Wiretaps_and_Electronic_Surveillance_After_September_11","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/1848743/State_Wiretaps_and_Electronic_Surveillance_After_September_11"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="20" data-entity-id="79972115" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/79972115/Snepp_v_United_States_The_CIA_Secrecy_Agreement_and_the_First_Amendment">Snepp v. United States: The CIA Secrecy Agreement and the First Amendment</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="54536945" href="https://independent.academia.edu/DianeOrentlicher">Diane Orentlicher</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Columbia Law Review, 1981</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Snepp v. United States: The CIA Secrecy Agreement and the First Amendment","attachmentId":86508662,"attachmentType":"pdf","work_url":"https://www.academia.edu/79972115/Snepp_v_United_States_The_CIA_Secrecy_Agreement_and_the_First_Amendment","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/79972115/Snepp_v_United_States_The_CIA_Secrecy_Agreement_and_the_First_Amendment"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="21" data-entity-id="34626103" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/34626103/The_Secret_Keepers_Judges_Security_Detentions_and_Secret_Evidence">The Secret Keepers: Judges, Security Detentions, and Secret Evidence</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="47845503" href="https://deakin.academia.edu/ShiriKrebs">Shiri Krebs</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Secret Keepers: Judges, Security Detentions, and Secret Evidence","attachmentId":54489814,"attachmentType":"pdf","work_url":"https://www.academia.edu/34626103/The_Secret_Keepers_Judges_Security_Detentions_and_Secret_Evidence","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/34626103/The_Secret_Keepers_Judges_Security_Detentions_and_Secret_Evidence"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="22" data-entity-id="71758483" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/71758483/National_Security_and_the_Supreme_Court">National Security and the Supreme Court</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="133736973" href="https://independent.academia.edu/AndrewGNordin">Andrew Nordin</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2010</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"National Security and the Supreme Court","attachmentId":80969373,"attachmentType":"pdf","work_url":"https://www.academia.edu/71758483/National_Security_and_the_Supreme_Court","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/71758483/National_Security_and_the_Supreme_Court"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="23" data-entity-id="44696448" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/44696448/Striking_a_Balance_Between_National_Security_and_the_Civil_Right_to_Privacy_Improving_National_Security_Intelligence_Oversight_in_the_US">Striking a Balance Between National Security & the Civil Right to Privacy: Improving National Security Intelligence Oversight in the US</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="80673372" href="https://ubc.academia.edu/JackMagnus">Jack P . D . Magnus</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2020</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Striking a Balance Between National Security \u0026 the Civil Right to Privacy: Improving National Security Intelligence Oversight in the US","attachmentId":65411464,"attachmentType":"pdf","work_url":"https://www.academia.edu/44696448/Striking_a_Balance_Between_National_Security_and_the_Civil_Right_to_Privacy_Improving_National_Security_Intelligence_Oversight_in_the_US","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/44696448/Striking_a_Balance_Between_National_Security_and_the_Civil_Right_to_Privacy_Improving_National_Security_Intelligence_Oversight_in_the_US"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="24" data-entity-id="76707144" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/76707144/Secrets_and_leaks_the_dilemma_of_state_secrecy">Secrets and leaks: the dilemma of state secrecy</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="697201" href="https://exeter.academia.edu/OwenDThomas">Owen D Thomas</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Contemporary Justice Review, 2015</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Secrets and leaks: the dilemma of state secrecy","attachmentId":84325487,"attachmentType":"pdf","work_url":"https://www.academia.edu/76707144/Secrets_and_leaks_the_dilemma_of_state_secrecy","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/76707144/Secrets_and_leaks_the_dilemma_of_state_secrecy"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div></div><div class="ds-related-content--container"><h2 class="ds-related-content--heading">Related topics</h2><div class="ds-research-interests--pills-container"><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="534" href="https://www.academia.edu/Documents/in/Law">Law</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="1236" href="https://www.academia.edu/Documents/in/Art">Art</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="1660" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="4486" href="https://www.academia.edu/Documents/in/Political_Science">Political Science</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="8616" href="https://www.academia.edu/Documents/in/National_Security_Law">National Security Law</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="60553" href="https://www.academia.edu/Documents/in/State_Secrets">State Secrets</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="69856" href="https://www.academia.edu/Documents/in/Social_Science_Research_Network">Social Science Research Network</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="89758" href="https://www.academia.edu/Documents/in/Separation_of_Powers">Separation of Powers</a></div></div></div></div></div><div class="footer--content"><ul class="footer--main-links hide-on-mobile"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a rel="nofollow" href="https://medium.com/academia">Blog</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px; position: relative; bottom: -1px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg> <strong>We're Hiring!</strong></a></li><li><a href="https://support.academia.edu/"><svg style="width: 12px; height: 12px; position: relative; bottom: -1px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg> <strong>Help Center</strong></a></li></ul><ul class="footer--research-interests"><li>Find new research papers in:</li><li><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul><ul class="footer--legal-links hide-on-mobile"><li><a href="https://www.academia.edu/terms">Terms</a></li><li><a href="https://www.academia.edu/privacy">Privacy</a></li><li><a href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia ©2024</li></ul></div> </body> </html>