Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Public Affairs, Public Policy and Public Administration

Selected Works

Intelligence

Articles 1 - 4 of 4

Full-Text Articles in Law

Kill-Lists And Accountability, Greg Mcneal Dec 2012

Kill-Lists And Accountability, Greg Mcneal

Greg McNeal

This article is a comprehensive examination of the U.S. practice of targeted killings. It is based in part on field research, interviews, and previously unexamined government documents. The article fills a gap in the literature, which to date lacks sustained scholarly analysis of the accountability mechanisms associated with the targeted killing process. The article makes two major contributions: 1) it provides the first qualitative empirical accounting of the targeted killing process, beginning with the creation of kill-lists extending through the execution of targeted strikes; 2) it provides a robust analytical framework for assessing the accountability mechanisms associated with those processes. …


Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke Dec 2012

Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke

Professor Katina Michael

During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …


Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski Nov 2008

Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski

David A. Bray

We review three different theories that can inform how researchers can determine the performance of smart business networks, to include: (1) the Theory of Evolution, (2) the Knowledge-Based Theory of the Firm, and (3) research insights into computers and cognition. We suggest that each of these theories demonstrate that to be generally perceived as smart, an organism needs to be self-organizing, communicative, and tool-making. Consequentially, to determine the performance of a smart business network, we suggest that researchers need to determine the degree to which it is self-organizing, communicative, and tool-making. We then relate these findings to the Internet and …


Secrecy And Democratic Decisions, Mark A. Chinen Dec 2007

Secrecy And Democratic Decisions, Mark A. Chinen

Mark A. Chinen

Secrecy to protect intelligence sources and methods appears often in the nation’s discourse about controversial national security matters. Often it is asked whether such secrecy is consistent with the nation’s democratic principles and processes. I argue such principles and processes provide a framework through which we try to answer questions about secrecy and indeed legitimate them, but are often too broad to provide definitive guidance in specific cases. At the same time, the sources and methods argument itself is overbroad because of the nature of the sources and methods themselves; the tentative nature of intelligence assessments derived from those sources …