While an important part of US innovation and culture, bankruptcy proceedings have nonetheless become a unique avenue through which foreign adversaries are able to acquire sensitive US national security technologies and intellectual property. Through a detailed analysis of the current gaps in federal regulations governing foreign investment and bankruptcy proceedings in the US, Camille Stewart provides the reader an in-depth look into exactly how foreign companies have been able to circumvent these US foreign investment regulations.
In raising awareness to an issue that could ultimately leave the United States vulnerable to destructive cyberattacks, Stewart argues that training and equipping bankruptcy judges to identify potential national security concerns in bankruptcy cases will help mitigate the exfiltration of national security-related information and technology.
Joel Brenner presents his critique of Professor Laura Donohue’s The Future of Foreign Intelligence, and its “full-throated denunciation of the entire legal framework regulating the government’s collection of data about American citizens and permanent residents.” He discusses her findings in detail, and in the end, finds that they both agree on a number of specific proposals, and “disagree profoundly on FISA’s rationale and constitutional limitations.”
A Review of “The Future of Foreign Intelligence: Privacy and Surveillance in a Digital Age” by Laura K. Donohue
From the perspective of private industry, Mieke Eoyang examines the interplay between US national security electronic surveillance and the US telecommunications companies that are necessary intermediaries for this surveillance, tracing the history of major surveillance programs and identifying key areas of tension. Eoyang recommends reforms including a court process for government access to overseas data on foreign customers, leaving bulk, unfiltered data in the hands of private industry, and working with close allies to build consensus around electronic surveillance norms.
In “Deterring Financially Motivated Cybercrime,” Zachary K. Goldman and Damon McCoy present three strategies for deterring attacks that use malicious cyber capabilities to generate a profit. Each strategy—the imposition of financial sanctions, public/private partnerships to disrupt tools of cybercrime, and activities to disrupt payment networks run by criminals who sell fraudulent goods over the Internet—is analyzed for strengths and weaknesses. The authors conclude with a discussion of the ways in which regulatory tools to combat cybercrime can overcome problems with formulating a cohesive deterrent strategy such as secrecy and attribution.
David Kris examines recent developments in foreign intelligence surveillance, including the impact of the Snowden leaks and the rise of the Islamic State of Iraq and the Levant on public and political attitudes towards electronic surveillance. In light of these developments, Kris presents several issues that he expects will surface as the 2017 expiration date of the Foreign Intelligence Surveillance Act (FISA) Amendments Act (FAA) draws near. He also addresses the longer-term impacts that other political and technological developments will have on foreign surveillance.