ABA-Homeland Security

Homeland Security – Legal and Policy Issues

 

Contents

Dedication          xiii

Foreword by the Hon. Lee H. Hamilton                 xv

Acknowledgments          xvii

About the Editors            xix

About the Authors          xxi

Introduction                xxxi

Section I

Administration of Homeland Security                    

Chapter 1         

Homeland Security: An Inside Perspective of the Last Seven Years and a Look Ahead
(Jessica R. Herrera-Flanigan)       3

Before September 11, 2001: An Idea Without a Motivation          4

The 9/11 Attacks: Making a Case for a Homeland Security Agency             5

Building Blocks: Foundation of a New Security Regime    9

Congress: Fiefdoms, Politics, and Oversight         10

The 9/11 Commission: Why Did It Happen, How Did It Happen, and What Does America Do Next?             12

Transition to New Leaders and the Natural Disaster No One Expected    14

Dubai Ports: The Global Economy Meets Homeland Security       17

Remembering the 9/11 Commission’s Unimplemented Recommendations           18

Looking Beyond 2008—the Future of Homeland Security               19

Chapter 2

State and Federal Emergency Powers (Michael Greenberger and Arianne Spaccarelli)    21

State Authority during Public Health Emergencies             23

Emergency Management and Civil Defense Statutes       24

Public Health Emergency Statutes            27

Power to Seize and Control Property      29

Power to Control and Utilize Health-Care Providers         30

Quarantine, Isolation, and Compelled Medical Testing and Treatment    31

Federal Authority during Public Health Emergencies        33

Posse Comitatus Act, the Insurrection Act, and

The Use of Active Duty Military 35

Constitutional Authority for Federal Action during

Emergencies      36

Commerce Clause           37

Insurrection Clause         39

Guarantee of a Republican Form of Government

Clause   39

Necessary and Proper Clause     40

Spending Clause               41

Conclusion          41

Chapter 3

Understanding the Role of Northern Command in the Defense of the Homeland: The Emerging Legal Framework— Authorities and Challenges
(Lisa L. Turner, Jeanne Meyer, and Harvey Rishikof)                43

Unified Combatant Commands and USNORTHCOM         44

Unity of Effort through Interagency and

Intergovernmental Coordination              47

Functional Areas              49

Conclusion          57

Chapter 4

The USA PATRIOT Act and the Federal Anti-Money-Laundering Regime (Mark J. Biros)  61

Introduction       61

Legal Background             62

The Federal Anti-Money-Laundering Statutes Prior to Enactment of the PATRIOT Act     62

Overview of Title III of the PATRIOT Act Regarding Financial Transactions               64

Anti-Money-Laundering Programs           65

Customer Identity Verification   65

Information Sharing        66

Regulatory Guidance      67

Agency Regulations        67

The Financial Crimes Enforcement Network        67

The Office of Foreign Assets Control       68

Additional Resources     69

Enforcement Actions     70

Enforcement Trends      73

How to Avoid Noncompliance    74

Identify Risk Factors       75

Develop and Implement AML Procedures            76

Conclusion                78

Chapter 5

Compliance Is Not Enough: What It Really Takes to Maintain Responsible Information Security    (Donald A. Purdy, Jr.)            81

Federal and State Regulation of Information Security      83

Dangers of Compartmentalized Compliance        88

From Compliance to Risk Management  90

Summary and Conclusion                93

Chapter 6

Information Protection (James W. Conrad, Jr.)  95

Introduction       95

The Freedom of Information Act              96

“Other Laws” Exemption              97

 National Security Exemption      97

Law Enforcement Exemption     98

Confidential Business Information Exemption    99

The Exemption 99

Concerns about the Exemption 100

“Risk of Circumvention” Exemption         102

“Protections” That Aren’t             103

Other Laws that May Protect a Business’s Security Information  104

Laws Applicable to Particular Classes of Business Activities             105

Large Public Drinking Water Systems       105

Ports, Facilities, and Vessels Regulated by the Maritime Transportation Security Act        106

Shippers and Carriers of Hazardous Materials Required to Prepare Security Plans              106

Facilities Regulated under the Chemical Weapons Convention Implementation Act          107

Nuclear Power and Atomic Weapons Activities  108

Facilities Regulated by the Federal Energy Regulatory Commission           109

Sensitive Security Information   110

Background        110

Scope    111

Persons Able to Obtain SSI          113

The SSI Rules Bind Private Persons           114

Litigation              114

Chemical-Terrorism Vulnerability Information    115

The Critical Infrastructure Information Act            118

Background        118

Scope    119

Information Protections               120

Implementation                 121

Chapter 7

2008: The Year of Increased Worksite Enforcement (Dawn M. Lurie, Mahsa Aliaskari, and Joe Whitley)  123

Enforcement-Only Strategy        124

Worksite Enforcement  127

The Next Wave of Enforcement: Agriprocessors               130

Other Compliance Tools                131

IMAGE  131

Social Security No-Match Rule    132

E-Verify                133

The Year of Increased Worksite Enforcement: What

We Have Learned            137

Looking Forward: Worksite Enforcement              137

Conclusion                138

Chapter 8

Succession Planning and Business Continuity (James P. Gerkis and Adam Klepack)          141

Administrative and Regulatory Developments in Business Continuity Planning    141

Introduction       141

Sarbanes-Oxley’s Effect on Business Continuity Planning              143

New York Stock Exchange and Financial Industry Regulatory Authority, Inc.: Business Continuity Rules    144

National Futures Association: Business Continuity Rules                146

Legislative Developments in Succession Planning and Business Continuity Planning          147

Disaster Planning and Corporation Law: Emergency Bylaws          147

The Emergency Securities Response Act of 2004                149

Private-Sector Developments in Business Continuity Planning    151

How the Private Sector Has Reacted       151

Business Continuity Planning for Pandemics        152

Corporate Liability           154

Introduction       154

Oversight Liability: Board of Directors and Officers            155

Oversight Liability and Business Continuity Planning         157

Best Practices    158

 Section III

Critical Infrastructure                159

Chapter 9

The SAFETY Act—A Practioner’s Guide to the Homeland Security Technology Catalyst  161

(Mark J. Robertson and Jeffrey Kaliel)

 The SAFETY Act’s Protections     163

Designation as a Qualified Anti-Terrorism Technology      165

Certification of a QATT   169

Designation vs. Certification under the SAFETY Act           169

Government Contractor Defense             170

Public Readiness and Emergency Preparedness Act         171

SAFETY Act Responsibilities         175

Changes to DHS Regulations in 2007—Streamlining and Expansion            176

New Developments—FAR Amendment and Coordination of Procurements        178

The Office of SAFETY ACT Implementation—How the Process Works in Practice                  181

Summary                183

Chapter 10

Security-Based Reregulation of Transportation after 9/11: Giving Coherent Client Advice in a Volatile Rules Climate (Joel A. Webber)                185

Summary             185

An Illustration of the Present Transport Reregulation Climate     192

Where We Have Come From: Background to Logistics Regulatory Upheaval         194

Transportation’s Economic Deregulation               194

9/11: The Initial Federal Response to Protect Freight Flows          195

Later (2006–2008) Federal Response to Protect Freight Flows     197

A New Legal Advice Paradigm    199

Distinctive Rules Environment Calls for New Approach   200

Toward a New Legal Advice Paradigm: A Diagram or Chart, Not an Essay                201

A Beginning: Work of American Association of Exporters and Importers                 201

Conclusion                202

Chapter 11

Maritime Security Developments and TWIC Tribulations
(Jonathan K. Waldron)   203

Introduction       203

Revalidation of Vessel and Facility Security Plans               204

SAFE Port Act of 2006     205

Overall Port Security       205

Section 101. Area Maritime Transportation Security Plans and Salvage Response Plans    205

Section 107. Long-Range Vessel Tracking               205

Section 108. Establishment of Interagency Operational Centers for Port Security               206

Section 109. Notice of Arrival for Foreign Vessels on the Outer Continental Shelf               206

Section 110. Enhanced Crew Member Identification        206

Section 234. Foreign Port Assessments  207

Security Improvements at Port Facilities                207

Section 102. Requirements Relating to Maritime Facility Security Plans    207

Section 103. Unannounced Inspections of Maritime Facilities      208

Implementation of the TWIC Program    208

Background        208

Implementation Responsibilities and Key Actions             208

Escorting/Monitoring in Maritime Transportation

Areas    211

Personnel Required or Eligible to Obtain a TWIC                212

The TWIC Card, Reader Requirements, and Pilot

Testing                 213

 Homeland Security: Legal and Policy Issues

Enrollment Status, Compliance Dates, and

Enforcement     214

Future Challenges                215

Chapter 12

Chemical Facility Anti-Terrorism Standards (James W. Conrad, Jr.)          217

Background        217

The CFATS Program        219

Applicability        220

Security Vulnerability Assessments         223

Site Security Plans           224

Risk-Based Performance Standards         225

Inherent Safety                226

Background Check/Personnel Issues      228

Inspections/Enforcement            228

Information Protection 229

Preemption        229

The Inherent Risk of Future Legislation 230

Section IV

International Trade                233

Chapter 13

CFIUS and Foreign Investment (Jonathan G. Cedarbaum and Stephen W. Preston)          235

CFIUS    237

Basic Framework and History      237

Scope and Focus of CFIUS Review            239

Recent Developments   240

Industry-Specific Review Regimes            248

Telecommunications      248

Air Carriers          250

Nuclear Power  251

Conclusion          252

Chapter 14

Export Control Enforcement Developments (Thomas E. Crocker)              253

National Counter Proliferation Initiative                254

Increased Penalties        255

Enforcement Trends      256

The ITT Corporation Case             257

Material Omissions in a Voluntary Disclosure       258

Exceeding the Scope of an Existing TAA 259

Failed Corporate Compliance Culture      260

The ITT Plea Agreement               260

The Axion Indictment    261

Indictments and Arrests for Selling Electronic Components to Entity List Companies         262

Prosecutions of Academic and Others for Deemed Export Violations       263

Reexport Violations Prosecuted                264

IED Conspiracy Indictments         264

Higher Expectations for Compliance                265

Table of Cases   269

Index    271

Leave a Reply

Your email address will not be published. Required fields are marked *