Category Archives: Vol. 7 No. 3

Book Reviews, Intelligence, Vol. 7 No. 3

Setting the Record Straight: An In-Depth Review of “Duty” by Robert Gates

M. E. (Spike) Bowman Leave a comment

Bowman “sets the record straight” with his review of Bob Gates’ new book, Duty. He states that Duty is not a “tell all,” but rather a highly personal and almost daily reflection of what Gates thought and experienced during his time as US Secretary of Defense. Ultimately, Bowman concludes that while the book is very readable, it is primarily a catharsis with little to no commentary on national security or international law.

Attached Files:

  • An In-depth Review of Duty by Robert Gates_2
Al QaedaInterrogationSecrecySurveillanceWar on Terror
Intelligence, Secrecy, Vol. 7 No. 3

A Proposal to Reduce Government Overclassification of Information Related to National Security

Herbert S. Lin Leave a comment

Lin explores the phenomenon of overclassification in American society and proposes a classification cost metric in order to create serious economic incentives to reduce classification. The metric would provide decision makers with a way to judge the relative importance of different classified documents and allow officials to classify documents on a more objective scale. The author relates a number of questions and answers relating to the underlying approach, the mechanics, budget and finance, and law and policy, thereby parsing out the strengths and weaknesses of his proposal.

Attached Files:

  • A Proposal to Reduce Government Overclassification_2
IntelligenceNational SecuritySecrecy
Cybersecurity, Vol. 7 No. 3

Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure

Susan Landau 7 Comments

Landau explains the National Security Agency’s little-known function of providing communications security (COMSEC) to private companies, which has involved an improvement of security and privacy of the domestic communications infrastructure. She examines the history of the program and how the NSA’s behavior towards the private sector has shifted since the 1950’s, as well as the rationale behind these radical changes. Ultimately, Landau argues that providing national security tools to the private sector is outside the mission of the NSA and should be done by an entity more in sync with the private sector and international community.

Attached Files:

  • NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure_2
Big DataCybersecurity
Laws of War, Remote Targeting, Vol. 7 No. 3

“On Target”: Precision & Balance in the Contemporary Law of Targeting

Michael N. Schmitt 1 Comment

Schmitt and Widmar explore the law of targeting within international humanitarian law (IHL) and its application to international and non-international armed conflict. The article examines the “five elements” of a target operation, including the target, the weapon used, the execution of the attack, possible collateral damage and incidental injury, and location of the strike. The authors suggest that a better understanding of these norms can help international lawyers, policymakers, and operators avoid violations of international law by creating appropriate and well-known boundaries for targeting operations.

Attached Files:

  • Precision and Balance in the Contemporary Law of Targeting_2
Counterterrorism LawDronesInternational Humanitarian Law