Meyer and Berenbaum analyze the national security policy challenge in balancing protections for Intelligence Community whistleblowers and the government’s legitimate need for secrecy in order to execute the federal intelligence and counterintelligence mission. It is that need for secrecy that creates the intellectual distance between the sovereign’s requirement for information regarding the performance of the federal intelligence and counterintelligence mission and the ability to conduct that mission.
Schmitt and Widmar explore the law of targeting within international humanitarian law (IHL) and its application to international and non-international armed conflict. The article examines the “five elements” of a target operation, including the target, the weapon used, the execution of the attack, possible collateral damage and incidental injury, and location of the strike. The authors suggest that a better understanding of these norms can help international lawyers, policymakers, and operators avoid violations of international law by creating appropriate and well-known boundaries for targeting operations.
This article introduces the topics to be discussed in the latest issue of JNSLP. The author argues that although readers will walk away with a greater understanding of “Big Data” generally, there still remains a need for a greater structural understanding of the subject in order to harness its power and direct its applications for the benefit of national security and the protection of civil liberties.
This article is modeled on a panel discussion at the symposium regarding two hypothetical case studies: the first about detection technologies related to facial recognition and Terahertz detection and the second about passenger name recognition information created by airlines to manage travel reservations. Through this conversation, the panelists discuss the relationship of big data collection to Fourth Amendment jurisprudence, the implications of changing technology on the future of big data collections, and the privacy concerns associated with the increased use of these types of surveillance methods as related to law enforcement.
The author reflects on a symposium panel discussion on “Swimming in the Ocean of Big Data: National Security in the Age of Unlimited Information” that occurred before the Snowden disclosures. He analyzes the panel discussion in context of the time at which it occurred and compares it to what has become known since June 2013. The article then focuses on the path to reform, specifically by focusing attention on the strengths and weaknesses of data collection by both the public and private sectors.