Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 29 of 29

Full-Text Articles in Law

Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, Asaf Lubin Jul 2023

Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, Asaf Lubin

Articles by Maurer Faculty

The May 2021 ransomware attack on Colonial Pipeline was a wake-up call for a federal administration slow to realize the dangers that cybersecurity threats pose to our critical national infrastructure. The attack forced hundreds of thousands of Americans along the east coast to stand in endless lines for gas, spiking both prices and public fears. These stressors on our economy and supply chains triggered emergency proclamations in four states, including Georgia. That a single cyberattack could lead to a national emergency of this magnitude was seen by many as proof of even more crippling threats to come. Executive Director of …


The Reasonable Intelligence Agency, Asaf Lubin Jan 2022

The Reasonable Intelligence Agency, Asaf Lubin

Articles by Maurer Faculty

Article 57(2) of the First Additional Protocol to the Geneva Conventions requires parties to an armed conflict to “do everything feasible to verify” their objects of attack and take “all precautions” to minimize civilian casualties and unintentional damage to civilian property. This obligation has been interpreted in international law to require state parties to set up an “effective intelligence gathering system” that would properly identify targets using all technical means at the disposal of the combating forces.

But existing law has failed to define what “effective intelligence” looks like. Quite the opposite. Modern history is filled with examples of intelligence …


The Liberty To Spy, Asaf Lubin Jan 2020

The Liberty To Spy, Asaf Lubin

Articles by Maurer Faculty

Many, if not most, international legal scholars share the ominous contention that espionage, as a legal field, is devoid of meaning. For them, any attempt to extrapolate the lex lata corpus of the International Law of Intelligence (ILI), let alone its lex scripta, would inevitably prove to be a failed attempt, as there is simply nothing to extrapolate. The notion that international law is moot as to the question of if, when, and how intelligence is to be collected, analyzed, and promulgated, has been repeated so many times that it has become the prevailing orthodoxy.

This paper offers a new …


Examining The Anomalies, Explaining The Value: Should The Usa Freedom Act’S Metadata Program Be Extended?, Susan Landau, Asaf Lubin Jan 2020

Examining The Anomalies, Explaining The Value: Should The Usa Freedom Act’S Metadata Program Be Extended?, Susan Landau, Asaf Lubin

Articles by Maurer Faculty

Edward Snowden’s disclosure of National Security Agency (“NSA”) bulk collection of communications metadata was a highly disturbing shock to the American public. The intelligence community was surprised by the response, as it had largely not anticipated a strong negative public reaction to this surveillance program. Controversy over the bulk metadata collection led to the 2015 passage of the USA FREEDOM Act. The law mandated that the intelligence community would collect the Call Detail Records (“CDR”) from telephone service providers in strictly limited ways, not in bulk, and only under order from the Foreign Intelligence Surveillance Court. The new program initially …


Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin Jan 2020

Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin

Articles by Maurer Faculty

תקציר בעברית: הניסיון של המחוקק הישראלי להביא להסדרה מפורשת של סמכויות השב״כ במרחב הקיברנטי משקף מגמה רחבה יותר הניכרת בעולם לעיגון בחקיקה ראשית של הוראות בדבר פעולות פצחנות מצד גופי ביון ומודיעין ורשויות אכיפת חוק למטרות איסוף מודיעין לשם סיכול עבירות חמורות, ובייחוד עבירות טרור אם בעבר היו פעולות מסוג אלה כפופות לנהלים פנימיים ומסווגים, הרי שהדרישה לשקיפות בעידן שלאחר גילויי אדוארד סנודן מחד והשימוש הנרחב בתקיפות מחשב לביצוע פעולות חיפוש וחקירה לסיכול טרור מאידך, מציפים כעת את הדרישה להסמכה מפורשת. במאמר זה אבקש למפות הן את השדה הטכנולוגי והן את השדה המשפטי בכל האמור בתקיפות מחשבים למטרות ריגול ומעקב. …


"We Only Spy On Foreigners": The Myth Of A Universal Right To Privacy And The Practice Of Foreign Mass Surveillance, Asaf Lubin Jan 2018

"We Only Spy On Foreigners": The Myth Of A Universal Right To Privacy And The Practice Of Foreign Mass Surveillance, Asaf Lubin

Articles by Maurer Faculty

The digital age brought with it a new epoch in global political life, one neatly coined by Professor Philip Howard as the “pax technica.” In this new world order, government and industry are “tightly bound” in technological and security arrangements that serve to push forward an information and cyber revolution of unparalleled magnitude. While the rise of information technologies tells a miraculous story of triumph over the physical constraints that once shackled mankind, these very technologies are also the cause of grave concern. Intelligence agencies have been recently involved in the exercise of global indiscriminate surveillance, which purports to go …


Cybersecurity And The New Era Of Space Activities, David P. Fidler Jan 2018

Cybersecurity And The New Era Of Space Activities, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


An Unstoppable Force And An Immoveable Object? Eu Data Protection Law And National Security, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson Jan 2018

An Unstoppable Force And An Immoveable Object? Eu Data Protection Law And National Security, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson

Articles by Maurer Faculty

No abstract provided.


Data Protection And Humanitarian Emergencies, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard Jan 2017

Data Protection And Humanitarian Emergencies, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard

Articles by Maurer Faculty

No abstract provided.


The U.S. Election Hacks, Cybersecurity, And International Law, David P. Fidler Jan 2017

The U.S. Election Hacks, Cybersecurity, And International Law, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


Transforming Election Cybersecurity, David P. Fidler Jan 2017

Transforming Election Cybersecurity, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


The Lawyers' War: Counterterrorism From Bush To Obama To Trump, Dawn E. Johnsen Nov 2016

The Lawyers' War: Counterterrorism From Bush To Obama To Trump, Dawn E. Johnsen

Articles by Maurer Faculty

No abstract provided.


Espionage As A Sovereign Right Under International Law And Its Limits, Asaf Lubin Sep 2016

Espionage As A Sovereign Right Under International Law And Its Limits, Asaf Lubin

Articles by Maurer Faculty

The literature surrounding the international legality of peacetime espionage has so far centered around one single question: whether there exist within treaty or customary international law prohibitive rules against the collection of foreign intelligence in times of peace. Lacking such rules, argue the permissivists, espionage functions within a lotus vacuum, one in which States may spy on each other and on each other's nationals with no restrictions, justifying their behavior through the argumentum ad hominem of "tu quoque." . . .


Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney Jan 2015

Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney

Articles by Maurer Faculty

Physical-world law may not be suitable for cyberspace. For example, the Supreme Court's "sufficient connection" test in U.S. v. Verdugo-Urquidez (1990) is inconsistent with the century-long trend for courts to find greater constitutional protections for those subject to U.S. jurisdiction outside the United States. Courts must maintain flexibility to conceive of a Fourth Amendment that does not depend exclusively on territory to fulfill its twin aims of ordering government and enabling redress of liberty infringements. Federal and state courts and legislatures addressing searches, seizures, and surveillance in cyberspace should seek simple rules that can easily adapt as cyberspace and government …


Did The National Security Agency Destroy The Prospects For Confidentiality And Privilege When Lawyers Store Clients' Files In The Cloud--And What, If Anything, Can Lawyers And Law Firms Realistically Do In Response?, Sarah Jane Hughes Jan 2014

Did The National Security Agency Destroy The Prospects For Confidentiality And Privilege When Lawyers Store Clients' Files In The Cloud--And What, If Anything, Can Lawyers And Law Firms Realistically Do In Response?, Sarah Jane Hughes

Articles by Maurer Faculty

No abstract provided.


Cybersecurity And The Administrative National Security State: Framing The Issues For Federal Legislation, David G. Delaney Jan 2014

Cybersecurity And The Administrative National Security State: Framing The Issues For Federal Legislation, David G. Delaney

Articles by Maurer Faculty

In the digital age, every part of federal government has critical cybersecurity interests. Many of those issues are brought into sharp focus by Edward Snowden's disclosure of sensitive government cyber intelligence programs conducted by the National Security Agency, the Federal Bureau of Investigation, and the Central Intelligence Agency. Courts are reviewing various constitutional and statutory challenges to those programs, two government review groups have reported on related legal and policy issues, and Congress is considering cyber intelligence reform proposals. All of this action comes on the heels of significant efforts by successive administrations to restructure government and pass comprehensive cybersecurity …


Leap-Ahead Privacy As A Government Responsibility In The Digital Age, David G. Delaney, Ivan K. Fong Jan 2013

Leap-Ahead Privacy As A Government Responsibility In The Digital Age, David G. Delaney, Ivan K. Fong

Articles by Maurer Faculty

No abstract provided.


The Sec Staff's "Cybersecurity Disclosure" Guidance: Will It Help Investors Or Cyber-Thieves More?, Sarah Jane Hughes, Roland L. Trope Jan 2011

The Sec Staff's "Cybersecurity Disclosure" Guidance: Will It Help Investors Or Cyber-Thieves More?, Sarah Jane Hughes, Roland L. Trope

Articles by Maurer Faculty

No abstract provided.


Domestic Surveillance And The Decline Of Legal Oversight, Fred H. Cate Jan 2007

Domestic Surveillance And The Decline Of Legal Oversight, Fred H. Cate

Articles by Maurer Faculty

JURIST Guest Columnist Fred Cate of Indiana University School of Law Bloomington says that a series of dramatic moves over the past five years - most recently the passage of the Protect America Act - has weakened statutory and judicial oversight of domestic surveillance to the point that one wonders whether, by the time the Bush Administration and Congress are finished, there is going to be any legal oversight of domestic surveillance at all.


Cybertrespass And Trespass To Documents, Kevin Emerson Collins Jan 2006

Cybertrespass And Trespass To Documents, Kevin Emerson Collins

Articles by Maurer Faculty

No abstract provided.


International Law And Weapons Of Mass Destruction: End Of The Arms Control Approach?, David P. Fidler Jan 2004

International Law And Weapons Of Mass Destruction: End Of The Arms Control Approach?, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


Public Health And National Security In The Global Age: Infectious Diseases, Bioterrorism, And Realpolitik, David P. Fidler Jan 2003

Public Health And National Security In The Global Age: Infectious Diseases, Bioterrorism, And Realpolitik, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


The Fight Against Global Terrorism: Self-Defense Or Collective Security As International Police Action? Some Comments On The International Legal Implications Of The "War Against Terrorism", Jost Delbruck Jan 2001

The Fight Against Global Terrorism: Self-Defense Or Collective Security As International Police Action? Some Comments On The International Legal Implications Of The "War Against Terrorism", Jost Delbruck

Articles by Maurer Faculty

No abstract provided.


Book Review. National Security And Environmental Protection: The Half-Full Glass, John S. Applegate Jan 1999

Book Review. National Security And Environmental Protection: The Half-Full Glass, John S. Applegate

Articles by Maurer Faculty

No abstract provided.


The National Information Infrastructure: Policymaking And Policymakers, Fred H. Cate Jan 1994

The National Information Infrastructure: Policymaking And Policymakers, Fred H. Cate

Articles by Maurer Faculty

No abstract provided.


The National Security Of The United States As The Host State For The United Nations, Elisabeth Zoller Jan 1989

The National Security Of The United States As The Host State For The United Nations, Elisabeth Zoller

Articles by Maurer Faculty

No abstract provided.


Covert Intervention And International Law, A. A. Fatouros Jan 1976

Covert Intervention And International Law, A. A. Fatouros

Articles by Maurer Faculty

No abstract provided.


Book Review. Freedom To Travel: Report Of The Special Committee To Study Passport Procedures Of The Association Of The Bar Of The City Of New York, Ivan C. Rutledge Jan 1959

Book Review. Freedom To Travel: Report Of The Special Committee To Study Passport Procedures Of The Association Of The Bar Of The City Of New York, Ivan C. Rutledge

Articles by Maurer Faculty

No abstract provided.


Security And The Constitution, W. Howard Mann Jan 1955

Security And The Constitution, W. Howard Mann

Articles by Maurer Faculty

No abstract provided.