Regulating Covert Action


Book Description

Covert activity has always been a significant element of international politics. This book attempts to assess the lawfulness of covert action under US and international law and faces the implications for democratic states that covert operations pose.




Regulating Covert Action


Book Description

Covert activity has always been a significant element of international politics. This book attempts to assess the lawfulness of covert action under US and international law and faces the implications for democratic states that covert operations pose.




The Oxford Handbook of National Security Intelligence


Book Description

The Oxford Handbook of National Security Intelligence is a state-of-the-art work on intelligence and national security. Edited by Loch Johnson, one of the world's leading authorities on the subject, the handbook examines the topic in full, beginning with an examination of the major theories of intelligence. It then shifts its focus to how intelligence agencies operate, how they collect information from around the world, the problems that come with transforming "raw" information into credible analysis, and the difficulties in disseminating intelligence to policymakers. It also considers the balance between secrecy and public accountability, and the ethical dilemmas that covert and counterintelligence operations routinely present to intelligence agencies. Throughout, contributors factor in broader historical and political contexts that are integral to understanding how intelligence agencies function in our information-dominated age.




The Centaur's Dilemma


Book Description

Assessing the legal and practical questions posed by the use of artificial intelligence in national security matters The increasing use of artificial intelligence poses challenges and opportunities for nearly all aspects of society, including the military and other elements of the national security establishment. This book addresses how national security law can and should be applied to artificial intelligence, which enables a wide range of decisions and actions not contemplated by current law. James Baker, an expert in national security law and process, adopts a realistic approach in assessing how the law—even when not directly addressing artificial intelligence—can be used, or even misused, to regulate this new technology. His new book covers, among other topics, national security process, constitutional law, the law of armed conflict, arms control, and academic and corporate ethics. With his own background as a judge, he examines potential points of contention and litigation in an area where the law is still evolving and might not yet provide clear and certain answers. The Centaur's Dilemma also analyzes potential risks associated with the use of artificial intelligence in the realm of national security—including the challenges of machine-human interface, operating (or not operating) the national-security decision-making process at machine speed, and the perils of a technology arms race. Written in plain English, The Centaur's Dilemma will help guide policymakers, lawyers, and technology experts as they deal with the many legal questions that will arise when using artificial intelligence to plan and carry out the actions required for the nation's defense.







The CIA's Black Ops


Book Description

The vast array of CIA black "ops" (operations) has turned the agency into a policy maker dangerously independent of the government that created it. This is an unprecedented declassification of foreign exploits and domestic secrets.




Emergence of the Intelligence Establishment


Book Description

State Department Publication 10316. Edited by C. Thomas Thorne, et al. General Editor: Glenn W. LaFantasie. One of a series of volumes on the foreign policy of the Truman administration. Also advertised with the subtitle: Intelligence and Foreign Policy. Includes high-level governmental plans, discussions, administrative decisions, and managerial actions that established institutions and procedures for the central coordination of intelligence collection and analysis and covert action. Documentsthe advice, actions, and initiatives of principals and groups in other departments and agencies, who helped to lay the foundations for the centralized intelligence bureaucracy.




Global Business Regulation


Book Description

How has the regulation of business shifted from national to global institutions? What are the mechanisms of globalization? Who are the key actors? What of democratic sovereignty? In which cases has globalization been successfully resisted? These questions are confronted across an amazing sweep of the critical areas of business regulation--from contract, intellectual property and corporations law, to trade, telecommunications, labor standards, drugs, food, transport and environment. This book examines the role played by global institutions such as the World Trade Organization, World Health Organization, the OECD, IMF, Moodys and the World Bank, as well as various NGOs and significant individuals. Incorporating both history and analysis, Global Business Regulation will become the standard reference for readers in business, law, politics, and international relations.




Spec Ops


Book Description

Vice Adm. William H. McRaven helped to devise the strategy for how to bring down Osama bin Laden, and commanded the courageous U.S. military unit that carried it out on May 1, 2011, ending one of the greatest manhunts in history. In Spec Ops, a well-organized and deeply researched study, McRaven analyzes eight classic special operations. Six are from WWII: the German commando raid on the Belgian fort Eben Emael (1940); the Italian torpedo attack on the Alexandria harbor (1941); the British commando raid on Nazaire, France (1942); the German glider rescue of Benito Mussolini (1943); the British midget-submarine attack on the Tirpitz (1943); and the U.S. Ranger rescue mission at the Cabanatuan POW camp in the Philippines (1945). The two post-WWII examples are the U.S. Army raid on the Son Tay POW camp in North Vietnam (1970) and the Israeli rescue of the skyjacked hostages in Entebbe, Uganda (1976). McRaven—who commands a U.S. Navy SEAL team—pinpoints six essential principles of “spec ops” success: simplicity, security, repetition, surprise, speed and purpose. For each of the case studies, he provides political and military context, a meticulous reconstruction of the mission itself and an analysis of the operation in relation to his six principles. McRaven deems the Son Tay raid “the best modern example of a successful spec op [which] should be considered textbook material for future missions.” His own book is an instructive textbook that will be closely studied by students of the military arts. Maps, photos.




Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations


Book Description

Tallinn Manual 2.0 expands on the highly influential first edition by extending its coverage of the international law governing cyber operations to peacetime legal regimes. The product of a three-year follow-on project by a new group of twenty renowned international law experts, it addresses such topics as sovereignty, state responsibility, human rights, and the law of air, space, and the sea. Tallinn Manual 2.0 identifies 154 'black letter' rules governing cyber operations and provides extensive commentary on each rule. Although Tallinn Manual 2.0 represents the views of the experts in their personal capacity, the project benefitted from the unofficial input of many states and over fifty peer reviewers.