Download presentation
Presentation is loading. Please wait.
Published byAlvin Melton Modified over 8 years ago
1
Anti-Terrorism in the Time of Hope and Change
2
Charges in Federal Court Offenses described by statute, typically defined in Title 18, U.S. Code. Includes Terrorism, 18 USC 2331, and all manner of constituent crimes.
3
Charges in Military Commissions Offenses made punishable by the MCA or laws of war when committed by an alien unprivileged enemy belligerent. Includes attacking civilians, murder, attacking civilian property, torture, using protected persons as a shield, murder in violation of the law of war, terrorism, and material support for terrorism.
4
Military Commissions Act of 2009 Drafted in the wake of Boumediene v. Bush, 553 U.S. 723 (2008) Military trial, before military judge and jury of military officers Hearsay and statements obtained by coercion admissible Limited Appellate Review Incorporates Classified Information Procedures Act (CIPA), adds rules explicitly prohibiting verbal testimony
5
Classified Information Protection Act(“CIPA”) Determines use, relevance, admissibility of classified information. Determines use, relevance, admissibility of classified information. Defense must notify U.S. and court in advance if it plans to use classified information. U.S. has right to appeal court decision to permit use. Defense cannot use it without final court approval. Defense must notify U.S. and court in advance if it plans to use classified information. U.S. has right to appeal court decision to permit use. Defense cannot use it without final court approval. Court may order substitution of information with government-provided summaries. Court may order substitution of information with government-provided summaries. Only attorneys with security clearance can review classified information. Defendant cannot see it. Court can order all manner of security rules to protect classified information. Only attorneys with security clearance can review classified information. Defendant cannot see it. Court can order all manner of security rules to protect classified information.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.