This title was first published in 2001. The D-Notice system is a voluntary arrangement between the government and the media whereby the media agree not to publish certain information in the interests of national security. This original and thought-provoking book identifies a major deficiency in both the D-Notice system and the legal alternatives to the system.
On August 24-25, 2010, the National Defense University held a conference titled “Economic Security: Neglected Dimension of National Security?” to explore the economic element of national power. This special collection of selected papers from the conference represents the view of several keynote speakers and participants in six panel discussions. It explores the complexity surrounding this subject and examines the major elements that, interacting as a system, define the economic component of national security.
This book creates a framework for understanding and using cyberpower in support of national security. Cyberspace and cyberpower are now critical elements of international security. United States needs a national policy which employs cyberpower to support its national security interests.
Fighting for balance / Avril Haines -- Crafting a new compact in the public interest : protecting the national security in an era of leaks / Keith B. Alexander and Jamil N. Jaffer -- Leaks of classified information : lessons learned from a lifetime on the inside/ Michael Morell -- Reform and renewal : lessons from Snowden and the 215 program / Lisa O. Monaco -- Government needs to get its own house in order / Richard A. Clarke -- Behind the scenes with the Snowden files : "how the Washington Post and national security officials dealt with conflicts over government secrecy" / Ellen Nakashima -- Let's be practical : a narrow post-publication leak law would better protect the press / Stephen J. Adler and Bruce D. Brown -- What we owe whistleblowers / Jameel Jaffer -- The long, (futile?) Fight for a federal shield law / Judith Miller -- Covering the cyberwars : the press vs the government in a new age of global conflict / David Sanger -- Outlawing leaks / David A. Strauss -- The growth of press freedoms in the United States since 9/11 / Jack Goldsmith -- Edward Snowden, Donald Trump, and the paradox of national security whistleblowing / Allison Stanger -- Information is power : exploring a constitutional right of access / Mary-Rose Papandrea -- Who said what to whom / Cass R. Sunstein -- Leaks in the age of Trump / Louis Michael Seidman the report of the commission, Lee C. Bollinger, Eric Holder, John O. Brennan, Ann Marie Lipinski, Kathleen Carroll, Geoffrey R. Stone, Stephen W. Coll -- Closing statement / Lee C. Bollinger and Geoffrey R. Stone.
Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable.
Why has U.S. security policy scarcely changed from the Bush to the Obama administration? National Security and Double Government offers a disquieting answer. Michael J. Glennon challenges the myth that U.S. security policy is still forged by America's visible, "Madisonian institutions" - the President, Congress, and the courts. Their roles, he argues, have become largely illusory. Presidential control is now nominal, congressional oversight is dysfunctional, and judicial review is negligible. The book details the dramatic shift in power that has occurred from the Madisonian institutions to a concealed "Trumanite network" - the several hundred managers of the military, intelligence, diplomatic, and law enforcement agencies who are responsible for protecting the nation and who have come to operate largely immune from constitutional and electoral restraints. Reform efforts face daunting obstacles. Remedies within this new system of "double government" require the hollowed-out Madisonian institutions to exercise the very power that they lack. Meanwhile, reform initiatives from without confront the same pervasive political ignorance within the polity that has given rise to this duality. The book sounds a powerful warning about the need to resolve this dilemma-and the mortal threat posed to accountability, democracy, and personal freedom if double government persists. This paperback version features an Afterword that addresses the emerging danger posed by populist authoritarianism rejecting the notion that the security bureaucracy can or should be relied upon to block it.