20080215

on the attorney general’s white paper



thirty three haiku on the attorney general’s white paper

  1. constitutional
    authority inherent
    Commander-in-Chief

  2. all traditional
    and accepted incidents
    his powers zenith

  3. authorization
    the absence of a grant, his
    own authority

  4. just such a statute
    fully comply with the Fourth
    constitutional

  5. appropriate force
    to protect US citizens
    all necessary

  6. take action
    to deter and prevent acts
    of terrorism

  7. To this day, finding
    al Qaeda sleeper agents
    remains paramount

  8. the War on Terror.
    concerns communications
    into and out of

  9. of persons linked:
    one party is a member
    affiliated

  10. or is a member
    of an organization
    affiliated

  11. “ha[ve] been effective ….”
    between potential terr’ists
    help “connect the dots”

  12. reviewed for legality:
    the DOJ GC and
    IG, NSA

  13. more devastating
    martyrdom operations
    made good on their threats

  14. ability to insert
    foreign agents express to
    deter and prevent

  15. the sole organ of
    external relations, all
    requisite power

  16. national security
    information intercept
    authority to gather

  17. The Federalist
    cloath’d with ... powers requisite …
    ‘gainst foreign danger …

  18. Thus, use secret means
    to collect intelligence
    to secret agents

  19. interpolate does
    not take away warrantless
    physical searches

  20. the temptation to
    utilize over dissent
    is danger acute

  21. proportional are
    minimally invasive
    and narrow designed

  22. “secret fund” persons
    sent publicly and secret
    to search for import

  23. the AUMF
    No longer than a sentence
    authorization

  24. “fairly possible”
    is all that is required
    for probable cause

  25. the mere fact that no
    warrant is secured prior
    to surveillance

  26. the degree to which
    it intrudes on privacy
    need, legitimate

  27. object, securing
    national security
    from hostile design

  28. will not be subject
    to government eavesdropping
    individuals

  29. intercept one-end
    foreign communications
    where reasonable

  30. basis to conclude
    one party is al Qaeda
    or affiliate

  31. one attack struck at
    the Nation’s military
    command and control

  32. reasonableness
    ensures a periodic
    review limited

  33. a reasonable basis
    to conclude a member or
    agent terrorist.