Order for this Paper or Similar Assignment Writing Help

Click to fill the order details form in a few minute.

Posted: October 24th, 2022

THE AMERICAN LEGAL PROCESS

THE AMERICAN LEGAL PROCESS

I. Analysis of the Constitution
The American constitution is a document, in which the organization of the American government would be based and also, a document which provided basic and fundamental rights to its citizens (Amar, 1992). The American constitution is divided into eight sections, running from Article I to Article VII. Article I explains the organization of the American Congress, by stating its powers, which are commonly known as the enumerated or the delegated powers (US Constitution.net., c. 2010). The article also gives legislative powers to the House of Representatives and the Senate, while also stating the various powers which are denied to Congress and the states as a whole. Article II explains the various issue in the US regarding the presidency: its election process, the required qualifications, and the conditions under which one cannot continue being the president of the US. Article III explains the process of forming the Supreme Court while giving the Congress the power to enhance the establishment of the lower federal courts, and the case jurisdiction for each court. Article IV guarantees equity and equality to all states and citizens from any state while giving room for the inclusion of other states to the union. The article also guarantees the citizens and states of the protection, form any kind of external and internal aggression, invasion, and even attacks. Article V stipulates the process which should be used in the cases where the constitution wants to be changed, vesting powers upon the American states, for the purposes of rectifying any amendments. Article VI stipulates for the supremacy clause, which states that the American Constitution, the laws passed by the states of the United States, and all the agreements the United States enters form part of the supreme law of the land (Creative Commons Attribution, 2013). The final section, Article VII states that, in order to rectify the constitution of the United States of America, there should be the approval by the agreements of nine of the states forming the confederation of the US.
The US Bill of Rights is a documentation of the various provisions, which give the citizens their freedom and also protect them from the violations of either the public officials in the US or even their fellow citizens (Bearden, 2004). The US constitution gives various freedoms and rights to its citizens, especially, through the first ten amendments done to the U.S. Constitution. Some of the basic rights include The freedom of religion, speech, press, assembly, and petition by all citizens, the right to keep and bear arms in order to maintain a well-regulated militia, no quartering of soldiers, and the freedom from unreasonable searches and seizures (The Colonial Foundation, 2009). The Fifth Amendment bill states that everyone has the right to due process of law, the freedom from self-incrimination, and double jeopardy, while the sixth states that, all people have the right of accused persons where everyone is entitled to the right to a prompt and even public trial. The other bill of rights states that, everyone has the right to be tried by a jury in civil cases, and that the people have the right to be exempted from excessive bail, cruelty and unusual punishments. The ninth amendment addresses the issues related to the non-enumerated rights of 1791), and finally, the tenth amendment addresses the rights which are reserved to states and American people of 1791.
The most important institutional power in the American constitution is the protection of the minority rights in the US. The protection of the minority rights in the US is important since, it gives the chance for all individuals to compete ethically with the other people in the US for the various positions and opportunities in the nationals and federal government (Jabareen, 2008). Through the protection of the minority rights, there is the chance to enhance equity in all the American states, and hence, creating a conducive environment for living for all individuals. On the other hand, the most important personal right is the first amendment, which is the freedom of religion, speech, press, assembly, and petition. Through this amendment, individuals are guaranteed of a good life, and the ability to lead their lives without the fear from anyone, associate with others, and also worship, and subscribe to any religion of their own choice.
The institutional power that I would remove from the US constitution is the power vested in the Congress, as stipulated in Article II, where the president has to seek permission from the Congress before doing anything, and where he has to keep reporting to the Congress, of any progress, he or she is making toward the development of the country (United States Government Printing Office: Washington, 2007). The reason why I would remove that power is that the Congress might choose to act against the president, and hence, delay various issue which would be of benefit to the American people, and also the whole nation. The personal right which I would remove from the US constitution is the Right to keep and even bear arms in order to maintain a well-regulated militia in the US, as stipulated in the second amendment (Dowlut, 1997). The reason why I would remove the right to possess personal guns in the US is that there has been an increase in the rates of crime in the US, due to the position of guns (Duggan, 2001). The possession of guns has also led to the deaths of thousands of people in the US, through mass killings, crimes, and also accidents where people shoot others and even themselves.
One institutional power that I would add is the power to for the courts to have independent investigative authorities, where individuals who have committed a crime would be investigated, without the interference from the police, the military and also the other parties of the government. The reason why I would add this power is to ensure that, all individuals are able to get justice for the cases which face them, in cases where many are implicated with cases which require them to spend a long period of time in prison. The personal right that I would add to the US constitution is the right to privacy and absolute ability to control an individual’s property, without interference from the government, where the individuals are allowed to do as they please with their property, and their backyards. The reason why I would add this personal right is that many people suffer from the invasion of the law enforcement officers, who want to know what an individual is doing with their own property in the US.

II. Two Examples of Homeland Security Issues in Art or Popular Culture
There are various areas in which the issue of homeland security has been raised, in relation to the popular cultures or even art. A majority of the individuals who have expressed their views have done so, with the aim of either predicting, or even showing the areas in which the homeland security has either been breached, might have some challenges, or even where issues need to be rectified for the purpose of a more secure society. In the first example, a film produced in the year 2004, by Antonia Bird was known as the “The Hamburg Cell” shows the issue of the breach in the homeland security (Wheatley, 2006). In the film, Antonia Bird describes the issues related to the September 11 attacks, where many people lost their lives and many were left maimed and injured. In the film, the activities of the terrorist group, known as the Hamburg cell were shown, where the hijacking and the bombing of the houses in the US. There are many issues which Antonia Bird presents in that film, as a way of ridiculing the process of the gathering information and intelligence especially on the issues terrorists, by the US intelligence as well as the Germany intelligence forces. In the film, Bird presents two of the main characters in the film: Karim Saleh and Kamel who starred in the film as Ziad Jarrah and Mohamed Atta respectively as ‘normal’ students’, who obey and follow the law and who are focused on their aviation studies in the US, after moving from Germany under the recommendation of their tutor. There are various issues which are also presented in the film, and which relate to the US homeland security, such as the inability of the US intelligence at home, to predict and even suspect the activities of the two students, who had turned themselves into criminals and for that matter radical criminals in the end of the 1990s under the watch of the intelligence agencies in the US and Germany (Gastil, 2010). In this film, Bird showed that the US policy on enhancing the safety of the citizens is challenging and requires a more resilient approach in ensuring that all individuals are put into consideration. On watching the film, it presents the shame which lies within the homeland security agencies, since they could not uphold the safety of the citizens. To ensure the safety of the citizens, Bird proposes that scrutiny should be upheld, for all individuals, regardless soft her background, religion, place of origin, age or even activities they are undertaking in the US.
The second example of homeland security issues in art and popular culture is the case presented by Cassetteboy, through their track is known as “Fly Me To New York”, where criticism was given, in regard to the 9/11 bombing activity in the US, In the track, the lyrics, “burn the World Trade Center,” and “let the motherfucker burn” is released, which is a critique to the process of the bombing which happened in the US, posing a major threat to the homeland security, for many years (Dahlen, 2005). The song also mocks the organization of the homeland security agencies, terming them as a way ofay creating “ghost militia”, for the US, through which money is lost, citing the fact that, a majority of the people who lose their lives do so under the watch of the homeland security agencies. In the track, the singer presents himself as a hijacker, who flies the plane into the trade center, causing major problems, to the security of the US (Cincinnati, 2011). In the track, Cassetteboy states that he found one of the weakest points in the US homeland security, which is regarded as one of the most sacred across the world, and hence untouchable, and especially, through the reaction of the government to the 9/11 attacks. Cassetteboy also states that, the issues related to the 9/11 bombing happened under the watch of the homeland security agencies, and thus, they have no right to complain, since they allowed the hijackers, who had been stated as a threat to security, to board the planes and even fly them, causing the deaths and the injury to many people.

III. Identification of Two Pre-9/11 Homeland Security Events
The US has received many challenges and even threats to its homeland security, long before the 9/11 bombing and attacks. The first major attack happened on February 26, 1993, where the World Trade Center was bombed, from the North Tower, killing six people and injuring hundreds of people around the area (Homeland Security, 1993). The 1993 bombing attack on the World Trade Center happened when a bomb made up of 1,336 pounds, an equivalent of 606 kg device containing urea nitrate-hydrogen gas, was set to detonate on the North Tower. The initial intention of the bombers was that there would be a major catastrophe, from the destruction of the twin towers, killing thousands of people, but the plot failed as per the expectations of the bombers. The plot had been organized and financed by Khaled Sheikh Mohammed, who was an uncle to one of the bombers, Ramzi Yousef. Other major individuals who participated in the raid included Mohammad Salameh, Nidal A. Ayyad, Mahmud Abouhalima, and Ahmed Ajaj. As well as Abdul Rahman Yasin. According to various reports that were released by various security agencies, Eyad Ismoil was the driver, and the mastermind behind the bombing processes (Fahy & Proulx, 2002). The bomb had been placed in the basement of the North Tower, and so, upon its explosion, the six people who died were in the basement of the building, and it took more than twenty-five firefighter trucks to put off the fire which had started, with dust and smoke covering the two towers. The major side effects of the bombing were that the emergency communication systems which was installed in the building went down, and evacuating the buildings was a major problem, since it was dark, and it took other people hours to find their way out of the building.
The second major homeland security threat before the 2001 bombing was the bombing of the US embassies in East Africa, especially in Tanzania and Kenya (Perl, 1998). On August 7, 1998, an estimate of more than to hundred people died in Kenyan and Tanzania after the bombing of the Nairobi and the Dar es Salaam United States Embassies by the terror group, al-Qaeda, under the leadership of Osama bin Laden. To the US, this was a major attack, and a blow to its homeland security, although the attacks had not happened in their actual land, the territories which were attacked were the embassies, which harbor the US activities in each and every given country across the world. The attack was coordinated and the hit called by Osama Bin Laden, who had taken over the leadership of al-Qaeda, killing 12 Americans, which made it a total of 224 people who died that day, while more than 4,500people were maimed and badly injured in the act (Ploch, 2010). The 1998 attacks were also coordinated by the militia group that later executed the 2001attacs in the US soil and led to the death of hundreds of people while maiming many, and rendering the economy of the US down, and disrupting the social economic and political order in the county for a couple of hours. These two examples cited in this section are some of the major homeland security threats and events which happened before the 9/11 bombing and attacks.

IV. Legal Counsel Exercise
In the case where the US presidents learn of the plans by a terror group to attack the US citizens, both at home and aboard, the president has powers vested upon him to order military attacks against the militia group. In this case, President Obama empowered to order a military attack against the Scorpion group. The justification of the attacks ordered by the president against the terror group is based on the US declaration on the fight against terror attacks, especially through the authorization for the use of military force (AUMF), passed after 2001, 9/11 terror attack (Chivvis & Liepman, 2016). In the cases where the U.S. Army soldiers detain members of a militia group, or fighters and transfer them to Saudi Arabia, a country known to torture people, for questioning, the process is known as extraordinary rendition (Murphy, 2007). Through the process of extraordinary rendition, people are abducted and forced to speak on certain issues, through the interrogation process which is usually financed and facilitated by the US government, through its law and intelligence agencies, such as the CIA and the FBI (Open Society Foundations, 2013). The US policy does not allow this practice to take place, but it usually happens under the watch and the authority of the US top leadership, such as through the powers vested on the individuals who carry out the processes by the US Presidents. Even if the current US policy was to allow such an activity to happen, it is not lawful, since it goes against the rights of other humans and threatens the relationships between various states across the world.
For the non-US soldiers who were captured in the event of the Global War on Terror, by the Bush Administration and taken to the Guantanamo Bay prisons in Cuba, the possibility of them accessing the U.S. federal court system and wage litigation warfare is very minimal, and many are not likely to access any of the court systems within the US (Lennon, 2015). The background of this issue is that a majority of the individuals who are detained in these camps do not stand any trial, and a majority undergo extreme torture, which even violets their rights, as per the reports by the Amnesty International (Gilles, 2016). Currently, the situation remains the same, and there are no changes to that effect.
A military tribunal is a set of judicial proceedings which are based on the structures of a military court and guidelines, set up to try soldiers, and war criminals who are captured in the war against terror and who violate certain laws in the military (Khan, 2002). The US has used the military tribunals before, to try war criminals and the soldiers who are caught in the war against terror. Currently, the US is using the military tribunals to try all the individuals who are implicated to be war criminals and also involved in the war against terror. Currently, the tribunals are increasing in number, across the world, as the US tries to shake the terror activities across the globe, and its activities in the US.
It is true that the US spies on its citizens. Through the Foreign Intelligence Surveillance Act (FISA), Section 702, the US government agencies are given the powers to keep surveillance on its citizens, living within and outside the US, so as to collect any information, which in any way or another might threaten the security of the US (Wu, 2006). The agencies which are involved in the surveillance process include National Security Agency (NSA) and the Federal Bureau of Investigation (FBI), whose primary target is the information shared between the citizens on many issues regarding the country and its security issues. From the threats which are posed to the US homeland security, there is legality in the military involvement in the surveillance of the citizens, so as to make sure that, all individuals are kept safe from threats and attacks (Severson, 2015). According to the law, it is justified for anyone, or even a group to defend itself, in the event here their security is threatened, and their lives are posed in danger (Mossin, 2014). However, the attack would only be posed as a destruction to the US security protocol, and thus, met with retaliation (Jenkins et al., 2013). The justification of the attack would be that the US was trying to threaten the lives of the members of the Scorpion family, and the attack was just as a way of defending themselves.
The US has a constitution which has the Bill of Rights, and which is based on a certain framework, and concepts which are essential for the survival of all individuals. The US constitution is organized into seven major sections, which range from Article I to Article VII. The US constitution also contains the Bill of Rights, which are basically ten, in form of amendments, which give the US citizens various freedoms and capabilities to perform various tasks (Virelli, 2012). The US constitutions are built on various concepts which include: separation of power, the nature of authority, as well as the stipulation of the various rights and duties of citizens and the arms of government (Bulmer, 2017). There are various rights which are contained in the US constitutions, which include: the right to life, right to assembly, right to own property among other many rights. The executive forms the branch of the U.S. federal government which is the most powerful today (Arnold, 2004). The strength of the executive arm is based on the various powers which have been vested on the branch of the government, and especially, through the process of ensuring the day to day running of the country and its affairs.

(e) Statute Draft
To have independent judicial investigative authorities operating under the judicial arm of the government, whose main role shall be to cross-examine the individuals who are implicated with issues related to the homeland security: based on the legislative laws and power vested on it by the US Congress,

Section 1. Short Title and Table of Contents
(a) Short Title: This Act may be cited as the “law that prohibits the use of torture to interrogate anyone, whether in or even outside the US” (CERL Report, 2018), from the 2015 McCain-Feinstein Amendment, Army Field Manual, and Law of War Manual.

Title I-Enhancing Security for the Criminals and Detainees of War
SEC 101: War Crime Trials
(a) TRIALS; INTERROGATIONS- There is hereby established that the United States Judiciary shall have a separate body, which shall be involved in the interrogation for the individuals who are convicted as war criminals, in the fight for terrorism in the US-
(b) The body shall be free and independent, without the compromise or the interference of the other arms of the government, investigative authorities, and even other homeland security agencies-
(1) to interrogate, and get information from all individuals who have been arrested, and detained as war criminals, in the fight for terror,
(A) gather information from the war criminals and the detained convicts for the purposes of ensuring there is security for the people of the US-
(B) While minimizing the use of force, and torture for the war criminals, so as to ensure their rights and privileges are also upheld during the process of integration.

References
Amar, A.R., (1992). The Bill of Rights as a Constitution. Yale Law School Legal Scholarship Repository. Faculty Scholarship Series & Yale Law School Faculty Scholarship. Online Access https://pdfs.semanticscholar.org/0225/5491158c35b6b54c0abf5bbabedd061871f4.pdf
Arnold, P.A., (2004). How the United States is governed. Bureau of International Information Programs. Online Access https://usa.usembassy.de/etexts/gov/governed.pdf
Bearden, M., (2004). The Constitution of the United States, the Bill of Rights, and the Declaration of Independence: A Guide to Obtaining Copies. CRS Report for Congress. Online Access https://www.everycrsreport.com/files/20040819_98-68_8e4b043a21cc765cafbaf2847c8a105ca5562140.pdf
Bulmer, E., (2017). What is a Constitution? Principles and concepts International IDEA Constitution-Building Primer 1. Online Access https://www.idea.int/sites/default/files/publications/what-is-a-constitution-primer.pdf
CERL Report, (2018). The Ethics of Interrogation and the Rule of Law. Center for Ethics and the Rule of Law. The University of Pennsylvania. Online Access https://www.law.upenn.edu/live/files/7921-the-ethics-of-interrogation-and-the-rule-of-law.pdf
Chivvis, C.S., and Liepman, A.M., (2016). Authorities for Military Operations against Terrorist Groups the State of the Debate and Options for Congress. RAND Corporation, Santa Monica, Calif. Print.
Cincinnati, (2011). Society for American Music Thirty-Seventh Annual Conference International Association for the Study of Popular Music, U.S. Branch Time Keeps On Slipping: Popular Music Histories. College-Conservatory of Music, University of Cincinnati, Hilton Cincinnati Netherland Plaza. Online Access http://www.american-music.org/conferences/Cincinnati/SAM%20program_final.pdf
Creative Commons Attribution, (2013). The Constitution of the United States: A Transcription. The U.S National Archives and Records Administration. Online Access https://alleganyarc.org/wp-content/uploads/us_constitution.pdf
Dahlen, C., (2005). The Pop Culture of 9/11. Pitch Fork. Online Access https://pitchfork.com/features/article/6001-the-pop-culture-of-911/
Dowlut, R., (1997). The Right to Keep and Bear Arms: A Right to Self-Defense Against Criminals and Despots. Stanford Law & Policy Review. Online Access https://www.azcdl.org/Dowlut_TheRighToKeepAndBearArms.pdf
Duggan, M., (2001). More Guns, More Crime. Journal of Political Economy. Vol. 109, no. 5. Online Access http://www.kellogg.northwestern.edu/faculty/dranove/htm/dranove/coursepages/Mgmt%20469/guns.pdf
Fahy, R.F., and Proulx, G., (2002). A Comparison of the 1993 and 2001 Evacuations of the World Trade Center. Proceedings – Fire Risk and Hazard Assessment Symposium, Baltimore MD, pp. 111-117. Online Access http://www.cfaa.ca/Files/flash/EDUC/FIRE%20ALARM%20ARTICLES%20AND%20RESEARCH/A%20Comparison%20of%20the%201993%20and%202001%20evacuations%20of%20the%20World%20Trade%20Center%20nrcc46005.pdf
Gastil, J., (2010). The Group in Society. SAGE Publications, Inc. Online Access http://groupinsociety.la.psu.edu/files/GroupInSocietyExcerpt.pdf
Gilles, M., (2016). Class Warfare: The Disappearance of Low-Income Litigants from the Civil Docket. Emory Law Journal. Vol. 65, Issue 1531. Online Access http://law.emory.edu/elj/_documents/volumes/65/6/gilles.pdf
Homeland Security, (1993). The World Trade Center Bombing: Report and Analysis. U.S. Fire Administration/Technical Report Series. New York City, New York. Online Access https://www.usfa.fema.gov/downloads/pdf/publications/tr-076.pdf
Jabareen, Y.T., (2008). Toward Participatory Equality: Protecting Minority Rights Under International Law. ISR. L. REV. Vol. 41 No. 3. Online Access http://weblaw.haifa.ac.il/he/Faculty/DocLib/ISLR.pdf
Jenkins, B.M., Willis, H.H., and Han, B., (2013). Do Significant Terrorist Attacks Increase the Risk of Further Attacks? Initial Observations from a Statistical Analysis of Terrorist Attacks in the United States and Europe from 1970 to 2013. Online Access https://www.rand.org/content/dam/rand/pubs/perspectives/PE100/PE173/RAND_PE173.pdf
Khan, R., (2002). The U.S. Military Tribunals to Try Terrorists. Max-Planck-Institut für ausländisches öffentliches Recht und Völkerrecht. Online Access http://www.zaoerv.de/62_2002/62_2002_1_a_293_316.pdf
Lennon, C., (2015). Detainees in the Global War on Terrorism aboard Guantanamo Bay. Touro Law Review. Volume 31, Number 4 & Article 1. Online Access https://digitalcommons.tourolaw.edu/cgi/viewcontent.cgi?referer=https://www.google.com/&httpsredir=1&article=2682&context=lawreview
Mossin, M.A., (2014). The Justification of Terrorism. Department of Archaeology, Conservation, and History (IAKH) & University of Oslo. Online Access https://www.duo.uio.no/bitstream/handle/10852/40164/TheJustificationOfTerrorism_MortenMossin.pdf?sequence=1
Murphy, P., (2007). Intelligence and Security Committee Rendition. Presented to Parliament by the Prime Minister by Command of Her Majesty. Online Access https://fas.org/irp/world/uk/rendition.pdf
Open Society Foundations, (2013). Globalizing Torture: CIA Secret Detention and Extraordinary Rendition. Online Access https://www.opensocietyfoundations.org/sites/default/files/globalizing-torture-20120205.pdf
Perl, R.F., (1998). Terrorism: U. S. Response to Bombings in Kenya and Tanzania: A New Policy Direction? CRS Report for Congress. Online Access https://nsarchive2.gwu.edu//NSAEBB/NSAEBB55/crs19980901.pdf
Ploch, L., (2010). Countering Terrorism in East Africa: The U.S. Response. Congressional Research Service & CRS Report for Congress. Online Access http://www.refworld.org/pdfid/4d05fd102.pdf
Severson, D., (2015). American Surveillance of Non-U.S. Persons: Why New Privacy Protections Offer Only Cosmetic Change. Harvard International Law Journal. Volume 56, Number 2. Online Access http://www.harvardilj.org/wp-content/uploads/562Severson.pdf
The Colonial Foundation, (2009). The Bill of Rights (Plain Text Version). Ratified December 15, 1791. Online Access http://www.memorialitalia.it/ita/wp-content/uploads/2017/02/billofrights.pdf
United States Government Printing Office: Washington, (2007). The Constitution of the United States of America: As Amended Unratified Amendments Analytical Index. 110th Congress Document. House of Representatives 1st Session. Online Access https://www.gpo.gov/fdsys/pkg/CDOC-110hdoc50/pdf/CDOC-110hdoc50.pdf
US Constitution.net. (c. 2010). The Constitution of the United States. Online Access https://www.usconstitution.net/const.pdf
Virelli, L.J., (2012). What Is A Constitution And How Does It Work? A Constitution Day Primer. Associate Professor of Law & Stetson University College of Law. Online Access https://www.acslaw.org/sites/default/files/pdf/Virelli%20ACS%20Curriculum%20for%20Constitution%20Day.pdf
Wheatley, J., (2006). The Hamburg 9/11 Terrorism Trials: Prospects for German Legal Reform and Intelligence Sharing. Journal of International Law & Policy. Vol. III. Online Access https://www.law.upenn.edu/journals/jil/jilp/articles/3-1_Wheatley_Joseph.pdf
Wu, E.Y., (2006). Domestic Spying And Why America Should Avoid The Slippery Slope. Review of Law and Social Justice. Vol. 16, Issue 1. Online Access https://gould.usc.edu/students/journals/rlsj/issues/assets/docs/Wu_Final.pdf

Check Price Discount

Study Notes & Homework Samples: »

Why Choose our Custom Writing Services

We prioritize delivering top quality work sought by students.

Top Tutors

The team is composed solely of exceptionally skilled graduate writers, each possessing specialized knowledge in specific subject areas and extensive expertise in academic writing.

Discounted Pricing

Our writing services uphold the utmost quality standards while remaining budget-friendly for students. Our pricing is not only equitable but also competitive in comparison to other writing services available.

0% similarity Index

Guaranteed Plagiarism-Free Content: We assure you that every product you receive is entirely free from plagiarism. Prior to delivery, we meticulously scan each final draft to ensure its originality and authenticity for our valued customers.

How it works

When you decide to place an order with Dissertation Help, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We analyze your order and match it with a custom writer who has the unique qualifications for that subject, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00