Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- National Security Law (27)
- Military, War, and Peace (23)
- Law Enforcement and Corrections (7)
- Internet Law (5)
- Rule of Law (5)
-
- Science and Technology Law (3)
- Civil Procedure (2)
- Commercial Law (2)
- Insurance Law (2)
- Litigation (2)
- Torts (2)
- Administrative Law (1)
- Air and Space Law (1)
- Civil Rights and Discrimination (1)
- Communications Law (1)
- Computer Sciences (1)
- Criminal Law (1)
- Human Rights Law (1)
- Information Security (1)
- Intellectual Property Law (1)
- International Humanitarian Law (1)
- Law and Politics (1)
- Legislation (1)
- Organizations Law (1)
- Physical Sciences and Mathematics (1)
- Privacy Law (1)
- Institution
- Publication Year
- Publication
- Publication Type
Articles 1 - 30 of 37
Full-Text Articles in International Law
The Liberty To Spy, Asaf Lubin
The Liberty To Spy, Asaf Lubin
Articles by Maurer Faculty
Many, if not most, international legal scholars share the ominous contention that espionage, as a legal field, is devoid of meaning. For them, any attempt to extrapolate the lex lata corpus of the International Law of Intelligence (ILI), let alone its lex scripta, would inevitably prove to be a failed attempt, as there is simply nothing to extrapolate. The notion that international law is moot as to the question of if, when, and how intelligence is to be collected, analyzed, and promulgated, has been repeated so many times that it has become the prevailing orthodoxy.
This paper offers a new …
Attribution And Other Conditions Of Lawful Countermeasures To Cyber Misconduct, Mary Ellen O'Connell
Attribution And Other Conditions Of Lawful Countermeasures To Cyber Misconduct, Mary Ellen O'Connell
Journal Articles
State cyber misconduct is on the rise, and it can be difficult to differentiate between malicious governmental cyber conduct and active cyber defense. Though some argue that cyberspace is a law-free zone, offensive cyberattacks are almost always unlawful regardless of their purpose. This Article contends that international law can provide for legal boundaries in cyberspace and analogizes cyber misconduct to government actions such as espionage. So long as conditions provided by international law (such as notice, necessity, and proportionality) are met, countermeasures to malicious cyber operations are generally lawful. Cases of urgency may be an exception to this general rule …
Cyber Law And Espionage Law As Communicating Vessels, Asaf Lubin
Cyber Law And Espionage Law As Communicating Vessels, Asaf Lubin
Books & Book Chapters by Maurer Faculty
Professor Lubin's contribution is "Cyber Law and Espionage Law as Communicating Vessels," pp. 203-225.
Existing legal literature would have us assume that espionage operations and “below-the-threshold” cyber operations are doctrinally distinct. Whereas one is subject to the scant, amorphous, and under-developed legal framework of espionage law, the other is subject to an emerging, ever-evolving body of legal rules, known cumulatively as cyber law. This dichotomy, however, is erroneous and misleading. In practice, espionage and cyber law function as communicating vessels, and so are better conceived as two elements of a complex system, Information Warfare (IW). This paper therefore first draws …
"We Only Spy On Foreigners": The Myth Of A Universal Right To Privacy And The Practice Of Foreign Mass Surveillance, Asaf Lubin
Articles by Maurer Faculty
The digital age brought with it a new epoch in global political life, one neatly coined by Professor Philip Howard as the “pax technica.” In this new world order, government and industry are “tightly bound” in technological and security arrangements that serve to push forward an information and cyber revolution of unparalleled magnitude. While the rise of information technologies tells a miraculous story of triumph over the physical constraints that once shackled mankind, these very technologies are also the cause of grave concern. Intelligence agencies have been recently involved in the exercise of global indiscriminate surveillance, which purports to go …
Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour
Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour
Faculty Scholarship
The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (for instance, to commit crimes or to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet to directly access and control criminals’ devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers will be subject to remote …
Espionage As A Sovereign Right Under International Law And Its Limits, Asaf Lubin
Espionage As A Sovereign Right Under International Law And Its Limits, Asaf Lubin
Articles by Maurer Faculty
The literature surrounding the international legality of peacetime espionage has so far centered around one single question: whether there exist within treaty or customary international law prohibitive rules against the collection of foreign intelligence in times of peace. Lacking such rules, argue the permissivists, espionage functions within a lotus vacuum, one in which States may spy on each other and on each other's nationals with no restrictions, justifying their behavior through the argumentum ad hominem of "tu quoque." . . .
Contemporary Practice Of The United States Relating To International Law., Kristina Daugirdas, Julian Davis Mortenson
Contemporary Practice Of The United States Relating To International Law., Kristina Daugirdas, Julian Davis Mortenson
Articles
In this section: • Agreement on Iran Nuclear Program Goes into Effect • United States and China Reach Agreement Regarding Economic Espionage and International Cybersecurity Norms • United States Ratifies the International Convention for the Suppression of Acts of Nuclear Terrorism • United States Reaches Agreement with Turkey on Use of Incirlik Air Base for Strikes on ISIL; “Safe Zone” Not Part of the Deal
Contemporary Practice Of The United States Relating To International Law, Kristina Daugirdas, Julian Davis Mortenson
Contemporary Practice Of The United States Relating To International Law, Kristina Daugirdas, Julian Davis Mortenson
Articles
In this section: • United States Condemns Russia’s Use of Force in Ukraine and Attempted Annexation of Crimea • In Wake of Espionage Revelations, United States Declines to Reach Comprehensive Intelligence Agreement with Germany • United States Defends United Nations’ Immunity in Haitian Cholera Case • French Bank Pleads Guilty to Criminal Violations of U.S. Sanctions Laws • D.C. Circuit Strikes down Administrative Order Requiring Divestment by Foreign-Owned Corporation • United States Adopts New Land Mine Policy • United States Claims That Russia Has Violated the INF Treaty
Cyber War And International Law: Does The International Legal Process Constitute A Threat To U.S. Vital Interests?, John F. Murphy
Cyber War And International Law: Does The International Legal Process Constitute A Threat To U.S. Vital Interests?, John F. Murphy
International Law Studies
No abstract provided.
Should Cyber Exploitation Ever Constitute A Demonstration Of Hostile Intent That May Violate Un Charter Provisions Prohibiting The Threat Or Use Of Force?, Anna Wortham
Federal Communications Law Journal
More and more, the United States and other countries rely on complex infrastructures that are primarily controlled by information technology. Although extremely destructive cyber threats and attacks against nations are a reality, the laws governing cyber exploitation have not kept pace with this threat. Because the United States and other nations may use cyber capabilities offensively as well as defensively, it is important that the laws for engaging in such cyber conflict be well defined. Currently, it seems unlikely that cyber exploitation can ever be regarded as a threat or use of force under the UN Charter because it is …
Making Fiction Of Facts In The Israeli Spy Case, Kenneth Lasson, Angelo Codevilla, Lawrence J. Korb, John Loftus
Making Fiction Of Facts In The Israeli Spy Case, Kenneth Lasson, Angelo Codevilla, Lawrence J. Korb, John Loftus
All Faculty Scholarship
The authors make the case that Jonathan Pollard, the man convicted of spying for Israel, is again being condemned by new allegations by Martin Peretz in a New Republic article, and by retired Navy Capt. M. E. Bowman. The authors of these new assertions may not know more of the particulars than others in high places who have already publicly supported commuting Pollard's sentence to time served.
Pollard Languishes, Kenneth Lasson
Passover And Jonathan Pollard, Kenneth Lasson
Passover And Jonathan Pollard, Kenneth Lasson
All Faculty Scholarship
No abstract provided.
The Unresolved Equation Of Espionage And International Law, A. John Radsan
The Unresolved Equation Of Espionage And International Law, A. John Radsan
Michigan Journal of International Law
This Essay, in order to offer up something to that appetite, is divided into five parts. After this introduction, the author, A. John Radsan, describes a Hegelian impulse, the perpetual drive to find unity in disorder. That impulse, for better or worse, creates the train and the track for many of the academy's journeys. Radsan then defines what is meant by "intelligence activities" for purposes of this Essay, after which Radsan surveys the scholarship that existed before this symposium on the relationship between espionage and international law. As the number of pages written on this topic suggests, scholarship on espionage …
Secrets And Lies: Intelligence Activities And The Rule Of Law In Times Of Crisis, Simon Chesterman
Secrets And Lies: Intelligence Activities And The Rule Of Law In Times Of Crisis, Simon Chesterman
Michigan Journal of International Law
This Article will consider generally the prospects for an approach to intelligence activities based on the rule of law, focusing on the problem of covertness. In particular, it will examine the debate over how law should deal with crises, epitomized by the "ticking time-bomb" hypothetical. On the one hand, some call for a pragmatic recognition that, in extremis, public officials may be required to act outside the law and should seek after-the-fact ratification of their "extra-legal measures." On the other hand, others argue that the embrace of "extra-legal measures" misconceives the rule of law, underestimates the capacity of a …
State Intelligence Gathering: Conflict Of Laws, Charles H.B. Garraway
State Intelligence Gathering: Conflict Of Laws, Charles H.B. Garraway
Michigan Journal of International Law
This Article begins with an examination of the development of the law of war (Part II) and human rights law (Part III) before looking at the differing legal categories of armed conflict (Part IV). It then examines the applicability of human rights law in situations of armed conflict (Part V) and the increasing complexity of defining violence, whether as armed conflict or otherwise (Part VI). The Article proceeds with an examination of the overlap between the law of war and human rights law (Part VII) and the risk of divergence that this overlap causes (Part VIII). Finally, it seeks to …
Keynote Address, Jeffrey H. Smith
Keynote Address, Jeffrey H. Smith
Michigan Journal of International Law
This afternoon, I want to touch briefly on a number of issues rather than discuss one or two to death. I chose this approach because it seemed an appropriate way to open a conference. I also chose it because I hope I can convince you that intelligence and international law interact in a way that simultaneously strengthens the law and improves intelligence; that law matters, especially in time of war; and that both good intelligence and good law have one common core value: integrity. So that you will have a sense of the perspective that I bring to this, I …
Counterintuitive: Intelligence Operations And International Law, Glenn Sulmasy, John Yoo
Counterintuitive: Intelligence Operations And International Law, Glenn Sulmasy, John Yoo
Michigan Journal of International Law
The question before us is whether international law is useful or required to govern the covert intelligence-gathering activities of nation-states during peacetime. The very notion that international law is currently capable of regulating intelligence gathering is dubious. In fact, we suggest that international regulation of intelligence operations could have the perverse effect of making international conflict more, rather than less, likely. Certainly, there is legitimate space for coordination and cooperation between states in sharing intelligence, but such "sharing" does not involve significant needs for universal regulation by international law. Simply stated, it is not in the interests of nation-states or …
Towards A Right To Privacy In Transnational Intelligence Networks, Francesca Bignami
Towards A Right To Privacy In Transnational Intelligence Networks, Francesca Bignami
Michigan Journal of International Law
Privacy is one of the most critical liberal rights to come under pressure from transnational intelligence gathering. This Article explores the many ways in which transnational intelligence networks intrude upon privacy and considers some of the possible forms of legal redress. Part II lays bare the different types of transnational intelligence networks that exist today. Part III begins the analysis of the privacy problem by examining the national level, where, over the past forty years, a legal framework has been developed to promote the right to privacy in domestic intelligence gathering. Part IV turns to the privacy problem transnationally, when …
Individual And State Responsibility For Intelligence Gathering, Dieter Fleck
Individual And State Responsibility For Intelligence Gathering, Dieter Fleck
Michigan Journal of International Law
It is the purpose of this contribution to examine relevant norms and principles for assessing acts of intelligence gathering under international law (Part I), evaluate legal problems of attribution of such acts (Part II), and, where governments commit wrongful acts, look into circumstances precluding their wrongfulness (Part III). Based on these considerations, legal consequences for criminal accountability (Part IV) and reparation (Part V) will be discussed. Finally, some conclusions may be drawn (Part VI).
The Spy Who Came In From The Cold War: Intelligence And International Law, Simon Chesterman
The Spy Who Came In From The Cold War: Intelligence And International Law, Simon Chesterman
Michigan Journal of International Law
This Article will focus on the narrower questions of whether obtaining secret intelligence-that is, without the consent of the state that controls the information-is subject to international legal norms or constraints, and what restrictions, if any, control the use of this information once obtained. Traditional approaches to the question of the legitimacy of spying, when even asked, typically settle on one of two positions: either collecting secret intelligence remains illegal despite consistent practice, or apparent tolerance has led to a "deep but reluctant admission of the lawfulness of such intelligence gathering, when conducted within customary normative limits.” Other writers have …
Sounds Of Silence, Kenneth Lasson
It's Time To Be Fair To Jonathan Pollard, Kenneth Lasson
It's Time To Be Fair To Jonathan Pollard, Kenneth Lasson
All Faculty Scholarship
No abstract provided.
The Demonization Of Jonathan Pollard, Kenneth Lasson
The Demonization Of Jonathan Pollard, Kenneth Lasson
All Faculty Scholarship
This article discusses the case of Jonathan Pollard, and the issues surrounding his conviction of spying for Israel while acting as a U.S. naval intelligence analyst. Cited are the writer's view of the inequities of his conviction, and possible political motivations for his sentence.
Pollard Treated Unfairly, Kenneth Lasson
Pollard Treated Unfairly, Kenneth Lasson
All Faculty Scholarship
No abstract provided.
Why Clinton Should Pardon Pollard – Now, Kenneth Lasson
Why Clinton Should Pardon Pollard – Now, Kenneth Lasson
All Faculty Scholarship
No abstract provided.
Pollard Case Is One For The Legal Books, Kenneth Lasson
Pollard Case Is One For The Legal Books, Kenneth Lasson
All Faculty Scholarship
Jonathan Pollard, the former Navy intelligence analyst who was convicted of passing classified information to Israel, has been behind bars for more than 12 years now. His life sentence - by far the harshest ever meted out for a similar offense - continues to make "equal justice under law" seem like little more than a palsied proverb.
Pollard's actions were clearly misguided and rightly punishable, but should he languish for life in prison while others obviously more perfidious have been set free? Americans who expect fairness in their judicial system should be sorely disillusioned at how grossly disproportionate Pollard's treatment …
Ax-Grinding Politics Leads To Unequal Justice, Kenneth Lasson
Ax-Grinding Politics Leads To Unequal Justice, Kenneth Lasson
All Faculty Scholarship
No abstract provided.
Industrial Espionage As Unfair Competition, Robert L. Tucker
Industrial Espionage As Unfair Competition, Robert L. Tucker
Akron Law Faculty Publications
No abstract provided.
Industrial Espionage As Unfair Competition, Robert L. Tucker
Industrial Espionage As Unfair Competition, Robert L. Tucker
Robert L Tucker
No abstract provided.