Tag Archives: Counterterrorism Law

Managing Terrorism

Legal analysis of the now much maligned “war on terror” has been a growth industry since the events of September 11, 2001. Despite this, how best to respond to and regulate terrorism remains a contested debate intellectually and practically. This article dives into that empirical gap by providing unique data on the operation of detention, arrest, and trial regimes created to counter and manage terrorism in the United Kingdom.

Managing Terrorism

 

 

A Review of “The Future of Foreign Intelligence: Privacy and Surveillance in a Digital Age” by Laura K. Donohue

Joel Brenner presents his critique of Professor Laura Donohue’s The Future of Foreign Intelligence, and its “full-throated denunciation of the entire legal framework regulating the government’s collection of data about American citizens and permanent residents.” He discusses her findings in detail, and in the end, finds that they both agree on a number of specific proposals, and “disagree profoundly on FISA’s rationale and constitutional limitations.”

A Review of “The Future of Foreign Intelligence: Privacy and Surveillance in a Digital Age” by Laura K. Donohue

Terrorism, the Internet, & Propaganda: A Deadly Combination

Ariel Lieberman outlines the evolution, content, and goals of modern terrorist propaganda on the Internet, and presents a three-pronged approach for challenging such propaganda using a combination of criminal prosecution, removal of terrorist propaganda from social media platforms, and an active counter-propaganda campaign to discredit and undermine terrorist groups.

Rethinking Privacy: Fourth Amendment “Papers” and the Third-Party Doctrine

As the field of privacy and digital surveillance grows increasingly chaotic, Michael Price proposes a compelling supplement to the third-party doctrine. Eschewing the popular position that our privacy clashes are generational, Price instead reviews the history of Fourth Amendment jurisprudence to identify missteps in doctrine that have led us to the current impossible position. Along the way he wrestles with problems such as cloud storage and communications metadata, and he concludes with a framework that strikes a new balance between our storied civil liberties heritage and the “papers” of a big data society.

The Wasp’s Nest: Intelligence Community Whistleblowing & Source Protection

Meyer and Berenbaum analyze the national security policy challenge in balancing protections for Intelligence Community whistleblowers and the government’s legitimate need for secrecy in order to execute the federal intelligence and counterintelligence mission. It is that need for secrecy that creates the intellectual distance between the sovereign’s requirement for information regarding the performance of the federal intelligence and counterintelligence mission and the ability to conduct that mission.