Category Archives: Big Data

Personal Information as an Attack Vector: Why Privacy Should Be an Operational Dimension of US National Security

The US government has always been keen on its ability to protect sensitive and classified information from its enemies, yet the majority of resources have focused on military and national security information, which has left other categories of information exposed.

Capt. Christopher Dearing focuses the reader on the national security implications of personal information and the detrimental impact it possesses. This article provides an analysis of current privacy law and the information landscape, while highlighting areas where the US government has failed to keep pace to protect personal information, providing a valuable target for adversaries.

In an expansive call for action, Capt. Dearing recommends eight concrete steps that the government can take to better protect and manage personal information while developing stronger procedures to identify threats and respond to them.

Gathering Intelligence: Drifting Meaning and the Modern Surveillance Apparatus

Since its implementation in 1981, Executive Order 12,333 has served as a general charter governing the structure and operations of the Intelligence Community. While legislation has imposed a degree of added judicial and congressional oversight, the executive branch continues to retain sole discretion over large swathes of foreign intelligence activity today.

Over the past several decades, and in accordance with E.O. 12,333’s mandate, members of the Intelligence Community have each created internal agency manuals to guide their foreign intelligence operations. These manuals identify and define a range of technical terms critical to determining the scope of agencies’ intelligence-gathering authority, including what information is gathered, how long that information is retained, and the uses to which it may be put. But over time, the dispersion of authority to make decisions within and across intelligence agencies has enabled drift in the meaning of these terms. Together, the manuals have created a thicket of often conflicting and unclear definitions that are difficult for Congress, the courts, and even committees within the executive branch to understand.

In this article, Diana Lee, Paulina Perlin, and Joe Schottenfeld provide the first sustained analysis of these definitional inconsistencies, their consequences, and efforts to address the problem from within and outside the executive branch. In particular, it focuses on three terms that determine when the intelligence cycle “officially” begins: “collection,” “acquisition,” and “targeting.” By analyzing these three terms, this Article demonstrates the lack of clarity that executive discretion and dispersal create. This lack of clarity, in turn, makes it difficult for meaningful oversight, such as congressional hearings, to occur. The Article concludes by offering recommendations to clarify the parameters of the government’s intelligence-gathering authority. As technological advancements continue to expand the Intelligence Community’s capacity to gather information, it is imperative that the government adopt measures to facilitate effective oversight over the executive’s foreign intelligence operations.

Sovereign Immunity in Cyber Space: Towards Defining a Cyber-Intrusion Exception to the Foreign Sovereign Immunities Act

In light of recent foreign cyber-assaults that have jeopardized personal privacy in the United States, it is time for individuals to explore opportunities for private suits against foreign governments. In the first attempt to do this, Doe v. Federal Democratic Republic of Ethiopia, the courts found that the Foreign Sovereign Immunities Act barred suit under the Wiretap Act’s private cause of action and the common law tort of intrusion upon seclusion. Kurland posits that either a new exception should be added to the FSIA to ameliorate this legal lacuna.