Formation and Interpretation of Dilatant Echelon Cracks

Total Page:16

File Type:pdf, Size:1020Kb

Formation and Interpretation of Dilatant Echelon Cracks Formation and interpretation of dilatant echelon cracks DAVID D. POLLARD | U.S. Geological Survey, Metilo Park, California 94025 PAUL SEGALL PAUL T. DELANEY U.S. Geological Survey, Flagstaff, Arizona 86001 ABSTRACT 1974, p. 82; Broek, 1974, p. 31-38), and echelon cracks in glass have been produced in laboratory experiments (Sommer, 1969). The The relative displacements of the walls of many veins, joints, ubiquity of echelon cracks attests to their importance in the fracture and dikes demonstrate that these structures are dilatant cracks. We process, but it suggests the possibility of several mechanisms of infer that dilatant cracks propagate in a principal stress plane, nor- origin. We focus on a particular mechanism that applies to some, mal to the maximum tensile or least compressive stress. Arrays of but not to all of the crack arrays mentioned above. echelon crack segments appear to emerge from the peripheries of The two principal views of fractures, in-plane and cross- some dilatant cracks. Breakdown of a parent crack into an echelon sectional, reveal different features of the echelon geometry. In the array may be initiated by a spatial or temporal rotation of the fracture plane (Fig. 1), we see smooth echelon-crack surfaces that remote principal stresses about an axis parallel to the crack propa- are bounded by rough steps and emerge from a single parent crack. gation direction. Near the parent-crack tip, a rotation of the local principal stresses is induced in the same sense, but not necessarily through the same angle. Incipient echelon cracks form at the parent-crack tip normal to the local maximum tensile stress. Further longitudinal growth along surfaces that twist about axes parallel to the propagation direction realigns each echelon crack into a remote principal stress plane. The walls of these twisted cracks may be idealized as helicoidal surfaces. An array of helicoi- dal cracks sweeps out less surface area than one parent crack twist- ing through the same angle. Thus, many echelon cracks grow from a single parent because the work done in creating the array, as measured by its surface area, decreases as the number of cracks increases. In cross sections perpendicular to the propagation direc- tion, echelon cracks grow laterally, each crack overlapping its neighbors, until the mechanical interaction of adjacent cracks limits this growth. Dilation of each crack pinches the tips of adjacent cracks into an asymmetrical form and introduces local stresses that can cause lateral growth along a curving, sigmoidal path. Sigmoidal echelon cracks may link at tip-to-plane intersections, leaving a step in the through-going crack wall. The geometry of dilatant echelon cracks may be used to infer spatial or temporal changes in the orientation of principal stresses in the Earth. INTRODUCTION Dilatant echelon cracks are associated with fractures in a vari- ety of materials and at scales ranging from microns to kilometres. Examples include cracks in test specimens of granite (Kranz, 1979), fringe cracks on joints (Hodgson, 1961), quartz-filled veins (Beach, 1975), segments of igneous dikes (Anderson, 1951, p. 56), and ground cracks in volcanic regions (Nakamura, 1970; Duffield, 1975). Other natural echelon cracks occur as crevasses in glacial ice (Meier, 1960), as tension gashes in shear zones (Ramsay, 1967, p. 88-91), as cracks in soil within active fault zones (Brown and oth- Figure 1. Surfaces of dilatant echelon cracks and the parent ers, 1967), and as traces of fault segments (Wallace, 1973). Cleavage crack. A: Photograph normal to joint in hand specimen of shale. B: fractures in metal crystals display an echelon geometry (Fellows, Photograph oblique to the joint. Geological Society of America Bulletin, v. 93, p. 1291-1303, 16 figs., December 1982. 1291 Downloaded from http://pubs.geoscienceworld.org/gsa/gsabulletin/article-pdf/93/12/1291/3444723/i0016-7606-93-12-1291.pdf by guest on 01 October 2021 1292 POLLARD AND OTHERS The association of echelon cracks with a single parent crack is well segments of a quartz vein (Fig. 3A) about 10 cm wide and 1 cm documented for both joints (Kulander and others, 1979) and sheet thick strike about 5° from the strike of the vein. Segments of a intrusions (Pollard and others, 1975). We emphasize the following minette dike (Fig. 3B) about 200 m wide and 2 m thick strike about geometric features observed in these examples and idealized in Fig- 6° from the strike of the dike. Noteworthy similarities between ure 2. (1) Cracks of similar width form along a narrow breakdown these two examples include the following. (1) Crack segments zone marking the periphery of the parent crack, (2) each crack is a within a particular array have comparable widths and thicknesses; twisted surface that systematically diverges from the orientation of (2) strikes of cracks systematically diverge from the strike of the the parent, and (3) echelon-crack length may be several times array; (3) cracks display a pronounced asymmetry in cross-sectional greater than width. One purpose of this paper is to analyze a break- form near their tips; and (4) the overlap of crack tips approximately down mechanism that produces echelon cracks with these geomet- equals the step between cracks. A second purpose of this paper is to ric characteristics from a parent crack. rationalize these common geometric features of echelon cracks in In cross section, the width, thickness, and relative orientation cross section. of discrete echelon segments are readily observed. We limit atten- tion to echelon cracks oriented at small angles to the trend of their INITIATION OF ECHELON-CRACK ARRAYS array and having a small ratio of thickness to width. For example, Laboratory experiments have demonstrated that breakdown into many echelon-crack segments occurs when a parent crack, propagating in a principal stress plane, encounters a region in which the remote principal stresses have rotated about an axis parallel to the propagation direction (Sommer, 1969). The echelon cracks grow along twisting surfaces into the new principal stress plane. This concept has been applied by Pollard and others (1975) to interpret echelon igneous dike segments; by Ryan and Sammis (1978) to interpret cooling cracks in a basalt flow; and by Kulander and others (1979) to interpret joints. To study this process in more detail, we follow Gell and Smith (1967) and examine the stress field near a parent-crack tip where echelon cracks nucleate. The analysis applies to cracks in a brittle, elastic material propagating at low speeds where inertial forces are negligible. Stress State Required for Breakdown Consider an elastic body subject to remote principal stresses aj" and 02, (tensile stress is positive) acting in the yz plane, and a crack of length 2a subject to pressure p lying in the xz plane with straight tips parallel to z (Fig. 4A). Breakdown into echelon segments is Figure 2. Idealized block diagram illustrating geometry of par- independent of the third remote principal stress, which acts in the ent and echelon cracks (Lutton, 1971). propagation direction, x. The parent crack initially grows and ® — quartz vein segment ——, 0 10 Figure 3. Cross sections of dila- CENTIMETERS tant echelon cracks. A: Map of part of a quartz-filled vein array from Carboniferous rocks near Black Pool, North Devon, England (Beach, 197S). B: Map of part of a minette dike near ® Ship Rock, New Mexico (Delaney minette dike segment and Pollard, 1981). The small en- closed areas along the contact contain breccia. 0 100 1 i _-•_ .... I METERS Downloaded from http://pubs.geoscienceworld.org/gsa/gsabulletin/article-pdf/93/12/1291/3444723/i0016-7606-93-12-1291.pdf by guest on 01 October 2021 DILITANT ECHELON CRACKS 1293 dilates in a plane perpendicular to the maximum tension or least quate because the stress distribution near the crack tip is dominated compression. In nature, aj^may change orientation spatially along by the geometric effect of the sharp tip and is not strongly depen- the propagation direction, or temporally as the parent crack inter- dent on where the shear is applied (Lawn and Wilshaw, 1975, p. 55). acts with adjacent structures.. This subjects the parent crack to shear A uniform rotation a of the remote stresses about the x axis stresses. In our analysis, the effects of varying remote stresses on the introduces a normal stress and a shear stress of2 acting in the near-tip stress field are approximated by changing the orientation crack plane (Fig. 4A). Breakdown of the parent crack depends upon of afuniformly over the entire region. This approximation is ade- a and the applied stress ratio R-(2p + a2°°)/(ar- erf), . OO p>-o i. (1) The inequality relating p and afis required for the parent crack to be open. The numerator in equation 1 is the difference between the internal pressure and the remote mean stress or pressure, -(aj'c+ 2. The denominator in equation 1 is the remote maximum shear, (aj"- af)/2. Near the crack tip (Fig. 4B), the stress field is proportional to the stress-intensity factors (Lawn and Wilshaw, 1975, p. 51-56). The remote normal stress and internal pressure contribute to a . mode / stress intensity, K[ - (ovy + p) V an, and the remote shear stress introduces a mode ///stress intensity, Km = o°?z\[an. A crack subject only to mode / deformation will dilate and propagate in its own plane. Breakdown into echelon cracks is initiated by shear parallel to the crack tip, that is, the mode III deformation. The tendency for breakdown increases as the ratio of stress intensities Km IK/ differs from zero. Writing a"y and a" in terms of a and the remote principal stresses by resolving stress in the xz plane, we have Kin I Ki = (sin2 a)l(R + cos2a), R + cos2<* >0.
Recommended publications
  • Case Study of NETRA
    Network Protocols and Algorithms ISSN 1943-3581 2016, Vo l . 8, No. 4 Internet Traffic Surveillance & Network Monitoring in India: Case Study of NETRA Rajan Gupta Dept. of Computer Science, Faculty of Mathematical Sciences, University of Delhi 1st Floor, North Campus, Delhi – 110007, India E-mail: [email protected], [email protected] Sunil Kumar Muttoo Dept. of Computer Science, Faculty of Mathematical Sciences, University of Delhi 1st Floor, North Campus, Delhi – 110007, India Received: October 20, 2016 Accepted: December 30, 2016 Published: December 31, 2016 DOI: 10.5296/npa.v8i4.10179 URL: http://dx.doi.org/10.5296/npa.v8i4.10179 Abstract Internet traffic surveillance is gaining importance in today’s digital world. Lots of international agencies are putting in efforts to monitor the network around their countries to see suspicious activities and illegal or illegitimate transmission of messages. India, being a center of attraction for terrorist activities, is also working towards development of such surveillance systems. NETRA or Network Traffic Analysis is one such effort being taken by the Indian Government to filter suspicious keywords from messages in the network. But is it good enough to be used at highest level for security analysis or does the system design needs to be improved as compared to other similar systems around the world; this question is answered through this study. The comparison of NETRA is done against Dish Fire, Prism and Echelon. The design of the NETRA scheme and implementation level analysis of the system shows few weaknesses like limited memory options, limited channels for monitoring, pre-set filters, ignoring big data demands, security concerns, social values breach and ignoring ethical issues.
    [Show full text]
  • Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities
    University of Central Florida STARS HIM 1990-2015 2013 Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities Mark Berrios-Ayala University of Central Florida Part of the Legal Studies Commons Find similar works at: https://stars.library.ucf.edu/honorstheses1990-2015 University of Central Florida Libraries http://library.ucf.edu This Open Access is brought to you for free and open access by STARS. It has been accepted for inclusion in HIM 1990-2015 by an authorized administrator of STARS. For more information, please contact [email protected]. Recommended Citation Berrios-Ayala, Mark, "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities" (2013). HIM 1990-2015. 1519. https://stars.library.ucf.edu/honorstheses1990-2015/1519 BRAVE NEW WORLD RELOADED: ADVOCATING FOR BASIC CONSTITUTIONAL SEARCH PROTECTIONS TO APPLY TO CELL PHONES FROM EAVESDROPPING AND TRACKING BY THE GOVERNMENT AND CORPORATE ENTITIES by MARK KENNETH BERRIOS-AYALA A thesis submitted in partial fulfillment of the requirements for the Honors in the Major Program in Legal Studies in the College of Health and Public Affairs and in The Burnett Honors College at the University of Central Florida Orlando, Florida Fall Term 2013 Thesis Chair: Dr. Abby Milon ABSTRACT Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter.
    [Show full text]
  • Lonworks® Platform Revision 2
    Introduction to the LonWorks® Platform revision 2 ® 078-0183-01B Echelon, LON, LonWorks, LonMark, NodeBuilder, , LonTalk, Neuron, 3120, 3150, LNS, i.LON, , ShortStack, LonMaker, the Echelon logo, and are trademarks of Echelon Corporation registered in the United States and other countries. LonSupport, , , OpenLDV, Pyxos, LonScanner, LonBridge, and Thinking Inside the Box are trademarks of Echelon Corporation. Other trademarks belong to their respective holders. Neuron Chips, Smart Transceivers, and other OEM Products were not designed for use in equipment or systems which involve danger to human health or safety or a risk of property damage and Echelon assumes no responsibility or liability for use of the Neuron Chips in such applications. Parts manufactured by vendors other than Echelon and referenced in this document have been described for illustrative purposes only, and may not have been tested by Echelon. It is the responsibility of the customer to determine the suitability of these parts for each application. ECHELON MAKES AND YOU RECEIVE NO WARRANTIES OR CONDITIONS, EXPRESS, IMPLIED, STATUTORY OR IN ANY COMMUNICATION WITH YOU, AND ECHELON SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of Echelon Corporation. Printed in the United States of America. Copyright
    [Show full text]
  • A Failure of Intelligence: the Echelon Interception System & the Fundamental Right to Privacy in Europe
    Pace International Law Review Volume 14 Issue 2 Fall 2002 Article 7 September 2002 Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe Kevin J. Lawner Follow this and additional works at: https://digitalcommons.pace.edu/pilr Recommended Citation Kevin J. Lawner, Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe, 14 Pace Int'l L. Rev. 435 (2002) Available at: https://digitalcommons.pace.edu/pilr/vol14/iss2/7 This Article is brought to you for free and open access by the School of Law at DigitalCommons@Pace. It has been accepted for inclusion in Pace International Law Review by an authorized administrator of DigitalCommons@Pace. For more information, please contact [email protected]. POST-SEPT. 11TH INTERNATIONAL SURVEILLANCE ACTIVITY - A FAILURE OF INTELLIGENCE: THE ECHELON INTERCEPTION SYSTEM & THE FUNDAMENTAL RIGHT TO PRIVACY IN EUROPE Kevin J. Lawner* I. Introduction ....................................... 436 II. Communications Intelligence & the United Kingdom - United States Security Agreement ..... 443 A. September 11th - A Failure of Intelligence .... 446 B. The Three Warning Flags ..................... 449 III. The Echelon Interception System .................. 452 A. The Menwith Hill and Bad Aibling Interception Stations .......................... 452 B. Echelon: The Abuse of Power .................. 454 IV. Anti-Terror Measures in the Wake of September 11th ............................................... 456 V. Surveillance Activity and the Fundamental Right to Privacy in Europe .............................. 460 A. The United Nations International Covenant on Civil and Political Rights and the Charter of Fundamental Rights of the European Union... 464 B.
    [Show full text]
  • Lunar Crater Volcanic Field (Reveille and Pancake Ranges, Basin and Range Province, Nevada, USA)
    Research Paper GEOSPHERE Lunar Crater volcanic field (Reveille and Pancake Ranges, Basin and Range Province, Nevada, USA) 1 2,3 4 5 4 5 1 GEOSPHERE; v. 13, no. 2 Greg A. Valentine , Joaquín A. Cortés , Elisabeth Widom , Eugene I. Smith , Christine Rasoazanamparany , Racheal Johnsen , Jason P. Briner , Andrew G. Harp1, and Brent Turrin6 doi:10.1130/GES01428.1 1Department of Geology, 126 Cooke Hall, University at Buffalo, Buffalo, New York 14260, USA 2School of Geosciences, The Grant Institute, The Kings Buildings, James Hutton Road, University of Edinburgh, Edinburgh, EH 3FE, UK 3School of Civil Engineering and Geosciences, Newcastle University, Newcastle, NE1 7RU, UK 31 figures; 3 tables; 3 supplemental files 4Department of Geology and Environmental Earth Science, Shideler Hall, Miami University, Oxford, Ohio 45056, USA 5Department of Geoscience, 4505 S. Maryland Parkway, University of Nevada Las Vegas, Las Vegas, Nevada 89154, USA CORRESPONDENCE: gav4@ buffalo .edu 6Department of Earth and Planetary Sciences, 610 Taylor Road, Rutgers University, Piscataway, New Jersey 08854-8066, USA CITATION: Valentine, G.A., Cortés, J.A., Widom, ABSTRACT some of the erupted magmas. The LCVF exhibits clustering in the form of E., Smith, E.I., Rasoazanamparany, C., Johnsen, R., Briner, J.P., Harp, A.G., and Turrin, B., 2017, overlapping and colocated monogenetic volcanoes that were separated by Lunar Crater volcanic field (Reveille and Pancake The Lunar Crater volcanic field (LCVF) in central Nevada (USA) is domi­ variable amounts of time to as much as several hundred thousand years, but Ranges, Basin and Range Province, Nevada, USA): nated by monogenetic mafic volcanoes spanning the late Miocene to Pleisto­ without sustained crustal reservoirs between the episodes.
    [Show full text]
  • NSA) Surveillance Programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) Activities and Their Impact on EU Citizens' Fundamental Rights
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS The US National Security Agency (NSA) surveillance programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) activities and their impact on EU citizens' fundamental rights NOTE Abstract In light of the recent PRISM-related revelations, this briefing note analyzes the impact of US surveillance programmes on European citizens’ rights. The note explores the scope of surveillance that can be carried out under the US FISA Amendment Act 2008, and related practices of the US authorities which have very strong implications for EU data sovereignty and the protection of European citizens’ rights. PE xxx.xxx EN AUTHOR(S) Mr Caspar BOWDEN (Independent Privacy Researcher) Introduction by Prof. Didier BIGO (King’s College London / Director of the Centre d’Etudes sur les Conflits, Liberté et Sécurité – CCLS, Paris, France). Copy-Editing: Dr. Amandine SCHERRER (Centre d’Etudes sur les Conflits, Liberté et Sécurité – CCLS, Paris, France) Bibliographical assistance : Wendy Grossman RESPONSIBLE ADMINISTRATOR Mr Alessandro DAVOLI Policy Department Citizens' Rights and Constitutional Affairs European Parliament B-1047 Brussels E-mail: [email protected] LINGUISTIC VERSIONS Original: EN ABOUT THE EDITOR To contact the Policy Department or to subscribe to its monthly newsletter please write to: [email protected] Manuscript completed in MMMMM 200X. Brussels, © European Parliament, 200X. This document is available on the Internet at: http://www.europarl.europa.eu/studies DISCLAIMER The opinions expressed in this document are the sole responsibility of the author and do not necessarily represent the official position of the European Parliament.
    [Show full text]
  • DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL to USA AUS CAN GBR NZL SID Today Home
    DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL SID Today home SID Today archives Welcome! Friday, 09 Nov 2012 feedback Go to the NSA Daily Go to the SID Home Web search Agency-all Emails SID-all Emails NSA Rolodex SCQAWK: The SID Mailbag SIDtoday Blog SIDtoday Series SIGINT Worldwide VTC SIDtoday Article Letter to the Editor SIGINT-y Social Media Page (U) Back in Time: The ECHELON Story FROM: Foreign Affairs Directorate Special Advisor (DP09) Run Date: 07/19/2005 ECHELON, a system targeting communications satellites, caught the ire of Europeans several years ago... (S//SI) (C//SI) The ECHELON story... revisited. It's worth a reminder that NSA's foreign SIGINT relationships are not far removed from the public spotlight. ECHELON is the most vivid example of this fact, although events post-9/11 have overtaken the spotlight and the ECHELON story rarely makes the news these days. Could it be that the European nations that previously made the claims about ECHELON and industrial espionage have come to realize that, yes, there is an ECHELON system, but rather than conducting alleged industrial espionage, it is a vital contributor to the global war on terror? (C) Undoubtedly the most prominent moment in the ECHELON saga was the Summer of 2000 when the European Parliament appointed a 36-member ad hoc committee to spend a year investigating ECHELON. As the media spotlight brightened, a series of events occurred which help tell the story. These included a visit to the US by members of the EU Commission, during which the members declared their intention to come to NSA to get ground truth.
    [Show full text]
  • Echelon/Frenchelon : Mythes Et Réalités
    Echelon/Frenchelon : mythes et réalités Enjeux politiques et stratégiques des systèmes de surveillance Conférence de Jean Marc Manach, le 14 avril 2005 à l©IEP de Rennes à l©invitation de l©association YSEGORIA Introduction Le programme anglo-saxon d©écoute des télécommunications, surnommé « Echelon », qui fait de temps à autres les choux gras d©Hollywood et de certains jeux vidéos, et constitue l©un des sujets de prédilection des adeptes des « théories de la conspiration », est un « secret défense » plus ou moins battu en brèche par certains journalistes et défenseurs des droits de l©homme et de la vie privée. « Frenchelon », son (relatif) équivalent français (et partiellement européen), est bien moins connu : révélée en 1998, son existence n©a jamais entraînée qu©une poignée d©articles de quelques journalistes (un anglais, cinq français), quand bien même plusieurs rapports parlementaires, et communiqués de presse du ministère de la Défense, en parlent à mots couverts. Dans les deux cas, ils ne sont que la partie emergée d©un iceberg dont l©ampleur croît à mesure que se développe la société de l©information; la question reste en effet de savoir ce qui, de l©espionnage militaire (et politique, et industriel), ou de la surveillance administrative (et policière, et domestique), constitue la plus grande menace en termes de libertés, et de démocratie. Chronique d©une médiatisation 1976 : un étudiant écossais en physique de 24 ans, Duncan Campbell, est arrêté par le contre- espionnage britannique pour avoir publié dans un journal (de gauche) une enquête sur une installation gouvernementale de surveillance électronique. S©ensuivent 18 mois de « tracasseries judiciaires », qui ne font que conforter Campbell dans son désir d©enquêter sur cette affaire.
    [Show full text]
  • Global Surveillance: the Evidence for Echelon
    Global Surveillance: The Evidence for Echelon Duncan Campbell This presentation sets out the historical, factual and evidential basis for our knowledge and understanding of highly classified matters concerning the mass global interception and processing of civil and commercial telecommunications. Such understanding is important in underpinning discus- sion of the political and technical interventions that can secure personal and commercial communi- cations and provide data security in the 21st century. Since 1996, there has been increasing global interest in and awareness of the extent of the automated surveillance of global telecommunications systems, primarily but not exclusively by the signals intelligence (sigint) agencies of the United States and its English-speaking allies. Although many thousands of codenames are in use, the technically-informed public now commonly know this system as “Echelon”. Recent information suggests that the original Echelon system came into existence about 1971, and that within the signals intelligence agencies it was (and remains) the commercial communications satellite (COMSAT) collection sub-system of the global communications surveillance system. The existence of the Echelon network was first publicised in the late 1980s, when it underwent an unprec- edented enlargement, including the development of southern hemisphere interception sites. Develop- ment has continued on an ever-increasing basis since 1990. This presentation reports and attempts to and assimilate the best available evidence for the interception and processing capabilities of such systems, together with their implications for personal and commercial privacy and security. It also reviews the legal authority controlling such activities, and such privacy procedures as have been disclosed. A key contemporary issue is whether the techno- logical processes now associated with automated communications intelligence effectively nullify pri- vacy protection safeguards, such as are set out in statutes such as the US Foreign Intelligence Surveil- lance Act (FISA).
    [Show full text]
  • Intelligence Special Relationship’ Between Britain and the United States Written by Jonjo Robb
    The ‘Intelligence Special Relationship’ between Britain and the United States Written by Jonjo Robb This PDF is auto-generated for reference only. As such, it may contain some conversion errors and/or missing information. For all formal use please refer to the official version on the website, as linked below. The ‘Intelligence Special Relationship’ between Britain and the United States https://www.e-ir.info/2014/06/15/the-intelligence-special-relationship-between-britain-and-the-united-states/ JONJO ROBB, JUN 15 2014 Is it accurate to talk of an ‘intelligence special relationship’ between Britain and the United States? The United Kingdom and the United States are often regarded as having incredibly close and cordial bilateral relations, to the extent that this is often described as a ‘special relationship’. President Barack Obama remarked when addressing Parliament on a state visit to the UK in 2011 that the two nations enjoyed ‘one of the oldest, one of the strongest alliances the world has ever known’.[1] On taking office in 2010, Secretary of State for Foreign & Commonwealth Affairs William Hague commented that ‘the United States is without doubt the most important ally of the United Kingdom’.[2] The two states share a language, a vast history, and a number of interests and values. The UK and USA have both in the past and at present cooperated intensively on military matters. Both were members of the ‘Big Three’ during World War II, both were founding members of NATO, and both formed the leading contingents in the invasions of Afghanistan and Iraq. As a result of their shared military experiences, the UK and USA have also cooperated on intelligence matters.
    [Show full text]
  • Echelon: the National Security Agency's Compliance with Applicable Legal Guidelines in Light of the Need for Tighter National Security
    ECHELON: THE NATIONAL SECURITY AGENCY'S COMPLIANCE WITH APPLICABLE LEGAL GUIDELINES IN LIGHT OF THE NEED FOR TIGHTER NATIONAL SECURITY Erin L. Brown I. INTRODUCTION LON is whether this global communications inter- ceptor infringes upon the Fourth Amendment's Article II of the ConstitutionI broadly states guarantees of protection from unreasonable 7 that the President has the fundamental duty to search and seizure. preserve, protect and defend the Constitution of This issue now must be analyzed in light of the the United States. In United States v. United States World Trade Center and Pentagon tragedies of District Court,2 Justice Powell elaborated on Article September 11, 2001.8 These tragic events have led II by stating, "Implicit in that duty is the power to Americans to reevaluate the debate between pri- protect our Government against those who would vacy and national security in a new context. Gone subvert or overthrow it by unlawful means."3 The are the days when "Big Brother" was the only con- United States is the most powerful country in the cern that Americans had in regard to the govern- world, and it arguably has the most enemies. The ment's use of electronic surveillance. Americans National Security Agency ("NSA"), in upholding are now faced with questions that will substantially the provisions of Article II, operates intelligence gathering systems that protect our nation from its affect the manner in which they view their funda- mental constitutional rights. Americans must ask enemies. 4 In carrying out this duty, the NSA must government surveillance constantly monitor communications to and from if they will tolerate ECHE- the United States, while remaining cognizant of through the use of technologies, such as the constitutional protections granted to its citi- LON, used in the hopes of detecting, preventing zens.
    [Show full text]
  • Intelligence Reform and the Snowden Paradox: the Case of France
    Media and Communication (ISSN: 2183–2439) 2017, Volume 5, Issue 1, Pages X–X DOI: 10.17645/mac.v5i1.821 Article Intelligence Reform and the Snowden Paradox: The Case of France Félix Tréguer Center for International Studies and Research, Sciences Po, 75006, Paris, France; E-Mail: [email protected] Submitted: 10 November 2016 | Accepted: 26 January 2017 | Published: in press Abstract Taking France as a case study, this article reflects on the ongoing legalisation strategies pursued by liberal states as they seek to secure and expand the Internet surveillance programs of their domestic and foreign intelligence agencies. Following the path to legalisation prior and after the Snowden disclosures of 2013, the article shows how post-Snowden controversies helped mobilise advocacy groups against the extra judicial surveillance of Internet communications, a policy area which had hitherto been overlooked by French human rights groups. It also points to the dilemma that post-Snowden contention created for governments. On the one hand, the disclosures helped document the growing gap between the existing legal framework and actual surveillance practices, exposing them to litigation and thereby reinforcing the rationale for legalisa- tion. On the other hand, they made such a legislative reform politically risky and unpredictable. In France, policy-makers navigated these constraints through a cautious mix of silence, denials, and securitisation. After the Paris attacks of January 2015 and a hasty deliberation in Parliament, the Intelligence Act was passed, making it the most extensive piece of legisla- tion ever adopted in France to regulate secret state surveillance. The article concludes by pointing to the paradoxical effect of post-Snowden contention: French law now provides for clear rules authorising large-scale surveillance, to a degree of detail that was hard to imagine just a few years ago.
    [Show full text]