Open Source Intelligence in the Face of Judicial Deference Andrew Moshirnia.

Copyright © 2013 by the Presidents and Fellows of Harvard College & Andrew Moshirnia. ARTICLE Valuing Speech and Open Source Intelligence in the Face of Judicial Deference __________________________ Andrew V. Moshirnia∗ Abstract In seeking to more effectively wage the war on terror, the United States government has come close to declaring war on speech related to terrorism. The Government has taken steps to silence and punish foreign propagandists, foreign reporters, and even Americans who have produced “coordinated” speech with foreign terrorist organizations.
 While this latter attempt to chill speech raises serious constitutional concerns, the United States Supreme Court has seen little wrong with this approach. Indeed, the Court contorted existing First Amendment jurisprudence in Holder v. Humanitarian Law Project so as to uphold 18 U.S.C. § 2339B, an expansive material support statute encompassing “coordinated” speech. These positions, no doubt taken with American safety in mind, not only damage our First Amendment jurisprudence, but also threaten to choke off the supply of open source intelligence, which derives from publicly available sources. This intelligence is especially vital in the modern war on terror taking place on the ground as well as on the Internet.

 This Article highlights the extraordinary deference shown by the Court in upholding a material support statute criminalizing non-violent speech and examines other governmental actions designed to chill foreign speech. This piece examines the deleterious effects chilling foreign speech will have on domestic security, detailing the importance of open source intelligence. Finally, this Article concludes by investigating the likely effect the Government’s positions will ∗ JD, May 2011, Harvard Law School; PhD—Informational Technology, May 2008, University of Kansas; Law Clerk to the Hon. Richard D. Cudahy, Senior Circuit Judge, United States Court of Appeals for the Seventh Circuit. Thanks are due to Jack Battaglia, Aaron Dozeman, Sonia Fleury, Hank Greenberg, Jordan Mobley, and Stephanie Kuhlmann for their excellent assistance. I would like to thank Professors Phil Malone, Brian Sheppard, and especially the late Bill Stuntz for their guidance and support. 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 386 have on Crisis Mapping, an exciting new technology that leverages open source intelligence, social media, and horizontal information sharing, to empower citizens and coordinate humanitarian efforts. I. Introduction Commentators often implore the Court to resist the false dichotomy of liberty and security. In times of crisis, governmental actors seem all too willing to sacrifice the former to guarantee the latter.1 Recently, the United States government has taken steps to chill the speech of foreign combatants, non-governmental organizations (NGOs), lawful permanent residents, and even the foreign and domestic press.

 The Government has adopted the position that First Amendment speech protections simply do not apply to trials of enemy aliens in American courts, a measure designed to silence foreign propagandists.2 Furthermore, the Government has previously detained an individual at Guantanamo Bay on the basis of his employment as a foreign reporter.3 Finally, the Government has claimed that association with terrorists may allow the criminalization of domestic speech that would otherwise enjoy First Amendment protection. While these actions are taken with security in mind, they undermine the ability of the United States to analyze and anticipate future threats. In the age of open source intelligence (OSINT), which is intelligence produced from publicly available information,4 our security often derives from the foreign production of 1 See Korematsu v. United States, 323 U.S. 214 (1944) (upholding internment of JapaneseAmericans); see also Dennis v. United States, 341 U.S. 494 (1951); Whitney v. California, 274 U.S. 357 (1927) (criminalizing all association, even non-violent association, with the communist party); Gitlow v. New York, 268 U.S. 652 (1925) (reintroducing the “the bad tendency test” found in Abrams v. United States, 250 U.S. 616 (1919) to punish political speech that might endanger the government); Schenck v. United States, 249 U.S. 47 (1919) (upholding the 1917 Espionage Act). 2 While courts are often cognizant of chilling, there is no shortage of justifications for why a speech restrictive statute does not have the effect of chilling. See e.g., United States v. AlBahlul, 820 F. Supp. 2d 1141, 1250 (USCMCR 2011) (arguing that the decision does not chill speech). The court’s justification disregards the effect penalties would have on future speech. 3 DEP’T OF DEF., UNCLASSIFIED SUMMARY OF EVIDENCE FOR ADMINISTRATIVE REVIEW BOARD IN THE CASE OF SAMI MUHEIDINE MOHAMED AL HAJ 33–35 (Sept. 4, 2006), http://www.dod.mil/pubs/foi/detainees/csrt_arb/ARB_Round_2_Factors_499- 598.pdf#33 [hereinafter HAJ REVIEW BOARD]. 4 National Defense Authorization Act of 2006, Pub. L. No. 109-163 § 931(a)(1), 119 Stat. 3136, available at http://www.gpo.gov/fdsys/pkg/PLAW- 109publ163/html/PLAW-109publ163.htm. 387 Harvard National Security Journal / Vol. 4 terror-related intelligence. Cutting off the flow of terror-related foreign and domestic speech will undermine that intelligence, and in turn, American safety. It is up to the Court to serve as a restraint on such reactions. However, the United States Supreme Court, in Holder v. Humanitarian Law Project, 5 (HLP) recently embraced exactly this trade-off, restricting some speech linked to foreign terrorist organizations (FTOs). There, the Court held that 18 U.S.C. § 2339B, a material support statute that restricts “material support” to foreign terrorist groups, could criminalize speech related to foreign terrorist groups, provided that the speech was made in “coordination” with those groups. To facilitate this trade-off, the Court diluted the exacting standard usually demanded for content-based speech restrictions and conducted a curtailed policy and ends-only analysis determining that reducing advocacy for terrorists is essential to the war on terror.6 Even if this conclusion were correct, the Court damaged our understanding of First Amendment doctrine through the application of a strange variation of strict scrutiny devoid of any means analysis.7 In this rare situation, the First Amendment doctrine of strict scrutiny was perfectly equipped to deliver the right result. In its analysis, the Court ignored the important relationship between foreign speech and domestic safety. By manipulating established standards to elevate security over liberty, the Court served neither principle. It is unclear how speech associated with foreign terrorist groups deserves less First Amendment protections when that speech does not advocate imminent lawless conduct. Consequently, the nebulous “coordination” test will likely chill otherwise constitutionally protected speech. HLP will signal to both Congress and lower courts that contentbased speech restrictions may survive strict scrutiny, provided that the Government cites a compelling interest in fighting the war on terror. Indeed, lower courts have followed suit, sustaining material support convictions involving the production of speech that would clearly fall below the legal standard for unprotected incitement speech. 5 130 S. Ct. 2705 (2010). 6 Id. at 2724–29 (using much of the opinion to justify the statute in light of the government’s evidence as to its necessity for the war on terror). 7 See HLP, 130 S. Ct. at 2734 (Breyer, J., dissenting). 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 388 HLP not only appears to be constitutionally dubious, but it will also likely decrease the ability of the intelligence community to fight the war on terror. Deviating from established jurisprudence to protect § 2339B will likely rob us of valuable OSINT at exactly the time when the need for OSINT is most acute. Fear of terrorism and a desire to defer to the executive caused the Court to underestimate the dangers of chilling domestic and foreign speech, including—most ironically—speech that is necessary to advance counterterrorism initiatives.8 These policies threaten academics, journalists, and other individuals with access to terrorists groups who produce OSINT, a vital stream of information for a domestic understanding and prosecution of the war on terror.9 While each of these positions is individually harmful, in combination they will exact far more damage on the Government’s intelligence efforts. Part II of this Article details the vital importance of OSINT in the war on terror, repeated Congressional findings of the same, and recommendations for stronger OSINT collection, analysis, and dissemination.10 Part III of this Article explores three recent examples—two by the Executive Branch and one by the Supreme Court—of government actions that disrupt OSINT. The three examples discussed in Part III are (1) the Executive Branch’s view that “incitement” speech—a category of speech that receives no First Amendment protection—is broader in scope in the context of an enemy alien’s solicitation trial; (2) the Executive Branch’s treatment and detention of foreign reporters; and (3) the Supreme Court’s adoption of an expansive definition of a material support statute in Holder v. Humanitarian Law Project. 11 This case is given special attention because it provided the Court with an opportunity to value speech and because recent jurisprudence counseled a different result. Part IV of this Article discusses the dangers of chilling both domestic and foreign speech and why this chilling implicates OSINT.12 Part V of this Article discusses the possible 8 For the proposition that these holdings arise out of a desire to defer to the executive see, for example, HLP, 130 S. Ct. at 2727–30. See also id. at 2727 (finding that “evaluation of the facts by the Executive, like Congress’s assessment, is entitled to deference”). 9 Brief for the Academic Researchers and the Citizen Media Law Project as Amici Curiae Supporting Respondents/Cross-Petitioners, Holder v. Humanitarian Law Project, 130 S. Ct. 2705 (2010) (Nos. 08-1498, 09-89) 2009 WL 4271309 [hereinafter CMLP Brief]. 10 Infra text accompanying notes 14–99. 11 Infra text accompanying notes 100–257. 12 Infra text accompanying notes 258–288. 389 Harvard National Security Journal / Vol. 4 impact of the positions of the Government on Crisis Mapping, a technology greatly aiding intelligence gathering and the coordination of humanitarian efforts.13 Part VI concludes, arguing that the Court should have halted the governments continued policy of chilling speech. The Court’s flirtation with a return to the tradition of restricting speech out of blind deference to military concerns has far reaching implications for how we approach the First Amendment, foreign policy, journalism, human rights, military intelligence and national security. II. The Importance of OSINT While the Government surely intends to increase U.S. security by limiting speech activities tied to terrorism, the removal of vital intelligence sources will put the United States in a more vulnerable position. This Part provides a definition of OSINT, a history of the United States’ approach to gathering this valuable intelligence, and the particular importance of OSINT in the war on terror. Separately, this Part provides an introduction to Crisis Mapping, perhaps the most powerful new use of OSINT that assists in intelligence gathering and coordinating humanitarian assistance. OSINT is defined as “the systematic collection, processing, analysis and production, classification and dissemination of information derived from sources openly available to and legally accessible by the public in response to particular Government requirements serving national security.”14 OSINT is commonly derived from newspapers, journals, radio, television, and the Internet.15 Analysts and military commanders estimate that 80 to 90 percent of U.S. intelligence comes from open sources.16 13 Infra text accompanying notes 289–369. 14 FLORIAN SCHAURER & JAN STORGER, OSINT REPORT 3/2010 2 (2010). 15 See RICHARD A. BEST, JR. & ALFRED CUMMING, CONG. RESEARCH SERV., RL 34270, OPEN SOURCE INTELLIGENCE (OSINT): ISSUES FOR CONGRESS, 5–6 (2007), available at http://www.fas.org/sgp/crs/intel/RL34270.pdf, [hereinafter CRS REPORT]. See also Noah Shachtman, All-Seeing Blimp on the Rise, http://noahshachtman.com/blog/page/63 (quoting Rear Adm. Ronald Henderson, deputy director of operations for the Joint Staff, “I spend a lot of time watching TV because—if you think about it—it’s the best intelligence network in the world”). 16 See NORTH ATLANTIC TREATY ORGANIZATION [NATO], OPEN SOURCE INTELLIGENCE READER 17 (2002); Robert David Steele, Open Source Intelligence, in STRATEGIC INTELLIGENCE: THE INTELLIGENCE CYCLE 98 (Loch Johnson ed., 2007). 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 390 According to the NATO OSINT Handbook, “OSINT is absolutely vital to the all-source intelligence process. OSINT provides the historical background information, the current political, economic, social, demographic, technical, natural, and geographic context for operations, critical personality information, and access to a wide variety of tactically useful information about infrastructure, terrain, and indigenous matters. . . . [T]his vital element of . . . intelligence. . . has been too long neglected.”17 OSINT publications specifically mention aid organizations, NGOs, and the traditional media as important sources of OSINT. The 2002 NATO OSINT handbook notes that NGOs have “deep direct knowledge that can be drawn upon through informal coordination.”18 Religious aid organizations are also “an essential source of overt information and expert perceptions.”19 Academic papers, too, are a valuable source of OSINT.20 OSINT intelligence assists tradecraft and the intelligence cycle in four ways, increasing: immediacy of information, the ease of validating existing information, efficiency in collecting information, and the opportunity to disseminate information. First, open sources may alert classified sources of rapidly changing events.21 CIA agents learned of the fall of the Berlin Wall by watching it on Television.22 More recently, intelligence agencies tracked the development of the green revolution in Iran by examining Twitter messages (Tweets), blog posts, and YouTube uploads.23 Second, OSINT lends context to and validates existing classified 17 NATO OPEN SOURCE INTELLIGENCE HANDBOOK 36 (2001) [hereinafter OSINT Handbook]. 18 Id. 19 Id. 20 See MARK M. LOWENTHAL, INTELLIGENCE, FROM SECRETS TO POLICY 79 (2003); CRS Report, supra note 15, at 6–7. Robert Steele, an OSINT expert, argues that intelligence must derive from the “seven tribes” of intelligence: government, military, law enforcement, business, academic, ground truth (non-governmental and media), and civil (citizens, labor unions, religions). Robert David Steele, Open Source Intelligence 129, 145 n.2, in HANDBOOK OF INTELLIGENCE STUDIES, (Loch K. Johnson, ed., 2007). 21 CODY BURKE, FREEING KNOWLEDGE, TELLING SECRETS: OPEN SOURCE INTELLIGENCE AND DEVELOPMENT 21 (2007); OSINT Handbook, supra note 17, at 39–40. 22 ANTONIO J. MENDEZ, THE MASTER OF DISGUISE: MY SECRET LIFE IN THE CIA 337 (1999); see also OSINT Handbook, supra note 17, at 39–40. 23 Mark Landler & Brian Stetler, Washington Taps Into a Potent New Force in Diplomacy, N.Y. TIMES, June 16, 2009, http://www.nytimes.com/2009/06/17/world/middleeast/17media.html?_r=0. The use of trackback scripts to monitor Twitter is fairly simple and can give early warning about 391 Harvard National Security Journal / Vol. 4 information.24 Third, OSINT increases the efficiency of the intelligence effort by focusing the attention of valuable classified assets. If open sources provide information sufficient to answer an intelligence objective, covert assets can devote their attention to hidden activities. Finally, OSINT provides the intelligence community with the opportunity to reveal information without jeopardizing classified sources.25 OSINT can therefore be more easily shared with other nations, NGO’s, and the public at large. Collaboration of this kind is especially important in the global war on terror, with a widespread enemy and numerous intelligence agencies for both national and multinational groups.26 A. The Importance of OSINT in Context of Novel Terror Threat The United States has turned to OSINT when traditional military intelligence has failed. In 1941, the United States established the Foreign Broadcast Monitoring Service (FBMS) under the FCC. 27 Perhaps the most famous example of using OSINT was the analysis of orange prices in Paris to determine the success of bridge bombing missions during WWII.28 Six years later, FBMS was renamed the Foreign Broadcast Intelligence Service (FBIS), 29 put under the control of the War Department,30 and finally placed under CIA control. 31The FBIS detected several events, including the SinoSoviet split, that were not predicted by the CIA.32 Following the World Trade Center attacks of 2001, several government commissions noted that data risk. See Tracking Tweets in your SIEM, /DEV/RANDOM (Feb. 27, 2012), http://blog.rootshell.be/2012/02/27/tracking-tweets-in-your-siem/. 24 OSINT Handbook, supra note 17, at 39–40. 25 Id. at 33, 39–40 26 BURKE, supra note 21, at 21. 27 See JOSEPH E. ROOP, FOREIGN BROADCAST INTELLIGENCE SERVICE: HISTORY PART I: 1941–1947 7–8 (1969), available at http://www.foia.cia.gov/sites/default/files/FBIS_history_part1.pdf. 28 See Maj. D. Marshall Bornn, Service members, civilians learn to harness power of Open Source Information, Army.mil, Jan. 9 2013, http://www.army.mil/article/94007; see also CARL J. SCHNEIDER & DOROTHY SCHNEIDER, WORLD WAR II: EYEWITNESS HISTORY 144 (2007); Nathan Siebach, OPSEC: Operations Security, 2 THE DIAMOND JOURNAL 8 (2009). 29 See ROOP, supra note 27, at 50. 30 Id. at 280. 31 See id. at 299, 300 (noting transfer to the Central Intelligence Group, the successor of the OSS, and the direct predecessor of the CIA). 32 BURKE, supra note 21, at 13. 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 392 the Intelligence Community had failed to take advantage of open source intelligence and recommended a consolidated OSINT program.33 Numerous congressional commissions have urged the intelligence community to recognize the importance of OSINT in the face of novel security threats. In 1996, the Aspen Brown Commission criticized the Intelligence Community for its failure to utilize open source information. Intelligence agencies were moving “inexplicably slow[ly],” failing to provide analysts with a computer infrastructure or access to existing open source data bases. Though the 9/11 Commission did not focus on OSINT, it did suggest the establishment, within the CIA, of a clearinghouse for open source information. According to a 2007 report,34 the 9/11 Commission thought OSINT was important but simply did not have enough time to evaluate the issue. The Intelligence Reform and Terrorism Prevention Act of 2004 contained a consensus on the need for an open source center to collect and analyze open source intelligence.35 Congress noted that OSINT “[is] a valuable source that must be integrated into the intelligence cycle to ensure the United States policymakers are fully and completely informed.”36 Similarly, in 2005, the commission on Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (the WMD Commission), urged the creation of an open source center and noted that “[r]egrettably, all too frequently these ‘non-secret’ sources are undervalued and underused by the Intelligence Community.”37 The importance of OSINT has also been touted by members of the intelligence community. George Tenet, the Former Director of the CIA, and other commentators argued that a failure to integrate OSINT into the 33 NAT’L COMM’N ON TERRORIST ATTACKS UPON THE UNITED STATES, THE 9/11 COMMISSION REPORT 399–400, 413 (2004). 34 CRS Report, supra note 15, at 10–11. 35 See Section 1052, Pub. L. 108–458, 118 Stat. 3638 (2004). 36 Id. 37 THE COMMISSION ON THE INTELLIGENCE CAPABILITIES OF THE UNITED STATES REGARDING WEAPONS OF MASS DESTRUCTION, 395 (2005); BURKE, supra note 21, at 21 (“The use of OSINT has been stymied by the mistaken belief that only secrets hold intelligence value. NATO identifies this as ‘excessive secrecy and compartmentalization,’ an over reliance on select methods in the name of operational security.”). 393 Harvard National Security Journal / Vol. 4 intelligence cycle38 caused agencies to miss the lead up to India’s detonation of three nuclear devices in 1998.39 While the failure to predict the arrival of a new nuclear power was an embarrassment, intelligence failures take on a much greater urgency when placed in the terrorism context. Intelligence analysts have repeatedly noted that OSINT is vital in the war on terror, primarily due to the diffuse nature of the terrorist threat and America’s reliance on multiple international allies.40 Stephen Mercado, a CIA analyst, noted that OSINT or overt intelligence, often betters covert intelligence in speed, quantity, quality, clarity, ease of use, and affordability.41 Furthermore, Mercado “maintain[s] that OSINT often equals or surpasses secrets in addressing such intelligence challenges . . . as proliferation, terrorism, and counterintelligence.”42 This is especially true as “[i]t is virtually impossible to penetrate a revolutionary terrorist organization, particularly one structured and manned the way al-Qa`ida is.”43 Instead, we must rely “on the intelligence community’s overt collectors and analysts.”44 38 See generally Harold M. Greenberg, Is the Department of Homeland Security an Intelligence Agency?, 24 J. INTELLIGENCE & NAT. SEC. 216–35 (2009). 39 CRS REPORT, supra note 15, at 23–24. 40 See, e.g., Using Open-Source Information Effectively: Hearing Before the Subcomm. On Intelligence, Info. Sharing, and Terrorism Risk Assessment of the H. Comm. on Homeland Sec., 109th Cong. 13 (2005) (statement of Eliot A. Jardines) (“From Pea[r]l Harbor to the September 11th terrorist attacks, intelligence failures have largely resulted not from a lack of information, but rather the inability to effectively disseminate that information or intelligence. In looking at the nature of the homeland security and first responder communities, it is apparent that open source intelligence is particularly useful. Due to its unclassified nature, OSINT can be shared extensively without compromising national security.”). 41 Stephen C. Mercado, Reexamining the Distinction Between Open Information and Secrets, 49 CIA STUD. IN INTELLIGENCE 2 (2005), available at https://www.cia.gov/library/center-for-thestudy-of-intelligence/csi-publications/csistudies/studies/Vol49no2/reexamining_the_distinction_3.htm. 42 Id. 43 Stephen C. Mercado, Sailing the Sea of OSINT in the Information Age, 48 CIA STUD. IN INTELLIGENCE 3 (2004), available at https://www.cia.gov/library/center-for-the-study-ofintelligence/csi-publications/csi-studies/studies/vol48no3/article05.html. See also Brief for Robert D. Steele and Other Former Members of the U.S. Intelligence Community as Amicus Curiae Supporting Petitioner, Al Bahlul v. United States, 2013 WL 297726 (D.C. Cir. Jan. 25, 2013), reh'g en banc granted, order vacated Apr. 23, 2013 (No. 11-1324), 2012 WL 1423657 at *8 (noting that MICHAEL SCHEUR, THROUGH OUR ENEMIES’ EYES: OSAMA BIN LADEN, RADICAL ISLAM, AND THE FUTURE OF AMERICA (1st ed. 2002) “is a book based wholly on open-source materials and which is relied upon by many in the 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 394 The use of OSINT in the fight against al-Qaeda is especially important in light of the technological versatility of that organization. The as-Sahab institute, al-Qaeda’s complex multimedia production and Internet-based messaging wing, provides an “example of why open source collection and analysis is so important in today’s technology-driven and globalized world.”45 Al-Qaeda’s use of Internet channels limits detection by conventional intelligence gathering, allowing it to plot with relative impunity. Furthermore, al-Qaeda’s rapid adoption of new technologies is well known, 46 reinforcing our own need to implement flexible intelligence strategies, based in large part on open resources. In the words of one intelligence official, “[open source information] is no longer the icing on the cake, it is the cake itself.”47 It makes little sense to stem the flow of this valuable strategic resource in the name of greater security. B. Historical Examples of the Effectiveness of OSINT Due to the fact that OSINT is “[n]either glamorous nor adventurous,”48 it is often discounted. For many outside the intelligence community, the notion of national intelligence gathering evokes images of covert meetings with deep cover agents. But this simply does not reflect reality. Lt. Gen. Samuel V. Wilson, former director of the Defense Intelligence Agency, noted that “Ninety percent of intelligence comes from open sources. The other ten percent, the clandestine work, is just the more dramatic. The real intelligence hero is Sherlock Holmes, not James Bond.”49 This Section seeks to combat OSINT’s handicap: the lack of understanding that it is open information collection and analysis that undergirds the intelligence cycle. There are numerous successful OSINT Intelligence Community, as well as by policy makers and law enforcement involved in counter-terrorism efforts”) [hereinafter Amicus Intelligence Brief]. 44 Mercado, supra note 43. 45 CRS REPORT, supra note 15, at 3. 46 Id. at 6. See, e.g., Arnaud de Borchgrave, Networked and Lethal, WASH. TIMES, Sept. 25, 2007, at 18 (“[A]l-Qaida is right on the cutting edge of the adoption of new technologies. They grab hold of the new stuff as soon as it becomes available and start using it.”). 47 CRS REPORT, supra note 15, at 3. 48 Mercado, supra note 43. 49 Richard S. Friedman, Open Source Intelligence: A Review Essay, 285, in INTELLIGENCE AND THE NATIONAL SECURITY STRATEGIST: ENDURING ISSUES AND CHALLENGES (2006) (quoting Lt. Gen. Sam Wilson, USA Ret. Former Director, Defense Intelligence Agency). 395 Harvard National Security Journal / Vol. 4 case studies demonstrating the importance of civilian data collection and intensive data analysis. 1. Reporter Interviews Intelligence targets often volunteer vital information to journalists. Mercado provides one such story, stressing the importance of reporters in debriefing subjects: Stanislav Levchenko, a KGB officer working under cover as a reporter in Japan, defected to the United States in 1979. In 1983, a Japanese journalist conducted more than 20 hours of interviews with him, during which the former operative named agents and discussed tradecraft. The resulting book and Levchenko's press conferences were, according to a US intelligence officer, more revealing than his CIA debriefing.50 Journalists have played a vital role in the War on Terror by locating terrorists and disseminating al-Qaeda produced videos, which are themselves useful pieces of OSINT. For example, Al-Jazeera reporter Yosri Fouda was invited to interview two al Qaeda leaders, Khalid Sheikh Mohammed and Ramzi Bin AlShibh.51 During the interview Mohammed confirmed his place in the al-Qaeda hierarchy, discussed AlShibh’s role in planning the World Trade Center attacks, and confirmed that al-Qaeda was responsible for the attacks.52 Mohammed also used aliases of then-at-large Osama Bin Laden.53 Finally, Mohammed gave Fouda several video disks 50 Mercado, supra note 43; see also Amicus Intelligence Brief, supra note 43, at *13 n. 20 (“Credentialed and accomplished foreign journalists and reporters working for news organizations who produce films and articles could also be deterred. Foreign reporting is often a vital source of open source intelligence. One example is the Al Jazeera reporter Yosri Fouda, who tracked down two al Qaeda leaders, Khalid Sheikh Mohammed and Ramzi Bin AlShibh, on his own before they were captured by U.S. forces. Although al Qaeda contacted and provided Mr. Fouda with information to help their own cause, Mr. Fouda's openly published book Masterminds of Terror was an enormous benefit to U.S. intelligence officials.”). 51 We Left Out Nuclear Targets, For Now, GUARDIAN, Mar. 2, 2003, http://www.guardian.co.uk/world/2003/mar/04/alqaida.terrorism. 52 Id. (“‘I am the head of the al-Qaida military committee,’ he began, ‘and Ramzi is the coordinator of the Holy Tuesday operation. And yes, we did it.’”). 53 Id. (“Sheikh Abu Abdullah,” sometimes “Sheikh Osama” or simply “the Sheikh.”). 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 396 and cassettes, including the last statement of one of the hijackers, an alQaeda documentary about “the new crusades” and a video of the beheading of Daniel Pearl. Fouda later published a book, Masterminds of Terror, which was of enormous help to the U.S. intelligence community.54 Both Mohammed and AlShibh were later apprehended by U.S. forces. 2. Parsing Foreign Diction The FBIS also had a long string of successes based on careful analysis of foreign dispatches, correctly predicting the Sino-Soviet split,55 the 1979 Chinese invasion of Vietnam,56 and the Soviet military withdrawal from Afghanistan.57 Predicting the Sino-Soviet Split. Western observers assumed that the relative friendship of the Soviet Union and the People’s Republic of China would be long lasting, due to geo-political concerns and shared ideologies.58 However, following the death of Stalin, the relationship deteriorated, with China criticizing Soviet proxies and the Soviets doing likewise. The two countries openly argued at the 22nd Congress of the Communist Party of the Soviet Union in 1961. 59 Finally, in 1962 the two countries broke relations in the immediate aftermath of the Cuban Missile Crisis.60 The wider American intelligence community did not recognize any such split until 1963, when the PRC published The Chinese Communist Party’s Proposal Concerning 54 Amicus Intelligence Brief, supra note 43, at 13 n 20. See generally YOSRI FOUDA & NICK FIELDING, MASTERMINDS OF TERROR: THE TRUTH BEHIND THE MOST DEVASTATING TERRORIST ATTACK THE WORLD HAS EVER SEEN (2004). 55 Harold P. Ford, Calling the Sino-Soviet Split, CIA STUDIES IN INTELLIGENCE (1998–1999), available at https://www.cia.gov/library/center-for-the-study-of-intelligence/csipublications/csi-studies/studies/winter98_99/art05.html. 56 J. Niles Riddel, Deputy Director, Foreign Broadcast Information Service, Remarks at the First International Symposium – “National Security and National Competitiveness: Open Source Solutions” (Dec. 2, 1992), available at http://www.fas.org/irp/fbis/riddel.html. 57 NORTH ATLANTIC TREATY ORGANIZATION [NATO], OPEN SOURCE INTELLIGENCE READER 56–58 (2002); Riddel, supra note 56. 58 Ford, supra note 55. 59 RODERICK MACFARQUHAR, THE ORIGINS OF THE CULTURAL REVOLUTION: THE COMING OF THE CATACLYSM 1961–1966 128–29 (1997). 60 ALFRED D. LOW, THE SINO-SOVIET DISPUTE: AN ANALYSIS OF THE POLEMICS 131–35 (1976). 397 Harvard National Security Journal / Vol. 4 the General Line of the International Communist Movement,61 to which the USSR replied with an Open Letter of the Communist Party of the Soviet Union62 announcing formal ideological breaks between the respective Communist systems.63 By 1964, Mao asserted that the USSR had been the victim of a counter-revolution reintroducing capitalism. The FBIS predicted this split at least seven years before the mainline intelligence agencies realized what had occurred.64 In April 1956, FBIS noted that a Beijing People's Daily article had attacked the USSR’s “cult of the individual” and certain “important mistakes” Stalin had made.65 The article criticized the USSR’s eagerness to eliminate counterrevolutionaries, lack of preparedness before World War II, neglect of the agricultural sector, mishandling of the Yugoslav break with the Commitern, and, most notably, the crude implementation of policies in China. 66 At the same time, the article hailed Mao as “our great leader” and the true, all-out defender of “the theories of Marxism-Leninism.”67 The FBIS continued to point out that Sino-Russian and Sino-Soviet history, including land grabs by the then Russian Empire and mistreatment of the Chinese Communist Party counseled a future split. Tellingly, as late as 1963 the heads of the American intelligence community refused to recognize an imminent split.68 While the American Intelligence community accepted the reality of a Sino-Soviet split after 1963, American foreign 61 The Letter of the Central Committee of the Communist Party of China in Reply to the Letter of the Central Committee of the Communist Party of the Soviet Union of March 30, 1963, available at http://www.marxists.org/history/international/comintern/sino-sovietsplit/cpc/proposal.htm. 62 Open Letter of the Central Committee of the Communist Party of the Soviet Union to all Party Organizations, to all Communists of the Soviet Union, available at http://www.marxists.org/history/international/comintern/sino-sovietsplit/cpsu/openletter.htm. 63 Ford, supra note 55. 64 Id. 65 Id. 66 Id. 67 Id. 68 See Summary Record of 516th meeting of the National Security Council, 31 July 1963, Foreign Relations of the United States, 1961–1963, Vol. XXII, China, at 373. (“[Director of Central Intelligence] McCone added that, although the differences between the Russians and the Chinese are very great, he did not think they were very deep or that a final break between the two powers would occur.”). 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 398 policy lagged and continued to treat the split as temporary. As noted by one of the C.I.A.’s most influential analysts, Harold P. Ford: 69 By 1967, Nixon had come to the view that ‘American policy toward Asia must come urgently to grips with the reality of China . . . We simply cannot afford to leave China forever outside the family of nations, there to nurture its fantasies, cherish its hates, and threaten its neighbors.’ But it took later empirical military evidence to demonstrate that the SinoSoviet split was for real: armed hostilities in 1969 between Soviet and Chinese border forces, threats (or bluffs?) by Moscow that it might suddenly launch nuclear strikes to destroy China's nuclear weapons facilities, and the beginnings of a massive buildup of Soviet armed strength along China's borders. 70 Predicting Chinese Invasion of Vietnam. Like the Sino-Soviet split, Western observers had assumed that Chinese-Vietnamese relations would remain warm due to ideological, geo-political, and racial concerns.71 However, from 1974 on, a long series of land border incidents eroded SinoVietnamese relations.72 After Vietnam signed a mutual defense treaty on November 3, 1978, that was specifically aimed at China, China began to use increasingly bellicose language. As some have noted, “FBIS analysts anticipated the February 1979 Chinese invasion of Vietnam by demonstrating that the language used in authoritative Chinese warnings to Vietnam had almost never been used except in instances such as the 1962 Chinese intrusions into India in which Beijing had actually used military force.”73 Chinese forces invaded Vietnam on February 17, 1979, starting a war that would last 28 days and cost over 55,000 lives.74 69 Scott Shane, Harold P. Ford, C.I.A. Analyst, Dies at 89, N.Y. TIMES, Nov. 11, 2010, http://www.nytimes.com/2010/11/12/world/12ford.html?_r=0. 70 Ford, supra note 55. 71 See BRANTLY WOMACK, CHINA AND VIETNAM: THE POLITICS OF ASYMMETRY 175 (2006) (noting that the relationship between the two countries was described “as close as lips and teeth”). 72 RONALD BRUCE ST. JOHN, THE LAND BOUNDARIES OF INDOCHINA: CAMBODIA, LAOS AND VIETNAM, 35 (1998). 73 Riddel, supra note 56. 74 David R. Dreyer, One Issue Leads to Another: Issue Spirals and the Sino-Vietnamese War, 6 FOREIGN POL’Y ANALYSIS 297 (2010). 399 Harvard National Security Journal / Vol. 4 Predicting the Soviet Military Withdrawal from Afghanistan. The Soviet Union invaded Afghanistan in 1979, starting a nine-year conflict “involving nearly one million Soviet soldiers.”75 Years after the initial incursion with large Soviet loses, intelligence officials were uncertain of a timetable for Soviet withdrawal. The ascension to Secretary General of Mikhail Gorbachev, who had up to that time been seen as a party member loyal to the current Communist orthodoxy, seemed to most observers to promise little change in foreign policy. However, in May 1985, the FBIS correctly detected the change in policy leading to the February 1989 Soviet military withdrawal from Afghanistan. 76 Gorbachev raised Foreign Minister Andrei Gromyko, one of the original architects of the war, to the honorific office of President of the Presidium of the Supreme Soviet and replaced him with Eduard Shevardnadze, a noted critic of the war.77 Analysis of Gorbachev’s personnel moves was not the only clue of a policy change. The FBIS also noted the appearance of stories critical of the war in Soviet newspapers, the early returns of “Glasnost.”78 In effect, Gorbachev manipulated the Soviet media by allowing the unprecedented publishing of critiques of the war and then used the incredible appearance of critical press articles to foster a sense of public dissatisfaction with the war. 79 The FBIS monitored this effort and correctly predicted that Gorbachev’s actions would force a reluctant military withdrawal. This prediction could have allowed the United States to reduce covert aid to the mujahedin in anticipation of a rapid end to the war. 80 Such a reduction would have been advisable in order to limit further arming of radical Muslims who would later target Americans. 81 However, 75 Rafael Reuveny & Aseem Prakash, The Afghanistan War and the Breakdown of the Soviet Union, 25 REV. OF INT’L. STUD. 693, 696 (1999). 76 Riddel, supra note 56. 77 GREGORY ELLIOTT & MOSHE LEWIN, THE SOVIET CENTURY 238 (2005). 78 WILLIAM MALEY, THE AFGHANISTAN WARS 119–20 (2002). 79 For more on the impact of the war on the USSR, see Rafael Reuveny & Aseem Prakash, The Afghanistan War and the Breakdown of the Soviet Union, 25 REV. OF INT’L. STUD. 693 (1999). 80 This prediction also could have allowed the United States to craft a better plan for postwar treatment of the volatile Afghan situation and avoid a power vacuum. Of course, this was not the course taken, and the Taliban reaped the rewards of American apathy towards the region. 81 It is widely alleged that al-Qaeda grew from American funding, networking, and weapons related to the Soviet-Afghan war. See William D. Hartung, We Arm The World, TOMPAINE.COMMONSENSE (Oct. 27, 2006), http://www.tompaine.com/articles/2006/10/27/we_arm_the_world.php (“[T]he early foundations of al-Qaida were built in part on relationships and weaponry that came from 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 400 anti-Soviet sentiment, as well as other policy factors, prevented this from occurring. 3. Analyzing publishing patterns A great deal of OSINT may derive from analysis of so-called “gray” literature which include trip reports, working papers, discussion papers, unofficial government documents, proceedings, preprints, research reports, studies, and market surveys with limited public availability. While the text of documents contains actionable information, publishing patterns also provide valuable intelligence. During the Cold War, U.S. intelligence agents tracked the publication patterns of Soviet scientists. 82 When certain scientists ceased to publish for extended periods of time, this signaled that they were sequestered to work on new technologies.83 The known specialties of these scientists helped inform the actions of covert intelligence agents, who could be directed to investigate a possible Soviet break through. 84 C. Modern Datamining, Webmining, and OSINT: Terrorism Informatics While OSINT has traditionally relied on human driven intelligence, modern datamining and webmining techniques create the possibility for automaticity and quantitative-based investigations. These novel techniques have been employed in numerous ways by the intelligence community to create actionable information reports relating to the war on terror. This Section outlines several of these promising methods, including: deep web analysis, automated content analysis of jihadi recruitment videos, semantic analysis of language used in jihadi forums, social network analysis, and terrorist detection using web browsing pattern analysis. Deep Web Analysis. Terrorist entities frequently make use of websites that are beyond the reach of search engines—the so-called “Deep Web.”85 the billions of dollars in U.S. support for the Afghan mujahadin during the war to expel Soviet forces from that country.”). 82 See Amy Sands, Integrating Open Sources into Transnational Threat Assessments, in TRANSFORMING U.S. INTELLIGENCE 63, 67–68 (Jennifer E. Sims & Burton Gerber eds., 2005). 83 Id. 84 Id. 85 Mohit Kumar, What is the Deep Web? A First Trip Into the Abyss, HACKER NEWS, May 30, 2012, http://thehackernews.com/2012/05/what-is-deep-web-first-trip-into-abyss.html. 401 Harvard National Security Journal / Vol. 4 These non-indexed sites may use a variety of methods to prevent detection from web crawlers (that is, automated browsers that follow hyperlinks, indexing sites for later queries).86 Analysts in 2006 began a detailed web analysis in order to detect Internet use patterns. 87 Specifically, analysts sought to determine the technological sophistication of various terror groups, their preferred avenues for disseminating technological propaganda, and their use of covert messaging. As a first step, analysts compiled a list of known terrorist groups and their associated URLs. 88 Next, this set of URLs was expanded through link and forum analysis—that is, an automated process examining out-links and in-links from a target URL and a semi-automated process combing message boards for links to forums posted by extremists. 89 Finally, after arriving at this expanded list, analysts tailored a web crawler to download all files, both textual and multimedia, from these sites.90 This automated crawler populated the study database with 1.7 million documents.91 The resulting investigation of coding style, file type, total link-ins, and other objective measures allowed for statistical analysis of organizational technological sophistication, content richness (examining the use of video and audio files), and site interconnectedness. 92 Analysis of Jihadi Recruitment Videos. Using a similar harvesting method, researchers downloaded 705 multimedia files used in jihadi recruitment.93 86 James Bruce, How To Build A Basic Web Crawler To Pull Information From A Website (Part 1), MAKEUSEOF.COM (Dec. 10, 2010), http://www.makeuseof.com/tag/build-basic-webcrawler-pull-information-website/. 87 Jialun Qin, Yilu Zhou, Edna Reid, & Hsinchun Chen, Studying Global Extremist Organizations’ Internet Presence Using the Dark Web Attribute System: A Three Region Comparison Study, in TERRORISM INFORMATICS: KNOWLEDGE MANAGEMENT AND DATA MINING FOR HOMELAND SECURITY 244–45 (Hsinchun Chen et al. eds., 2008). 88 Jialun Qin, Yilu Zhou, Edna Reid, & Hsinchun Chen, Studying Global Extremist Organizations’ Internet Presence Using the Dark Web Attribute System: A Three Region Comparison Study, in TERRORISM INFORMATICS: KNOWLEDGE MANAGEMENT AND DATA MINING FOR HOMELAND SECURITY 237 (Hsinchun Chen et al. eds., 2008). 89 Id. at 244. 90 Id. 91 Id. at 245. 92 Id. at 248–62. 93 Arab Salem, Edna Reid, & Hsinchun Chen, Content Analysis of Jihadi Extremist Groups’ Videos, in TERRORISM INFORMATICS: KNOWLEDGE MANAGEMENT AND DATA MINING FOR HOMELAND SECURITY 273 (Hsinchun Chen et al. eds., 2008) (see text and Table 13- 2). 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 402 Content was coded into video type, content properties, verbal expressions/quotations, and technical features (such as the use of logos). The study established a standard structure for these videos, identifying typical images (specifically transport vehicles and military convoys that are the frequent targets of insurgents), quotations, and identifiers. 94 The effort may lead to a more systematic means of identifying jihadi videos and their origin. Semantic Analysis. Researchers have examined the most frequent words and word-combinations used in particular jihadi forums.95 By identifying the diction most employed by groups, researchers have taken steps to create automated detection systems which will flag particular forums for review and use language as predictors of imminent events. Social Network Analysis. Links between terrorist web pages, blogs, and discussion forums can be visualized and analyzed in order to detect intergroup cooperation and alliances. 96 While terrorist affiliations are often uncertain, webmining may establish patterns of mutual assistance or antagonism between groups, providing the intelligence community with greater insight into field operations. Web Browsing Pattern Analysis. While monitoring the access points of known terrorist web sites may detect terrorist users, this resource intensive practice is not feasible in part due to floating IP addresses. 97 Instead, researchers have developed models for wide area network monitoring in which a detection system identifies suspected terrorists by analyzing the informational content of websites that those individuals access.98 Such a method is less likely than direct site monitoring to result in false positives, because cross-referencing has a higher rate of detecting terrorist users who 94 Id. at 277–83. 95 Ahmed Abbasi & Hsinchun Chen, Analysis of Affect Intensities in Extremist Group Forums, in TERRORISM INFORMATICS, supra note 93, at 285 . 96 V. Burris, E. Smith, & A. Strahm, White Supremacist Networks on the Internet, 33.2 SOC. FOCUS 215–35 (2000). 97 Yuval Elovici et al., Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS), in 3495 INTELLIGENCE AND SECURITY INFORMATICS LECTURE NOTES IN COMPUTER SCIENCE 244, 366 (2005). 98 Id. at 371. 403 Harvard National Security Journal / Vol. 4 access a large amount of clustered suspect content, for example accessing bomb making sites, jihadi sites, and maps of military deployment.99 These techniques provide multiple avenues to predict and combat terrorism, demonstrating the importance of content rich data. OSINT, be it based on modern automated datamining or traditional human driven analysis, relies on a rich environment of open information. Chilling the production of this information thwarts these valuable efforts, which by some accounts provide the great majority of our actionable intelligence. While the popular consciousness imagines that our intelligence results from secret agents and clandestine meetings, our vital intelligence flows instead from journalists, researchers, and academics. Unfortunately, recent legal positions by the U.S. Government and decisions by the Supreme Court threaten to chill the very speech that forms the foundation of our intelligence analysis. In doing so, the decision harms our nation’s capacity for intelligence gathering and heightens the security threats we face. III. Recent Government Positions Threaten to Chill Valuable Intelligence The Government’s and the Court’s recent legal stances are intended to chill sources of open source intelligence involving terrorists themselves, foreign reporters, and domestic individuals who have had contact with foreign terror organizations. In the trial and appeal of al-Qaeda propagandist, Ali Hamza Al-Bahlul, the Government has advanced the theory that no part of the First Amendment reaches enemy aliens tried in an American courtroom. 100 The chilling effects of HLP are exacerbated by the trial of Al-Bahlul. Taking these precedents together, a future court could merge the broad definition of material support with a solicitation charge decoupled from First Amendment limitations. That is, if the Court may disregard the First Amendment in solicitation cases involving foreign combatants and in material support cases involving Americans who have associated with terrorists, the Government will be emboldened to ignore First Amendment concerns in crimes involving the solicitation of material support for terrorism. The Government has also detained and threatened 99 Id. 100 Reply Brief for Government/Appellee, Al Bahlul v. United States, CMCR (No. 09-001), *5 (2009), available at http://www.defense.gov/news/2%20- %20Prosecution%20Reply%20Brief%20(30%20OCT%2009)%20(58%20pages).pdf [hereinafter Bahlul Reply]. 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 404 several foreign reporters, specifically noting the subsequent chilling of speech as a desired result. A. Stripping Judicial Review of Foreign Terrorist Organization (FTO) Designations As the Government’s speech restrictions flow from a speaker’s membership, association, or coordination with an FTO, it is necessary to first understand that the FTO designation process occurs with little judicial oversight or review. The perception of legitimacy plays a significant role in the listing and delisting of a group as an FTO.101 These determinations are opaque, may be the result of political trends rather than clear fact-finding, and not subject to meaningful judicial review.102 Public perceptions may also play an important role in this predicate determination. “The FTO designation has at least three consequences: the Secretary of the United States Treasury Department may freeze the FTO's assets, 8 U.S.C. § 1189(a)(2)(C); FTO members are barred from entering the United States, id. § 1182(a)(3)(B)(i)(IV), (V); and those who knowingly provide “material support or resources” to an FTO are subject to criminal prosecution, 18 U.S.C. § 2339B(a)(1).”103 A designated organization can seek review before the D.C. Circuit within thirty days after publication in the Federal Register of the Secretary’s designation, amended designation or determination in response to a petition for revocation.104 The court’s review is then based “solely upon the administrative record, except that the Government may submit, for ex parte and in camera review, classified information” that the Secretary used to reach her decision.105 If the designation is found to be arbitrary, capricious, and not in accordance with the procedures required by law, it must be set aside.106 However, this standard of review applies only to the first and 101 For a description of the FTO Designation Review Process, see People’s Mojahedin Org. of Iran v. U.S. Dep’t of State, 613 F.3d 220, 223 (2010). 102 See, e.g., People’s Mojahedin Org. of Iran v. Dep’t of State, 182 F.3d 17, 25 (D.C. Cir. 1999) (noting that “the record consists entirely of hearsay, none of it was ever subjected to adversary testing, and there was no opportunity for counter-evidence”). 103 People’s Mojahedin Org. of Iran v. Dep’t of State, 613 F.3d 220, 223 (D.C. Cir. 2010). 104 See 8 U.S.C. § 1189(c)(1) (2006). 105 Id. § 1189(c)(2). 106 See id. § 1189(c)(3). 405 Harvard National Security Journal / Vol. 4 second requirements for listing as an FTO, namely, (1) that the organization is foreign and (2) that it engages in terrorism or terrorist activity or retains the capability and intent to do so. The third criterion (that the organization’s activities threaten U.S. nationals or national security) is not reviewable in court, as it presents a political question. 107 The current scheme for review of FTO designation cannot seriously be called robust judicial review. The People's Mujahedin of Iran (MEK), for example, shows that political favor, rather than actual fact-finding, may determine a group’s designation. The group, made up of Marxist Iranian dissidents, focused its attacks again the Islamic Republic of Iran.108 The group was designated as an FTO in 1997, a move which one Clinton official characterized as “intended as a goodwill gesture to Tehran and its newly elected moderate president, Mohammad Khatami.”109 The group appealed this designation for the next 15 years. It presented very strong evidence when seeking de-listing (though it nonetheless unfairly failed to obtain delisting through the judiciary), including evidence that the group had: ceased its military campaign; renounced violence; handed over arms to U.S. forces in Iraq; cooperated with U.S. officials; shared intelligence with the United States regarding Iran’s nuclear program; disbanded its military units; had members sign a document rejecting violence and terror; obtained de-listing as a terrorist organization in the U.K. and the EU; and had letters of information presented on its behalf from retired members of the U.S. military, U.S. members of Congress, and U.K. members of parliament.110 107 People’s Mojahedin Org. of Iran v. U.S. Dep’t of State, 182 F.3d 17, 23 (D.C. Cir. 1999). 108 State Department, Patterns of Global Terrorism: 1997, App. B, Background Information on Terrorist Groups (Jan. 20, 2001), available at http://www.state.gov/www/global/terrorism/1997Report/backg.html (“The MEK directs a worldwide campaign against the Iranian Government that stresses propaganda and occasionally uses terrorist violence. During the 1970s, the MEK staged terrorist attacks inside Iran to destabilize and embarrass the Shah's regime; the group killed several US military personnel and civilians working on defense projects in Tehran. The group also supported the takeover in 1979 of the US Embassy in Tehran. In April 1992 the MEK carried out attacks on Iranian embassies in 13 different countries, demonstrating the group's ability to mount large-scale operations overseas.”). 109 Norman Kempster, U.S. Designates 30 Groups as Terrorists, L.A. TIMES, Oct. 9, 1997, http://articles.latimes.com/1997/oct/09/news/mn-40874. 110 See People’s Mojahedin Org. of Iran v. U.S., 613 F.3d 220 (D.C. Cir. 2010); Josh Rogin, Are the MEK’s U.S. Friends its Worst Enemies?, FOREIGN POL’Y, Mar. 8, 2012, 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 406 The Government noted MEK’s possible consideration of suicide attacks in Iraq and the MEK’s possibly fraudulent fundraising efforts as justification for refusing to de-list the group. 111 The Government’s argument was hard to understand, as the MEK was confined to an American-controlled camp at this time and therefore had little to no operational capacity. In a climate where the Government may rely largely on classified (and therefore uncontested) hearsay,112 there are few, if any, effective avenues of correcting or overturning FTO designations through the courts. The MEK’s expensive lobbying efforts eventually paid off. 113 Secretary of State Hillary Clinton de-listed the MEK in September 2012.114 Curiously, this de-listing occurred after reports that linked MEK to Israeli- http://thecable.foreignpolicy.com/posts/2012/03/08/are_the_mek_s_us_friends_its_wors t_enemies. 111 See People’s Mojahedin, 613 F.3d at 230 (“Some of the reports included in the Secretary's analysis on their face express reservations about the accuracy of the information contained therein. See, e.g., Suppl. Admin. R., MEK-11 (describing “possible plans to attack [the] international zone in Baghdad” but conceding that ‘the ultimate sources of the information was [sic] unknown and as such, their access, veracity, and motivations were unknown’). Similarly, while including reports about the Karbala suicide attack plot described above, the Secretary did not indicate whether she accepted or discredited the reports and we do not know whether the PMOI can rebut the reports.”). 112 Id. at 225–26. (“After reviewing an administrative record consisting of both classified and unclassified information, the Secretary denied the PMOI's petition and . . . provided the PMOI with a heavily redacted 20-page administrative summary of State's review of the record, which summary referred to 33 exhibits, many of which were also heavily or entirely redacted.”). 113 Scott Shane, For Obscure Iranian Exile Group, Broad Support in U.S., N.Y. TIMES, Nov. 26, 2011, http://www.nytimes.com/2011/11/27/us/politics/lobbying-support-for-iranianexile-group-crosses-party-lines.html?pagewanted=all (noting the high cost of speaking fees for former American politicians); Glenn Greenwald, Likely Victory for MeK Shills, SALON, May 15, 2012, http://www.salon.com/2012/05/15/likely_victory_for_mek_shills/ (“[F]ormer officials have been paid large sums of money to speak at MeK events and meet with its leaders, thus developing far more extensive relations with this Terror group than many marginalized Muslims who have been prosecuted and punished with lengthy prison terms for ‘materially supporting a Terrorist organization.’”). 114 Scott Shane, Iranian Dissidents Convince U.S. to Drop Terror Label, N.Y. TIMES, Sept. 21, 2012, http://www.nytimes.com/2012/09/22/world/middleeast/iranian-oppositiongroup-mek-wins-removal-from-us-terrorist-list.html?pagewanted=all (“Presumably it did not hurt the group’s case that among the dozens of prominent American supporters were R. James Woolsey and Porter J. Goss, former C.I.A. directors; Louis J. Freeh, the former F.B.I. director; President George W. Bush’s homeland security secretary, Tom Ridge, and attorney general, Michael B. Mukasey; and President Obama’s first national security adviser, Gen. James L. Jones.”). 407 Harvard National Security Journal / Vol. 4 backed assassinations of Iranian nuclear scientists,115 leading some commentators to conclude that the United States does not oppose terrorism in line with American interests. 116 At least one analyst suggested that the MEK’s successful de-listing campaign will encourage FTOs to engage in lobbying. 117 B. Al-Bahlul—Silencing Propagandists The government has taken steps to silence terrorist propagandists on the grounds that their speech is incitement. However, the production of these propaganda videos provides the American military with vital information, and the government’s efforts to dilute the incitement standard will likely have spill over effects in cases involving individuals who are not deemed enemy combatants. Ali Hamza Ahmed Suliman Al-Bahlul (“Al-Bahlul”) is an admitted member of al-Qaeda. He was captured by Pakistani forces and turned over to U.S. custody in December 2001. 118 He has been detained in Guantanamo Bay since January 2002. Roughly seven years after his capture,119 Al-Bahlul was tried before a military commission. 115 Richard Engel & Robert Windrem, Israel Teams with Terror Group to Kill Iran's Nuclear Scientists, U.S. Officials Tell NBC News, NBC NEWS, Feb. 9, 2012, http://rockcenter.nbcnews.com/_news/2012/02/08/10354553-israel-teams-with-terrorgroup-to-kill-irans-nuclear-scientists-us-officials-tell-nbc-news. 116 Glenn Greenwald, Five lessons from the De-Listing of MEK as a Terrorist Group, GUARDIAN, Sept. 23, 2012, http://www.guardian.co.uk/commentisfree/2012/sep/23/iran-usa (“Violence used by the US and its allies (including stateless groups) can never be terrorism, no matter how heinous and criminal.”). 117 Spencer Ackerman, Iranian Cult Is No Longer Officially a Terrorist Group, WIRED, Sept. 21, 2012, http://www.wired.com/dangerroom/2012/09/mek-terrorists/ (quoting Mila Johns of the University of Maryland’s National Consortium for the Study of Terrorism and Responses to Terrorism, “The delisting of the MEK, following a well-funded political lobby campaign, creates the dangerous impression that it is possible for terrorist organizations to buy their way off the [terrorism] list.”); Analysts React to MEK Terror Delisting, PROJECT ON MIDDLE EAST DEMOCRACY (Sept. 25, 2012), http://pomed.org/blog/2012/09/analystsreact-to-mek-terror-delisting.html. 118 Bahlul Reply, supra note 100, at *9. 119 Id. at *3. This delay comprised numerous aborted adjudications and arraignments, as the Supreme Court ordered significant changes to the military commission system. In February 2004, the Deputy Appointing Authority charged Al-Bahlul with a single charge of Conspiracy, comprising Al-Bahlul’s alleged membership in and support of the terrorist organization al Qaeda. A military commission was set to adjudicate this charge but in 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 408 In February 2008, the Government brought three charges against Al-Bahlul: Conspiracy120 (for membership in al-Qaeda); Solicitation121 (for the production of a video State of the Ummah advocating membership in alQaeda); and Material Support for Terrorism122 (for the acts allegedly taken in furtherance of the aforementioned conspiracy). In September 2008, AlBahlul entered a plea of not guilty, but stated his intention to boycott the trial and to provide no legal defense.123 Accordingly, the defense remained silent during the course of the trial. 124 Al-Bahlul produced a video called State of the Ummah. 125 The video is also known as the “Cole Video” because it contains several scenes of the aftermath of the bombing of the U.S.S. Cole. The Government bases the great majority of its case against Al-Bahlul on his production of this video; it serves as the basis for the solicitation charge. The State of the Ummah is a documentary that is largely made up of news footage and speeches from Osama Bin Laden.126 Courts have long recognized the preeminent importance of the freedom of expression. 127 The State may not simply condemn or prohibit the transmission of unpopular, offensive, or even destabilizing ideas. Accordingly, the United States Supreme Court in Brandenburg v. Ohio, 128 held per curiam that a State may not bring a charge of incitement or solicitation of violence, “except where such advocacy is directed to inciting or November 2004, Judge James Robertson’s stay in Hamdan v. Rumsfeld, effectively halted proceedings in all military commissions. The Supreme Court’s decision in Hamdan v. Rumsfeld, and the passage of the Military Commissions Act of 2006 overhauled the military commission system. Hamdan v. Rumsfeld, 344 F. Supp. 2d 152 (D.D.C. 2004) rev'd, 415 F.3d 33 (D.C. Cir. 2005) rev'd and remanded, 548 U.S. 557, 126 S. Ct. 2749, 165 L. Ed. 2d 723 (2006). 120 Bahlul Reply, supra note 100, at *3; 10 U.S.C. § 950V(b)(28) (2006). 121 Bahlul Reply, supra note 100, at *3; 10 U.S.C. § 950V(b)(1) (“Any person subject to this chapter who solicits or advises another or others to commit one or more substantive offenses triable by military commission under this chapter shall, . . . be punished . . . .”). 122 Bahlul Reply, supra note 100, at *3; 10 U.S.C. § 950V(b)(25). 123 Bahlul Reply, supra note 100, at *4. 124 Id. 125 Id. at *5. 126 Id. at *5–7. 127 See Murdock v. Pennsylvania, 319 U.S. 105, 115 (1943). 128 Brandenburg v. Ohio, 395 U.S. 444, 447 (1969). 409 Harvard National Security Journal / Vol. 4 producing imminent lawless action and is likely to incite or produce such action.” 129 In Brandenburg, the Court held that a KKK rally, in which hooded figures brandished weapons, shouted “Bury the niggers” and promised “revengeance [sic] . . . [against] our President, our Congress, [and] our Supreme Court,” was “mere advocacy.”130 First Amendment protections require the implementation of Brandenburg’s narrow definition of incitement.131 Typically, a court would employ a Brandenburg analysis for the crime of solicitation or incitement, which differentiates protected advocacy from proscribable incitement. However, the presiding military judge in Bahlul conducted neither a Brandenburg analysis, nor offered a Brandenburg limiting instruction requiring the advocacy be delivered to specific individuals who are likely to act,132 or that there be an unambiguous causal link between the advocacy and violence that has already occurred.133 Indeed, the judge failed to provide a limiting instruction of any kind in relation to the solicitation charge.134 On November 3, 2008, the commission returned a verdict of guilty on all charges, except on one overt act alleged in Counts I and III. 135 On 129 Id. 130 Id. at 447 n.1; id. at 449. Subsequent cases have clarified the Brandenburg standard: the speaker must address specific individuals, Hess v. Indiana, 414 U.S. 105, 108–109 (1973) and must actually authorize the violence to be held liable. N.A.A.C.P. v. Claiborne Hardware, 458 U.S. 886, 930 (1982). 131 Cf. Virginia v. Black, 538 U.S. 343, 359–60 (2003) (internal citations omitted) (discussing the true threats doctrine and defining true threat for purposes of legal prosecution); Planned Parenthood of Columbia/Willamette, Inc. v. Am. Coal. of Life Activists, 290 F.3d 1058, 1079–80, 1085 (9th Cir. 2002) (en banc) (holding that “Wanted” posters and listing of abortion doctors' home and work addresses went “well beyond the political message” that “abortionists are killers who deserve death” and were true threats that suggested message “You're Wanted or You're Guilty; You'll be shot or killed” in light of the prior murders of physicians who appeared on Wanted posters). 132 Hess v. Indiana, 414 U.S. 105, 108–09 (1973). 133 See NAACP v. Claiborne Hardware, 458 U.S. 886, 918 (1982). 134 Bahlul Reply, supra note 100, at *19. While the record is unclear as to whether counsel for Al-Bahlul requested any limiting instruction, such a request is unnecessary when limiting instructions are constitutionally required. The presiding military judge has an “independent duty to determine and deliver appropriate instructions.” United States v. Westmoreland, 31 M.J. 160, 164 (C.M.A. 1990). 135 Bahlul Reply, supra note 100, at *4. 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 410 that same day, the commission sentenced Al-Bahlul to life imprisonment.136 The case was scheduled for reargument before the commission and was affirmed.137 In response to Al-Bahlul’s appeal, the Government took the position that no part of the First Amendment reaches foreign speakers, even those tried in American courtrooms under American statutes.138 Al-Bahlul appealed to the D.C. Circuit, which upheld the conviction with minimal First Amendment analysis. Members of the intelligence community have pointed out the potential damage of the Government’s position. Besides the fact that State of Ummah appears to have actually had consequences that ran counter to alQaeda’s intent, 139 these types of videos provide the American military with vital information. The Government’s intention to chill production of these videos, however ineffectual, remains a matter of grave concern for the intelligence community.140 C. Al-Haj – Chilling Foreign Reporters Faced with governmental harassment and possible interminable detention, foreign reporters may be wary of covering stories related to FTOs. This would represent a great blow against the liberty and safety of American citizens. A dearth of coverage will weaken the marketplace of ideas and further deprive our intelligence services of valuable information. 136 Id. 137 See, e.g., United States v. Al-Bahlul, 820 F. Supp. 2d 1141 (USCMCR 2011). 138 Bahlul Reply, supra note 100, at *5 –*11. Members of the intelligence community have pointed out that Bahlul’s video was valuable open source intelligence. “Recognizing the value of open source intelligence, Congress created the National Open Source Center under the Central Intelligence Agency for the collection and analysis of open source intelligence. Contrary to public policy however, Petitioner, Ali Hamza Ahmad Suliman al Bahlul (“al Bahlul” or“Petitioner”), is being punished for speech that is and should be protected under the First Amendment. Al Bahlul has been sentenced to life imprisonment for creating in Afghanistan in early 2001 a propaganda video directed towards and widely seen by a U.S. audience, titled State of the Ummah. The video was compiled from already publicly available information. It expresses the motivations of and identifies key figures in al Qaeda. Such information is valuable open source intelligence. The future dissemination of valuable information such as this should be encouraged and, at the very least, not prevented.” Amicus Intelligence Brief, supra note 43, at 2. 139 Amicus Intelligence Brief, supra note 43, at 7. 140 Id. at 6. 411 Harvard National Security Journal / Vol. 4 It is little comfort that the statutes at issue in Al-Bahlul only apply to individuals deemed enemy combatants.141 The United States has previously deemed a foreign journalist an enemy combatant, largely on the basis of travel taken while in the employ of Al-Jazeera and his alleged interviews of terrorist leaders. 142 Sami Mohy El Din Muhammed Al Haj, a Sudanese journalist for Al-Jazeera, was detained by the United States for over six years. 143 Though the Government reviewed Al Haj’s enemy combatant status twice, the Government declined to release Al Haj in either instance. Among the “factors favor[ing] continued detention” listed in the Administrative Review of Detention of the Enemy were Al Haj’s experience as a reporter for Al-Jazeera, and the fact that he had interviewed several Taliban officials. 144 Al Haj claims that during detention, his interrogators asked “How much does bin Laden pay Al Jazeera for all the propaganda that Al Jazeera supplies?”145 It appears that the Government viewed the chilling effect of detention as a positive development. In “primary factors favor[ing] release or transfer” of Haj, “the detainee noted that he would exercise caution in future assignment with Al-Jazeera.”146 The threat to Al-Jazeera did not go unnoticed. Wadah Khanfar, managing director of Al-Jazeera’s Arabic service, noted that, “[w]e are concerned about the way the Americans dealt with Sami, and we are concerned about the way they could deal with others as well.”147 The news organization may have been especially sensitive to this incident, as there had been a number of strained interactions between American troops and AlJeezera employees. There are credible accounts that Salah Hassan, an AlJeezera camera man, and his colleague Suheib Badr Darwish, were tortured 141 10 U.S.C. § 950(v) (2006). 142 Haj Review Board, supra note 3, at 33–35. 143 Freed Guantanamo Prisoner is Home, BBC.COM, May 2, 2008, http://news.bbc.co.uk/2/hi/americas/7378828.stm (“’His detention for six years, without the most basic due process, is a grave injustice and represents a threat to all journalists working in conflict areas,’ said Joel Simon, executive director of the New York-based Committee to Protect Journalists.”). 144 Haj Review Board, supra note 3, at 33–35. 145 Brian Stelter, From Guantánamo to Desk at Al Jazeera, N.Y. TIMES, Dec. 22, 2009, https://www.nytimes.com/2009/12/23/world/middleeast/23jazeera.html. 146 Haj Review Board, supra note 3, at 35. 147 Freed Guantanamo Prisoner is Home, supra note 143. 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 412 while held at Abu Ghraib in November 2003. Both men were eventually released when Iraqi courts found a lack of evidence. 148 Al-Jeezera employees might be likely to perceive American actions as direct and deliberate threats. The United States has twice bombed an AlJazeera headquarters, once in Kabul in 2001, 149 and again in a Baghdad missile strike in 2003.150 The latter attack killed reporter Tareq Ayyoub.151 Al-Jeezera reports that it had previously made the United States aware of its coordinates. 152 Ayyoub’s widow and the International Federation of Journalists claimed this attack was deliberate. 153 The Daily Mirror later published a piece claiming to have in their possession a leaked memo that records an April 2004 meeting between President Bush and Prime Minister Blair, in which President Bush discussed a potential bombing run against AlJeezera’s Qatari headquarters. 154 While both governments denied the report, David Keogh and Leo O’Connor were charged under the Official Secrets Act of 1989 for the unauthorized leak of the memo. 155 The subsequent gag order banning any U.K. reporter from connecting the trial to Al-Jeezera in any medium was widely decried by international reporting agencies, including Reporters without Borders. 156 The Al-Jeezera Iraq 148 Christian Parenti, Al Jazeera Goes to Jail, THE NATION, Mar. 29, 2004, http://www.thenation.com/article/al-jazeera-goes-jail?page=full. 149 Al-Jazeera Kabul Offices Hit in US Raid, BBC NEWS, Nov. 13, 2001, http://news.bbc.co.uk/2/hi/south_asia/1653887.stm. 150 U.S. Bombing Raid Kills Three Journalists in Baghdad, FOX NEWS, Apr. 8, 2003, http://www.foxnews.com/story/0,2933,83503,00.html. 151 Id. 152 Id. 153 IFJ Accuses US Over Killing of Al-Jazeera Journalist in Baghdad: “It Could be Murder,” INT’L FED’N OF JOURNALISTS, Nov. 23, 2005, http://mena.ifj.org/en/articles/ifj-accuses-usover-killing-of-al-jazeera-journalist-in-baghdad-it-could-be-murder-. 154 John Plunkett, Memo Warning 'Attack on Press Freedom’, THE GUARDIAN, Nov. 23, 2005, http://www.guardian.co.uk/media/2005/nov/23/nationalunionofjournalists.broadcasting . 155 U.K. Charges Official with Leaking Blair Memo, MSNBC, Nov. 22, 2005, http://www.msnbc.msn.com/id/10153489/ns/world_news-europe/t/uk-charges-officialleaking-blair-memo/. Subsequently, Attorney General Lord Goldsmith forbade any publication of information from the leaked memo. Keogh was found guilty of revealing the memo and sentenced to six months in jail. 156 Unacceptable Meddling in News Media By Bush-Blair Memo Trial Judge, REPORTERS WITHOUT BORDERS, May 21, 2007, http://en.rsf.org/united-kingdom-unacceptablemeddling-in-news-21-05-2007,22223.html. Lord Chief Justice Phillips partially lifted this 413 Harvard National Security Journal / Vol. 4 bombing and the later memo controversy furthered the perception amongst foreign reporters that America was targeting unfriendly media. Al-Haj is hardly the only foreign journalist who has been detained by American forces. Abdul Ameer Younis Hussein, a freelance cameraman then employed by CBS, was detained for over a year without charge after he filmed clashes in Mosul. He was later acquitted by an Iraqi criminal court. 157 Bilal Hussein, an AP photographer, was detained for two years on the basis of photos he took in Fallujah, and was finally released in April 2008. 158 Ibrahim Jassam, a freelance journalist, was held for seventeen months without charge and was released February 2010.159 D. Humanitarian Law Project—Punishing Those Who Associate with Terrorists While the Government’s actions in Bahlul and its treatment of foreign reporters are of serious concern, proponents of these actions may argue that the impact of these positions is limited; the disregard of Brandenberg in Bahlul ought not implicate Americans or lawful residents. Even if this were true, the recent Government and Supreme Court position with regard to expansive interpretation of material support statutes clearly implicates the speech rights of individuals entitled to First Amendment protection. This result demands special attention for several reasons. First, by chilling the speech of Americans and American residents, it removes valuable sources of OSINT that are most easily integrated in the intelligence cycle—items written in English, prepared for Western consumption. Second, it represents the clearest failure by the judiciary to restrain the Government in its ultimately self-damaging quest to silence speech related to terrorism. Third, the broad scope of the Court’s ultimate conclusion that ban, allowing U.K. media to repeat accusations that were previously published. However, these groups may not suggest that these allegations were accurate. 157 Joel Roberts, CBS Cameraman Acquitted In Iraq, CBS NEWS, Apr. 5, 2006, http://www.cbsnews.com/stories/2006/04/05/iraq/main1472263.shtml. 158 Tim Arango, Case Lays Bare the Media’s Reliance on Iraqi Journalists, N.Y. TIMES, Dec. 17, 2007, http://www.nytimes.com/2007/12/17/business/media/17apee.html?_r=1&adxnnl=1&o ref=slogin&adxnnlx=1198184561-4Ss0Q98pNRov6DzbujkKLA. 159 Caesar Ahmed and Liz Sly, Iraqi Journalist Freed after 17 Months, L.A. TIMES, Feb. 11, 2010, http://articles.latimes.com/2010/feb/11/world/la-fg-iraq-photographer11- 2010feb11. 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 414 speech “coordinated with” foreign terrorist organizations may be criminalized threatens to undermine humanitarian information sharing efforts. 1. Expanding the Material Support Statute to Encompass Speech In Holder v. Humanitarian Law Project, the Supreme Court upheld 18 U.S.C. § 2339B. 160 The statute prohibits “knowingly provid[ing] material support or resources to a foreign terrorist organization (FTO).”161 Material support or resources are broadly defined as: any property, tangible or intangible, or service, including currency or monetary instruments or financial securities, financial services, lodging, training, expert advice or assistance, safehouses, false documentation or identification, communications equipment, facilities, weapons, lethal substances, explosives, personnel (1 or more individuals who may be or include oneself), and transportation, except medicine or religious materials. 162 The Humanitarian Law Project (HLP), an organization that aims to reduce global terrorism by educating terrorist organizations on legal means to address grievances, argued that the statute was impermissibly vague, in violation of the Fifth Amendment, and would unconstitutionally restrict actions protected by the First Amendment. 163 Specifically, HLP and other aid groups argued that the “training,” “expert advice or assistance,” “service,” and “personnel” definitions under the law would restrict non- 160 Holder v. Humanitarian Law Project, 130 S. Ct. 2705, 2712 (2010). 161 Id. at n.2 (quoting 18 U.S.C. § 2338B (2006 & Supp. III 2009). 162 18 U.S.C. § 2339A(b)(1) (Supp. III 2009). 163 HLP, 130 S. Ct. at 2713–14. (“Plaintiffs claimed they wished to provide support for the humanitarian and political activities of the PKK and the LTTE in the form of monetary contributions, other tangible aid, legal training, and political advocacy, but that they could not do so for fear of prosecution.”). The PKK, (Partiya Karkerên Kurdistanê or Kurdish Workers’ Party), is an organization that seeks to establish an independent Kurdish state. The LTTE, the Liberation Tigers of Tamil Eelam, more popularly known as the Tamil Tigers, was seeking to establish an independent Tamil state in Sri Lanka. Both groups are designated FTOs. See Designation of Foreign Terrorist Organizations, 62 Fed. Reg. 52,650 (Oct. 8, 1997). The LTTE conceded defeat to the Sri Lankan government in May 2009. Niel A. Smith, Understanding Sri Lanka's Defeat of the Tamil Tigers, 59 JOINT FORCE QUART4 (2010), http://www.ndu.edu/press/understanding-sri-lanka.html. 415 Harvard National Security Journal / Vol. 4 threatening activities: “train[ing] members of [an FTO] on how to use humanitarian and international law to peacefully resolve disputes”; “engag[ing] in political advocacy on behalf of Kurds who live in Turkey”; and “teach[ing FTO] members how to petition various representative bodies such as the United Nations for relief.”164 HLP asked that the Court interpret the statute’s use of “knowingly” to impose a mens rea requirement that the individual knows or intends to assist with unlawful terrorist actions. The Court first held the law was not unconstitutionally vague165 and that an offender need not intend to further a terrorist organization’s illegal activities166 in order to trigger liability under the statute. The Court then distinguished the statute from a restriction on individual speech. Under the statute, individuals “may speak and write freely about” terrorist organizations. 167 The Court repeatedly stressed that the law would not reach independent advocacy.168 However, the statute does criminalize “a narrow category of speech” that is made “to, under the direction of, or in coordination with foreign groups that the speaker knows to be terrorist organizations.”169 The Court held that this prohibition was constitutional in light of the danger posed by terrorist organizations. 170 Positing that support is fungible, the Court reasoned that providing expertise on non-violent advocacy could 164 HLP, 130 S. Ct. at 2716. 165 Id. at 2720. 166 Id. at 2721. The Court in HLP did not address questions involving journalistic or electoral “support.” However, offering legal representation before the UN would run afoul of the law. 167 Id. at 2723. The perception of legitimacy of FTOs’ causes played a large role in the HLP decision. The Court noted that advising or advocating for FTOs may increase the legitimacy of terrorist groups. However, the Breyer dissent points out that this assertion has no factual support. The legitimacy of a group’s terrorism may have little to do with the support it receives for nonviolent activities. 168 See HLP, 130 S. Ct. at 2721. (“The statute makes it clear that ‘personnel’ does not cover independent advocacy: ‘Individuals who act entirely independently of the foreign terrorist organization to advance its goals or objectives shall not be considered to be working under the foreign terrorist organization’s direction and control.’”). 169 HLP, 130 S. Ct. at 2730–31. 170 Id. at 2725–27 (“Indeed, some designated foreign terrorist organizations use social and political components to recruit personnel to carry out terrorist operations, and to provide support to criminal terrorists and their families in aid of such operations.”). 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 416 allow terrorist groups to refocus resources on violent terrorist activities. 171 Furthermore, such advocacy might lend legitimacy to terrorist groups and allow these groups to use the international legal system to threaten, manipulate, and disrupt. 172 HLP, then, essentially stands for the notion that the involvement of terrorist aliens transmutes protected political speech to actionable material support. 173 It is unclear what constitutional principles support this transformation. Writing in dissent, Justice Breyer argued that “‘[c]oordination’ with a group that engages in unlawful activity does not deprive the plaintiffs of the First Amendment’s protection under any traditional ‘categorical’ exception to its protection. . . . Not even the ‘serious and deadly problem’ of international terrorism can require automatic forfeiture of First Amendment rights.”174 While the Court provided little constitutional reasoning for its holding in HLP, the Justices in the majority believed that interpreting the statute to cover coordinated speech activity would serve a compelling Government interest in combating terrorism. 175 As a content-specific criminal restriction on speech, the statute should have received “strict scrutiny”’—the Court’s most searching type of review. 176 Although the 171 Id. at 2729. The Court explained that because money is fungible “‘foreign terrorist organizations that have a dual structure raise funds . . . highlight the . . . humanitarian ends to which such moneys could be put . . .’ but ‘there is reason to believe that foreign terrorist organizations do not maintain legitimate financial firewalls between those funds raised for civil, nonviolent activities, and those ultimately used to support violent terrorist operations.’” Id. at 2725–26 (quoting Declaration of Kenneth R. McKune, App. 135, ¶ 12). 172 Id. In this way, the statute appears to be a manner restriction, limiting whom the speaker may address, in addition to a content restriction. 173 See e.g., Erwin Chemerinsky, Not A Free Speech Court, 53 ARIZ. L. REV. 723, 729–30 (2011) (“The court allowed the government to prohibit speech that in no way advocated terrorism or taught how to engage in terrorism solely because the government felt that the speech assisted terrorist organizations. The restriction on speech was allowed even without any evidence that the speech would have the slightest effect on increasing the likelihood of terrorist activity. The deference that the Court gave to the government was tremendous and the restrictions it placed on speech were great.”). 174 HLP, 130 S. Ct. at 2733 (Breyer, J., dissenting). 175 Id. at 2724. 176 See United States v. Playboy Entertainment Group, Inc., 529 U.S. 803, 813 (2000) (“Since [the law] is a content-based speech restriction, it can stand only if it satisfies strict scrutiny.”); City of Houston v. Hill, 482 U.S. 451, 459 (1987). Though it is not relevant to the statute at issue here, it is interesting to note that the current Court does not seem to 417 Harvard National Security Journal / Vol. 4 Court claimed that its review amounted to strict scrutiny, 177 in practice the majority applied an analysis that bore few of the hallmarks of that high standard: narrow tailoring and least restrictive means. 178 Instead, the Court returned to an ignominious tradition of deferring to the military in wartime, even in matters of fundamental rights. The Government, surely aware of the oft-fatal touch of strict scrutiny, had argued that the restriction merited only intermediate scrutiny. 179 The Government argued that the Court should apply the intermediate scrutiny set out in United States v. O’Brien, 180 under the theory that § 2339B was a facially neutral regulation of conduct that only incidentally burdened speech.181 Under this less exacting standard, the law need only be substantially related to an important government interest.182 The majority rejected the Government’s suggestion that the Court apply a weaker First Amendment standard for conduct. 183 However, it is unclear what level of scrutiny the Court actually applied. To be sure, the Court adopted some of the language of the strict scrutiny standard when it considered whether there was a compelling Government interest in agree if all content-based restrictions trigger strict scrutiny, with limited historical exceptions, provided that the targeted speech involves false statements about easily verifiable facts. Compare United States v. Alvarez, 132 S.Ct. 2537, 2548 (2012) (Kennedy, J.) (plurality opinion) (noting that “[i]n assessing content-based restrictions on protected speech, the Court . . . . has applied the ‘most exacting scrutiny’ and applying strict scrutiny to the Stolen Valor Act) with Alvarez, 132 S.Ct at 2552–53 (Kagan, J, concurring) (applying intermediate scrutiny to same Act due to “the regulation[] concern[ing] false statements about easily verifiable facts” unrelated to “statements about philosophy, religion, history, the social sciences, [and] the arts”). 177 Analogizing to its decision in Cohen v. California, 403 U.S. 15 (1971), the Court wrote, “[W]e recognized that the generally applicable law was directed at Cohen because of what his speech communicated—he violated the breach of the peace statute because of the offensive content of his particular message. We accordingly applied a more rigorous scrutiny and reversed his conviction. . . . This suit falls into the same category.” HLP, 130 S. Ct. at 2724. 178 The Court did, however, determine that the statute served a compelling state interest. Id. (“Everyone agrees that the Government’s interest in combating terrorism is an urgent objective of the highest order.”). 179 Id. 180 391 U. S. 367 (1968). 181 HLP, 130 S. Ct. at 2723 (citing United States v. O’Brien, 391 U.S. 367, 377 (1968)). 182 O’Brien, 391 U.S. at 377. 183 HLP, 130 S. Ct. at 2724. 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 418 combating terrorism. 184 But the Court failed to mention the test’s other half, which is to ensure that the statute is narrowly tailored to further that interest. 185 Similarly, the Court never determined if the statute represented the least restrictive means of achieving the Government’s compelling interest. Indeed, it appears that the Court did not engage in any independent analysis as to whether the statute would even further the Government’s interest. The majority, though occasionally paying lip service to strict scrutiny, did not hide its deference to the Government. 186 The Court repeatedly noted “respect for the Government’s conclusions is appropriate,” especially in a field “where information can be difficult to obtain.”187 Even if the Court were justified in applying a standard of review that is less exacting than strict scrutiny, there is little independent analysis in the opinion to suggest that the statute would clear the hurdle presented by intermediate scrutiny. Justice Breyer, writing in dissent, says as much, noting that the statute would fail even this lower standard. 188 The dissent rightly points out that in balancing a compelling interest, “the means adopted . . . and the specific prohibitions of the First Amendment,” the Government must not only show the importance of the claimed interest, but 184 Id. (comparing the speech at issue in the case to that of the speech in Cohen, the Court said: “The law here may be described as directed at conduct, as the law in Cohen was directed at breaches of the peace, but as applied to the plaintiffs the conduct triggering coverage under the statute consists of communicating a message. . . . we are outside of O’Brien’s test, and we must [apply] a more demanding standard.”) (internal citations omitted). 185 Simon & Schuster, Inc. v. Members of N.Y. State Crime Victims Bd., 502 U.S. 105, 118 (1991). 186 See, e.g., HLP, 130 S. Ct. 2727–30; id. at 2727 (“[E]valuation of the facts by the Executive, like Congress’s assessment, is entitled to deference.”). 187 Id. at 2727. The Court placed “significant weight” on “the considered judgment of Congress and the Executive that providing material support to a . . . terrorist organization . . . bolsters [its] terrorist activities” and cautioned that demanding “‘detail,’ ‘specific facts,’ and ‘specific evidence’” was “dangerous.” Id. at 2728. The majority scolded the dissent for “simply disagree[ing] with the considered judgment of Congress and the Executive.” Id. 188 Id. at 2732–34 (Breyer, J., dissenting) (“[E]ven if we assume for argument’s sake that ‘strict scrutiny’ does not apply, no one can deny that we must at the very least ‘measure the validity of the means adopted by Congress against both the goal it has sought to achieve and the specific prohibitions of the First Amendment’. . . . I doubt that the statute, as the Government would interpret it, can survive any reasonably applicable First Amendment standard.”). 419 Harvard National Security Journal / Vol. 4 also explain how the means help achieve that interest. 189 In particular, Justice Breyer characterized the majority’s fears as speculative, based largely on hypotheticals from the Government’s brief. 190 In effect, the Court found that the statute furthered a compelling Government interest because the Government claimed the statute would further a compelling interest. 191 After making this determination, the Court then failed to examine the methods used to achieve this interest. Justices have previously warned of accepting bald assertions in the name of security. 192 The Court, in agreeing with the Government’s position that non-violent advocacy would further the terrorist agenda, seemed to reject the notion that the First Amendment, by allowing for the free discussion of grievances, furthers peaceful resolution of conflict. 193 It strains belief to conclude that the teaching of non-violence may be banned on the basis that such knowledge may be misused. 194 Instead, the Court followed the dubious tradition of overcriminalizing speech during national security crises. 195 189 Id. at 2734. 190 Id. at 2739. In fact, it was clear that Justice Breyer was suspicious of the Government’s arguments: “I would reemphasize that neither the Government nor the majority points to any specific facts that show that the speech-related activities before us are fungible in some special way or confer some special legitimacy upon the PKK. Rather, their arguments in this respect are general and speculative.” Id. 191 The majority spent most of the opinion attempting to bolster the justification for the statute in the first place; focusing primarily on the danger of FTO’s and the fungibility of support. See id. at 2724–27. 192 Id. at 2727 (“Our precedents, old and new, make clear that concerns of national security and foreign relations do not warrant abdication of the judicial role. We do not defer to the Government’s reading of the First Amendment, even when such interests are at stake.”); see, e.g., Korematsu v. United States, 323 U.S. 214, 234–40 (1944) (Murphy, J., dissenting). 193 See Whitney v. California, 274 U.S. 357, 378–79 (1927) (Brandies, J., concurring) (“[The Framers] knew . . . that fear breeds repression; that repression breeds hate; that hate menaces stable government; [and] that the path of safety lies in the opportunity to discuss freely supposed grievances and proposed remedies.”). 194 See HLP, 130 S. Ct. at 2738 (Breyer, J., dissenting) (“I am not aware of any case in this Court—not Gitlow v. New York, 268 U. S. 652 (1925), not Schenck v. United States, 249 U. S. 47 (1919), not Abrams, 250 U. S. 616, not the later Communist Party cases decided during the heat of the Cold War—in which the Court accepted anything like a claim that speech or teaching might be criminalized lest it, e.g., buy negotiating time for an opponent who would put that time to bad use.). 195 See, e.g., Dennis v. United States, 341 U.S. 494 (1951); Whitney, 274 U.S. 357 (1927); Gitlow v. New York, 268 U.S. 652 (1925); Schenck v. United States 249 U.S. 47 (1919); see generally David Cole, No Reason to Believe: Radical Skepticism, Emergency Power, and Constitutional Constraint, 75 U. CHI. L. REV. 1329, 1329 (2008) (reviewing ERIC A. POSNER & ADRIAN 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 420 2. The Court’s Tradition of War Time Deference The most glaring case of deference, Korematsu v. United States, 196 deserves special attention. It provides a particularly embarrassing example197 of how military deference198 may override even the most exacting legal standard. The case concerned the constitutionality of Executive Order 9066, the internment order for persons of Japanese ancestry. The Court, in a 6–3 opinion, upheld the constitutionality of the Order in the face of strict scrutiny, largely relying on the claims of military necessity, 199 as in the earlier unanimously upheld Hirabayashi v. United States, 200 enforcing a night curfew on persons of Japanese ancestry in the VERMEULE, TERROR IN THE BALANCE: SECURITY, LIBERTY, AND THE COURTS 3–10 (2007)) (“Most observers of American history look back with regret and shame on our nation’s record of respecting civil liberties in times of crisis.”). 196 323 U.S. 214 (1944). 197 See Stenberg v. Carhart, 530 U.S. 914, 953 (2000) (Scalia, J., dissenting) (likening Korematsu to Dred Scott); Adarand Constructors, Inc. v. Pena, 515 U.S. 200, 236 (1995) (noting that Korematsu was a “fail[ure] to detect an illegitimate racial classification”); Craig Green, Ending the Korematsu Era: An Early View from the War on Terror Cases, 105 NW. U. L. REV. 983 (2011); Jamal Greene, The Anticanon, 125 HARV. L. REV. 379, 400 (2011) (“[I]t appears that at no time since September 11 has any U.S. government lawyer publicly used the Korematsu decision as precedent in defending executive detention decisions.”); Richard H. Fallon, Jr. & Daniel J. Meltzer, Habeas Corpus Jurisdiction, Substantive Rights, and the War on Terror, 120 HARV. L. REV. 2029, 2077 (2007) (noting that Korematsu is particularly odious precedent); Eugene V. Rostow, The Japanese American Cases—A Disaster, 54 YALE L. J. 489, 531–32 (1945) (criticizing Korematsu). 198 Samuel Issacharoff & Richard H. Pildes, Emergency Contexts Without Emergency Powers: The United States’ Constitutional Approach to Rights During Wartime, 2 INT’L J. CONST. L. 296, 311 (2004) (using Korematsu to comment on the “inability of courts during wartime to provide any check on political excesses, particularly those jointly endorsed by the executive and legislature”); Daniel J. Solove, The Darkest Domain: Deference, Judicial Review, and the Bill of Rights, 84 IOWA L. REV. 941, 1000 (1999) (discussing the Japanese curfew and interment cases in the context of judicial deference). 199 Korematsu, 323 U.S. at 223 (“Korematsu was not excluded from the Military Area because of hostility to him or his race. He was excluded because we are at war with the Japanese Empire, because the properly constituted military authorities feared an invasion of our West Coast and felt constrained to take proper security measures, because they decided that the military urgency of the situation demanded that all citizens of Japanese ancestry be segregated from the West Coast temporarily, and, finally, because Congress, reposing its confidence in this time of war in our military leaders—as inevitably it must— determined that they should have the power to do just this.”) 200 Hirabayashi v. United States, 320 U.S. 81, 93 (1943) (“The war power of the national government is ‘the power to wage war successfully’ . . . . Where as they did here, the 421 Harvard National Security Journal / Vol. 4 aftermath of the Pearl Harbor attacks. 201 The Court accepted on faith the government’s claims that both of these exclusionary orders were the only method to safeguard the national interest.202 While Korematsu clearly reflects racist undercurrents of the period, 203 close analysis of the opinion indicates that executive and congressional prerogative coupled with judicial deference was the main divide between the majority and the three dissents. 204 While conditions call for the exercise of judgment and discretion and for the choice of means by those branches of the Government on which the Constitution has placed the responsibility of warmaking, it is not for any court to sit in review of the wisdom of their action or substitute its judgment for theirs.”). 201 Both orders were supported by General DeWitt, who noted the absolute military necessity of segregating possible saboteurs. See Memorandum from Burling to Solicitor General,(Apr. 13, 1944) (File 146-42-7, Department of Justice), cited in TETSUDEN KASHIMA, PERSONAL JUSTICE DENIED: REPORT OF THE COMMISSION ON WARTIME RELOCATION AND INTERNMENT OF CIVILIANS 382, n. 175 (1996) (However there is “substantially incontrovertible evidence that the most important statements of fact advanced by General DeWitt to justify the evacuation and detention [of the Japanese] were incorrect, and furthermore that General DeWitt had cause to know, and in all probability did know, that they were incorrect at the time he embodied them in his final report . . . .”). 202 Korematsu, 323 U.S. at 233 (Murphy, J., dissenting) (“This exclusion of all persons of Japanese ancestry, both alien and non-alien, from the Pacific Coast area on a plea of military necessity . . . goes over the very brink of constitutional power and falls into the ugly abyss of racism.” (internal quotation marks omitted)). 203 Id. at 243 (Jackson, J., dissenting) (“[I]f any fundamental assumption underlies our system, it is that guilt is personal and not inheritable. . . . But here is an attempt to make an otherwise innocent act a crime merely because this prisoner is the son of parents as to whom he had no choice, and belongs to a race from which there is no way to resign.”); J.L. DEWITT, FINAL REPORT: JAPANESE EVACUATION FROM THE WEST COAST 1942, 34 (1943) (“The Japanese race is an enemy race and while many second and third generation Japanese born on United States soil, possessed of United States citizenship, have become ‘Americanized’, the racial strains are undiluted.”), available at http://ia600506.us.archive.org/1/items/japaneseevacuati00dewi/japaneseevacuati00dewi .pdf; JOHN W. DOWER, WAR WITHOUT MERCY: RACE AND POWER IN THE PACIFIC WAR 81 (1993) (“‘A Jap’s a Jap,’ [DeWitt] reiterated in public testimony in April 1943. ‘You can’t change him by giving him a piece of paper.’ Indeed in General DeWitt’s view, the menace posed by the Japanese could only be eliminated by destroying the Japanese as a race.”); Craig Green, Wiley Rutledge, Executive Detention, and Judicial Conscience at War, 84 WASH. U. L. REV. 99, 133–40 (2006) (noting that the military reasoning was explicitly racist). 204 Green, supra note 197, at 996 (“Simple vote counting shows that the Korematsu Court itself did not view the case as involving straightforward racial discrimination. Several Justices who were sensitive to racial issues in other cases—including Douglas, Rutledge, Black, and Stone—were majority votes for the government in Korematsu. And two Justices with far less progressive records on race—Roberts and Jackson—were among Korematsu’s 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 422 there is great political pressure to accede to the demands of the executive, Congress, and the military, especially in times of war, the notion of deference becomes harder to support when the Government’s claims are simply not credible. 205 Though the Court often defers to the Government in military matters, 206 in the context of the First Amendment this deference cannot rightly be characterized as strict scrutiny. 207 One of the main purposes of strict scrutiny is rooted in the fact that restrictive laws may reflect possible illicit motivations on the part of the Government. If the Court simply defers to the Government as to whether the means actually further the ends in the least restrictive manner, the standard ceases to serve a function. After all, it was this very deference that led the Court to approve the internment of Japanese-Americans in Korematsu v. United States. The Court, to its credit, has not engaged in this sort of widespread deference to the Government during the war on terror. However, the HLP decision, with its reliance on deference even in the face of strict scrutiny perhaps signals that the Court’s willingness to oppose the executive and congress in military matters is waning. It is unsurprising that the Court would feel pressure to affirm government actions during times of war. However, the deep embarrassment of the Court for such decisions, 208 including Korematsu, a member of the socalled “Anti-Canon,”209 could be considered a buffer. The war-speech cases dissenters. This indicates that these Justices did not find the cases’ racial elements to be decisive; other doctrinal factors were driving their determinations.”). 205 Id. at 998 (“The uniquely decisive question in Hirabayashi and Korematsu was how much the Court should defer to the President’s assertions of military necessity. Such military judgments had been explicitly supported by Congress and were hard to falsify, but they were also increasingly hard to believe.”). 206 See, e.g., Korematsu v. United States, 323 U.S. 214 (1944). 207 See Jonathan Masur, A Hard Look or a Blind Eye: Administrative Law and Military Deference, 56 HASTINGS L.J. 441, 456–57 (2005) (“In Korematsu, the Court’s adoption of this level of factual deference rendered its ostensibly stringent legal scrutiny a virtual nullity.”); Bill Araiza, Posting of Bill Arazia, PRAWFSBLOG.COM, Dec. 21, 2010, http://prawfsblawg.blogs.com/prawfsblawg/2010/12/first-amendment-rules-andstandards.html (“I wonder whether anything is gained by a court pretending to do some form of heightened scrutiny when it more or less just defers to Congress on these issues?”). 208 Constitutional scholars have interpreted that the embarrassment of the court over Korematsu is reflected in recent decisions opposing executive overreach in the detainee cases. See Green, supra note 197, at 990. 209 Greene, supra note 197, at 380–81 (“We know these cases by their petitioners: Dred Scott, Plessy, Lochner, and Korematsu. They are the American anticanon. Each case 423 Harvard National Security Journal / Vol. 4 above were decided before the advent of strict scrutiny or its solidification (of course, Koreamatsu, a particularly odious case, announced strict scrutiny in the racial context). Even after the advent of strict scrutiny, there is little doubt that the Supreme Court has a long history of deference to the military when confronted with a justification of military necessity or other national security concerns. However, in 1971, the Pentagon Papers case210 marked a rather shocking departure from this trajectory. The crux of the case was an injunction issued by the Second Circuit, preventing the New York Times and the Washington Post from publishing portions of classified Defense Department study on its policies in Vietnam. 211 The government argued that the publication would prolong the War by revealing sensitive information, though concededly not any future plans, that would embarrass the war effort. 212 In a per curiam decision with nine different opinions, the majority determined that the Government’s justifications were insufficient to justify the prior restraint on speech. 213 With each of the nine justices writing separate opinions, the boundaries of the case are relatively unclear; 214 yet, the overall effect of the decision is clear. Following cases like Korematsu, and the war-time speech cases, the determination that a military necessity justification was insufficient is remarkable. Faced with the one-of-a-kind abrogation of a fundamental embodies a set of propositions that all legitimate constitutional decisions must be prepared to refute. Together they map out the land mines of the American constitutional order, and thereby help to constitute that order: we are what we are not.”). 210 New York Times Co. v. United States, 403 U.S. 713 (1971). 211 Id. at 714. 212 Id. at 731–32 (White, J., concurring). 213 Id. at 714. Encouraged by this decision in favor of free speech and subject to the demands of the 24/7 news cycle, reporters are no longer hesitant to publicize the mistakes of Presidents’ administrations. Nixon’s term was brought to an end through the Watergate scandal, Reagan’s was tarnished by the Iran-Contra affair, Clinton’s extracurricular activities led to his impeachment, and George W. Bush was held accountable for Iraqi weapons of mass destruction that were never located. Charles Bierbauer, When Everything is Classified, Nothing is Classified, 1 WAKE FOREST J.L. & PUB. POL’Y 21, 23 (2011). 214 The majority essentially falls into two categories: Justices Black and Douglas did not think prior restraints were ever justified. See New York Times Co. v. United States, at 714–24 (1971). Justices Brennan, White, and Stewart left open the possibility of prior restraints in extreme instances where the government could allege and prove that publication would “inevitably, directly, and immediately cause the occurrence of an event kindred to imperiling the safety of a transport at sea.” Id. at 726–27. 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 424 constitutional guarantee, 215 the court seemed willing to challenge the Government’s understanding of security threats: “The word ‘security’ is a broad, vague generality whose contours should not be invoked to abrogate the fundamental law embodied in the First Amendment. The guarding of military and diplomatic secrets at the expense of informed representative government provides no real security for our Republic.”216 In the more recent past, the Court signaled a similar reticence to swallow the Government’s military necessity justifications in two cases: Boumediene v. Bush217 and Hamdi v. Rumsfeld. 218 In Hamdi, an individual detained in Afghanistan as an enemy combatant petitioned for writ of habeas corpus, challenging the evidence the United States used to label him an enemy combatant. 219 In a plurality opinion, the Court concluded that “due process demands that a citizen held in the United States as an enemy combatant be given a meaningful opportunity to contest the factual basis for that detention.”220 As part of the demands of due process, the Court rejected the Government’s argument that “courts should review its determination that a citizen is an enemy combatant under a very deferential ‘some evidence’ standard.”221 In Boumediene, individuals detained as enemy combatants and held at Guantanamo petitioned for writ of habeas corpus. In granting the petitioners writ, the Court went beyond merely rejecting the Government’s desired low evidence standard, as it did in Hamdi. 222 In fact, the Court held that section 7 of the Military Commissions Act was an unconstitutional suspension of habeas corpus.223 In doing so, the Court performed its legitimate and necessary “responsibility to hear challenges to the authority of the Executive to imprison a person.”224 215 Id. at 725 (Brennan, J., concurring) (“So far as I can determine, never before has the United States sought to enjoin a newspaper from publishing information in its possession.”). 216 Id. at 719 (Black, J., concurring). 217 553 U.S. 723 (2008). 218 542 U.S. 507 (2004). 219 Id. at 511. 220 Id. at 509. 221 Id. at 527. 222 Id. 223 Boumediene v. Bush, 553 U.S. 723, 728 (2008). 224 Id. at 797. 425 Harvard National Security Journal / Vol. 4 Boumediene and Hamdi are all the more remarkable given the National Security climate post-9/11. Yet, despite security justifications that seem sufficient to allow other courts to abrogate certain rights, the Court in these cases applied a strict scrutiny that lives up to its reputation. 225 What is significant from these decisions is not that they compel courts to challenge the military justifications offered by the Government to justify policies or actions that restrict constitutional rights; indeed, there are many more cases subsequent to the Pentagon Papers case, which suggest the Court cannot shake its habit of assuming the “necessity” of military necessity justifications. 226 But, these decisions do show that the Court does not have to give absolute deference to the Government in matters of national security. They represent bright spots in the Court’s application of a strict(er) scrutiny standard in light of a Government policy or action to address security concerns. More than that though, these cases show that deference to the Government where security concerns are relevant is not a foregone conclusion—neither political nor judicial prudence mandates the deference evident in HLP. 3. HLP’s Strange Scrutiny In HLP the material support statute survived the Court’s purported application of strict scrutiny. The survival of the statute should astound. Very few laws survive strict scrutiny in the speech context, though the standard is not always fatal. Professor Volokh takes the position that the standard is near-fatal, noting that, as of 1997, the Court had upheld three speech restrictions under strict scrutiny—Buckley v. Valeo, 227 Austin v. Michigan 225 Strict in theory, fatal in fact. 226 See e.g., Ashcroft v. Al-Kidd, 131 S. Ct. 2074 (2011); Ashcroft v. Iqbal, 129 S. Ct. 1937 (2009); United States v. Verdugo-Urquidez, 494 U.S. 259, 273–74 (1990) (noting that enforcing the Fourth Amendment abroad would have “significant and deleterious consequences for the United States in conducting activities beyond its boundaries . . . . The United States frequently employs Armed Forces outside this country . . . for the protection of American citizens or national security. . . . Application of the Fourth Amendment to those circumstances could significantly disrupt the ability . . . to respond to foreign situations involving our national interest.”). 227 Buckley v. Valeo, 424 U.S. 1 (1976). The Court struck down the Federal Election Campaign Act of 1971 in part, upholding individual contribution limits, disclosure and reporting provisions, and a public financing section; while striking down limits on campaign expenditures, limits on independent expenditures, and expenditures by a candidate’s personal funds. The opinion has been heavily criticized by both sides, with some arguing 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 426 Chamber of Commerce, 228 and Burson v. Freeman229—all involving election speech. 230 However, these cases have been either criticized or overruled. For example, Austin v. Michigan Chamber of Commerce, 231 was overruled in Citizens United v. FEC. 232 While other commentators insist that strict scrutiny is not always fatal, it is “most fatal” in the context of speech restrictions. 233 Over a thirteen-year period, 1990–2003, the entirety of the federal courts applied strict scrutiny in the speech context 222 times, upholding the law only 22% of the time. 234 The reader is then left with a puzzling picture: the Court went out of its way to announce that it viewed the statute as content-based. 235 The Court then announced that it must, therefore, apply the most rigorous standard, strict scrutiny.236 However, the Court then proceeded to apply none of the hallmarks of that standard. There is little discussion of the means to achieve a compelling goal. There is no examination of less intrusive means. In the face of this strict in-name-only scrutiny, the statute survives. It seems unlikely that § 2339B, even as interpreted by the Court, could have survived strict scrutiny. 237 The Court’s attempts to address the clear overinclusive nature of the ban are unconvincing. In order to justify banning all aid, the Court must first accept that all aid, even political or that the decision allowed the rich to have a disproportionate influence on elections and others arguing that any contribution limitation is an infringement of free speech. Of particular interest is the dissent of Justice White, which engages in extreme deference (strangely reminiscent of the Court in HLP) in arguing that the entire law should be upheld due to the expertise of Congress. 228 Austin v. Michigan Chamber of Commerce, 494 U.S. 652 (1990). 229 Burson v. Freeman, 504 U.S. 191 (1992) (plurality). 230 Eugene Volokh, Freedom of Speech, Permissible Tailoring and Transcending Strict Scrutiny, 144 U. PA. L. REV. 2417, 2426–27 (1997). 231 494 U.S. 652 (1990). 232 130 S. Ct. 876 (2010). 233 Adam Winkler, Fatal in Theory and Strict in Fact: An Empirical Analysis of Strict Scrutiny in the Federal Courts, 59 VAND. L. REV. 793, 815 (2006). Strict scrutiny is actually most fatal in the area of free speech, where the survival rate is 22 percent, lower than in any other right. Id. 234 Id. 235 Holder v. Humanitarian Law Project, 130 S. Ct. 2705, 2724 (2010). 236 Id. 237 Recall that the Court has found nearly all content-based restrictions to be unconstitutional. 427 Harvard National Security Journal / Vol. 4 legal training, is inherently fungible. The dissent rightly points out the absurdity of this argument. The reinterpreted § 2339B now suffers from underinclusion. The majority surely realized that by stressing the danger of any aid to terrorist groups, the Court could be seen endorsing a speech ban on any thought critical of the war effort or supportive of terrorist goals. Indeed, any such speech might contribute to the legitimacy of a terrorist group, a specific concern of the majority. 238 Instead, the Court noted that § 2339B would not reach independent advocacy. 239 The statute would only reach those individuals whose speech was “coordinated” with terrorist groups.240 But it should be obvious that independent advocacy would likely have a greater legitimating effect than coordinated speech. 241 It would seem, then, that the Court damaged established First Amendment doctrine in order to arrive at a possible military advantage. But this sacrifice of jurisprudential clarity for some imagined military necessity is counterproductive. The great irony of the majority’s action is that by willfully deviating from strict scrutiny, the Court managed to protect a statute likely to chill OSINT and harm the war effort. The chilling of valuable OSINT will hamper intelligence efforts. Supporters of the HLP decision may claim that the Court’s affirmance was compelled by Congress’s finding that “foreign organizations that engage in terrorist activity are so tainted by their criminal conduct that any contribution to such an organization facilitates that conduct.”242 However, this defense is seriously undermined by the fact that Congress made a nearly identical finding regarding the Communist Party, yet the Court repeatedly struck down statutes criminalizing membership or participation with the Party. Under the Communist cases of the 1950s, 243 as 238 HLP, 130 S. Ct at 2724–30. 239 Id. at 2728. 240 Id. 241 See id. at 2737–38 (Breyer, J., dissenting) (“And, as for the Government’s willingness to distinguish independent advocacy from coordinated advocacy, the former is more likely, and not less likely, to confer legitimacy than the latter.”). 242 Antiterrorism and Effective Death Penalty Act of 1996, Pub. L. No. 104-132, § 301(a)110 Stat. 1214 , 110 Stat. 1214, 1247 (codified at 18 U.S.C. § 2339B note). 243 See De Jonge v. United States, 299 U.S. 353 (1937). In reversing a conviction for syndicalism for participating in a meeting of the Communist Party, the Court specifically 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 428 well as the “clear and present danger” test set out in Brandenburg v. Ohio, 244 mere advocacy of membership in or aid to an organization with both dangerous and peaceful goals is not subject to punishment under the First Amendment. 245 The opinion is additionally concerning because it does not comport with recent case law. Constitutional scholars have noted that the Supreme Court, in upholding § 2339B, essentially created a new category of unprotected speech, 246 “terrorist coordinated speech,” ignoring the general principle that discouraged the establishment of new categories after United States v. Stevens. 247 In Stevens, the Court declined to recognize a new category of unprotected speech: depictions of animal cruelty. The Court noted that “historic and traditional categories long familiar to the bar”248—including obscenity,249 defamation,250 fraud,251 incitement,252 and speech integral to criminal conduct253—are “well-defined and narrowly limited classes of speech, the prevention and punishment of which have never been thought to raise any Constitutional problem.”254 noted that “peaceable assembly for lawful discussion cannot be made a crime. . . . Those who assist in the conduct of such meetings cannot be branded as criminals on that score.” Id. at 365. 244 395 U.S. 444, 449 (1969). 245 See Scales v. United States, 367 U.S. 203 (1967) (finding that though the Soviet Union was a violent terrorist state, membership in the domestic communist party could not be criminalized, absent defendant’s specific intent to engage in illegal activity). 246 Carrie O’Neill, Holder v. Humanitarian Law Project, HARV. NEGOT. & MEDIATION CLINICAL PROGRAM BLOG, July 3, 2011, http://blogs.law.harvard.edu/hnmcp/ newsletters/holder-vs-humanitarian-law-project/ (noting that Professor Martha Field argued that the Court’s decision in HLP “is not in keeping with First Amendment jurisprudence, possibly creating a new category of speech outside First Amendment standards”). 247 130 S. Ct. 1577 (2010). 248 Simon & Schuster, Inc. v. Members of N.Y. State Crime Victims Bd., 502 U. S. 105, 127 (1991) (Kennedy, J., concurring in judgment). 249 See Roth v. United States, 354 U. S. 476, 483 (1957). 250 See Beauharnais v. Illinois, 343 U. S. 250, 254–55 (1952). 251 See Va. Bd. of Pharmacy v. Va. Citizens Consumer Council, Inc., 425 U. S. 748, 771 (1976). 252 Brandenburg v. Ohio, 395 U. S. 444, 447–49 (1969) (per curiam). 253 Giboney v. Empire Storage & Ice Co., 336 U. S. 490, 498 (1949). 254 Chaplinsky v. New Hampshire , 315 U. S. 568, 571–72 (1942). 429 Harvard National Security Journal / Vol. 4 The Court concluded that depictions of animal cruelty were not historically unprotected. 255 While acknowledging the possibility that “[m]aybe there are some categories of speech that have been historically unprotected, but have not yet been specifically identified or discussed as such in our case law,” the Court noted the difficulty of establishing a new categories: “Our decisions in Ferber and other cases cannot be taken as establishing a freewheeling authority to declare new categories of speech outside the scope of the First Amendment.”256 4. The Potential Impact of HLP on Congress and Lower Courts Regardless of the motivations for diluting strict scrutiny in HLP, the Court has sent the signal to both Congress and lower courts that contentbased speech restrictions related to the war on terror may survive the most exacting legal standard. Congress demonstrated an awareness of the potential invalidation of § 2339B in drafting § 2339B(i) before the decision in HLP: “Nothing in this section shall be construed or applied so as to abridge the exercise of rights guaranteed under the First Amendment to the Constitution of the United States.” Such saving paragraphs may now be unnecessary. Armed with the knowledge that the Court, and thus lower courts, may be reluctant to strike down content-based restrictions, Congress may continue to restrict speech related to terrorist activities. While Congress surely means to aid in the fight against terror, indulging the Government’s desires for more tools to combat terror-related speech might paradoxically lessen the country’s ability to detect and prevent terrorist activities. Congress’s decision to criminalize speech “coordinated” with terrorist groups allowed members to simultaneously appear tough on crime, tough on national security, and tough on terrorists. It is hardly surprising that Congress, even after having stressed the importance of OSINT in other findings, has taken and will continue to take such a hardened stance. 257 The Court’s approach in HLP will surely encourage this impulse. 255 United States v. Stevens, 130 S. Ct. 1577 (2009). 256 Id. at 1586. The Court makes clear that First Amendment protection of speech is more than a simple cost-benefit analysis; for a category of speech to receive no protection, it must be “of such slight social value as a step to truth that any benefit that may be derived from them is clearly outweighed by the social interest in order and morality.” Id. at 1585 (internal quotation marks omitted). 257 The near constant (re)election cycle forces members of congress to focus on advertising, credit claiming, and position taking. See DAVID MAYHEW, CONGRESS: THE ELECTORAL 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 430 IV. The New Legal Doctrine of Terrorist-Related Speech The Court and the Government have taken positions that will chill speech of advocates of terrorism. But these positions will go much further, criminalizing otherwise protected speech and stemming the flow of ideas. If the Government may prosecute individuals who have interacted with terrorists and produced “coordinated” speech, then the Government may threaten journalists, academics, and humanitarian workers. In effect, the Government has announced a new restrictive approach to speech related to terrorism in the name of security, while simultaneously ignoring the intelligence value of that speech. This Part will first discuss the danger to domestic speech, then explore the impact on speech related to the production of OSINT. A. HLP’s Unclear Coordination Requirement will Chill Speech In its decision, the Court sought to minimize the risk that its interpretation of the statute would chill speech, noting that only speech “directed to, coordinated with, or controlled by” a terrorist organization would qualify as material support. 258 Unfortunately, however, it is not obvious what level of foreign involvement will strip speech of its First Amendment protection. 259 It is true that in order for speech to lose First Amendment protection the law requires more than simply having contact with a terrorist organization. On the other hand, the vagueness surrounding CONNECTION, 49–55, 60–62, 130–36 (2d ed. 2004). There is little chance that a member would either willingly advertise a “soft on crime” stance or claim credit for a bill stating the same. Taking a “tough” stance on crime is often a path to political success. Prosecutor or Politician?, THE ECONOMIST BLOG, Jan. 13th, 2010, http://www.economist.com/blogs/democracyinamerica/2010/01/prosecutor_or_politicia n. 258 Holder v. Humanitarian Law Project, 130 S. Ct. 2705, 2728 (2010) (noting that the statute only reaches speech “directed to, coordinated with, or controlled by foreign terrorist groups”). 259 Steve Vladeck, What Counts as Abetting Terrorists, N.Y. TIMES, June 21, 2010, http://roomfordebate.blogs.nytimes.com/2010/06/21/what-counts-as-abettingterrorists/(“[T]he majority’s sweeping reading of the statute’s scope blurs th[e] line [between criminalizing association and criminalizing support] almost to the point of invisibility. In its view, the material support statute doesn’t impose guilt by association; the defendant had to do something to support the group. But almost anything can be that something.”). 431 Harvard National Security Journal / Vol. 4 precisely what more is required may well cause many individuals to avoid speaking on the subject of terror. As a result, the Court’s decision in HLP will likely chill the speech of any aid organizations, academics, or journalists that have had contact with foreign terrorist organizations. Furthermore, the Court does not define any of the three speech conditions that trigger material support liability. While “directed to” seems fairly straightforward, the vagueness inherent in “coordinated” is likely to chill speech. Justice Breyer noted that he was “not aware of any form of words that might be used to describe ‘coordination’ that would not, at a minimum, seriously chill not only the kind of activities the plaintiffs raise before us, but also the ‘independent advocacy’ the Government purports to permit.”260 The term coordination is not defined as part of any criminal statute in 18 U.S.C. Although the term “coordinated communication” is defined in 11 C.F.R. § 109.21, 261 the definition is couched in the rather dissimilar electioneering context. Disregarding the language of a communication’s financial sponsorship, the term is defined in terms of speech content262 and speaker conduct.263 There, speech is considered coordinated if “the communication is created, produced, or distributed at the request . . . of a candidate.”264 At least one plausible interpretation of “coordination” would be that the terrorist organization approves of the content of the speech and requests that another party disseminate that speech; a surrogate speaker, in a sense. While we do not know the exact contours of “coordination,” we do know that the speaker need not share the same goals as the terrorist organization. 265 It seems, therefore, that a coincidence of wants between the speaker and the terrorist group—that is, a desire that the message be published—would likely qualify as coordination even if there was no coincidence of motive. This renders the restriction distinctly content-based and overinclusive. It would not be surprising if an FTO coincidentally 260 HLP, 130 S. Ct. at 2737 (Breyer, J., dissenting). 261 Answering, “What is a ‘coordinated communication’?” for the purposes of federal election law. 11 C.F.R. § 109.21 (2010). 262 Id. § 109.21(c). 263 Id. § 109.21(d). 264 Id. 265 HLP, 130 S. Ct. at 2717–18. 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 432 endorsed the views expressed in this Article, and under such an expansive and elusive coordination requirement, this author may have seemingly provided material support. Chilling the speech of journalists, aid workers, and academics does not merely impact a few select professionals; the American public suffers an intangible loss of intellectual freedom. The speech protections of the First Amendment allow for a flourishing marketplace of ideas, where individuals gain exposure to a variety of “social, political, esthetic, [and] moral” views. 266 The Court has noted the importance of this “open marketplace where ideas, most especially political ideas”267 inform the populace and enrich the national character. The America-centered notion that these ideas can only emanate from within the borders of the United States is, at best, outdated. Those who might have communicated to us views that are critical of our foreign policy, might out of an abundance of caution, keep them to themselves. We lose out on these ideas, and the republic suffers as a result. The Government should be wary of disrupting the flow of ideas, especially those ideas that relate to the global war on terror. It is clear that the positions of the Government and the Court will also chill foreign speech. While chilling foreign speech is typically of less concern, the depletion of foreign material concerning the war on terror implicates the constitutional rights of Americans. The Court has repeatedly confirmed “that the Constitution protects the right to receive information and ideas . . . regardless of their social worth.”268 The Court has applied this 266 Red Lion Broadcasting Co. v. FCC, 395 U.S. 367, 390 (1969) ("It is the purpose of the First Amendment to preserve an uninhibited marketplace of ideas in which truth will ultimately prevail . . . . It is the right of the public to receive suitable access to social, political, esthetic, moral, and other ideas and experiences which is crucial here."). 267 N.Y. State Bd. of Elections v. Lopez Torres, 552 U.S. 196, 128 S. Ct. 791, 801 (2008) (“The First Amendment creates an open marketplace where ideas, most especially political ideas, may compete without government interference.” (citing Abrams v. United States, 250 U.S. 616, 630 (1919)). 268 Stanley v. Georgia, 394 U.S. 557, 564 (1969) (“It is now well established that the Constitution protects the right to receive information and ideas.”); see Martin v. City of Struthers, 319 U.S. 141, 143 (1943) (“[F]reedom [of speech] embraces the right to distribute literature, and necessarily protects the right to receive it.”); Griswold v. Connecticut, 381 U.S. 479, 482 (1965) (“In other words, the State may not, consistently with the spirit of the First Amendment, contract the spectrum of available knowledge. The right of freedom of speech and press includes not only the right to utter or to print, but the right to distribute, the right to receive, the right to read and freedom of inquiry, freedom of 433 Harvard National Security Journal / Vol. 4 doctrine to protect the right to possess obscene material in the home, to receive uncensored mail, and to receive religious literature.269 The First Amendment serves not only the interests of individual authors, but also the collective interest of a society enriched by a vibrant marketplace of ideas. Far from individualized harm, chilling the flow of foreign ideas would hurt the entirety of the American people by damaging this marketplace of ideas. B. HLP’s Chilling Effects will reach Speakers with the Greatest Exposure to Terrorist Activities and Vital Intelligence The Court’s holding in HLP not only threatens to chill domestic speech and the reception of foreign speech, it also greatly hampers the ability of NGOs and other third-parties to facilitate the production of valuable OSINT. Academic papers comprising interviews with a terror organization would provide intelligence agencies with a better understanding of the organization’s goals and grievances. Similarly, NGO reports, prepared with the cooperation of members of a terror organization, might yield valuable group demographics and thus, information on current fighting strength. Civilian communication that might indirectly reveal terrorist whereabouts or plans would be driven underground. Academics who have collected information on terrorist organizations are also likely to refrain from publishing their findings. Editorials following the decision noted, “it hardly seems farfetched that a zealous prosecutor could pursue people for lending ‘legitimacy’ to terrorist groups by publishing academic papers on their history and aims or their reasons for fighting.”270 There is good evidence that the Court’s holding will chill the production of these valuable documents. Several concrete examples of academic/terrorist group collaborations are provided in an HLP amicus thought, and freedom to teach—indeed, the freedom of the entire university community.”); Lamont v. Postmaster General, 381 U.S. 301, 307–08 (1965) (Brennan, J., concurring) (“The dissemination of ideas can accomplish nothing if otherwise willing addressees are not free to receive and consider them. It would be a barren marketplace of ideas that had only sellers and no buyers.”); Kingsley International Pictures Corp. v. Regents, 360 U.S. 684, 688–89 (“Yet the First Amendment's basic guarantee is of freedom to advocate ideas.”). 269 Stanley, 394 U.S. at 564; Procunier v. Martinez, 416 U.S. 396, 408 (1974); Martin, 319 U.S. at 143, 149. 270 Editorial, Court Chills Free Speech, USA TODAY, June 22, 2010, http://www.usatoday.com/news/opinion/editorials/2010-06-23-editorial23_ST2_N.htm. 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 434 brief prepared by the Brennan Center. 271 One anthropologist feared that he could no longer take part in and thus directly observe and report on Hamas funeral marches for terrorist “martyrs.”272 By walking in the parade, the anthropologist is able to hear the intimate conversations of terrorist members, but his presence also increases the size of protest directed by a terrorist group.273 Furthermore, the anthropologist presents the views of his subjects in academic papers, a valuable service that might legitimate terrorist causes and aggravate U.S. Allies. 274 HLP is especially worrisome for those individuals who seek to collect data from a terrorist group or interview its members, as they would seem to be engaging in something that might approach criminal coordination. Indeed, under the Court’s theory of fungible material support, a journalist who interviews a terrorist and shares those views in a story has provided a valuable service in coordination with a prohibited group. 275 By providing a medium for communication, the journalist allows the group to redirect resources from propaganda to plotting violent attacks.276 Several 271 Brief for the Academic Researchers and the Citizen Media Law Project as Amici Curiae in Support of Respondents/Cross-Petitioners at *12–*19, Holder v. Humanitarian Law Project, 130 S. Ct. 2705 (2010) (Nos. 08-1498, 09-89), 2009 WL 4271309 [hereinafter CMLP Brief]. 272 Id. at *18–19. 273 Id. 274 Id. It is deeply troubling that the Court in HLP felt that censuring American speech activities was necessary to avoid upsetting our allies in the war on terror. There is a nontrivial argument that denying speech protections in both the Domestic and Foreign sphere will antagonize allies. The Executive has repeatedly warned our allies and enemies alike to respect the freedom of speech in the Internet domain. See, e.g., Paul Colgan & Geoff Elliott, Stephen Conroy and US at Odds on Net Filter, THE AUSTRALIAN.COM, Mar. 29, 2010, http://www.theaustralian.com.au/ business/media/stephen-conroy-and-us-at-odds-onnet-filter/story-e6frg996-1225846614780 (expressing concern with Australia’s use of extensive Internet filtering); see also, Andrew Moshirnia, The Persian Version: Why Support for ACTA Undermines U.S. Promotion of Internet Freedom, DIGITALMEDIALAWPROJECT.ORG, Mar. 10, 2010, http://www.dmlp.org/blog/2010/persian-version-why-support-actaundermines-us-promotion-internet-freedom. These actions would ring hollow if the United States did not offer steadfast protection of foreign content and foreign authors. 275 CMLP Brief, supra note 271 at *15–*17. 276 Id. at *18. (specifically mentioning the al-Bahlul prosecution as cause for journalist concern: “In light of the fact that the government has successfully prosecuted at least one Al Qaeada member under the material support statute for creating and disseminating a propagandist videotape [referring to Al-Bahlul] can journalists be confident that they may broadcast clips of such videos or otherwise provide a forum in which terrorist groups air their views without risking criminal prosecution?”). 435 Harvard National Security Journal / Vol. 4 newspapers published editorials immediately following the HLP decision citing this same fear. 277 The New York Times editorial noted that “[t]he FBI has [already] questioned people it suspected as being sources for a New York Times article about terrorism, and threatened to arrest them for providing material support.”278 C. Side Stepping Brandenburg in Targeting Domestic Speech HLP is already being used to convert speech that falls far below the solicitation threshold into criminally actionable offenses. That is, the government is criminalizing conduct by American residents that would not satisfy the Brandenburg standard for intent, imminence, and likelihood. Jubair Ahmad, a 24-year-old immigrant, was charged with violating 18 U.S.C. § 2339B for the production of a YouTube video that fell well below the Brandenburg standard. 279 Ahmad, who was born in Pakistan and was a lawful permanent resident of Virginia, created a five-minute YouTube video. He did so at the behest of Talha Saeed, the son of the leader of Lashkar-e-Tayyiba (LeT), a foreign terrorist organization active primarily in the Kashmir. Ahmad pleaded guilty to the single count. The five-minute video was made up of pictures and video clips, with the background audio of a prayer from Hafiz Saeed, the leader of LeT. The video begins with pictures of the arrest of Hafiz by Pakistani authorities, and continues on to show the LeT logo, images of abuse against Muslims at Abu Ghraib, armored trucks exploding when struck by improvised explosive devices, and pictures of dead men. The audio prayer consists of several refrains: “O God, support Jihad and the Mujahideen,” “O God give us the glory of Jihad,” and “O God, lead the Mujahideen to victory, who fight for 277 Editorial, Court Chills Free Speech, USA TODAY, June 22, 2010, http://www.usatoday.com/news/opinion/editorials/2010-06-23-editorial23_ST2_N.htm. (“[A] sharp and troubling turn, the court has denied free speech rights to humanitarian groups— and potentially to academics and journalists.”). 278 Editorial, A Bruise on the First Amendment, N.Y. TIMES, June 21, 2010, at A26. 279 Affidavit in Support of Criminal Complaint, Arrest Warrant, and Search Warrant Jubair, Criminal No. 1:11 MJ 742 available at http://www.scribd.com/doc/63816237/Jubair-Ahmad-Affidavit; Position of the United States with Respect to Sentencing, Criminal No 1:11 CR 554, available at http://www.scribd.com/doc/89282160/ Ahmad-gov-Sentencing-Memo. 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 436 your sake.” Hafiz calls on Allah to protect the Mujahideen and grant them victory in Kashmir, Afghanistan, Iraq, Chechnya, and Palestine. This video almost certainly falls below the requirements of Brandenburg—mere requests for viewers to join a group or asking for victory (however violent that victory may be) simply do not reach the imminence and likelihood requirements of Brandenburg. If anything, this video appears to be “pure speech,” as specifically protected in HLP. 280 Upon review of the video, the district court reasoned that the production of a video encouraging jihad was a violent act and sentenced Ahmad to twelve years imprisonment. The import of the Ahmad case is fairly clear: even if the underlying speech would be non-criminal, if it is made in coordination with an FTO it becomes criminal. Interestingly, in this way the logic of the prosecution of Ahmad, a lawful American resident, merges with the prosecution of alBahlul: no Brandenburg instruction need be given because the First Amendment does not apply. Though Brandenburg281 was not overruled by HLP, an analysis of imminence and likelihood of criminal response to speech is no longer necessary—provided that the speaker has interacted with terrorists. It should be obvious that these cases undermine Brandenburg generally. There is no constitutional basis for stripping First Amendment protection merely on the basis of association. It is for perhaps this reason that the Government has begun to bring solicitation charges against individuals who have not associated with terrorists for conduct that would fall below Brandenburg. Emerson Winfield Begolly, a 21-year-old Pennsylvanian man, was charged with soliciting terrorism for his online comments praising terrorist attacks and urging Jihad. 282 Deputy Assistant Attorney General in 280 Holder v. Humanitarian Law Project, 130 S. Ct. 2705, 2710 (2010). 281 Marty Lederman, The Begolly Indictment and the First Amendment, BALKINIZATION (July 15, 2011), http://balkin.blogspot.com/2011/07/begolly-indictment-and-firstamendment.html.; Brandenburg v. Ohio, 395 U. S. 444 (1969) (per curiam). 282 Grand Jury Indictment of Emerson Winfield Begolly, Criminal No 1:11 CR 326, available at http://www.lawfareblog.com/wp-content/uploads/2011/07/BegollyIndictment.pdf. His comments included: 437 Harvard National Security Journal / Vol. 4 the Department of Justice’s Office of Legal Counsel, Marty Lederman, noted that Begolly’s indictment raised serious First Amendment concerns, because his speech: does not at first glance appear to be different from the sort of advocacy of unlawful conduct that is entitled to substantial First Amendment protection under the Brandenburg line of cases. . .The Begolly indictment does not allege either an intent to incite imminent lawless action, or a likelihood that the speech would produce such imminent lawlessness. Assuming the government could not prove such Brandenburg intent and likelihood beyond a reasonable “Peaceful protests do not work. The kuffar [infidels] see war as solution to their problems, so we must see war as the solution to our[s]. No peace. But bullets, bombs and martyrdom operations”; “There is only one life, let it be spend in the service of Allah. And there is only one death, let it be for the sake of Allah”; “Who are the best targets? Off duty police, off duty soldiers, gang member, family members of soldiers, government agents, workers at ammunition factory, white supremacists or black supremacists. It is best if targeting soldiers or police that they are off duty and out of uniform simply because they investigations will look usually for 'robbery gone wrong' or 'revenge' then as act of terrorism of revolt”; “A successful lone-wolf attack, when even kills 1 or 2 or 3 of the kuffar [infidels] is BETTER THAN an[] UNSUCCESSFUL massive attack which also results in your own arrest . . . .”; “Allah commands us to fight the kuffar as they have fought us. Remember 9/11, 7/7, Madrid and Beslan”; “Let your voice speak forever, write your autobiography with blood”; “Why terrorize the average Americans? BECAUSE ALLAH COMMANDS US TO TERRORIZE THEM. They terrorize us. Let the[m] wake up to the horrors of war and the reality of death that they would otherwise not ever know just sitting at home stuffing their fat faces watching TV”; “Our religion tells us, and example has shown to us, YES to is halal [permissible] to deliberately target civilians in Jihadi operations carried out in Dar-ul-Kuffar [land of the infidels].” Id. 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 438 doubt, Count One would appear to be very vulnerable to a First Amendment challenge. 283 Begolly pleaded guilty and so this First Amendment question was never explored. Of course, there is some evidence that the Government will not bring criminal charges when a clearly materially supportive speaker is nonmuslim and well respected. There was a concerted effort to remove MEK from the FTO list. 284 In the course of this campaign, MEK spent millions of dollars to gain the support of former politicians, such as former mayor Rudolph Guliani, former Homeland Security Advisor Fran Townsend, and former Pennsylvania Governor Ed Rendell. In the case of Rendell, the MEK paid him $20,000 for a ten-minute speech he made on their behalf. He is currently under investigation by the Treasury Department for taking such fees. However, he appears to be the only member of a large support group including Rudy Giuliani, Howard Dean, Michael Mukasey, Andy Card, Lee Hamilton, Tom Ridge, Bill Richardson, Wesley Clark, Michael Hayden, John Bolton, Louis Freeh and Fran Townsend, to be investigated. And none of these individuals has been charged with material support. 285 D. HLP and Bahlul threaten to further Chill Speech in Combination It is axiomatic that broadening the scope of a criminal speech sanction will chill speech at the boundary of that sanction. It is clear the Government intends to prosecute not only advocacy directed towards imminent lawless action, but also offensive propaganda and political argument. 286 By expanding the sanction, the Government may chill the 283 Lederman, supra note 281. 284 Scott Peterson, Iranian Group’s Big-Money Push to get off US Terrorist List, THE CHRISTIAN SCIENCE MONITOR, Aug. 8, 2011, http://www.csmonitor.com/World/MiddleEast/2011/0808/Iranian-group-s-big-money-push-to-get-off-US-terrorist-list. 285 These efforts eventually succeeded in the de-listing of MEK, but commentators have pointed out that this does not retroactively immunize individuals who provided material support to the organization. See Greenwald, supra note 116. 286 See Brief for Appellant at 9, Al Bahlul v. United States, CMCR (No. 09-001), available at http://www.defense.gov/news/6%20%20%20United%20States%20v%20%20al%20Bahl ul%20-%20Brief%20for%20Appellant%20(1%20September%202009).pdf. Several intelligence officers have argued that this propaganda is itself valuable OSINT. Brief for the United States Intelligence Community Amicus Curiae in applying First Amendment protected speech rights in Support of Appellant, Al Bahlul v. United States, CMCR (No. 439 Harvard National Security Journal / Vol. 4 speech of regional media expressing “offensive arguments.” HLP alone exacts a significant toll on nonconforming speech. Section 2339B will likely have a chilling effect on American and foreign researchers by threatening them with prison time. Worse still, the solicitation offense at issue in Bahlul, 10 U.S.C. § 950, creates an expansive crime of solicitation of material support. 287 A solicitation charge, freed from any Brandenburg constraints, would encompass an even larger field of conduct for individuals labeled enemy combatants. 288 Like HLP, the Government’s position in Bahlul and Al-Haj’s case unjustifiably and unnecessarily curtails free speech rights. Not only is this discussion complex and important, it is arguably the most powerful critique because it adopts the accepted values of proponents of my antipodes and shows how even they ought to favor a different approach. The material support statute, as interpreted in HLP, will limit terrorist group advocacy. It is also the explicit goal of the Government in Al-Bahlul’s trial to limit the production and distribution of al-Qaeda propaganda. The Government’s position, though intended to suppress terrorist efforts, will ultimately have a self-defeating effect because it will chill speech that has value as intelligence. 09-001), available at http://www.defense.gov/news/3d%20Motion%20and%20Brief%20from%20US%20Intel ligence%2015%20Oct%2009.pdf. 287 The language of 10 U.S.C. § 950v (2006) comprises 18 U.S.C. § 2339(a)–(b). 288 It should be noted that Government may bring a fairly broad charge of conspiracy to provide material support only against alien unprivileged enemy belligerents. 10 U.S.C. § 950v(28) (2006) (“Any person subject to this chapter who conspires to commit one or more substantive offenses triable by military commission under this chapter, . . . shall be punished . . . .”). It is not the position of this Article that § 950v will be used against citizens. However, some lawmakers have demonstrated a desire to widen the definition of enemy combatants to include U.S. citizens held within the United States in response to domestic attacks. In response to the Boston Marathon Bombing, several prominent Republican senators requested that Dzhokhar Tsarnaev, a naturalized U.S. citizen, be labeled an enemy combatant. Press Release, Sen. Lindsey Graham, Graham, McCain, Ayotte and King Statement On Enemy Combatant Status For Boston Suspect (Apr. 20, 2013), available at http://www.lgraham.senate.gov/public/index.cfm?FuseAction=PressRoom.PressReleases &ContentRecord_id=283aeb5a-ffc4-7534-730b-b9df7e3a648f . The administration refused this request. See John R. Ellement, Milton J. Valencia & Martin Finucane, Dzhokhar Tsarnaev, Marathon bombing suspect, charged in federal court with using a weapon of mass destruction, BOSTON.COM, Apr. 23, 2013, http://www.boston.com/metrodesk/2013/04/22/whitehouse-dzhokhar-tsarnaev-bombing-suspect-tried-federalcourt/VvkTs5UtwmsuEnKMXMVSXM/story.html. 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 440 V. Crisis Mapping: Concrete Results from Data Mining Rich Open Source Intelligence There is a well-understood rights-based argument that all individuals suffer when policies chill speech. But these policies will also severely impair our ability to explore and develop crucial new technologies in the field of human rights and humanitarian intervention. This is important not just because of OSINT and information we might capture from these new approaches, but also because it impedes our ability to more effectively deal with global crises. These crises, of course, relate to rises in terrorist activity, violence, and the radicalization of marginalized groups. As this Article has sought to demonstrate, there are robust security reasons for safeguarding the marketplace of ideas—content-rich analysis provides valuable intelligence in the war on terror. While previous models of the intelligence cycle assumed that data collection and analysis would occur primarily at the government level, in an age of social media and horizontal information sharing, actionable intelligence is being gathered and disseminated by civilian actors. Recent efforts by programmers and activists leverage SMS messaging and Google Maps (and corresponding application programming interfaces or APIs) as well as social media such as Twitter, Facebook, and YouTube in order to create useful intelligence to aid humanitarian efforts. One of the most striking examples of the utilization of modern OSINT to create an empowered citizenry is Crisis Mapping. Crisis Mapping crowd sources the datamining of OSINT to visualize real-life crises. This Section explains Crisis Mapping, provides two case studies of the impact of Crisis Mapping on humanitarian responses to world events, and explores the possible effects of HLP on Crisis Mapping. A. Crisis Mapping: Information Sourcing, Visualization, and Analysis Crisis Mapping is the live mapping of crises. 289 Crises may take the form of sudden disasters or long-term events. 290 While the subject matter of 289Monica Hesse, Crisis Mapping Brings Online Tool to Haitian Disaster Relief Effort, THE WASHINGTON POST, Jan. 16, 2010, http://www.washingtonpost.com/wpdyn/content/article/2010/01/15/AR2010011502650.html?hpid=topnews. 441 Harvard National Security Journal / Vol. 4 crisis maps varies, typical subjects include political, social, and environmental crises. Crisis Mapping comprises three separate elements: Information Sourcing, Visualization, and Analysis.291 Each stage is either dependent on or generates further OSINT. Information sourcing is the collection of data to inform the visual map. 292 Current crisis mappers use a variety of methods to obtain this information.293 These may be as simple as paper surveys or the scanning of hand-drawn maps from multiple observers. 294 However, the most exciting developments within this field are the crowdsourcing295 of reports (typically through mobile phones) and the use of social media data. Traditional media, NGOs, and government sources may provide verification for this data, leading to the creation of actionable reports. 296 Visualization translates the available data into a map, which provides maximal utility for the data and assists in the detection of patterns. 297 Traditional cartography298 and Geographic Information 290 Patrick Meier, What is Crisis Mapping? An Update on the Field and Looking Ahead, IREVOLUTION Jan. 20, 2011, http://irevolution.net/2011/01/20/what-is-crisis-mapping/ [hereinafter Meier Mapping]. 291 Id. 292 Id. 293 Id. 294 Id. 295 For more information on crowdsourcing, see Jeff Howe, The Rise of CrowdSourcing, WIRED (June 2006), http://www.wired.com/wired/archive/14.06/crowds.html. Crowdsourcing is commonly defined as “the practice of obtaining needed services, ideas, or content by soliciting contributions from a large group of people and especially from the online community rather than from traditional employees or suppliers.” Crowdsourcing, MERRIAM WEBSTER ONLINE DICTIONARY, http://www.merriamwebster.com/dictionary/crowdsourcing (last visited Jan. 22, 2013). 296See, e.g., John Crowley & Jennifer Chan, Disaster Relief 2.0: The Future of Information Sharing in Humanitarian Emergencies, UN FOUNDATION-VODAFONE FOUNDATION-UNOCHA (2011). 297 Patrick Meier & Jennifer Leaning, Applied Technology to Crisis Mapping and Early Warning in Humanitarian Settings, Crisis Mapping Working Paper I of III, HARVARD HUMANITARIAN INITIATIVE 3 (Sept. 2009), available at http://fletcher.tufts.edu/~/media/%20Fletcher/News%20and%20Media/2009/Sep/Op -Ed/Meier%2009%2009.pdf. 298 See generally The History of Cartography, THE HISTORY OF CARTOGRAPHY PROJECT, http://www.geography.wisc.edu/histcart/ (last visited Apr. 15, 2013). 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 442 Systems (GIS)299 will be familiar to most readers. However, each of these methods requires expertise, and is time consuming and often prohibitively expensive.300 Crisis Mapping Visualization differs significantly in that free and open source technology allows users to cheaply engage in the effort to visualize data without extensive training. By utilizing existing systems, such as Google Maps, a far greater number of individuals can utilize crisis mapping visualization. 301 Analysis involves the use of statistics to enable pattern detection. Again, the reader is no doubt familiar with the concept of pattern detection, perhaps envisioning a general making decisions while leaning over a map of the battlefield. However, crisis mapping enables real-time detection of patterns. 302 This immediacy in turn allows for rapid decision-making and further impact analysis.303 Just as information collection utilizes crowdsourcing, visualization and analysis allow crowdfeeding,304 that is, horizontal communication between members of the crowd, increasing the efficiency of first responders. 305 299 See generally What is GIS?, ESRI.COM, http://www.esri.com/what-is-gis/index.html. (last visited Apr. 15, 2013). 300 See James Bennet, Cost and Fee Structure Modeling for GIS, ESRI.COM, http://proceedings.esri.com/library/userconf/proc00/professional/papers/PAP775/p775 .htm (last visited Feb. 28, 2013). 301 Meier Mapping, supra note 290. 302 Patrick Meier, Crisis Mapping Analytics and Pattern Recognition, IREVOLUTION, June 23, 2008, http://irevolution.net/2008/06/23/crisis-mapping-analytics-and-patternrecognition/. 303 Meier Mapping, supra note 290. 304 Patrick Meier, Ushahidi: From Croudsourcing to Crowdfeeding, IREVOLUTION, Mar. 27, 2009, http://irevolution.net/2009/03/27/ushahidi-from-croudsourcing-to-crowdfeeding/. 305 This principle springs largely from technological democracy and generativity literature. See ERIC VON HIPPEL, DEMOCRATIZING INNOVATION 121 (2005); see generally Carliss Baldwin & Eric von Hippel, Modeling a Paradigm Shift: From Producer Innovation to User and Open Collaborative Innovation (MIT Sloan Sch. of Mgmt., Working Paper No. 4764-09, 2010), available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1502864; Jonathan L. Zittrain, The Generative Internet, 119 HARV. L. REV. 1974, 1980 (2006) (noting that the generativity of the “grid of PCs connected by the Internet” is what makes the internet so valuable). See generally LAWRENCE LESSIG, THE FUTURE OF IDEAS (2001). However, as established by Robert Steele, it aligns perfectly with the demands of OSINT, as “contributions of these varied sources must be then communicated to the masses, to create "citizen centered intelligence" by enabling citizens to not only participate, but to draw upon the pooled knowledge created.” BURKE, supra note 21, at 17. 443 Harvard National Security Journal / Vol. 4 B. Case Studies of Ushahidi: A Crisis Mapping Platform This Section traces the development and deployment of a crisis mapping platform and network, Ushahidi. The Ushahidi platform has been deployed for several crises since its creation for the Kenyan Election Crisis of 2007-2008, 306 including: in the aftermath of the earthquake that devastated Haiti307 in 2010; through development of the Syria Tracker Crisis Map308 in response to the ongoing political violence in Syria; and, most recently, in relation to Libya’s revolution that ended the rule of Muammar Gaddafi. This Section explains the utility of crisis maps, the role of crisis maps in reducing violence, the possible utilization of crisis maps by U.S. governmental actors, and the critical role of volunteers who could be chilled by an expansive reading of the material support statute, § 2339B. 1. Kenya The Ushahidi platform has its roots in the Kenyan Election Crisis of 2007–2008. 309 On December 27, 2007, Kenya held a presidential election between incumbent Mwai Kibaki and Raila Odinga, of the Orange 306 Ushahidi has been used in a variety of contexts. Ushahidi platforms have been deployed frequently to aid election monitoring: in India, for the general elections of 2009—Vote Report India—and in Mexico for the federal elections of July 5, 2009—Cuidemos el voto. Ushahidi platforms have also assisted election monitoring in “Mozambique, Togo, Lebanon, Ethiopia, Burundi, Colombia, Guinea, Brazil, Sudan, and Afghanistan . . . .” Deployment has not been limited to elections. Ushahidi deployments have covered “[s]wine flu reports, consumer complaints about mobile phone companies in the Philippines, forest fires in Italy, medical supplies stock outs at pharmacies in Kenya, Uganda, Malawi and Zambia, wildlife tracking in Kenya, crime reports in the metro area of Atlanta (USA), snow problems during the 2010 blizzard in Washington (USA) and traffic accidents in Los Angeles.” Frans Staal, Interaction Between Social Media and Democracy: A Case Study on the Societal Factors Influencing the Success of Ushahidi in Afghanistan 17–19 (Mar. 21, 2011) (unpublished master thesis, Tilburg University) (on file with Tilburg School of Economics and Management). 307 Ushahidi Aggregates, Disseminates Haiti Crisis Info: Q&A with Patrick Meier, TED BLOG (Jan. 14, 2010), http://blog.ted.com/2010/01/14/ushahidi_brings/. 308 Syria Tracker Crisis Map, SYRIA TRACKER, https://syriatracker.crowdmap.com/(last visited Apr. 15 2013). 309Simon Jeffery, Ushahidi: Crowdmapping Collective that Exposed Kenyan Election Killings, THE GUARDIAN NEWS BLOG, Apr. 7, 2011, http://www.guardian.co.uk/news/blog/2011/apr/07/ushahidi-crowdmap-kenyaviolence-hague. 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 444 Democratic Movement (ODM). 310 The initial results gave Odinga a strong lead of several hundred thousand votes. 311 However, as days passed and the tally continued, Odinga’s lead disappeared.312 When the Election Commission indicated that Kibaki was now ahead by a small margin, the Odinga camp claimed this was the result of rampant electoral manipulation.313 EU observers characterized the election as flawed314 and noted that there was substantial evidence of fraud on both sides.315 Tribal violence broke out almost immediately after the Electoral Commission’s declaration of Kibaki’s victory, with attacks focused on Kikuyus,316 the ethnic group to which Kibaki belongs.317 The ministry of security ordered a 310 See Jeffrey Gettleman, Election Rules Complicate Kenya Race, N.Y. TIMES, Dec. 25, 2007, http://www.nytimes.com/2007/12/25/world/africa/25kenya.html?_r=1&ref=railaoding a (predicting that the close election and vague election law would cause violence and quoting one western diplomat: “We just hope it’s not close”). 311 Nicholas Soi & Robyn Dixon, Close Race Spurs Riots in Kenya: President Closes in on Opposition's Lead Both Claim Victory, THE BALT. SUN, Dec. 30, 2007, http://articles.baltimoresun.com/2007-12-30/news/0712300076_1_kenya-presidentmwai-kibaki-odinga. 312 Id. 313 ODM Claims Police Used in Election Fraud, SOWETANLIVE.CO.ZA, (Dec. 27, 2007), http://www.sowetanlive.co.za/sowetan/archive/2007/12/27/odm-claims-police-used-inelection-fraud; see also ORANGE DEMOCRATIC MOVEMENT, REPORT BY THE ORANGE DEMOCRATIC MOVEMENT ON ELECTION FRAUD AND MALPRACTICES COMMITTED BY THE ELECTORAL COMMISSION OF KENYA IN FAVOUR OF MWAI KIBAKI IN THE PRESIDENTIAL ELECTIONS (Jan. 2, 2008), available at http://www.pambazuka.org/actionalerts/images/uploads/ODMreport.pdf. 314 Mike Pflanz & Natalie Paris, EU Calls for Inquiry into Kenya Election, TELEGRAPH.CO.UK, Dec. 30, 2007, http://www.telegraph.co.uk/news/worldnews/1574243/EU-calls-forinquiry-into-Kenya-election.html; Jeffrey Gettleman, Disputed Vote Plunges Kenya Into Bloodshed, N.Y. TIMES, Dec. 31, 2007, http://www.nytimes.com/2007/12/31/world/africa/31kenya.html? pagewanted=all. 315 Jeffrey Gettleman, Disputed Vote Plunges Kenya Into Bloodshed, N.Y. TIMES, Jan. 7, 2007, http://www.nytimes.com/2007/12/31/world/africa/31kenya.html?pagewanted=all&_r= 0. 316 Jeffrey Gettleman, Kenya's Kikuyus Are Now Target of Rival Tribes, N.Y. TIMES, Jan. 7, 2008, http://www.nytimes.com/2008/01/07/world/africa/07iht- 07kenya.9047314.html?pagewanted=all. 317 There is good evidence that agitators helped exacerbate ethnic tension by sending mass text messages directing recipients to slaughter members of targeted ethnic groups: “Fellow Kenyans, the Kikuyu’s have stolen our children’s future . . . we must deal with them in a way they understand . . . violence,” and “No more innocent Kikuyu blood will be shed. We will slaughter them right here in the capital city. For justice, compile a list of Luo’s you know . . .we will give you numbers to text this information.” Susan Benesch, Words as Weapons, WORLD POLICY INSTITUTE (Spring 2012), 445 Harvard National Security Journal / Vol. 4 suspension of all live broadcasts, further obscuring the already chaotic scene on the ground. Ory Okolloh, a Kenyan lawyer and blogger, posted online a request for an Internet-based mapping tool to allow people to anonymously report attacks and abuse. 318 Programmers Erik Hersman and David Kobia took up the call.319 The result was the Usahidi platform (which means “Testimony” or “Witness” in Swahili), a site that gathered user-generated cellphone reports of deaths, rapes, riots, and refugees. 320 These reports could be verified against information derived from the international media, government sources, NGOs, and members of the Kenyan media.321 Harvard’s Kennedy School of Government analyzed the site’s effectiveness in relation to coverage by mainstream media and concluded that “Ushahidi had been better . . . at reporting acts of violence as they started, better at reporting acts of nonfatal violence (which are often a precursor to deaths), and better at reporting over a wide geographical area, including rural districts.”322 2. Haiti On January 12, 2010, a 7.0 magnitude earthquake struck Haiti, approximately sixteen miles west of the capital, Port-au-Prince. 323 Leogane, http://www.worldpolicy.org/journal/spring2012/words-weapons; Neelam Verjee, Will Kenya’s Elections Transform the Text Message from Deadly Weapon to Peace Offering?, QUARTZ (Mar. 2, 2013) http://qz.com/58510/will-kenyas-elections-transform-the-text-message-fromdeadly-weapon-to-peace-offering/. 318 Ory Okolloh, Update Jan 3 11:00 PM, KENYAN PUNDIT, Jan. 3, 2008, http://www.kenyanpundit.com/2008/01/03/update-jan-3-445-1100-pm/ (“Google Earth supposedly shows in great detail where the damage is being done on the ground. It occurs to me that it will be useful to keep a record of this, if one is thinking long-term. For the reconciliation process to occur at the local level the truth of what happened will first have to come out. Guys looking to do something—any techies out there willing to do a mashup of where the violence and destruction is occurring using Google Maps?”). 319 Tom Masters, Ushahidi—A Stroke of Social Genius, THE DESMOND TUTU PEACE FOUNDATION, Oct. 6, 2011, http://www.tutufoundationusa.org/2011/10/feature-story- 2/. 320 JESSICA HEINZELMAN & CAROL WATERS, CROWDSOURCING CRISIS INFORMATION IN DISASTER-AFFECTED HAITI 5 (2010). 321 Id. 322 Clay Shirky, Tapping the Cognitive Surplus, WORLD FUTURE SOCIETY (2010), http://www.wfs.org/content/tapping-cognitive-surplus. 323 HEINZELMAN & WATERS, supra note 320, at 2. 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 446 the town at the epicenter of the earthquake, was essentially obliterated, with ninety percent of its buildings collapsed.324 The infrastructure of Haiti was severely compromised, with the country’s UN headquarters, presidential palace, parliament, and the great majority of ministries destroyed or otherwise heavily damaged. 325 The human infrastructure was also tragically crippled, as the head of the UN peacekeeping mission in Haiti and 100 members of the UN staff were killed in the earthquake. 326 The extent of the devastation engendered a rapid international commitment of aid. 327 However, the traditional international aid system could not easily integrate data from the Haitians themselves. Existing aid information was inadequate; for example, there was a noted lack of accurate road maps and poor understanding of existing Haitian infrastructure. 328 In a particularly telling example, local Haitians were unable to enter the UN logbase, the informational hub of the UN relief effort, without first registering and obtaining a security badge. 329 Even if granted access, Haitians were not included in high-level action meetings.330 One prominent Haitian aid organizer noted, “International aid groups compare notes and discuss strategies for distributing aid at ‘cluster meetings’ from which 324 Christian Fraser, Leogane: Haiti's 'Neglected' Quake-Hit Town, BBC NEWS, Feb. 12, 2010, http://news.bbc.co.uk/2/hi/americas/8511762.stm. 325 HEINZELMAN & WATERS, supra note 320 at 5. 326 Neil MacFarquhar, U.N. Honors the 101 Who Served and Died in Haiti, N.Y. TIMES, Mar. 10, 2010, http://www.nytimes.com/2010/03/10/world/americas/10nations.html (noting that the loss was “the largest one-day toll in the history of the organization”). 327 Sara Miller Llana, Haiti Earthquake: With Aid Groups Already There, Relief Efforts Ramp up Quickly, CHRISTIAN SCIENCE MONITOR, Jan. 13, 2010, http://www.csmonitor.com/World/Americas/2010/0113/Haiti-earthquake-With-aidgroups-already-there-relief-efforts-ramp-up-quickly. But there has been great criticism that much of this promised aid was never delivered. Tom Phillips & Claire Provost, Haiti Earthquake: Two Years on, and Just Half of Promised Aid has Been Delivered, THE GUARDIAN, Jan. 11, 2012, http://www.guardian.co.uk/world/2012/jan/11/haiti-earthquake-promisedaid-not-delivered; see also Sharyl Attkisson, Haiti Earthquake Aid: Nearly $15 Billion in Donations, CBS NEWS, Apr. 22, 2010, http://www.cbsnews.com/8301-31727_162-20003180- 10391695.html. 328 Another thing that has slowed down the relief effort is the lack of reliable maps of Haiti. See Clark Boyd, Online Mapping Helps Haiti Relief Efforts, THE WORLD, Jan. 22, 2010, http://www.theworld.org/2010/01/online-mapping-helps-haiti-relief-efforts/. 329 HEINZELMAN & WATERS, supra note 320, at 3. 330 Id. 447 Harvard National Security Journal / Vol. 4 ordinary Haitians are in effect banned. . . . Discrimination against Haitians in their own country seems more prevalent ever since the earthquake.”331 The inability to incorporate data from local Haitians created an informational vacuum that increased the threat of violence on the ground. International media had reached some areas before the aid organizations and sensationalist reports of violence prevented the delivery of aid. 332 Several aid providers disputed the validity of these reports, 333 but the delay in aid delivery served to create a frustrated populace, which in turn increased the likelihood of violence: “[o]ur team on the ground reaffirms that the reports of violence in the streets of Port-au-Prince have been grossly exaggerated and have become a major obstacle to mounted the response needed to save tens of thousands of lives each day.”334 The Ushahidi-Haiti map was deployed within two hours of the earthquake. 335 The team drew on social media (Twitter, Facebook, blog posts) as well as traditional media in generating actionable reports. 336 Critically, the team established a direct SMS text messaging system, which allowed Haitian households, approximately 85% of which have mobile phones, to submit alerts for analysis and mapping.337 Because of the large amount of information submitted, volunteers from the Fletcher School of Law and Diplomacy at Tufts University were asked to assist live mapping. 338 The team eventually grew to over 1,000 volunteers (largely members of the Haitian diaspora) in the United States and Canada, who translated and geo-coordinated incoming messages. 339 A report on the deployment noted the importance of volunteers: 331 Id. 332 Id.; Lucia Sepulveda, Haiti: Narrative Analysis of the 2010 Haiti Earthquake in the Conservative and Mainstream Media (Jun. 2, 2012) (unpublished Masters thesis, California State University Northridge) (on file with CSUN ScholarWorks) available at http://scholarworks.csun.edu/handle/10211.2/1134?show=full. 333 See HEINZELMAN & WATERS, supra note 320 at 6. 334 Id. 335 Id. at 6. 336 Id. at 6–7. 337 Id. at 7. 338 Id. at 6. 339 Id. at 7. 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 448 [T]he majority of the mapping, translating, and processing work for the Ushahidi platform was done purely by volunteers. In the spirit of the Ushahidi platform itself, the very large and daunting task of aggregating thousands of reports was manageable only because the body of work was crowdsourced to a dedicated international network of volunteers. 340 Ultimately, the team translated 25,186 SMS messages, along with other media communications, creating 3,596 actionable reports. 341 Craig Fugate of the FEMA Task Force noted that “[t]he crisis map of Haiti represents the most comprehensive and up-to-date map available to the humanitarian community.”342 While the great majority of actionable reports collected and mapped in Ushahidi during the immediate aftermath of the earthquake concerned food, water, and shelter, a much smaller number dealt with violence. 343 Of the 3,596 reports generated, only 54 were related to security. 344 However, these reports, and the U.S. military’s response to them, provide key insight into the possible role of Crisis Mapping in addressing violent situations in foreign countries. As noted earlier, many aid workers felt that the delay in delivering supplies to areas perceived as dangerous due to exaggerated reports would increase the chance of violence on the part of a disaffected populace. This view was largely corroborated by reports of possible food riots posted on Ushahidi: “[r]esidents angry that they have not received aid have been reported to be building roadblocks between Carrefour and Portau-Prince”345 and “Angry mobs are moving up route national no. 2 from the district of Merger. They have set up road blockades and are threatening to move up the road towards Port-au-Prince. They are angry because they have not received any food aid. They are also threatening to escalate violence.”346 On both occasions, the U.S. Marine Corps responded to the 340 Id. at 8. 341 Id. at 9. 342 Id. 343 See NATHAN MORROW ET AL, INDEPENDENT EVALUATION OF USHAHIDI HAITI PROJECT, DEVELOPMENT INFORMATION SYSTEMS INTERNATIONAL USHAHIDI HAITI PROJECT 21 (2011), available at, http://www.alnap.org/pool/files/1282.pdf. 344 HEINZELMAN & WATERS, supra note 329, at 9. 345 Id. at 10. 346 Id. 449 Harvard National Security Journal / Vol. 4 report and dispersed the crowds before violence erupted.347 The Crisis Map not only provided location data but also contextualized the violence, allowing other actors to assess the security threat and craft targeted solutions. 348 While the above examples represent reactions to distinct threats, crisis map analysis also provides for the possibility of discerning society-wide attitudinal shifts. Sentiment analysis, which utilizes a word analysis to determine the emotional state of the populace, can be employed to predict imminent conflict. 349 In the case of Haiti, the European Council’s Joint Research Center conducted a sentiment analysis by identifying words and word combinations as either positive or negative and running the reports through this filter. 350 3. Syria The Ushahidi-Haiti deployment demonstrates the vital role of Crisis Mapping in organizing and assisting humanitarian aid. The current deployment of Syria Tracker351 continues to demonstrate the importance of crisis mapping in assessing war and violence. Syria Tracker impressively integrates data mining and eyewitness reports.352 Working off of a modification of the HealthMap software, Syria Tracker searches Google News for reports of violence and converts these to visualizations on the Syria Tracker Map. 353 Due to the Assad government’s monitoring of phone networks, Syria Tracker relies on Twitter, Facebook, and YouTube posts 347 See id. 348 See generally MORROW ET AL, supra note 343. 349 Cf. Patrick Philippe Meier, Sentiment Analysis of Haiti Text Messages (Updated), IREVOLUTION, Mar. 3, 2008, http://irevolution.net/2010/03/08/sentiment-analysissms/. 350 HEINZELMAN & WATERS, supra note 320 at 5. 351 Syria Tracker: Crowdsourcing Crisis Information, USHAHIDI.COM (May 24, 2011), http://blog.ushahidi.com/index.php/2011/05/24/syria-tracker-crowdsourcing-crisisinformation/. 352 See Jim Giles, Mapping the human cost of Syria’s uprising, NEW SCIENTIST, Mar. 27, 2012, http://www.newscientist.com/article/mg21328576.000. 353 Id. 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 450 for eyewitness reports.354 The resulting list of killings and disappearances populate a live Crisis Map of Syria. 355 4. Libya Perhaps the most celebrated deployment of Crisis Mapping in the security context was the Libya Crisis Map. The Libya crisis began as a series of peaceful protests in February 2011 that quickly spread into a civil war, with rebels seeking to overthrow Muammar Gaddafi. The United Nations responded rapidly, authorizing member states to establish a no-fly zone over Libya. The Libyan military response, with collective reprisals and indiscriminate attacks, created an immense humanitarian crisis. There were few if any formal networks reporting on this crisis; the United Nations had not been a presence in Libya for several years and therefore had no Information Management Officers on the ground, and there were no independent media to speak of in Libya. 356 However, information was making its way out of the country through social media.The United Nations Office for the Coordination of Humanitarian Affairs (UNOCHA), realizing that it faced a dearth of situational awareness, sent out a call for assistance to several crisis mapping groups. 357 One such group that mobilized in response was the Standby Volunteer Task Force for Live Mapping (SBTF). 358 The end product of this humanitarian UN collaboration was the Libya Crisis Map.359 SBTF ran the Libya Crisis map for twenty-three days before handing it over to OCHA. 360 In that time, relying on verifiable reports, the group mapped 1430 reports, many including pictures or embedded video. 361 354 Patrick Meier, Crisis Mapping Syria: Automated Data Mining and Crowdsourced Human Intelligence, IREVOLUTION, Mar. 25, 2012, http://irevolution.net/2012/03/25/crisismapping-syria/. 355 Id. 356 Libya Crisis Map Deployment: Standby Volunteer Task Force & UN OCHA March-April 2011, 9 (Sept. 2011), available at https://docs.google.com/file/d/0By08EjY3- T3RR0FqV1lzRldveE0/edit. 357 Id. at 8–9. 358 Id. at 8. 359 Eight major humanitarian NGOs and agencies formally requested access to the password protected Libya Crisis Map: UNHCR, WFP, Save the Children, IOM, IRC, SAARA, ICRC, American Red Cross. Id. at 10. 360 Id. at 9–10. 361 Id. at 10. 451 Harvard National Security Journal / Vol. 4 This required a massive effort, over 250 individuals participated in deployment, 200 new individuals joined the SBTF during Libya deployment and 100 United Nations Volunteers (UNVs) were trained and joined the deployment. 362 The resulting map was profoundly useful, so much so that a major concern of the project was to prevent Libyan military intelligence from seeing the map. 363 While crisis mapping security concerns is still in its infancy, the utility of the technology is not in doubt. However, recent Government actions make the future of crisis mapping uncertain. C. Consequences of Government Actions Threaten Crisis Mapping The above examples can run afoul of the expansive material support statute in HLP (or the solicitation contemplated in Bahlul) with relatively little change. One need only imagine the crisis developing in an area controlled by an FTO. For example, suppose that the Turkish army launches a major offensive in an area controlled by the PKK, a main Kurdish political force, 364 or severe droughts hit sections of Southern Somalia controlled by Al-Shabaab.365 In either scenario, several layers of 362 Id. 363 Neal Ungerleider, Here's a Map of the Humanitarian Crisis Hotspots in Libya (Don't Tell Gaddafi), FAST COMPANY (Mar. 9, 2011), http://www.fastcompany.com/1736822/heresmap-humanitarian-crisis-hotspots-libya-dont-tell-gaddafi. 364 Recall that the PKK, or Kurdish Workers’ Party, operates in Eastern Turkey and Northern Iraq. Turkey has repeatedly attacked PKK positions in Northern Iraq. See, e.g., Margaret Griffis, Turkey Shells PKK Targets in Northern Iraq, ANTIWAR.COM (Feb. 12, 2012), http://original.antiwar.com/updates/2012/02/12/turkey-shells-pkk-targets-in-northerniraq/; Turkey Shells Northern Iraq: Kurdish Rebels, AFP (Oct. 18, 2011), http://www.google.com/hostednews/afp/article/ALeqM5ghhk-oPFVnRTTEZMFYQgWiKFgXA?docId=CNG.ed3fb8b4aaf6fe4065c6bbf0031f2bf4.3a1. A Crisis Map visualizing these attacks might legitimize the PKK cause and annoy our ally Turkey, a concern specifically mentioned in HLP. 365 Harakat ash-Shabab al-Mujahideen, “Mujahideen Youth Movement” or “Movement of Striving Youth,” commonly referred to as al-Shabaab (“The Youth” or “The Boys”). See Terrorist Groups—Al Shabaab, NAT’L COUNTERTERRORISM CENTER (2013), http://www.nctc.gov/site/groups/al_shabaab.html. On February 29, 2008, the group was designated an FTO. Vol. 73, No. 53, DEP’T OF STATE Pub. No. 6136., 73 Fed. Reg. 14,550 (Mar. 18, 2008). Al-Shabaab controls a large swath of Southern Somalia, one of the areas currently suffering from one of the worst droughts in the last 60 years. Jayshree Bajoria, Al-Shabaab and Somalia's Spreading Famine, COUNCIL ON FOREIGN REL. (Aug. 10, 2011), http://www.cfr.org/somalia/al-shabaab-somaliasspreading-famine/p25630. 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 452 the Crisis Mapping team could be accused of material support or directly inhibited by a dearth of NGOs or media members on the ground. At the initial stage, the immediate reporters are likely to be FTO members or to be otherwise affiliated with them. These areas are under the control of FTO members, FTO members would likely have the greatest access to reporting tools, and FTO members would have good reason to report on crises so as to gain greater legitimacy. The receipt, translation, and visualization of these messages would generate a map that could be characterized as the result of “coordinated” speech. Indeed, the furnishing of the platform at all may be material support. After all, a Crisis Map is not merely a journalistic exercise. Team members translate, geolocate, and verify (thus lending more credibility to) submitted reports. The resulting Crisis Map is not simply a repetition of victim (in this scenario, members of an FTO) statements. It creates a guide for potential relief, provides a discussion platform, and generates a more easily accessible representation of facts to a wide audience. A Crisis Map may provide logistical support, early warning, and political legitimation, and surely an oppressed group may use it to harass or embarrass an aggressor. These, of course, are the very concerns addressed by the majority in HLP. 366 One does not need to assume that a great number of the actions of crisis mappers would actually be prosecuted in order to conclude that HLP may still retard crisis mapping. This Article has already discussed the chilling effect on NGOs and reporters of the expansive material support statute. 367 These actors are vital for verifying reports and creating actionable items. 368 In this way, an expansive reading of the material support at worst threatens to prevent Crisis Map deployments or at best lessens the effectiveness of Crisis Maps by reducing the number of verifying sources, who may be worried that they will face prosecution for their efforts under the new HLP standard. 369 366 Holder v. Humanitarian Law Project, 130 S. Ct. 2705, 2725–26 (2010). 367 See supra Part III. 368 See discussion supra Part II. 369 See chilled NGO discussion supra Part IV. 453 Harvard National Security Journal / Vol. 4 Conclusion The Government’s positions seem squarely aimed at chilling foreign speech and the speech of those who have interacted with foreign terrorist organizations. The Court has done little to stop the assault on speech; indeed, its interpretation of the material support statute will hamper domestic speakers and hamper the war effort. The Government’s position in Bahlul will likely exacerbate HLP’s effects, and both will serve to undermine Brandenburg. While all branches of government are working with American safety in mind, these actions choke off intelligence and therefore make Americans less safe. The simple solution to the HLP decision would be to establish a mens rea element, as suggested by the petitioning aid agencies and the dissent. 370 This approach would comport with precedent, by requiring that the charged individual further criminal activity through his speech. 371 There is a non-trivial argument that such an approach was the actual intent of Congress, which seemed far more concerned with monetary support than speech, and specifically protected the freedom to associate. 372 Further, this approach would remove the confusing “coordinated speech” dichotomy, which seems unconstitutionally vague and likely to create a new category of 370 HLP, 130 S. Ct. at 2740 (Breyer, J., dissenting) (“I would read the statute as criminalizing First-Amendment protected pure speech and association only when the defendant knows or intends that those activities will assist the organization’s unlawful terrorist actions. Under this reading, the Government would have to show, at a minimum, that such defendants provided support that they knew was significantly likely to help the organization pursue its unlawful terrorist aims.”). 371 Id. at 2737 (“[T]he First Amendment protect[s] an American's right to belong to [the Communist] party—despite whatever ‘legitimating’ effect membership might have had—as long as the person did not share the party's unlawful purposes.”) See, e.g., United States v. Robel, 389 U.S. 258 (1967) (holding that national security interests did not justify overbroad criminal prohibition on members of Communist-affiliated organizations working in any defense-related facility); Keyishian v. Bd. of Regents of Univ. of State of N. Y., 385 U. S. 589, 605–610 (1967); Elfbrandt v. Russell, 384 U. S. 11, 17 (1966); Scales v. United States, 367 U. S. 203, 228–30 (1961); De Jonge v. Oregon, 299 U. S. 353 (1937). 372 HLP, 130 S. Ct. at 2742 (Breyer, J., dissenting) (quoting 142 CONG. REC. S3354–S3360 (1994) (statement of Sen. Hatch)) (pointing out that the Chairman of the Senate Judiciary Committee believed that “[t]his bill also includes provisions making it a crime to knowingly provide material support to the terrorist functions of foreign groups designated by a Presidential finding to be engaged in terrorist activities. . . . I am convinced we have crafted a narrow but effective designation provision which meets these obligations while safeguarding the freedom to associate, which none of us would willingly give up.” (emphasis added)). 2013 / Valuing Speech and OSINT in the Face of Judicial Deference 454 barred speech. Finally, because this approach would not focus on FTO legitimatizing speech, it would not create the underinclusive problem of targeting coordinated speech and not the far more legitimizing category of independent advocacy. 373 HLP is troubling not only for the Court’s outcome but also for the strange means the Court used to arrive at that deleterious conclusion. The Court undermined strict scrutiny and demonstrated an alarming amount of deference to the Government in order to chill nonviolent speech. Supported by the HLP decision, the Government continues to stretch the boundaries of criminalized speech related to terror, claiming that Brandenburg does not apply to individuals who have interacted with terrorists and ignoring Brandenburg when charging nonaffiliated domestic advocates of terrorism. The American people are less free and likely less safe as a result. More broadly, a military assertion that less speech will serve to protect more freedom should not be credited; it flies in the face of repeated congressional findings and a well-established doctrine encouraging more speech. Congress has repeatedly stressed the vital nature of open source intelligence and commented on the government’s repeated failures to make proactive use of this resource. Civilian use of OSINT is flourishing through Crisis Mapping, but the Government’s actions seek the removal of NGOs and other information sources from troubled areas, undermining the effectiveness and credibility of Crisis Maps. In light of the importance of OSINT and the dubious constitutionality of the government’s positions, the Court should not deviate from traditional speech protections. While the Court may have considered a deliberate dilution of strict scrutiny a small price to pay for enhanced security, the possible damage of the Court’s approach cannot be so easily cabined. Weakened respect for foreign and domestic speech has far reaching implications for how we approach the First Amendment, foreign policy, journalism, human rights, military intelligence, and national security. The Court must resist the temptation to blindly defer during times of crisis, lest we render ourselves ignorant and visionless behind a curtain of imagined safety. 373 Id. at 2737 (“And, as for the Government’s willingness to distinguish independent advocacy from coordinated advocacy, the former is more likely, not less likely, to confer legitimacy than the latter. Thus, other things being equal, the distinction ‘coordination’ makes is arbitrary in respect to furthering the statute's purposes. And a rule of law that finds the ‘legitimacy’ argument adequate in respect to the latter would have a hard time distinguishing a statute that sought to attack the former.”).