{"id":4392,"date":"2014-03-31T22:36:26","date_gmt":"2014-04-01T02:36:26","guid":{"rendered":"http:\/\/journals.law.harvard.edu\/nsj\/?p=4392"},"modified":"2014-03-31T22:36:26","modified_gmt":"2014-04-01T02:36:26","slug":"hostage-takers-and-fleeing-felons-questioning-two-analogies-to-the-imminent-threat-of-terrorist-attack-from-abroad","status":"publish","type":"post","link":"https:\/\/journals.law.harvard.edu\/nsj\/2014\/03\/hostage-takers-and-fleeing-felons-questioning-two-analogies-to-the-imminent-threat-of-terrorist-attack-from-abroad\/","title":{"rendered":"Hostage-Takers and Fleeing Felons: Questioning Two Analogies to the \u201cImminent Threat\u201d of Terrorist Attack from Abroad"},"content":{"rendered":"<p style=\"text-align: center;\"><em>By Amien Kacou*<\/em><\/p>\n<p>The US government has been criticized for <a href=\"http:\/\/msnbcmedia.msn.com\/i\/msnbc\/sections\/news\/020413_DOJ_White_Paper.pdf\">invokin<\/a>g the right to self-defense to justify its <a href=\"https:\/\/journals.law.harvard.edu\/nsj\/2010\/06\/law-and-policy-of-targeted-killing\/\">targeted killings<\/a> of suspected al Qaeda terrorists. Critics <a href=\"https:\/\/www.aclu.org\/national-security\/statement-un-special-rapporteur-us-targeted-killings-without-due-process\">argue<\/a> that the indefinite, armed conflict is too expansive and does not <a href=\"https:\/\/journals.law.harvard.edu\/nsj\/2010\/06\/law-and-policy-of-targeted-killing\/\">provide<\/a> enough certainty and transparency as to the identity and culpability of its targets to <a href=\"http:\/\/www.hrw.org\/node\/119909\/section\/8\">ensure compliance<\/a> with international law.<\/p>\n<p>Targeted killings in response to \u201c<a href=\"http:\/\/msnbcmedia.msn.com\/i\/msnbc\/sections\/news\/020413_DOJ_White_Paper.pdf\">imminent<\/a>\u201d terrorist threats are similarly problematic. The President is not required to provide evidence of a specific attack, allowing <a href=\"http:\/\/msnbcmedia.msn.com\/i\/msnbc\/sections\/news\/020413_DOJ_White_Paper.pdf\">preemptive action<\/a> against individuals \u201ccontinually plotting\u201d against the United States. Proponents of this broader conception of imminence argue that this use of force is analogous to police officers\u2019 use of lethal force against hostage-takers and fleeing felons. These analogies are misguided.<\/p>\n<h4>Police Officers Using Lethal Force Against Hostage-Takers<\/h4>\n<p>Benjamin Wittes <a href=\"http:\/\/www.lawfareblog.com\/2010\/09\/two-points-about-targeted-killings\/\">argues<\/a> that suspected terrorists are similar to armed hostage-takers who US police officers can legally shoot. He <a href=\"http:\/\/www.lawfareblog.com\/2013\/02\/in-defense-of-the-administration-on-targeted-killing-of-americans\/\">observes<\/a> that \u201cpolice officers will not wait until the threat to the hostages is imminent in the sense that the hostage-taker is literally lifting his gun to kill innocents in real time\u201d before taking lethal action. He acknowledges that the threat of harm to hostages may be <a href=\"http:\/\/www.lawfareblog.com\/2010\/09\/two-points-about-targeted-killings\/\">temporally<\/a> more imminent than the threat of harm from a terrorist attack. Alan Dershowitz avoids this complication by proposing that the hostage-taker\u2019s primary <a href=\"http:\/\/intelligencesquaredus.org\/images\/debates\/past\/transcripts\/030514%20Targeted%20Killing.pdf\">goal<\/a> might be extended negotiations.<\/p>\n<p>However, this analogy conflates \u201creal time\u201d with potential speed and uncertainty with risk.<\/p>\n<p>It is reasonable to shoot armed hostage-takers not just when they are about to kill hostages (immediately in real time) but so long as they retain the immediate <i>opportunity<\/i> to do so quickly at any time (with potential speed). This opportunity is a function of hostage-takers\u2019 <i>spatio<\/i>temporal proximity to their hostages.<\/p>\n<p>By contrast, US drone targets like senior al Qaeda leaders are not proximate to the United States. They live in places such as Pakistan and Yemen and there is <a href=\"http:\/\/www.dni.gov\/files\/documents\/Intelligence%20Reports\/2014%20WWTA%20%20SFR_SSCI_29_Jan.pdf\">no evidence<\/a> they can access <a href=\"http:\/\/www.defense.gov\/bmdr\/docs\/BMDR%20as%20of%2026JAN10%200630_for%20web.pdf\">long-range<\/a>, <a href=\"http:\/\/www.rand.org\/content\/dam\/rand\/pubs\/monographs\/2008\/RAND_MG626.pdf\">guided<\/a> or <a href=\"http:\/\/www.fas.org\/irp\/world\/uk\/drones.pdf\">remote control<\/a> weapons that could reach the US. While a terrorist could communicate orders to US operatives in real time, as Lashkar-e Taiba <a href=\"http:\/\/www.longwarjournal.org\/archives\/2009\/01\/mumbai_handlers_in_p.php\">did<\/a> during the 2008 Mumbai attacks, this is <a href=\"http:\/\/www.usnews.com\/opinion\/blogs\/world-report\/2013\/07\/10\/could-terrorists-launch-a-mumbai-style-attack-in-the-united-states\">unlikely<\/a>. It is logistically difficult to set up such an operation, senior al Qaeda leaders rely primarily on <a href=\"http:\/\/www.nbcnews.com\/id\/43011358\/ns\/technology_and_science-tech_and_gadgets\/?GT1=43001#.UzGbSeTnYdV\">slow, painstaking systems<\/a> involving couriers and <a href=\"http:\/\/nypost.com\/2013\/08\/15\/al-qaeda-fighters-planning-and-coordinating-attacks-on-secret-chat-rooms-and-internet-message-boards\/\">underlings<\/a> rather than mobile phones, and even where terrorists try to communicate, the US <a href=\"http:\/\/news.bbc.co.uk\/2\/hi\/technology\/4738219.stm\">tracks<\/a>, taps, and <a href=\"http:\/\/www.fas.org\/irp\/congress\/2009_hr\/mumbai.pdf\">disrupts<\/a> mobile phones,. Likewise, the probability that terrorists could successfully launch a significant <a href=\"http:\/\/blogs.scientificamerican.com\/guest-blog\/2011\/05\/03\/threat-of-future-cyber-attacks-by-al-qaeda-remains-low\/\">cyber-attack<\/a> or use a cell phone <a href=\"http:\/\/www.wired.com\/dangerroom\/2010\/11\/could-a-cell-phone-call-from-yemen-blow-up-a-plane\/\">to detonate<\/a> a bomb from thousands of miles away is low.<\/p>\n<p>The <a href=\"http:\/\/mises.org\/books\/risk_uncertainty_profit_knight.pdf\">highly specifiable \u201crisk\u201d<\/a> that an armed hostage-taker poses is not similar to the <a href=\"http:\/\/mises.org\/books\/risk_uncertainty_profit_knight.pdf\">uncertainty<\/a> that a terrorist attack could happen at any time. It is more reasonable to shoot armed hostage-takers because they, unlike faraway terrorists, have an immediate opportunity to kill. They have already created the rough equivalent of <a href=\"http:\/\/msnbcmedia.msn.com\/i\/msnbc\/sections\/news\/020413_DOJ_White_Paper.pdf\">evidence of a specific attack<\/a>\u2013 the standard that the US government has <a href=\"http:\/\/msnbcmedia.msn.com\/i\/msnbc\/sections\/news\/020413_DOJ_White_Paper.pdf\">explicitly<\/a> declined to follow in targeted killings.<\/p>\n<p>In short, even though the terrorist threat <a href=\"http:\/\/www.lawfareblog.com\/2010\/09\/two-points-about-targeted-killings\/\">is<\/a> \u201cfar less controllable and much more threatening than a mere hostage standoff,\u201d a smart policy limits how far the government will go in attempting to preempt <a href=\"http:\/\/www.defense.gov\/transcripts\/transcript.aspx?transcriptid=2636\">unknown unknowns,<\/a> acknowledging that absolute security is a chimera. Blindly substituting potential damage for lack of probability in crafting rules for the use of force might lead to <a href=\"http:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/j.1538-165X.2011.tb00695.x\/abstract\">costly overreaction<\/a>.<\/p>\n<h4>Police Officers Using Lethal Force against Fleeing Felons<\/h4>\n<p><a href=\"http:\/\/www.lawfareblog.com\/2013\/02\/in-defense-of-the-administration-on-targeted-killing-of-americans\/\">Wittes<\/a> and <a href=\"http:\/\/intelligencesquaredus.org\/images\/debates\/past\/transcripts\/030514%20Targeted%20Killing.pdf\">Dershowitz<\/a> also analogize to the law enforcement \u201cfleeing felon\u201d rule. In <i>Tennessee v. Garner<\/i>, the US Supreme Court <a href=\"http:\/\/caselaw.lp.findlaw.com\/scripts\/getcase.pl?court=us&amp;vol=471&amp;invol=1\">held<\/a> that a police officer may use deadly force against a fleeing suspect if necessary to prevent the suspect\u2019s escape, if \u201cthe officer has probable cause to believe that the suspect poses a significant threat of death or serious physical injury to the officer or others.\u201d Might the US government apply a similar analysis to persons who <a href=\"http:\/\/msnbcmedia.msn.com\/i\/msnbc\/sections\/news\/020413_DOJ_White_Paper.pdf\">have<\/a> \u201crecently been involved in activities posing an imminent threat of violent attack against the United States?\u201d<\/p>\n<p>US drone targets are <a href=\"http:\/\/www.thebureauinvestigates.com\/category\/projects\/drones\/drones-graphs\/\">seldom (if ever)<\/a> struck down when returning from an attack. Al Qaeda leaders (presumably responsible for past attacks) are hiding in places such as <a href=\"http:\/\/www.csmonitor.com\/World\/Asia-South-Central\/2011\/0503\/The-top-5-militant-leaders-still-hiding-in-Pakistan\/Ayman-al-Zawahiri\">Pakistan<\/a> and <a href=\"http:\/\/www.lawfareblog.com\/2013\/01\/the-last-refuge-yemen-al-qaeda-and-americas-war-in-arabia\/\">Yemen<\/a>. However, the fleeing felon rule is not the \u201chiding felon rule.\u201d It might <a href=\"http:\/\/www.leagle.com\/decision\/19901441747FSupp694_11336.xml\/WRIGHT%20v.%20WHIDDON\">not<\/a> apply to felons years, weeks, or even hours after they have committed their crime, or <a href=\"http:\/\/caselaw.findlaw.com\/us-2nd-circuit\/1097024.html\">solely<\/a> on account of their history of violence (however extreme). <a href=\"https:\/\/go.mpdconline.com\/GO\/GO_901_07.pdf\">US Police Departments<\/a> also normally only use deadly force if the threat is actually immediate.<\/p>\n<p>Of <a href=\"http:\/\/www.newrepublic.com\/article\/112338\/obama-administrations-drone-memo-unconstitutional\">note<\/a>, the <i>Garner<\/i> Court rejected an older, more permissive common law fleeing felon rule on several grounds, <a href=\"http:\/\/caselaw.lp.findlaw.com\/cgi-bin\/getcase.pl?court=us&amp;vol=471&amp;invol=1\">including<\/a> that the common law rule had \u201cdeveloped at a time when weapons were rudimentary\u201d\u2013 that is, before police officers began carrying handguns and thus became capable (for the first time) of using \u201cdeadly force from a distance as a means of apprehension,\u201d with less risk to their own safety and \u201charsher consequences\u201d for suspects. Similarly, the recent advent of drone technology, by eliminating all remaining risk to government agents (<a href=\"http:\/\/breakingdefense.com\/2013\/02\/retired-gen-deputula-drones-best-weapons-weve-got-for-accurac\/\">allowing<\/a> them \u201cto project power without projecting vulnerability\u201d), might justify further constraining the use of deadly force against would-be attackers. (In contrast, terrorists have relied essentially on the same <a href=\"http:\/\/www.terrorismanalysts.com\/pt\/index.php\/pot\/article\/view\/89\/html\">readily accessible weapons<\/a> for forty years.)<\/p>\n<h4>Final Considerations<\/h4>\n<p>US domestic law enforcement has unique <a href=\"http:\/\/www.lawfareblog.com\/2013\/02\/confusion-about-imminence-and-targeted-killings\/\">institutional<\/a> and other accountability features that better justify the use of deadly force. For example, in both hostage-taker and fleeing felon situations, there is likely to be greater public transparency and certainty in real time as to the events taking place and the identity and probable culpability of suspects. This is due to the fact that police operations are more directly visible and more susceptible to <a href=\"http:\/\/news.bbc.co.uk\/2\/hi\/uk_news\/3702574.stm\">regular media<\/a> coverage (or <a href=\"http:\/\/www.nytimes.com\/2012\/09\/22\/us\/facebook-plays-role-in-pittsburgh-hostage-case.html\">social media<\/a> coverage) than targeted killing operations. In addition, sanctions against excessive police force are more readily obtainable due to the democratic system and ex post facto judicial process (see <i>Garner<\/i>). For these reasons, it is more likely that police officers will use deadly force only when reasonable.<\/p>\n<p>Finally, Wittes and others insist that imminence should be calibrated in light of the alleged <a href=\"http:\/\/www.lawfareblog.com\/2010\/09\/a-response-to-kevin-jon-heller\/\">difficulty of capturing<\/a> terrorist suspects. This is questionable in principle and <a href=\"http:\/\/www.hrw.org\/node\/119909\/section\/8\">practice<\/a>. Capture is almost always more risky or inconvenient than striking from a distance, but that never changed the <a href=\"http:\/\/www.hrw.org\/node\/119909\/section\/8\">requirement<\/a> that lethal force can only be used against imminent threats, outside of armed conflicts, if \u201cless extreme means, such as capture or non-lethal incapacitation, would be insufficient.\u201d Even if the capture of terrorist suspect targets were truly impossible, that is irrelevant to whether an imminent threat justifies the use of deadly force against individuals without judicial pre-approval.<\/p>\n<p><em>*Amien Kacou is an attorney at <a href=\"http:\/\/www.gpilaw.com\/\">GPI Law PLLC<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Amien Kacou, attorney at GPI Law PLLC, argues that analogies from the use of lethal force against hostage-takers or fleeing felons to justify targeted killings of suspected al Qaeda terrorists are misguided. <i>Image courtesy of Marie-Lan Nguyen \/ Wikimedia Commons \/ CC-BY 2.5.<\/i> <\/p>\n","protected":false},"author":20,"featured_media":4393,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_post_was_ever_published":false},"categories":[4,24],"tags":[],"class_list":["post-4392","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-features","category-online"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/03\/FrenchPoliceSnipers.jpg?fit=640%2C427&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/peZtUX-18Q","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts\/4392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/comments?post=4392"}],"version-history":[{"count":0,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts\/4392\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/media\/4393"}],"wp:attachment":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/media?parent=4392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/categories?post=4392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/tags?post=4392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}