Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

National Security Law

Intelligence

Articles 1 - 30 of 35

Full-Text Articles in Law

A Fake Future: The Threat Of Foreign Disinformation On The U.S. And Its Allies, Brandon M. Rubsamen Apr 2023

A Fake Future: The Threat Of Foreign Disinformation On The U.S. And Its Allies, Brandon M. Rubsamen

Global Tides

This paper attempts to explain the threat that foreign disinformation poses for the United States Intelligence Community and its allies. The paper examines Russian disinformation from both a historical and contemporary context and how its effect on Western democracies may only be exacerbated in light of Chinese involvement and evolving technologies. Fortunately, the paper also studies practices and strategies that the United States Intelligence Community and its allied foreign counterparts may use to respond. It is hoped that this study will help shed further light on Russian and Chinese disinformation campaigns and explain how the Intelligence Community can efficiently react.


Privilege In Peril: U.S. V. Zubaydah And The State Secrets Privilege, Alana Mattei Feb 2022

Privilege In Peril: U.S. V. Zubaydah And The State Secrets Privilege, Alana Mattei

Duke Journal of Constitutional Law & Public Policy Sidebar

U.S. v. Zubaydah presents an opportunity for the Court to settle the scope of the state secrets privilege and the role of the judiciary when the government invokes a claim of privilege. The state secrets privilege, invoked by the executive, gives courts the power to prevent the disclosure of information that could pose a threat to national security by excluding the particular evidence or dismissing the case. The Court will decide whether the Ninth Circuit erred by rejecting the Government’s assertion of the state secrets privilege over the depositions of former CIA contractors requested by Abu Zubaydah. The Ninth Circuit …


The Reasonable Intelligence Agency, Asaf Lubin Jan 2022

The Reasonable Intelligence Agency, Asaf Lubin

Articles by Maurer Faculty

Article 57(2) of the First Additional Protocol to the Geneva Conventions requires parties to an armed conflict to “do everything feasible to verify” their objects of attack and take “all precautions” to minimize civilian casualties and unintentional damage to civilian property. This obligation has been interpreted in international law to require state parties to set up an “effective intelligence gathering system” that would properly identify targets using all technical means at the disposal of the combating forces.

But existing law has failed to define what “effective intelligence” looks like. Quite the opposite. Modern history is filled with examples of intelligence …


Rethinking Responsibility As Cooperation And Control: The Case Of Intelligence Agents, Raphael Bitton Jan 2021

Rethinking Responsibility As Cooperation And Control: The Case Of Intelligence Agents, Raphael Bitton

American University National Security Law Brief

No abstract provided.


Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl May 2020

Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl

Catholic University Law Review

Intelligence collection must always evolve to meet technological developments. While the collection programs under Section 702 of the FISA Amendments Act of 2008 have produced a great deal of valuable intelligence over the last decade, the United States must begin to think about foreseeable technological developments and strategically consider how to conduct signals intelligence (SIGINT) collection in the future.

This Article identifies four technological trends that could significantly impact the way the United States conducts SIGINT. Individuals now have access to sophisticated technologies that formerly only governments seemed capable of creating, and this decentralization of capabilities will likely only increase …


Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin Jan 2020

Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin

Articles by Maurer Faculty

תקציר בעברית: הניסיון של המחוקק הישראלי להביא להסדרה מפורשת של סמכויות השב״כ במרחב הקיברנטי משקף מגמה רחבה יותר הניכרת בעולם לעיגון בחקיקה ראשית של הוראות בדבר פעולות פצחנות מצד גופי ביון ומודיעין ורשויות אכיפת חוק למטרות איסוף מודיעין לשם סיכול עבירות חמורות, ובייחוד עבירות טרור אם בעבר היו פעולות מסוג אלה כפופות לנהלים פנימיים ומסווגים, הרי שהדרישה לשקיפות בעידן שלאחר גילויי אדוארד סנודן מחד והשימוש הנרחב בתקיפות מחשב לביצוע פעולות חיפוש וחקירה לסיכול טרור מאידך, מציפים כעת את הדרישה להסמכה מפורשת. במאמר זה אבקש למפות הן את השדה הטכנולוגי והן את השדה המשפטי בכל האמור בתקיפות מחשבים למטרות ריגול ומעקב. …


The Theory And Practice At The Intersection Between Human Rights And Humanitarian Law, Monica Hakimi Feb 2018

The Theory And Practice At The Intersection Between Human Rights And Humanitarian Law, Monica Hakimi

Reviews

The United States is more than fifteen years into a fight against terrorism that shows no sign of abating and, with the change in administration, appears to be intensifying. Other Western democracies that have historically been uneasy about U.S. counterterrorism policies have, in recent years, shifted toward those policies. And armed nonstate groups continue to commit large-scale acts of violence in multiple distinct theaters. The legal issues that these situations present are not entirely new, but neither are they going away. Recent publications, like the three works under review, thus provide useful opportunities to reflect on and refine our thinking …


Newsroom: Interrogation Expert Warns Against Use Of Torture 2-2-2018, Roger Williams University School Of Law Feb 2018

Newsroom: Interrogation Expert Warns Against Use Of Torture 2-2-2018, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Open Source: The Enewsletter Of Rwu Law 09-22-2017, Roger Williams University School Of Law Sep 2017

Open Source: The Enewsletter Of Rwu Law 09-22-2017, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School Of Law Sep 2017

Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Trending @ Rwu Law: Dean Yelnosky's Post: Chelsea Manning, Professor David Coombs, And The "Wikileaks Trial" 08-28-2017, Edward Fitzpatrick, Roger Williams University School Of Law Aug 2017

Trending @ Rwu Law: Dean Yelnosky's Post: Chelsea Manning, Professor David Coombs, And The "Wikileaks Trial" 08-28-2017, Edward Fitzpatrick, Roger Williams University School Of Law

Law School Blogs

No abstract provided.


With Chelsea Manning's Release, Lead Trial Attorney Coombs Recalls Case: Rwu Law Professor David E. Coombs Revisits Issues In The Case, Looks Forward To Teaching Again Next Year 05-17-2017, Edward Fitzpatrick May 2017

With Chelsea Manning's Release, Lead Trial Attorney Coombs Recalls Case: Rwu Law Professor David E. Coombs Revisits Issues In The Case, Looks Forward To Teaching Again Next Year 05-17-2017, Edward Fitzpatrick

Life of the Law School (1993- )

No abstract provided.


Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick May 2017

Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick

Life of the Law School (1993- )

No abstract provided.


"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox Mar 2017

"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox

University of Richmond Law Review

No abstract provided.


Next Generation Foreign Intelligence Surveillance Law: Renewing 702, William C. Banks Mar 2017

Next Generation Foreign Intelligence Surveillance Law: Renewing 702, William C. Banks

University of Richmond Law Review

No abstract provided.


Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu Jan 2017

Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu

Scholarly Articles

This Article addresses the rapid growth of what the military and the intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence tool is reliant upon biometric databases—for example, digitalized storage of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to more accurately describe the manner in which this new tool is dependent upon cybersurveillance and big data’s massintegrative systems.

This Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, will be difficult …


A Response To Professor Samuel Rascoff’S Presidential Intelligence, Carrie F. Cordero Jan 2016

A Response To Professor Samuel Rascoff’S Presidential Intelligence, Carrie F. Cordero

Georgetown Law Faculty Publications and Other Works

Should foreign intelligence collection be subject to more rigorous oversight, and therefore, improved accountability, through a policy process that involves deeper personal involvement by the President and National Security Council (NSC)? Would a greater number of political appointees across the intelligence community facilitate that oversight? These are the essential questions posed by Professor Samuel Rascoff in his article Presidential Intelligence.


Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue Feb 2015

Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Section 702 of the Foreign Intelligence Surveillance Act (FISA) authorizes the NSA to collect the electronic communications of non-U.S. targets located overseas. Recent media reports and declassified documents reveal a more extensive program than publicly understood. The article begins by considering the origins of the current programs and the relevant authorities, particularly the transfer of part of the post-9/11 President’s Surveillance Program to FISA. It outlines the contours of the 2007 Protect America Act, before its replacement in 2008 by the FISA Amendments Act (FAA). The section ends with a brief discussion of the current state of foreign intelligence collection …


Fisa Reform, Laura K. Donohue Jan 2014

Fisa Reform, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Congress and the Executive Branch are poised to take up the issue of FISA reform in 2014. What has been missing from the discussion is a comprehensive view of ways in which reform could be given effect—i.e., a taxonomy of potential options. This article seeks to fill the gap. The aim is to deepen the conversation about abeyant approaches to foreign intelligence gathering, to allow fuller discussion of what a comprehensive package could contain, and to place initiatives that are currently under consideration within a broader, over-arching framework. The article begins by considering the legal underpinnings and challenges to the …


Due Process In American Military Tribunals After September 11, 2001, Gary Shaw May 2013

Due Process In American Military Tribunals After September 11, 2001, Gary Shaw

Gary M. Shaw

The Authorization for Use of Military Force ("AUMF") provides broad powers for a president after September 11, 2001. President Bush, under the AUMF, claimed he had the power to hold "enemy combatants" without due process. This gave rise to two questions that the article addresses: "Could they be held indefinitely without charges or proceedings being initiated? If proceedings had to be initiated, what process was due to the defendants?"


Legal Affairs: Dreyfus, Guantánamo, And The Foundation Of The Rule Of Law, David Cole May 2013

Legal Affairs: Dreyfus, Guantánamo, And The Foundation Of The Rule Of Law, David Cole

Touro Law Review

Analogous to the Dreyfus affair, America's reaction to the events of September 11, 2001, subverted the rule of law to impose penalties on those it viewed as a threat. There are lessons to be learned from both the Dreyfus affair and America's reaction to September 11, 2001.


The Leaky Leviathan: Why The Government Condemns And Condones Unlawful Disclosures Of Information, David E. Pozen Jan 2013

The Leaky Leviathan: Why The Government Condemns And Condones Unlawful Disclosures Of Information, David E. Pozen

Faculty Scholarship

The United States government leaks like a sieve. Presidents denounce the constant flow of classified information to the media from unauthorized, anonymous sources. National security professionals decry the consequences. And yet the laws against leaking are almost never enforced. Throughout U.S. history, roughly a dozen criminal cases have been brought against suspected leakers. There is a dramatic disconnect between the way our laws and our leaders condemn leaking in the abstract and the way they condone it in practice.

This Article challenges the standard account of that disconnect, which emphasizes the difficulties of apprehending and prosecuting offenders, and advances an …


Boland In The Wind: The Iran-Contra Affair And The Invitation To Struggle , Bretton G. Sciaroni Nov 2012

Boland In The Wind: The Iran-Contra Affair And The Invitation To Struggle , Bretton G. Sciaroni

Pepperdine Law Review

No abstract provided.


Occupy Wall Street And The U.S. Army's 82nd Airborne Division: A Hypothetical Examination Of The Slippery Slope Of Military Intervention During Civil Disturbance, Mckay Smith Jun 2012

Occupy Wall Street And The U.S. Army's 82nd Airborne Division: A Hypothetical Examination Of The Slippery Slope Of Military Intervention During Civil Disturbance, Mckay Smith

McKay Smith

Throughout 2011, the world was an incredibly angry place. The global economy was in disarray. The streets of Tunisia, Egypt, Libya, and Syria had erupted in unprecedented violence. While Americans watched events spiral out of control abroad, a new movement was taking shape domestically. The Occupy movement is a self-described, nonpartisan protest movement targeting economic injustice and social inequality. At its core, however, many domestic protestors also vocally deride the current state of U.S. politics. This article analyzes the Army’s authority to collect information in support of domestic operations, particularly operations aimed at quelling civil disturbance. Historically, the use of …


The Nuclear Terrorism Readiness And Alert Center: Transforming The Aspirational Nature Of International Law Into Operational Capabilities, Mckay Smith May 2012

The Nuclear Terrorism Readiness And Alert Center: Transforming The Aspirational Nature Of International Law Into Operational Capabilities, Mckay Smith

McKay Smith

Senior government officials, particularly those in the Intelligence Community, need to find a novel and creative solution for combating the deadly threat of nuclear terrorism. For decades the United States has been heavily involved in preventing the proliferation of nuclear weapons through traditional international law. It is noteworthy, however, that the Nuclear Non-proliferation Treaty, the crown jewel of all arms control treaties, does not contain a feasible method of countering the threat of nuclear terrorism. Taken as a whole, treaty law does not lend itself to conflicts against non-state actors such as al-Qaeda. Specifically, terrorists do not sign non-proliferation treaties …


Due Process In American Military Tribunals After September 11, 2001, Gary Shaw Jan 2012

Due Process In American Military Tribunals After September 11, 2001, Gary Shaw

Touro Law Review

The Authorization for Use of Military Force ("AUMF") provides broad powers for a president after September 11, 2001. President Bush, under the AUMF, claimed he had the power to hold "enemy combatants" without due process. This gave rise to two questions that the article addresses: "Could they be held indefinitely without charges or proceedings being initiated? If proceedings had to be initiated, what process was due to the defendants?"


National Security Federalism In The Age Of Terror, Matthew C. Waxman Jan 2012

National Security Federalism In The Age Of Terror, Matthew C. Waxman

Faculty Scholarship

National security law scholarship tends to focus on the balancing of security and liberty, and the overwhelming bulk of that scholarship is about such balancing on the horizontal axis among branches at the federal level. This Article challenges that standard focus by supplementing it with an account of the vertical axis and the emergent, post-9/11 role of state and local government in American national security law and policy. It argues for a federalism frame that emphasizes vertical intergovernmental arrangements for promoting and mediating a dense array of policy values over the long term. This federalism frame helps in understanding the …


Law Enforcement And Intelligence Gathering In Muslim And Immigrant Communities After 9/11, David A. Harris Jan 2010

Law Enforcement And Intelligence Gathering In Muslim And Immigrant Communities After 9/11, David A. Harris

Articles

Since the attacks of September 11, 2001, law enforcement agencies have actively sought partnerships with Muslim communities in the U.S. Consistent with community-based policing, these partnerships are designed to persuade members of these communities to share information about possible extremist activity. These cooperative efforts have borne fruit, resulting in important anti-terrorism prosecutions. But during the past several years, law enforcement has begun to use another tactic simultaneously: the FBI and some police departments have placed informants in mosques and other religious institutions to gather intelligence. The government justifies this by asserting that it must take a pro-active stance in order …


Us National Security, Intelligence And Democracy: From The Church Committee To The War On Terror, Russell Miller Dec 2007

Us National Security, Intelligence And Democracy: From The Church Committee To The War On Terror, Russell Miller

Russell A. Miller

No abstract provided.


What’S International Law Got To Do With It? Transnational Law And The Intelligence Mission, James E. Baker Jan 2007

What’S International Law Got To Do With It? Transnational Law And The Intelligence Mission, James E. Baker

Georgetown Law Faculty Publications and Other Works

The United States faces an immediate and continuous threat of terrorist attack using weapons of mass destruction, including nuclear weapons. The intelligence function and national security law, including international law--or more accurately transnational law--are central to addressing this threat. Indeed, international law is more relevant today in addressing this threat than it was before September 11. Part II of this article describes a continuum of contemporary threats to U.S. national security, with a focus on nonstate terrorism. Part III addresses the role of intelligence and national security law, and in particular law addressed to process, in combating these threats. Part …