Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Roger Williams University (6)
- Georgetown University Law Center (5)
- Selected Works (4)
- University of Michigan Law School (4)
- Columbia Law School (2)
-
- Maurer School of Law: Indiana University (2)
- Pepperdine University (2)
- Touro University Jacob D. Fuchsberg Law Center (2)
- University of Richmond (2)
- American University Washington College of Law (1)
- Duke Law (1)
- The Catholic University of America, Columbus School of Law (1)
- U.S. Naval War College (1)
- University of Pittsburgh School of Law (1)
- Washington and Lee University School of Law (1)
- Publication Year
- Publication
-
- Georgetown Law Faculty Publications and Other Works (5)
- Life of the Law School (1993- ) (5)
- Michigan Journal of International Law (3)
- Articles by Maurer Faculty (2)
- Faculty Scholarship (2)
-
- McKay Smith (2)
- Touro Law Review (2)
- University of Richmond Law Review (2)
- American University National Security Law Brief (1)
- Articles (1)
- Catholic University Law Review (1)
- Duke Journal of Constitutional Law & Public Policy Sidebar (1)
- Gary M. Shaw (1)
- Global Tides (1)
- International Law Studies (1)
- Law School Blogs (1)
- Pepperdine Law Review (1)
- Reviews (1)
- Russell A. Miller (1)
- Scholarly Articles (1)
- Publication Type
- File Type
Articles 1 - 30 of 35
Full-Text Articles in Law
A Fake Future: The Threat Of Foreign Disinformation On The U.S. And Its Allies, Brandon M. Rubsamen
A Fake Future: The Threat Of Foreign Disinformation On The U.S. And Its Allies, Brandon M. Rubsamen
Global Tides
This paper attempts to explain the threat that foreign disinformation poses for the United States Intelligence Community and its allies. The paper examines Russian disinformation from both a historical and contemporary context and how its effect on Western democracies may only be exacerbated in light of Chinese involvement and evolving technologies. Fortunately, the paper also studies practices and strategies that the United States Intelligence Community and its allied foreign counterparts may use to respond. It is hoped that this study will help shed further light on Russian and Chinese disinformation campaigns and explain how the Intelligence Community can efficiently react.
Privilege In Peril: U.S. V. Zubaydah And The State Secrets Privilege, Alana Mattei
Privilege In Peril: U.S. V. Zubaydah And The State Secrets Privilege, Alana Mattei
Duke Journal of Constitutional Law & Public Policy Sidebar
U.S. v. Zubaydah presents an opportunity for the Court to settle the scope of the state secrets privilege and the role of the judiciary when the government invokes a claim of privilege. The state secrets privilege, invoked by the executive, gives courts the power to prevent the disclosure of information that could pose a threat to national security by excluding the particular evidence or dismissing the case. The Court will decide whether the Ninth Circuit erred by rejecting the Government’s assertion of the state secrets privilege over the depositions of former CIA contractors requested by Abu Zubaydah. The Ninth Circuit …
The Reasonable Intelligence Agency, Asaf Lubin
The Reasonable Intelligence Agency, Asaf Lubin
Articles by Maurer Faculty
Article 57(2) of the First Additional Protocol to the Geneva Conventions requires parties to an armed conflict to “do everything feasible to verify” their objects of attack and take “all precautions” to minimize civilian casualties and unintentional damage to civilian property. This obligation has been interpreted in international law to require state parties to set up an “effective intelligence gathering system” that would properly identify targets using all technical means at the disposal of the combating forces.
But existing law has failed to define what “effective intelligence” looks like. Quite the opposite. Modern history is filled with examples of intelligence …
Rethinking Responsibility As Cooperation And Control: The Case Of Intelligence Agents, Raphael Bitton
Rethinking Responsibility As Cooperation And Control: The Case Of Intelligence Agents, Raphael Bitton
American University National Security Law Brief
No abstract provided.
Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl
Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl
Catholic University Law Review
Intelligence collection must always evolve to meet technological developments. While the collection programs under Section 702 of the FISA Amendments Act of 2008 have produced a great deal of valuable intelligence over the last decade, the United States must begin to think about foreseeable technological developments and strategically consider how to conduct signals intelligence (SIGINT) collection in the future.
This Article identifies four technological trends that could significantly impact the way the United States conducts SIGINT. Individuals now have access to sophisticated technologies that formerly only governments seemed capable of creating, and this decentralization of capabilities will likely only increase …
Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin
Articles by Maurer Faculty
תקציר בעברית: הניסיון של המחוקק הישראלי להביא להסדרה מפורשת של סמכויות השב״כ במרחב הקיברנטי משקף מגמה רחבה יותר הניכרת בעולם לעיגון בחקיקה ראשית של הוראות בדבר פעולות פצחנות מצד גופי ביון ומודיעין ורשויות אכיפת חוק למטרות איסוף מודיעין לשם סיכול עבירות חמורות, ובייחוד עבירות טרור אם בעבר היו פעולות מסוג אלה כפופות לנהלים פנימיים ומסווגים, הרי שהדרישה לשקיפות בעידן שלאחר גילויי אדוארד סנודן מחד והשימוש הנרחב בתקיפות מחשב לביצוע פעולות חיפוש וחקירה לסיכול טרור מאידך, מציפים כעת את הדרישה להסמכה מפורשת. במאמר זה אבקש למפות הן את השדה הטכנולוגי והן את השדה המשפטי בכל האמור בתקיפות מחשבים למטרות ריגול ומעקב. …
The Theory And Practice At The Intersection Between Human Rights And Humanitarian Law, Monica Hakimi
The Theory And Practice At The Intersection Between Human Rights And Humanitarian Law, Monica Hakimi
Reviews
The United States is more than fifteen years into a fight against terrorism that shows no sign of abating and, with the change in administration, appears to be intensifying. Other Western democracies that have historically been uneasy about U.S. counterterrorism policies have, in recent years, shifted toward those policies. And armed nonstate groups continue to commit large-scale acts of violence in multiple distinct theaters. The legal issues that these situations present are not entirely new, but neither are they going away. Recent publications, like the three works under review, thus provide useful opportunities to reflect on and refine our thinking …
Newsroom: Interrogation Expert Warns Against Use Of Torture 2-2-2018, Roger Williams University School Of Law
Newsroom: Interrogation Expert Warns Against Use Of Torture 2-2-2018, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Open Source: The Enewsletter Of Rwu Law 09-22-2017, Roger Williams University School Of Law
Open Source: The Enewsletter Of Rwu Law 09-22-2017, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School Of Law
Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Trending @ Rwu Law: Dean Yelnosky's Post: Chelsea Manning, Professor David Coombs, And The "Wikileaks Trial" 08-28-2017, Edward Fitzpatrick, Roger Williams University School Of Law
Trending @ Rwu Law: Dean Yelnosky's Post: Chelsea Manning, Professor David Coombs, And The "Wikileaks Trial" 08-28-2017, Edward Fitzpatrick, Roger Williams University School Of Law
Law School Blogs
No abstract provided.
With Chelsea Manning's Release, Lead Trial Attorney Coombs Recalls Case: Rwu Law Professor David E. Coombs Revisits Issues In The Case, Looks Forward To Teaching Again Next Year 05-17-2017, Edward Fitzpatrick
Life of the Law School (1993- )
No abstract provided.
Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick
Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick
Life of the Law School (1993- )
No abstract provided.
"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox
"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox
University of Richmond Law Review
No abstract provided.
Next Generation Foreign Intelligence Surveillance Law: Renewing 702, William C. Banks
Next Generation Foreign Intelligence Surveillance Law: Renewing 702, William C. Banks
University of Richmond Law Review
No abstract provided.
Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu
Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu
Scholarly Articles
This Article addresses the rapid growth of what the military and the intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence tool is reliant upon biometric databases—for example, digitalized storage of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to more accurately describe the manner in which this new tool is dependent upon cybersurveillance and big data’s massintegrative systems.
This Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, will be difficult …
A Response To Professor Samuel Rascoff’S Presidential Intelligence, Carrie F. Cordero
A Response To Professor Samuel Rascoff’S Presidential Intelligence, Carrie F. Cordero
Georgetown Law Faculty Publications and Other Works
Should foreign intelligence collection be subject to more rigorous oversight, and therefore, improved accountability, through a policy process that involves deeper personal involvement by the President and National Security Council (NSC)? Would a greater number of political appointees across the intelligence community facilitate that oversight? These are the essential questions posed by Professor Samuel Rascoff in his article Presidential Intelligence.
Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue
Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
Section 702 of the Foreign Intelligence Surveillance Act (FISA) authorizes the NSA to collect the electronic communications of non-U.S. targets located overseas. Recent media reports and declassified documents reveal a more extensive program than publicly understood. The article begins by considering the origins of the current programs and the relevant authorities, particularly the transfer of part of the post-9/11 President’s Surveillance Program to FISA. It outlines the contours of the 2007 Protect America Act, before its replacement in 2008 by the FISA Amendments Act (FAA). The section ends with a brief discussion of the current state of foreign intelligence collection …
Fisa Reform, Laura K. Donohue
Fisa Reform, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
Congress and the Executive Branch are poised to take up the issue of FISA reform in 2014. What has been missing from the discussion is a comprehensive view of ways in which reform could be given effect—i.e., a taxonomy of potential options. This article seeks to fill the gap. The aim is to deepen the conversation about abeyant approaches to foreign intelligence gathering, to allow fuller discussion of what a comprehensive package could contain, and to place initiatives that are currently under consideration within a broader, over-arching framework. The article begins by considering the legal underpinnings and challenges to the …
Due Process In American Military Tribunals After September 11, 2001, Gary Shaw
Due Process In American Military Tribunals After September 11, 2001, Gary Shaw
Gary M. Shaw
The Authorization for Use of Military Force ("AUMF") provides broad powers for a president after September 11, 2001. President Bush, under the AUMF, claimed he had the power to hold "enemy combatants" without due process. This gave rise to two questions that the article addresses: "Could they be held indefinitely without charges or proceedings being initiated? If proceedings had to be initiated, what process was due to the defendants?"
Legal Affairs: Dreyfus, Guantánamo, And The Foundation Of The Rule Of Law, David Cole
Legal Affairs: Dreyfus, Guantánamo, And The Foundation Of The Rule Of Law, David Cole
Touro Law Review
Analogous to the Dreyfus affair, America's reaction to the events of September 11, 2001, subverted the rule of law to impose penalties on those it viewed as a threat. There are lessons to be learned from both the Dreyfus affair and America's reaction to September 11, 2001.
The Leaky Leviathan: Why The Government Condemns And Condones Unlawful Disclosures Of Information, David E. Pozen
The Leaky Leviathan: Why The Government Condemns And Condones Unlawful Disclosures Of Information, David E. Pozen
Faculty Scholarship
The United States government leaks like a sieve. Presidents denounce the constant flow of classified information to the media from unauthorized, anonymous sources. National security professionals decry the consequences. And yet the laws against leaking are almost never enforced. Throughout U.S. history, roughly a dozen criminal cases have been brought against suspected leakers. There is a dramatic disconnect between the way our laws and our leaders condemn leaking in the abstract and the way they condone it in practice.
This Article challenges the standard account of that disconnect, which emphasizes the difficulties of apprehending and prosecuting offenders, and advances an …
Boland In The Wind: The Iran-Contra Affair And The Invitation To Struggle , Bretton G. Sciaroni
Boland In The Wind: The Iran-Contra Affair And The Invitation To Struggle , Bretton G. Sciaroni
Pepperdine Law Review
No abstract provided.
Occupy Wall Street And The U.S. Army's 82nd Airborne Division: A Hypothetical Examination Of The Slippery Slope Of Military Intervention During Civil Disturbance, Mckay Smith
McKay Smith
Throughout 2011, the world was an incredibly angry place. The global economy was in disarray. The streets of Tunisia, Egypt, Libya, and Syria had erupted in unprecedented violence. While Americans watched events spiral out of control abroad, a new movement was taking shape domestically. The Occupy movement is a self-described, nonpartisan protest movement targeting economic injustice and social inequality. At its core, however, many domestic protestors also vocally deride the current state of U.S. politics. This article analyzes the Army’s authority to collect information in support of domestic operations, particularly operations aimed at quelling civil disturbance. Historically, the use of …
The Nuclear Terrorism Readiness And Alert Center: Transforming The Aspirational Nature Of International Law Into Operational Capabilities, Mckay Smith
McKay Smith
Senior government officials, particularly those in the Intelligence Community, need to find a novel and creative solution for combating the deadly threat of nuclear terrorism. For decades the United States has been heavily involved in preventing the proliferation of nuclear weapons through traditional international law. It is noteworthy, however, that the Nuclear Non-proliferation Treaty, the crown jewel of all arms control treaties, does not contain a feasible method of countering the threat of nuclear terrorism. Taken as a whole, treaty law does not lend itself to conflicts against non-state actors such as al-Qaeda. Specifically, terrorists do not sign non-proliferation treaties …
Due Process In American Military Tribunals After September 11, 2001, Gary Shaw
Due Process In American Military Tribunals After September 11, 2001, Gary Shaw
Touro Law Review
The Authorization for Use of Military Force ("AUMF") provides broad powers for a president after September 11, 2001. President Bush, under the AUMF, claimed he had the power to hold "enemy combatants" without due process. This gave rise to two questions that the article addresses: "Could they be held indefinitely without charges or proceedings being initiated? If proceedings had to be initiated, what process was due to the defendants?"
National Security Federalism In The Age Of Terror, Matthew C. Waxman
National Security Federalism In The Age Of Terror, Matthew C. Waxman
Faculty Scholarship
National security law scholarship tends to focus on the balancing of security and liberty, and the overwhelming bulk of that scholarship is about such balancing on the horizontal axis among branches at the federal level. This Article challenges that standard focus by supplementing it with an account of the vertical axis and the emergent, post-9/11 role of state and local government in American national security law and policy. It argues for a federalism frame that emphasizes vertical intergovernmental arrangements for promoting and mediating a dense array of policy values over the long term. This federalism frame helps in understanding the …
Law Enforcement And Intelligence Gathering In Muslim And Immigrant Communities After 9/11, David A. Harris
Law Enforcement And Intelligence Gathering In Muslim And Immigrant Communities After 9/11, David A. Harris
Articles
Since the attacks of September 11, 2001, law enforcement agencies have actively sought partnerships with Muslim communities in the U.S. Consistent with community-based policing, these partnerships are designed to persuade members of these communities to share information about possible extremist activity. These cooperative efforts have borne fruit, resulting in important anti-terrorism prosecutions. But during the past several years, law enforcement has begun to use another tactic simultaneously: the FBI and some police departments have placed informants in mosques and other religious institutions to gather intelligence. The government justifies this by asserting that it must take a pro-active stance in order …
Us National Security, Intelligence And Democracy: From The Church Committee To The War On Terror, Russell Miller
Us National Security, Intelligence And Democracy: From The Church Committee To The War On Terror, Russell Miller
Russell A. Miller
No abstract provided.
What’S International Law Got To Do With It? Transnational Law And The Intelligence Mission, James E. Baker
What’S International Law Got To Do With It? Transnational Law And The Intelligence Mission, James E. Baker
Georgetown Law Faculty Publications and Other Works
The United States faces an immediate and continuous threat of terrorist attack using weapons of mass destruction, including nuclear weapons. The intelligence function and national security law, including international law--or more accurately transnational law--are central to addressing this threat. Indeed, international law is more relevant today in addressing this threat than it was before September 11. Part II of this article describes a continuum of contemporary threats to U.S. national security, with a focus on nonstate terrorism. Part III addresses the role of intelligence and national security law, and in particular law addressed to process, in combating these threats. Part …