Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
0Activity

Table Of Contents

INTRODUCTION
I. BACKGROUND TO THE IIPA
A. Historical Context
B. The Legislative Response
II. THE IIPA’S LIMITED APPLICATION
A. Availability of the Espionage Act
B. Inherent Limitations
C. Lack of Political Initiative
III. THE CRITICAL NEED FOR AN AMENDMENT
A. Policy Justifications
B. Constructing an Amendment
1. Expanding the Class of Protected Persons
2. Easing the Narrowness of Its Offenses
a. Replacing the “Knowledge” Element
C. Addressing the Other Factors
CONCLUSION
0 of .
Results for:
No results containing your search query
P. 1
Blowing Its Cover_ How the Intelligence Identities Protection Act

Blowing Its Cover_ How the Intelligence Identities Protection Act

Ratings: (0)|Views: 4|Likes:
Published by sanjuan_97

More info:

Published by: sanjuan_97 on Mar 29, 2014
Copyright:Traditional Copyright: All rights reserved

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

03/29/2014

pdf

text

original

You're Reading a Free Preview
Pages 5 to 44 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->