blank
Skip navigation links
Home
About Us
Current Articles
Archived Articles
Symposia
Alumni
Submissions
Article Download PDF Print Version
(Spy) Game Change: Cyber Networks, Intelligence Collection, and Covert Action
By Robert D. Williams
This Article makes two related arguments: one descriptive and one normative.  Descriptively, it contends that the use of computer networks in carrying out intelligence operations entails a blurring of the conceptual and legal distinction between intelligence collection and covert action.  In light of this emerging reality, executive branch officials face an increasingly difficult choice of legal paradigms in conducting oversight of offensive intelligence operations, as well as in seeking to characterize and respond to cyber intrusions from a defensive standpoint.  Normatively, the Article argues that, absent a legislative solution, the U.S. Government should adapt to this blurring of the legal lines by increasingly treating cyber intrusions as covert actions—even, in some cases, where the primary purpose of the operation is intelligence collection.  This evolution in the practice and oversight of intelligence would serve as a check against the inherent uncertainty of consequences attendant to the use of cyberspace as a medium for clandestine intelligence operations.  It would also account for the need to establish flexible and proactive deterrent options in a domain where traditional legal remedies are largely inadequate to manage the threats—and assets—of cyber exploitation and cyber attack.
About This Content
 
Keywords: Williams, Computer Law, Cybersecurity, Cyber Intrusions, Intelligence
Content Type: Article
Media Type: Print
Author: Robert D. Williams
Publish Date: June 2011
| | 1919 Pennsylvania Ave., NW, Suite M250, Washington, DC 20006 Phone: 202.994.4610 Fax: 202.994.4609