Legality of Target Acquisition: The U.S. Needs a Drone Board

3010120-inline-dronemap.jpg

 

More than 3,000 deaths from the U.S. drone program worldwide are on the public record

Recently we learned that a US drone strike in Pakistan inadvertently killed an American and an Italian held as hostages by al Qaeda. The strike also killed a US citizen who was a prominent member of al Qaeda. A separate operation in January killed an American-born al Qaeda spokesman. The deaths of hostages Warren Weinstein and Giovanni Lo Portois are tragic and the Obama administration has pledged to conduct an independent review to understand how to prevent this type of grievous mistake. The apparently unintentional killings of two American al Qaeda operatives raise an additional question that President Obama did not address in his televised statement today: under what circumstances may the United States intentionally use targeted lethal force against a US citizen abroad?
The Obama Administration has previously considered the question; several years ago, Justice Department lawyers set out the legal rationale for targeting radical cleric Anwar al Awlaki, a dual Yemeni-US citizen, in a now-public white paper and redacted memo. Satisfied that Awlaki was a permissible target, President Obama authorized a CIA-led operation that culminated in drone aircraft, armed with Hellfire missiles, striking and killing the cleric in Yemen in 2011.
So why bother rehashing the question? For one, lawyers across the ideological spectrum have challenged the Justice Department’s legal reasoning. In particular, critics argue that secret and internal executive branch review, however painstaking and careful, does not satisfy the Fifth Amendment, which provides that no person shall be deprived of life without due process of law.
How it works now
The current scheme is rigorous, but insulated from outside review and accountability. Indeed, the ACLU filed a lawsuit last month seeking Obama administration documents that establish the criteria for placement on the “kill list” for the use of lethal force. Military and executive branch departments nominate, vet, and validate candidates for the “kill list,” considering the legality of each strike and potential operational impact. The nominations trickle up to the National Counterterrorism Center, or NCTC, and to the National Security Council, or NSC, before the President signs off. 
Judicial Oversight
The US government concedes that the Fifth Amendment, in particular the Due Process Clause, applies to US citizens abroad. The Fifth Amendment establishes that “no person shall … be deprived of life, liberty, or property, without due process of law.” But due process does not always mean a trial in a federal court. As former Attorney General Eric Holder affirmed, “‘Due process’ and ‘judicial process’ are not one and the same, particularly when it comes to national security.” But if a person does not receive a federal court trial to determine whether the government can take away his life, how do we know whether the process he received is the process he is due?
Critics of the Obama Administration’s targeted killing program began recommending greater oversight and judicial review of the decision-making process early in President Obama’s first term. Though Justice Thomas and others scoffed at the notion of a “drone court,” the idea gained traction in policy circles. Some academics have also endorsed the idea of a “drone court,” in which federal judges would undertake a prior review of targeting decisions, in many cases using the Foreign Intelligence Surveillance Court as a model.
Notwithstanding the support for a drone court, prior review of the President’s targeting decisions by federal judges is not likely to succeed. Perhaps the most significant impediment is constitutional. Granting authority to the judiciary to regulate the president’s conduct of war would limit the President’s constitutionally afforded power as Commander in Chief of the military, thus raising serious separation of powers concerns. 
Recognizing the difficulties that prior review by federal judges poses, some scholars have called for judicial review after a targeting operation. 
Other proposals call for prior review by executive branch officials, or as Georgetown law professor Neal Katyal puts it, a “‘national security court’ housed within the executive branch itself.” However, a military review board is unlikely to be a neutral body when reviewing military intelligence and decision-making. A binding decision would impermissibly constrain the President’s Commander in Chief power. A “national security court” would also be viewed as biased because the President’s own national security advisors, the same people who vet the kill list, would serve as adjudicators. Despite the drawbacks of these proposals, they may be on to something.

A New Model
As a way to provide due process to US citizens, enable accountability for targeting decisions, increase public trust in the decision-making process, and avoid the use of excessive or erroneous force against targets, we propose an executive branch board (Drone Board) that would conduct a prior review of the use of targeted lethal force against U.S. citizens abroad.
The growing risk that US citizens will join terrorist groups around the world and be targeted for killing overseas by their own government creates an imperative to resolve when and how the U.S. government may lawfully use lethal force against its own citizens abroad. A Drone Board would be an important step to provide additional process and greater public confidence in the method of targeting US citizens overseas.
DefenseOne:  http://bit.ly/1Us02wV

« The Future Of Algorithmic Personalisation
Cyber Command: A War That Started Long Ago »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Information Risk Management (IRM)

Information Risk Management (IRM)

IRM is an international consultancy dedicated to helping organisations solve key business issues. We provide strategic cyber security advice across a wide range of sectors.

Cloud Industry Forum (CIF)

Cloud Industry Forum (CIF)

Cloud Industry Forum is a non-profit industry body that champions and advocates the adoption and use of Cloud-based services by businesses and individuals.

HID Global

HID Global

HID Global is a trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

National Cyber Security Centre (CNCS) - Portugal

National Cyber Security Centre (CNCS) - Portugal

CNCS is the operational coordinator and Portuguese national authority in cybersecurity working with State entities, and digital service providers

ZM CIRT

ZM CIRT

ZM CIRT is the national Computer Incident Response Team for Zambia.

Cryptosense

Cryptosense

Cryptosense provides the first application security software dedicated to the detection and remediation of crypto vulnerabilities.

AKATI Sekurity

AKATI Sekurity

AKATI Sekurity is a security-focused consulting firm providing services specializing in Information Security and Information Forensics.

WiJungle

WiJungle

WiJungle is an Indian Cyber Security Company that develops and markets a unified network security gateway solution.

CyberGuru

CyberGuru

CyberGuru is a service provided by CyberSecurity Malaysia specializing in cyber security professional training and development.

Jobsora

Jobsora

Jobsora is an innovative job search platform in the UK and more than 35 other countries around the world. Sectors covered include IT and cybersecurity.

ByteSnipers

ByteSnipers

ByteSnipers specialize in penetration testings and secure development services. Our focus is on your security.

Pacific Cyber Security Operational Network (PaCSON)

Pacific Cyber Security Operational Network (PaCSON)

PaCSON is an operational cyber security network of regional working-level cyber security experts in the Pacific.

Mobileum

Mobileum

Mobileum is a leading provider of Telecom analytics for roaming, security and risk management and end-to-end domestic and roaming testing solutions.

Gradient Cyber

Gradient Cyber

Gradient Cyber is a trusted cybersecurity partner specializing in small businesses and mid-market enterprises concerned about cybersecurity but lacking the staff to give it the attention it deserves.

Threatsys Technologies

Threatsys Technologies

Threatsys’s Integrated cyber security process helps your organizations to ensure that it’s secure from any fraudulent attacks.

SOC-E

SOC-E

SOC-E is a leading technology provider for high-availability and deterministic networking, sub-microsecond synchronization and cybersecurity solutions for critical sectors.