Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cybersecurity (10)
- National security (7)
- Espionage (5)
- Privacy (3)
- Spying (3)
-
- Terrorism (3)
- Barack Obama (2)
- Cyberspace (2)
- Data privacy (2)
- Data protection (2)
- Foreign policy (2)
- Intelligence (2)
- Internet (2)
- Jus Ad Explorationem (2)
- National Security Agency (2)
- Surveillance (2)
- 2016 U.S. Election (1)
- Biden administration (1)
- Bioterrorism (1)
- Bush Doctrine (1)
- CDR (1)
- Call Detail Records (1)
- Chinese Embassy (1)
- Client/server (1)
- Colonial pipeline (1)
- Communication policy (1)
- Confidentiality (1)
- Constitutional law (1)
- Counterterrorism (1)
- Courts (1)
Articles 1 - 29 of 29
Full-Text Articles in Law
Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, Asaf Lubin
Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, Asaf Lubin
Articles by Maurer Faculty
The May 2021 ransomware attack on Colonial Pipeline was a wake-up call for a federal administration slow to realize the dangers that cybersecurity threats pose to our critical national infrastructure. The attack forced hundreds of thousands of Americans along the east coast to stand in endless lines for gas, spiking both prices and public fears. These stressors on our economy and supply chains triggered emergency proclamations in four states, including Georgia. That a single cyberattack could lead to a national emergency of this magnitude was seen by many as proof of even more crippling threats to come. Executive Director of …
The Reasonable Intelligence Agency, Asaf Lubin
The Reasonable Intelligence Agency, Asaf Lubin
Articles by Maurer Faculty
Article 57(2) of the First Additional Protocol to the Geneva Conventions requires parties to an armed conflict to “do everything feasible to verify” their objects of attack and take “all precautions” to minimize civilian casualties and unintentional damage to civilian property. This obligation has been interpreted in international law to require state parties to set up an “effective intelligence gathering system” that would properly identify targets using all technical means at the disposal of the combating forces.
But existing law has failed to define what “effective intelligence” looks like. Quite the opposite. Modern history is filled with examples of intelligence …
The Liberty To Spy, Asaf Lubin
The Liberty To Spy, Asaf Lubin
Articles by Maurer Faculty
Many, if not most, international legal scholars share the ominous contention that espionage, as a legal field, is devoid of meaning. For them, any attempt to extrapolate the lex lata corpus of the International Law of Intelligence (ILI), let alone its lex scripta, would inevitably prove to be a failed attempt, as there is simply nothing to extrapolate. The notion that international law is moot as to the question of if, when, and how intelligence is to be collected, analyzed, and promulgated, has been repeated so many times that it has become the prevailing orthodoxy.
This paper offers a new …
Examining The Anomalies, Explaining The Value: Should The Usa Freedom Act’S Metadata Program Be Extended?, Susan Landau, Asaf Lubin
Examining The Anomalies, Explaining The Value: Should The Usa Freedom Act’S Metadata Program Be Extended?, Susan Landau, Asaf Lubin
Articles by Maurer Faculty
Edward Snowden’s disclosure of National Security Agency (“NSA”) bulk collection of communications metadata was a highly disturbing shock to the American public. The intelligence community was surprised by the response, as it had largely not anticipated a strong negative public reaction to this surveillance program. Controversy over the bulk metadata collection led to the 2015 passage of the USA FREEDOM Act. The law mandated that the intelligence community would collect the Call Detail Records (“CDR”) from telephone service providers in strictly limited ways, not in bulk, and only under order from the Foreign Intelligence Surveillance Court. The new program initially …
Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin
Articles by Maurer Faculty
תקציר בעברית: הניסיון של המחוקק הישראלי להביא להסדרה מפורשת של סמכויות השב״כ במרחב הקיברנטי משקף מגמה רחבה יותר הניכרת בעולם לעיגון בחקיקה ראשית של הוראות בדבר פעולות פצחנות מצד גופי ביון ומודיעין ורשויות אכיפת חוק למטרות איסוף מודיעין לשם סיכול עבירות חמורות, ובייחוד עבירות טרור אם בעבר היו פעולות מסוג אלה כפופות לנהלים פנימיים ומסווגים, הרי שהדרישה לשקיפות בעידן שלאחר גילויי אדוארד סנודן מחד והשימוש הנרחב בתקיפות מחשב לביצוע פעולות חיפוש וחקירה לסיכול טרור מאידך, מציפים כעת את הדרישה להסמכה מפורשת. במאמר זה אבקש למפות הן את השדה הטכנולוגי והן את השדה המשפטי בכל האמור בתקיפות מחשבים למטרות ריגול ומעקב. …
"We Only Spy On Foreigners": The Myth Of A Universal Right To Privacy And The Practice Of Foreign Mass Surveillance, Asaf Lubin
Articles by Maurer Faculty
The digital age brought with it a new epoch in global political life, one neatly coined by Professor Philip Howard as the “pax technica.” In this new world order, government and industry are “tightly bound” in technological and security arrangements that serve to push forward an information and cyber revolution of unparalleled magnitude. While the rise of information technologies tells a miraculous story of triumph over the physical constraints that once shackled mankind, these very technologies are also the cause of grave concern. Intelligence agencies have been recently involved in the exercise of global indiscriminate surveillance, which purports to go …
Cybersecurity And The New Era Of Space Activities, David P. Fidler
Cybersecurity And The New Era Of Space Activities, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
An Unstoppable Force And An Immoveable Object? Eu Data Protection Law And National Security, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
An Unstoppable Force And An Immoveable Object? Eu Data Protection Law And National Security, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Data Protection And Humanitarian Emergencies, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard
Data Protection And Humanitarian Emergencies, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard
Articles by Maurer Faculty
No abstract provided.
The U.S. Election Hacks, Cybersecurity, And International Law, David P. Fidler
The U.S. Election Hacks, Cybersecurity, And International Law, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Transforming Election Cybersecurity, David P. Fidler
Transforming Election Cybersecurity, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
The Lawyers' War: Counterterrorism From Bush To Obama To Trump, Dawn E. Johnsen
The Lawyers' War: Counterterrorism From Bush To Obama To Trump, Dawn E. Johnsen
Articles by Maurer Faculty
No abstract provided.
Espionage As A Sovereign Right Under International Law And Its Limits, Asaf Lubin
Espionage As A Sovereign Right Under International Law And Its Limits, Asaf Lubin
Articles by Maurer Faculty
The literature surrounding the international legality of peacetime espionage has so far centered around one single question: whether there exist within treaty or customary international law prohibitive rules against the collection of foreign intelligence in times of peace. Lacking such rules, argue the permissivists, espionage functions within a lotus vacuum, one in which States may spy on each other and on each other's nationals with no restrictions, justifying their behavior through the argumentum ad hominem of "tu quoque." . . .
Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney
Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney
Articles by Maurer Faculty
Physical-world law may not be suitable for cyberspace. For example, the Supreme Court's "sufficient connection" test in U.S. v. Verdugo-Urquidez (1990) is inconsistent with the century-long trend for courts to find greater constitutional protections for those subject to U.S. jurisdiction outside the United States. Courts must maintain flexibility to conceive of a Fourth Amendment that does not depend exclusively on territory to fulfill its twin aims of ordering government and enabling redress of liberty infringements. Federal and state courts and legislatures addressing searches, seizures, and surveillance in cyberspace should seek simple rules that can easily adapt as cyberspace and government …
Did The National Security Agency Destroy The Prospects For Confidentiality And Privilege When Lawyers Store Clients' Files In The Cloud--And What, If Anything, Can Lawyers And Law Firms Realistically Do In Response?, Sarah Jane Hughes
Articles by Maurer Faculty
No abstract provided.
Cybersecurity And The Administrative National Security State: Framing The Issues For Federal Legislation, David G. Delaney
Cybersecurity And The Administrative National Security State: Framing The Issues For Federal Legislation, David G. Delaney
Articles by Maurer Faculty
In the digital age, every part of federal government has critical cybersecurity interests. Many of those issues are brought into sharp focus by Edward Snowden's disclosure of sensitive government cyber intelligence programs conducted by the National Security Agency, the Federal Bureau of Investigation, and the Central Intelligence Agency. Courts are reviewing various constitutional and statutory challenges to those programs, two government review groups have reported on related legal and policy issues, and Congress is considering cyber intelligence reform proposals. All of this action comes on the heels of significant efforts by successive administrations to restructure government and pass comprehensive cybersecurity …
Leap-Ahead Privacy As A Government Responsibility In The Digital Age, David G. Delaney, Ivan K. Fong
Leap-Ahead Privacy As A Government Responsibility In The Digital Age, David G. Delaney, Ivan K. Fong
Articles by Maurer Faculty
No abstract provided.
The Sec Staff's "Cybersecurity Disclosure" Guidance: Will It Help Investors Or Cyber-Thieves More?, Sarah Jane Hughes, Roland L. Trope
The Sec Staff's "Cybersecurity Disclosure" Guidance: Will It Help Investors Or Cyber-Thieves More?, Sarah Jane Hughes, Roland L. Trope
Articles by Maurer Faculty
No abstract provided.
Domestic Surveillance And The Decline Of Legal Oversight, Fred H. Cate
Domestic Surveillance And The Decline Of Legal Oversight, Fred H. Cate
Articles by Maurer Faculty
JURIST Guest Columnist Fred Cate of Indiana University School of Law Bloomington says that a series of dramatic moves over the past five years - most recently the passage of the Protect America Act - has weakened statutory and judicial oversight of domestic surveillance to the point that one wonders whether, by the time the Bush Administration and Congress are finished, there is going to be any legal oversight of domestic surveillance at all.
Cybertrespass And Trespass To Documents, Kevin Emerson Collins
Cybertrespass And Trespass To Documents, Kevin Emerson Collins
Articles by Maurer Faculty
No abstract provided.
International Law And Weapons Of Mass Destruction: End Of The Arms Control Approach?, David P. Fidler
International Law And Weapons Of Mass Destruction: End Of The Arms Control Approach?, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Public Health And National Security In The Global Age: Infectious Diseases, Bioterrorism, And Realpolitik, David P. Fidler
Public Health And National Security In The Global Age: Infectious Diseases, Bioterrorism, And Realpolitik, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
The Fight Against Global Terrorism: Self-Defense Or Collective Security As International Police Action? Some Comments On The International Legal Implications Of The "War Against Terrorism", Jost Delbruck
Articles by Maurer Faculty
No abstract provided.
Book Review. National Security And Environmental Protection: The Half-Full Glass, John S. Applegate
Book Review. National Security And Environmental Protection: The Half-Full Glass, John S. Applegate
Articles by Maurer Faculty
No abstract provided.
The National Information Infrastructure: Policymaking And Policymakers, Fred H. Cate
The National Information Infrastructure: Policymaking And Policymakers, Fred H. Cate
Articles by Maurer Faculty
No abstract provided.
The National Security Of The United States As The Host State For The United Nations, Elisabeth Zoller
The National Security Of The United States As The Host State For The United Nations, Elisabeth Zoller
Articles by Maurer Faculty
No abstract provided.
Covert Intervention And International Law, A. A. Fatouros
Covert Intervention And International Law, A. A. Fatouros
Articles by Maurer Faculty
No abstract provided.
Book Review. Freedom To Travel: Report Of The Special Committee To Study Passport Procedures Of The Association Of The Bar Of The City Of New York, Ivan C. Rutledge
Book Review. Freedom To Travel: Report Of The Special Committee To Study Passport Procedures Of The Association Of The Bar Of The City Of New York, Ivan C. Rutledge
Articles by Maurer Faculty
No abstract provided.
Security And The Constitution, W. Howard Mann
Security And The Constitution, W. Howard Mann
Articles by Maurer Faculty
No abstract provided.