Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- International Law (10)
- Military, War, and Peace (6)
- Defense and Security Studies (4)
- Public Affairs, Public Policy and Public Administration (4)
- Rule of Law (4)
-
- Social and Behavioral Sciences (4)
- Business (3)
- Criminal Law (3)
- American Politics (2)
- Legislation (2)
- Political Science (2)
- Portfolio and Security Analysis (2)
- Administrative Law (1)
- Communications Law (1)
- Education (1)
- Evidence (1)
- Higher Education (1)
- Human Rights Law (1)
- International Relations (1)
- International Trade Law (1)
- Internet Law (1)
- Jurisdiction (1)
- Law and Politics (1)
- Law and Race (1)
- Organizational Behavior and Theory (1)
- Other Law (1)
- Other Political Science (1)
- Other Psychology (1)
- Institution
- Publication Year
Articles 1 - 20 of 20
Full-Text Articles in National Security Law
Academic Economic Espionage?, Elizabeth A. Rowe
Academic Economic Espionage?, Elizabeth A. Rowe
William & Mary Law Review
In 2018 the U.S. government announced that Chinese espionage was occurring in university research labs, and the Department of Justice subsequently made it a high priority to prosecute economic espionage in academia. The DOJ’s grave concerns about espionage in academia have continued, and the Director of the FBI has lamented that American taxpayers are footing the bill for China’s technological development. This geopolitical concern about espionage has had real world and personal consequences in academia. Since 2019, over a dozen high-profile criminal prosecutions have put prominent professors at major research universities across the country in handcuffs and almost all the …
Academic Espionage: How International Trade Law Can Protect Higher Education, Cameron Keen
Academic Espionage: How International Trade Law Can Protect Higher Education, Cameron Keen
Georgia Journal of International & Comparative Law
No abstract provided.
Espionage: Anything Goes?, Karen Jennings
Should Cyber Exploitation Ever Constitute A Demonstration Of Hostile Intent That May Violate Un Charter Provisions Prohibiting The Threat Or Use Of Force?, Anna Wortham
Federal Communications Law Journal
More and more, the United States and other countries rely on complex infrastructures that are primarily controlled by information technology. Although extremely destructive cyber threats and attacks against nations are a reality, the laws governing cyber exploitation have not kept pace with this threat. Because the United States and other nations may use cyber capabilities offensively as well as defensively, it is important that the laws for engaging in such cyber conflict be well defined. Currently, it seems unlikely that cyber exploitation can ever be regarded as a threat or use of force under the UN Charter because it is …
Murder And Martial Justice: Spying And Retribution In Wwii America. By Meredith Lentz Adams (Kent, Ohio: The Kent State University Press, 2011), Millard E. Moon Ed.D.
Murder And Martial Justice: Spying And Retribution In Wwii America. By Meredith Lentz Adams (Kent, Ohio: The Kent State University Press, 2011), Millard E. Moon Ed.D.
Journal of Strategic Security
No abstract provided.
Short Takes: Intelligence-Service Psychology: A German Perspective, Sven Max Litzcke, Helmut Müller-Enbergs
Short Takes: Intelligence-Service Psychology: A German Perspective, Sven Max Litzcke, Helmut Müller-Enbergs
Journal of Strategic Security
To date, four German volumes in the series "Intelligence-Service Psychology" (Nachrichtendienstpsychologie) have been published. These volumes generated interest in both the German and non-German speaking communities. It was therefore decided to translate some of the basic articles of the series into English (Litzcke, Müller-Enbergs & Ungerer, 2008), making them accessible to a wider range of readers. This article contains abbreviated versions of the articles in the book.
The Unresolved Equation Of Espionage And International Law, A. John Radsan
The Unresolved Equation Of Espionage And International Law, A. John Radsan
Michigan Journal of International Law
This Essay, in order to offer up something to that appetite, is divided into five parts. After this introduction, the author, A. John Radsan, describes a Hegelian impulse, the perpetual drive to find unity in disorder. That impulse, for better or worse, creates the train and the track for many of the academy's journeys. Radsan then defines what is meant by "intelligence activities" for purposes of this Essay, after which Radsan surveys the scholarship that existed before this symposium on the relationship between espionage and international law. As the number of pages written on this topic suggests, scholarship on espionage …
Keynote Address, Jeffrey H. Smith
Keynote Address, Jeffrey H. Smith
Michigan Journal of International Law
This afternoon, I want to touch briefly on a number of issues rather than discuss one or two to death. I chose this approach because it seemed an appropriate way to open a conference. I also chose it because I hope I can convince you that intelligence and international law interact in a way that simultaneously strengthens the law and improves intelligence; that law matters, especially in time of war; and that both good intelligence and good law have one common core value: integrity. So that you will have a sense of the perspective that I bring to this, I …
Secrets And Lies: Intelligence Activities And The Rule Of Law In Times Of Crisis, Simon Chesterman
Secrets And Lies: Intelligence Activities And The Rule Of Law In Times Of Crisis, Simon Chesterman
Michigan Journal of International Law
This Article will consider generally the prospects for an approach to intelligence activities based on the rule of law, focusing on the problem of covertness. In particular, it will examine the debate over how law should deal with crises, epitomized by the "ticking time-bomb" hypothetical. On the one hand, some call for a pragmatic recognition that, in extremis, public officials may be required to act outside the law and should seek after-the-fact ratification of their "extra-legal measures." On the other hand, others argue that the embrace of "extra-legal measures" misconceives the rule of law, underestimates the capacity of a …
State Intelligence Gathering: Conflict Of Laws, Charles H.B. Garraway
State Intelligence Gathering: Conflict Of Laws, Charles H.B. Garraway
Michigan Journal of International Law
This Article begins with an examination of the development of the law of war (Part II) and human rights law (Part III) before looking at the differing legal categories of armed conflict (Part IV). It then examines the applicability of human rights law in situations of armed conflict (Part V) and the increasing complexity of defining violence, whether as armed conflict or otherwise (Part VI). The Article proceeds with an examination of the overlap between the law of war and human rights law (Part VII) and the risk of divergence that this overlap causes (Part VIII). Finally, it seeks to …
Counterintuitive: Intelligence Operations And International Law, Glenn Sulmasy, John Yoo
Counterintuitive: Intelligence Operations And International Law, Glenn Sulmasy, John Yoo
Michigan Journal of International Law
The question before us is whether international law is useful or required to govern the covert intelligence-gathering activities of nation-states during peacetime. The very notion that international law is currently capable of regulating intelligence gathering is dubious. In fact, we suggest that international regulation of intelligence operations could have the perverse effect of making international conflict more, rather than less, likely. Certainly, there is legitimate space for coordination and cooperation between states in sharing intelligence, but such "sharing" does not involve significant needs for universal regulation by international law. Simply stated, it is not in the interests of nation-states or …
Towards A Right To Privacy In Transnational Intelligence Networks, Francesca Bignami
Towards A Right To Privacy In Transnational Intelligence Networks, Francesca Bignami
Michigan Journal of International Law
Privacy is one of the most critical liberal rights to come under pressure from transnational intelligence gathering. This Article explores the many ways in which transnational intelligence networks intrude upon privacy and considers some of the possible forms of legal redress. Part II lays bare the different types of transnational intelligence networks that exist today. Part III begins the analysis of the privacy problem by examining the national level, where, over the past forty years, a legal framework has been developed to promote the right to privacy in domestic intelligence gathering. Part IV turns to the privacy problem transnationally, when …
Individual And State Responsibility For Intelligence Gathering, Dieter Fleck
Individual And State Responsibility For Intelligence Gathering, Dieter Fleck
Michigan Journal of International Law
It is the purpose of this contribution to examine relevant norms and principles for assessing acts of intelligence gathering under international law (Part I), evaluate legal problems of attribution of such acts (Part II), and, where governments commit wrongful acts, look into circumstances precluding their wrongfulness (Part III). Based on these considerations, legal consequences for criminal accountability (Part IV) and reparation (Part V) will be discussed. Finally, some conclusions may be drawn (Part VI).
The Spy Who Came In From The Cold War: Intelligence And International Law, Simon Chesterman
The Spy Who Came In From The Cold War: Intelligence And International Law, Simon Chesterman
Michigan Journal of International Law
This Article will focus on the narrower questions of whether obtaining secret intelligence-that is, without the consent of the state that controls the information-is subject to international legal norms or constraints, and what restrictions, if any, control the use of this information once obtained. Traditional approaches to the question of the legitimacy of spying, when even asked, typically settle on one of two positions: either collecting secret intelligence remains illegal despite consistent practice, or apparent tolerance has led to a "deep but reluctant admission of the lawfulness of such intelligence gathering, when conducted within customary normative limits.” Other writers have …
Trends. Psychologies Of Personnel Security And Counterintelligence Failure: Racism, Satisficing, And Wen Ho Lee, Ibpp Editor
Trends. Psychologies Of Personnel Security And Counterintelligence Failure: Racism, Satisficing, And Wen Ho Lee, Ibpp Editor
International Bulletin of Political Psychology
This article discusses issues surrounding the actions of Mr. Wen Ho Lee in the context of espionage, treason, and national security as well as racial profiling and the problems with conducting counterintelligence.
The Pollard Case And The Nature Of Espionage, Ibpp Editor
The Pollard Case And The Nature Of Espionage, Ibpp Editor
International Bulletin of Political Psychology
This article describes some common misconceptions in evaluating the appropriateness of penalties for individuals convicted of espionage.
Diplomatic Immunity-Open-Door Policy To Espionage Activity Avoided (United States V. Kostadinov- United States V. Kostadinov), Blanche G. Lark
Diplomatic Immunity-Open-Door Policy To Espionage Activity Avoided (United States V. Kostadinov- United States V. Kostadinov), Blanche G. Lark
NYLS Journal of International and Comparative Law
No abstract provided.
Espionage In Transnational Law, Leslie S. Edmondson
Espionage In Transnational Law, Leslie S. Edmondson
Vanderbilt Journal of Transnational Law
Traditionally, spies have been defined as "secret agents of a State sent abroad for the purpose of obtaining clandestinely information in regard to military or political secrets." Older authorities have stated emphatically that the gravamen of espionage is the employment of disguise or false pretense. Such deception has been the justification for visiting the severest of penalties upon the captured spy. Curiously, however, the employment of spies has not been considered reprehensible conduct. The refusal to officially acknowledge the commissioning of a spy operated to relieve the government of any responsibility either to the offended state or to the secret …
Packer: Ex-Communist Witnesses, Malcolm Sharp
Packer: Ex-Communist Witnesses, Malcolm Sharp
Michigan Law Review
A Review of Ex-Communist Witnesses. By Herbert L. Packer
International Law-Jurisdictional Immunity Of United Nations Employees-The Gubitchev Case, Melvin J. Spencer S.Ed.
International Law-Jurisdictional Immunity Of United Nations Employees-The Gubitchev Case, Melvin J. Spencer S.Ed.
Michigan Law Review
Diplomatic officers are immune from the criminal jurisdiction of the receiving state under well-recognized principles of customary international law, which principles are said to be a part of the law of the United States. As international organizations developed, certain privileges and immunities were given to their personnel by treaties or agreements and it appeared that by common consent of the family of nations their right to immunities might also come to be recognized as a principle of the law of nations. As yet the United States has not recognized such a principle and jurisdictional immunity here must still be provided …