Cybercrime Logo

 

 

 NYLS Cybercrime.AdvancedStudies.Org

 

UNIT 13:
National Security; Foreign Intelligence

Cybercrime, Cyberterrorism, and Digital Law Enforcement
NYLS CRI150 SPRING 2009
Professor K. A. Taipale (bio) (contact)


Registered Students login to NYLS Portal for updated Course Information and Reading Assignments.



UNIT 13:
National Security; Foreign Intelligence

PONDERABLES:

What is national security in a globalized information environment? How to protect both national security and civil liberties? The intersectiobn of the First Amendment and espionage. When is espionage an act of war? Globalization and the network. The Cloud. "Ring fencing?

 

REQUIRED READING:

CASEBOOK: David J. Loundy, COMPUTER CRIME, INFORMATION WARFARE, AND ECONOMIC ESPIONAGE, Carolina Academic Press (2003) (ISBN:0890891109) read:

Chapter 16, National Security, pp. 591-684 (Snepp v. US, US v. HEINE, PHILLIPPI v. CIA, US v. MEGAHEY, In re All Matters Submitted to the FISC)

In re Sealed Cases, U.S. FISC of Review, 310 F.3d 717 (2002) (reversing In re All Matters Submitted to the FISA Court, 218 F. Supp. 2d 611 (U.S. FISC 2002) in the assigned text).

Foreign Intelligence Surveillance:

K. A. Taipale, Commentary (with James Jay Carafano), "Fixing Foreign Intelligence Surveillance," Wash. Times (Jan. 24, 2006).

K. A. Taipale, Whispering Wires and Warrantless Wiretaps: Data Mining and Foreign Intelligence Surveillance, N.Y.U. Rev. L. & Sec. No. VII, Suppl. Bull. on L. & Sec. (Jun. 2006).

K. A. Taipale, Written Testimony on Foreign Intelligence Surveillance Act Modernization Before the House Permanent Select Committee on Intelligence (HPSCI), U.S. House of Representatives, July 19, 2006.

ACLU v. NSA, (ED-Mich Aug. 17, 2006) (ruling that the NSA Terorist Surveillance Program was unconstitutional and illegal) (District Court ruling PDF) (On October 4, 2006, a unanimous three-judge panel of the Sixth Circuit Court of Appeals stayed the District Court's ruling while the the government's appeal is considered by the Court of Appeals, "Court Allows Warrantless Wiretapping During Appeal," AP (Oct. 5, 2006): "In the three-paragraph ruling, judges said that they balanced the likelihood an appeal would succeed, the potential damage to both sides, and the public interest.").

K. A. Taipale, "The Ear of Dionysus: Rethinking Foreign Intelligence Surveillance," 9 Yale J. L. & Tech. 128 (Spring 2007). 

Testimony of Kim Taipale, executive director of the Center for Advanced Studies, Foreign Intelligence Surveillance Modernization: Reconciling Signals Intelligence Activity with Targeted Wiretapping, before the U.S. Senate Select Committee on Intelligence (SCCI) Hearing on The Foreign Intelligence Modernization Act of 2007 (May 1, 2007).

Commentary (with James Jay Carafano), "Free the Hostages: Continuing FISA Concerns," National Review Online (Oct. 24, 2007).

K. A. Taipale, Commentary, "Security vs. Privacy: Security," The Huffington Post (Nov. 9, 2007).

 

STATUTES:

THE NATIONAL SECURITY ACT OF 1947
50 U.S.C. § 402

Presidential Decision Directive (PDD) 62, Combating Terrorism (22 May 1998)

FOREIGN INTELLIGENCE SURVEILLANCE ACT (FISA),
50 U.S.C. § 1801, et seq.

Protect America Act of 2007, P.L. 110-55 (Aug. 5, 2007) (180 day sunset).

FISA Amendments Act of 2008 (also called the Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008, H.R. 6304, enacted 2008-07-10) Public Law No: 110-261

TITLE 18 > PART I > CHAPTER 37. ESPIONAGE AND CENSORSHIP
18 U.S.C. §§ 792-799.

18 U.S.C. § 798. Disclosure of classified information.

 

FISA Amendments (2008):

FISA Amendments Act of 2008 (also called the Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008, H.R. 6304, enacted 2008-07-10) Public Law No: 110-261

"Amendments to the Foreign Intelligence Surveillance Act Set to Expire in 2009," Congressional Research Service R40138 (Jan. 6, 2009).

"Retroactive Immunity Provided by the FISA Amendments Act of 2008," Congressional Research Service RL34600 (Jul. 25, 2008)

"The Foreign Intelligence Surveillance Act: A Sketch of Selected Issues," Congressional Research Service RL34566 (Jul. 7, 2008).

"The Foreign Intelligence Surveillance Act: An Overview of Selected Issues," Congressional Research Service RL34279 (Jul. 7, 2008).

"The Foreign Intelligence Surveillance Act: Comparison of the Senate Amendment to H.R. 3773 and the House Amendment to the Senate Amendment to H.R. 3773," Congressional Research Service RL34533 (Jun. 12, 2008).

FISA Amendments (2007):

"P.L. 110-55, the Protect America Act of 2007: Modifications to the Foreign Intelligence Surveillance Act," Congressional Research Service RL34143 (updated Feb. 14, 2008)

"On August 5, 2007, the Protect America Act of 2007, P.L. 110-55, was enacted into law with a 180 day sunset provision, providing a temporary solution to concerns raised by the Director of National Intelligence. Both the House and the Senate have considered or are considering possible legislation to provide a longer-term statutory approach to these concerns. On November 15, 2007, the House of Representatives passed H.R. 3773, the Responsible Electronic Surveillance That is Overseen, Reviewed, and Effective Act of 2007 or the RESTORE Act of 2007. On October 26, 2007, Senator Rockefeller reported S. 2248, the Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2007 or the FISA Amendment Act of 2007, an original bill, from the Senate Select Committee on Intelligence. S. 2248 was referred to the Senate Judiciary Committee on November 1, 2007. On November 16, 2007, S. 2248 was reported out of the Senate Judiciary Committee by Senator Leahy with an amendment in the nature of a substitute. Each bill includes amendments to the Foreign Intelligence Surveillance Act." RL34277 p. 1-2.

"The Foreign Intelligence Surveillance Act: A Brief Overview of Selected Issues," Congressional Research Service RL34279 (Dec. 7, 2007).

"The Foreign Intelligence Surveillance Act: Comparison of House-Passed H.R. 3773, S. 2248 as Reported By the Senate Select Committee on Intelligence, and S. 2248 as Reported Out of the Senate Judiciary Committee," Congressional Research Service RL34277 (Dec. 6, 2007).  

"Bush and Congress Set to Fight on FISA," U.S. News & World Report (Jan. 3, 2008) ("President Bush's demand that the Senate swiftly approve an overhaul of the Foreign Intelligence Surveillance Act doesn't seem to be prompting any significant action in the Senate, where Democrats withdrew it from floor action amid opposition from liberal members of the party. The House already approved a version that has provoked a veto threat. The Senate appeared ready to OK one more acceptable to Bush but yanked it instead and voted to grant an extension until February 1. GOP and White House sources said that the battle may become a major topic in Bush's State of the Union address, slated for January 28.") 

 

ADDITIONAL READING:

 

 

SEE ALSO:

Anthony H. Cordesman, CYBER-THREATS, INFORMATION WARFARE, AND CRITICAL INFRASTRUCTURE PROTECTION: DEFENDING THE US HOMELAND (2002) (ISBN:0275974235).

Markle Task Force on National Security in the Information Age, "Mobilizing Information To Prevent Terrorism: Accelerating Development Of A Trusted Information Sharing Environment," THIRD REPORT (2006).

Markle Task Force on National Security in the Information Age, "Creating a Trusted Network for Homeland Security," SECOND REPORT (Dec. 2003).

Markle Task Force on National Security in the Information Age, "Protecting America's Freedom in the Information Age," FIRST REPORT (Oct. 2002).

 

ALSO RELATED:

Kim Taipale and Kate Martin, director of the Center for National Security Studies, debate the NSA surveillance programs on WHHY Radio Times, National Public Radio (NPR) (May 16, 2006). [Listen to the show via RealAudio or Streaming MP3] (1 hr.)

Kim Taipale and Marc Rotenberg, director of the Electronic Privacy Information Center (EPIC), discussed the role of technology in government surveillance efforts in the Wall St. J. Online (May 16, 2006). Their exchange is linked here.

BACKGROUND READING:

Cliff Stoll, THE CUCKOO'S EGG (1989) (ISBN:0743411463).

 

 


Registered Students login to NYLS Portal for updated Reading Assignments.



 

Course Outline/Class Units

Registererd NYLS students login to my.nyls.edu for updated outline and assignments.

  1. Overview, What is Cybercrime?
  2. Computer Intrusions and Attacks (Unauthorized Access)
  3. Computer Viruses, Time Bombs, Trojans, Malicious Code (Malware)
  4. Online Fraud and Identity Theft; Intellectual Property Theft; Virtual Crime
  5. Online Vice: Gambling; Pornography; Child Exploitation
  6. International Aspects and Jurisdiction
  7. Infrastructure and Information Security; Risk Management
  8. Investigating Cybercrime: Digital Evidence and Computer Forensics
  9. Interception, Search and Seizure, and Surveillance
  10. Information Warfare, Cyberterrorism, and Hacktivism
  11. Terrorism, Radicalization, and The War of Ideas
  12. Trade Secret Theft and Economic Espionage
  13. National Security
  14. Case Study: CALEA, VoIP

Course Information

  1. PAPER RESEARCH
  2. USEFUL LINKS FOR DEFINING TECHNICAL TERMS
  3. COURSE SUBTEXT AND OPTIONAL BACKGROUND MATERIAL

 


Registered Students login to NYLS Portal for updated Reading Assignments.


All original material on this or any linked page is copyright the Center for Advanced Studies in Science and Technology Policy © 2003-2009. Permission is granted to reproduce this material in whole or in part for non-commercial purposes, provided it is with proper citation and attribution.

 

 NYLS Logo