Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Espionage

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 43

Full-Text Articles in National Security Law

Academic Economic Espionage?, Elizabeth A. Rowe Oct 2023

Academic Economic Espionage?, Elizabeth A. Rowe

William & Mary Law Review

In 2018 the U.S. government announced that Chinese espionage was occurring in university research labs, and the Department of Justice subsequently made it a high priority to prosecute economic espionage in academia. The DOJ’s grave concerns about espionage in academia have continued, and the Director of the FBI has lamented that American taxpayers are footing the bill for China’s technological development. This geopolitical concern about espionage has had real world and personal consequences in academia. Since 2019, over a dozen high-profile criminal prosecutions have put prominent professors at major research universities across the country in handcuffs and almost all the …


Academic Espionage: How International Trade Law Can Protect Higher Education, Cameron Keen Jun 2021

Academic Espionage: How International Trade Law Can Protect Higher Education, Cameron Keen

Georgia Journal of International & Comparative Law

No abstract provided.


The Liberty To Spy, Asaf Lubin Jan 2020

The Liberty To Spy, Asaf Lubin

Articles by Maurer Faculty

Many, if not most, international legal scholars share the ominous contention that espionage, as a legal field, is devoid of meaning. For them, any attempt to extrapolate the lex lata corpus of the International Law of Intelligence (ILI), let alone its lex scripta, would inevitably prove to be a failed attempt, as there is simply nothing to extrapolate. The notion that international law is moot as to the question of if, when, and how intelligence is to be collected, analyzed, and promulgated, has been repeated so many times that it has become the prevailing orthodoxy.

This paper offers a new …


Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin Jan 2020

Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin

Articles by Maurer Faculty

תקציר בעברית: הניסיון של המחוקק הישראלי להביא להסדרה מפורשת של סמכויות השב״כ במרחב הקיברנטי משקף מגמה רחבה יותר הניכרת בעולם לעיגון בחקיקה ראשית של הוראות בדבר פעולות פצחנות מצד גופי ביון ומודיעין ורשויות אכיפת חוק למטרות איסוף מודיעין לשם סיכול עבירות חמורות, ובייחוד עבירות טרור אם בעבר היו פעולות מסוג אלה כפופות לנהלים פנימיים ומסווגים, הרי שהדרישה לשקיפות בעידן שלאחר גילויי אדוארד סנודן מחד והשימוש הנרחב בתקיפות מחשב לביצוע פעולות חיפוש וחקירה לסיכול טרור מאידך, מציפים כעת את הדרישה להסמכה מפורשת. במאמר זה אבקש למפות הן את השדה הטכנולוגי והן את השדה המשפטי בכל האמור בתקיפות מחשבים למטרות ריגול ומעקב. …


Cyber War And Deterrence: Applying A General Theoretical Framework, Isaac Nacita [*], Mark Reith Jul 2018

Cyber War And Deterrence: Applying A General Theoretical Framework, Isaac Nacita [*], Mark Reith

Faculty Publications

There is a saying that politicians and generals are always fighting the last war, which is emphasized when the weapons and characteristics of warfare are changing rapidly. However, if this is true, it is often not due to an inability to learn lessons from previous conflicts, but to “overlearn” or overcompensate for the failures and experiences of the past. In reality, this is not a learning problem but one of forming poor implications from historical events, which leads to poor applications of doctrine the next time around. The DOD now acknowledges that warfare has extended into cyberspace, and it is …


"We Only Spy On Foreigners": The Myth Of A Universal Right To Privacy And The Practice Of Foreign Mass Surveillance, Asaf Lubin Jan 2018

"We Only Spy On Foreigners": The Myth Of A Universal Right To Privacy And The Practice Of Foreign Mass Surveillance, Asaf Lubin

Articles by Maurer Faculty

The digital age brought with it a new epoch in global political life, one neatly coined by Professor Philip Howard as the “pax technica.” In this new world order, government and industry are “tightly bound” in technological and security arrangements that serve to push forward an information and cyber revolution of unparalleled magnitude. While the rise of information technologies tells a miraculous story of triumph over the physical constraints that once shackled mankind, these very technologies are also the cause of grave concern. Intelligence agencies have been recently involved in the exercise of global indiscriminate surveillance, which purports to go …


Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School Of Law Sep 2017

Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Espionage As A Sovereign Right Under International Law And Its Limits, Asaf Lubin Sep 2016

Espionage As A Sovereign Right Under International Law And Its Limits, Asaf Lubin

Articles by Maurer Faculty

The literature surrounding the international legality of peacetime espionage has so far centered around one single question: whether there exist within treaty or customary international law prohibitive rules against the collection of foreign intelligence in times of peace. Lacking such rules, argue the permissivists, espionage functions within a lotus vacuum, one in which States may spy on each other and on each other's nationals with no restrictions, justifying their behavior through the argumentum ad hominem of "tu quoque." . . .


U.S. Business: Tort Liability For The Transnational Republisher Of Leaked Corporate Secrets, Richard Peltz-Steele Jun 2013

U.S. Business: Tort Liability For The Transnational Republisher Of Leaked Corporate Secrets, Richard Peltz-Steele

Richard J. Peltz-Steele

Wikileaks, the web enterprise responsible for the unprecedented publication of hundreds of thousands of classified government records, is reshaping fundamental notions of the freedom of information. Meanwhile more than half of records held by Wikileaks are from the private sector, and the organization has promised blockbuster revelations about major commercial players such as big banks and oil companies. This paper examines the potential liability under U.S. business-tort law for Wikileaks as a transnational republisher of leaked corporate secrets. The paper examines the paradigm for criminal liability under the Espionage Act to imagine a construct of civil liability for tortious interference …


Espionage: Anything Goes?, Karen Jennings Jan 2013

Espionage: Anything Goes?, Karen Jennings

Pepperdine Law Review

No abstract provided.


Should Cyber Exploitation Ever Constitute A Demonstration Of Hostile Intent That May Violate Un Charter Provisions Prohibiting The Threat Or Use Of Force?, Anna Wortham May 2012

Should Cyber Exploitation Ever Constitute A Demonstration Of Hostile Intent That May Violate Un Charter Provisions Prohibiting The Threat Or Use Of Force?, Anna Wortham

Federal Communications Law Journal

More and more, the United States and other countries rely on complex infrastructures that are primarily controlled by information technology. Although extremely destructive cyber threats and attacks against nations are a reality, the laws governing cyber exploitation have not kept pace with this threat. Because the United States and other nations may use cyber capabilities offensively as well as defensively, it is important that the laws for engaging in such cyber conflict be well defined. Currently, it seems unlikely that cyber exploitation can ever be regarded as a threat or use of force under the UN Charter because it is …


Making Fiction Of Facts In The Israeli Spy Case, Kenneth Lasson, Angelo Codevilla, Lawrence J. Korb, John Loftus Sep 2011

Making Fiction Of Facts In The Israeli Spy Case, Kenneth Lasson, Angelo Codevilla, Lawrence J. Korb, John Loftus

All Faculty Scholarship

The authors make the case that Jonathan Pollard, the man convicted of spying for Israel, is again being condemned by new allegations by Martin Peretz in a New Republic article, and by retired Navy Capt. M. E. Bowman. The authors of these new assertions may not know more of the particulars than others in high places who have already publicly supported commuting Pollard's sentence to time served.


U.S. Business: Tort Liability For The Transnational Republisher Of Leaked Corporate Secrets, Richard J. Peltz-Steele Jan 2011

U.S. Business: Tort Liability For The Transnational Republisher Of Leaked Corporate Secrets, Richard J. Peltz-Steele

Faculty Publications

Wikileaks, the web enterprise responsible for the unprecedented publication of hundreds of thousands of classified government records, is reshaping fundamental notions of the freedom of information. Meanwhile more than half of records held by Wikileaks are from the private sector, and the organization has promised blockbuster revelations about major commercial players such as big banks and oil companies. This paper examines the potential liability under U.S. business-tort law for Wikileaks as a transnational republisher of leaked corporate secrets. The paper examines the paradigm for criminal liability under the Espionage Act to imagine a construct of civil liability for tortious interference …


Murder And Martial Justice: Spying And Retribution In Wwii America. By Meredith Lentz Adams (Kent, Ohio: The Kent State University Press, 2011), Millard E. Moon Ed.D. Jan 2011

Murder And Martial Justice: Spying And Retribution In Wwii America. By Meredith Lentz Adams (Kent, Ohio: The Kent State University Press, 2011), Millard E. Moon Ed.D.

Journal of Strategic Security

No abstract provided.


Jews In Jail, Kenneth Lasson Sep 2009

Jews In Jail, Kenneth Lasson

All Faculty Scholarship

No abstract provided.


Pollard Languishes, Kenneth Lasson Feb 2009

Pollard Languishes, Kenneth Lasson

All Faculty Scholarship

No abstract provided.


Short Takes: Intelligence-Service Psychology: A German Perspective, Sven Max Litzcke, Helmut Müller-Enbergs Nov 2008

Short Takes: Intelligence-Service Psychology: A German Perspective, Sven Max Litzcke, Helmut Müller-Enbergs

Journal of Strategic Security

To date, four German volumes in the series "Intelligence-Service Psychology" (Nachrichtendienstpsychologie) have been published. These volumes generated interest in both the German and non-German speaking communities. It was therefore decided to translate some of the basic articles of the series into English (Litzcke, Müller-Enbergs & Ungerer, 2008), making them accessible to a wider range of readers. This article contains abbreviated versions of the articles in the book.


Passover And Jonathan Pollard, Kenneth Lasson Apr 2007

Passover And Jonathan Pollard, Kenneth Lasson

All Faculty Scholarship

No abstract provided.


The Unresolved Equation Of Espionage And International Law, A. John Radsan Jan 2007

The Unresolved Equation Of Espionage And International Law, A. John Radsan

Michigan Journal of International Law

This Essay, in order to offer up something to that appetite, is divided into five parts. After this introduction, the author, A. John Radsan, describes a Hegelian impulse, the perpetual drive to find unity in disorder. That impulse, for better or worse, creates the train and the track for many of the academy's journeys. Radsan then defines what is meant by "intelligence activities" for purposes of this Essay, after which Radsan surveys the scholarship that existed before this symposium on the relationship between espionage and international law. As the number of pages written on this topic suggests, scholarship on espionage …


Keynote Address, Jeffrey H. Smith Jan 2007

Keynote Address, Jeffrey H. Smith

Michigan Journal of International Law

This afternoon, I want to touch briefly on a number of issues rather than discuss one or two to death. I chose this approach because it seemed an appropriate way to open a conference. I also chose it because I hope I can convince you that intelligence and international law interact in a way that simultaneously strengthens the law and improves intelligence; that law matters, especially in time of war; and that both good intelligence and good law have one common core value: integrity. So that you will have a sense of the perspective that I bring to this, I …


Secrets And Lies: Intelligence Activities And The Rule Of Law In Times Of Crisis, Simon Chesterman Jan 2007

Secrets And Lies: Intelligence Activities And The Rule Of Law In Times Of Crisis, Simon Chesterman

Michigan Journal of International Law

This Article will consider generally the prospects for an approach to intelligence activities based on the rule of law, focusing on the problem of covertness. In particular, it will examine the debate over how law should deal with crises, epitomized by the "ticking time-bomb" hypothetical. On the one hand, some call for a pragmatic recognition that, in extremis, public officials may be required to act outside the law and should seek after-the-fact ratification of their "extra-legal measures." On the other hand, others argue that the embrace of "extra-legal measures" misconceives the rule of law, underestimates the capacity of a …


State Intelligence Gathering: Conflict Of Laws, Charles H.B. Garraway Jan 2007

State Intelligence Gathering: Conflict Of Laws, Charles H.B. Garraway

Michigan Journal of International Law

This Article begins with an examination of the development of the law of war (Part II) and human rights law (Part III) before looking at the differing legal categories of armed conflict (Part IV). It then examines the applicability of human rights law in situations of armed conflict (Part V) and the increasing complexity of defining violence, whether as armed conflict or otherwise (Part VI). The Article proceeds with an examination of the overlap between the law of war and human rights law (Part VII) and the risk of divergence that this overlap causes (Part VIII). Finally, it seeks to …


Counterintuitive: Intelligence Operations And International Law, Glenn Sulmasy, John Yoo Jan 2007

Counterintuitive: Intelligence Operations And International Law, Glenn Sulmasy, John Yoo

Michigan Journal of International Law

The question before us is whether international law is useful or required to govern the covert intelligence-gathering activities of nation-states during peacetime. The very notion that international law is currently capable of regulating intelligence gathering is dubious. In fact, we suggest that international regulation of intelligence operations could have the perverse effect of making international conflict more, rather than less, likely. Certainly, there is legitimate space for coordination and cooperation between states in sharing intelligence, but such "sharing" does not involve significant needs for universal regulation by international law. Simply stated, it is not in the interests of nation-states or …


Towards A Right To Privacy In Transnational Intelligence Networks, Francesca Bignami Jan 2007

Towards A Right To Privacy In Transnational Intelligence Networks, Francesca Bignami

Michigan Journal of International Law

Privacy is one of the most critical liberal rights to come under pressure from transnational intelligence gathering. This Article explores the many ways in which transnational intelligence networks intrude upon privacy and considers some of the possible forms of legal redress. Part II lays bare the different types of transnational intelligence networks that exist today. Part III begins the analysis of the privacy problem by examining the national level, where, over the past forty years, a legal framework has been developed to promote the right to privacy in domestic intelligence gathering. Part IV turns to the privacy problem transnationally, when …


Individual And State Responsibility For Intelligence Gathering, Dieter Fleck Jan 2007

Individual And State Responsibility For Intelligence Gathering, Dieter Fleck

Michigan Journal of International Law

It is the purpose of this contribution to examine relevant norms and principles for assessing acts of intelligence gathering under international law (Part I), evaluate legal problems of attribution of such acts (Part II), and, where governments commit wrongful acts, look into circumstances precluding their wrongfulness (Part III). Based on these considerations, legal consequences for criminal accountability (Part IV) and reparation (Part V) will be discussed. Finally, some conclusions may be drawn (Part VI).


The Spy Who Came In From The Cold War: Intelligence And International Law, Simon Chesterman Jan 2006

The Spy Who Came In From The Cold War: Intelligence And International Law, Simon Chesterman

Michigan Journal of International Law

This Article will focus on the narrower questions of whether obtaining secret intelligence-that is, without the consent of the state that controls the information-is subject to international legal norms or constraints, and what restrictions, if any, control the use of this information once obtained. Traditional approaches to the question of the legitimacy of spying, when even asked, typically settle on one of two positions: either collecting secret intelligence remains illegal despite consistent practice, or apparent tolerance has led to a "deep but reluctant admission of the lawfulness of such intelligence gathering, when conducted within customary normative limits.” Other writers have …


Sounds Of Silence, Kenneth Lasson Sep 2005

Sounds Of Silence, Kenneth Lasson

All Faculty Scholarship

No abstract provided.


It's Time To Be Fair To Jonathan Pollard, Kenneth Lasson Oct 2003

It's Time To Be Fair To Jonathan Pollard, Kenneth Lasson

All Faculty Scholarship

No abstract provided.


Trends. Psychologies Of Personnel Security And Counterintelligence Failure: Racism, Satisficing, And Wen Ho Lee, Ibpp Editor Oct 2000

Trends. Psychologies Of Personnel Security And Counterintelligence Failure: Racism, Satisficing, And Wen Ho Lee, Ibpp Editor

International Bulletin of Political Psychology

This article discusses issues surrounding the actions of Mr. Wen Ho Lee in the context of espionage, treason, and national security as well as racial profiling and the problems with conducting counterintelligence.


The Pollard Case And The Nature Of Espionage, Ibpp Editor Sep 2000

The Pollard Case And The Nature Of Espionage, Ibpp Editor

International Bulletin of Political Psychology

This article describes some common misconceptions in evaluating the appropriateness of penalties for individuals convicted of espionage.