{"id":6712,"date":"2013-10-07T15:38:09","date_gmt":"2013-10-07T19:38:09","guid":{"rendered":"http:\/\/journals.law.harvard.edu\/crcl\/?p=6712"},"modified":"2016-11-16T19:52:16","modified_gmt":"2016-11-17T00:52:16","slug":"in-the-publics-interest-intelligence-whistleblowers-need-protection-too","status":"publish","type":"post","link":"https:\/\/journals.law.harvard.edu\/crcl\/in-the-publics-interest-intelligence-whistleblowers-need-protection-too\/","title":{"rendered":"In the Public\u2019s Interest: Intelligence Whistleblowers Need Protection, Too"},"content":{"rendered":"<p>When Edward Snowden first came forward as the source of leaked documents detailing the surveillance programs of the National Security Agency, he <a href=\"http:\/\/www.theguardian.com\/world\/2013\/jun\/09\/edward-snowden-nsa-whistleblower-surveillance?CMP=twt_gu\">maintained<\/a> that his sole motivation was \u201cto inform the public as to that which is done in their name and that which is done against them.\u201d Since that first leaked FISA court order compelling Verizon Business to prospectively turn over the metadata of its customers, we\u2019ve gradually learned just what he meant.<\/p>\n<p>With each new revelation, one fact is thrown into sharp relief: the agency is gathering and retaining increasing amounts of data on the electronic communications activities of American citizens, not just foreign intelligence targets. For example, as the New York Times <a href=\"http:\/\/www.nytimes.com\/2013\/09\/29\/us\/nsa-examines-social-networks-of-us-citizens.html\">reported<\/a> last week, the NSA authorized agency analysts to conduct, as part of a pilot program, \u201clarge-scale graph analysis on very large sets of communications metadata without having to check foreignness\u201d when pursuing a trail of communications related to a foreign intelligence target. That means if an American citizen has contact with a foreigner who is an intelligence target of the NSA, her metadata may be subject to surveillance without warrant, regardless of her status as an American citizen.<\/p>\n<p>Whether or not one thinks such activities are justified in the name of national security, it\u2019s difficult to deny that the contours of the NSA&#8217;s dragnet revealed thus far have raised serious questions. The breadth of the NSA\u2019s programs has caused alarm even among some members of Congress who approved the laws interpreted to justify these programs. And the revelations have spawned a number of lawsuits, including cases brought by civil liberties groups like the Electronic Privacy Information Center, the Electronic Frontier Foundation, and the American Civil Liberties Union, as well as by private technology companies like Microsoft, Google, and Yahoo. At the very least, it\u2019s clear that many reasonable people think the NSA has exceeded the limits imposed on it by the Constitution. And let\u2019s not forget, there are even\u00a0<a href=\"http:\/\/www.cbsnews.com\/8301-250_162-57605151\/glenn-greenwald-working-on-new-nsa-revelations\/\">more revelations<\/a> to come.<\/p>\n<p>The Whistleblower Protection Act (WPA) protects disclosures made by federal employee with the reasonable belief that the information demonstrates \u201cany violation of any law, rule, or regulation,\u201d or \u201cgross mismanagement, gross waste of funds, and abuse of authority, or a substantial and specific danger to public health or safety.\u201d Intelligence employees, however, are exempt from the protections afforded to other federal personnel under the WPA. The protections that exist for intelligence personnel, under the Intelligence Community Whistleblower Protection Act, construct a pathway for employees to report potential abuses internally, but fall short of offering protection from retribution. And if the case of former NSA executive Thomas Drake is any guide, internal reporting may be less than adequate as an avenue for reviewing practices of questionable legality.<\/p>\n<p>Make no mistake: Edward Snowden is a whistleblower. What makes the absence of protection in this case even more troubling is that if Edward Snowden faced trial in the United States, legally speaking his conviction would depend in no way on the presence or absence of altruistic motivations. The Espionage Act criminalizes, among other things, disclosure to unauthorized persons of information related to the national defense. One of the charges filed against Snowden, violation of 18 U.S.C. \u00a7 793(d), requires the communication of such information be made willfully, and that the individual charged \u201chas reason to believe [the information] could be used to the injury of the United States or to the advantage of any foreign nation.\u201d The statute does not prescribe and courts have not entertained any public interest defense in these cases. As the law has been applied, Snowden\u2019s actions <a href=\"http:\/\/jurist.org\/forum\/2013\/07\/tung-yin-edward-snowden.php\">almost certainly<\/a> meet the requirements of the violations with which he has been charged, regardless of his motivation (or, for that matter, of the harm his revelations have caused, which some NSA analysts have <a href=\"http:\/\/www.nytimes.com\/2013\/09\/30\/us\/qaeda-plot-leak-has-undermined-us-intelligence.html\">characterized<\/a> as muted).<\/p>\n<p>The international community has embraced public interest defenses for such crimes. In June 2013, a coalition of civil society groups, academics, and other experts in freedom of speech and media (including four special rapporteurs) issued the Global Principles on National Security and Freedom of Information, also known as the <a href=\"http:\/\/www.opensocietyfoundations.org\/sites\/default\/files\/Global%20Principles%20on%20National%20Security%20and%20the%20Right%20to%20Information%20%28Tshwane%20Principles%29%20-%20June%202013.pdf\">Tshwane Principles<\/a>. The principles state that criminal penalties should apply only to specific, narrow categories of information clearly identified by the law, and permit those charged to raise a public interest defense. Such a defense should defeat the criminal penalty if \u201cthe public interest in disclosure of the information in question outweighs the public interest in non-disclosure\u201d as assessed according to a number of criteria, including \u201cthe extent and risk of harm to the public interest caused by the disclosure.\u201d<\/p>\n<p>Intelligence personnel are often entrusted with sensitive information which, if released, would put American lives at risk. And, of course, not all unauthorized disclosures are worthy of protection. But refusal to acknowledge the circumstances surrounding a particular disclosure ignores the important role intelligence whistleblowing can play in strengthening democracy through increased transparency.<\/p>\n<p>The conversation Edward Snowden started is an important one, and is far from over. When this episode ends, it may well be the case that the public\u2019s interest in learning the information he released justified his actions. Or not. The question we must answer, though, is shouldn\u2019t a jury be able to consider that when assigning him criminal culpability?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When Edward Snowden first came forward as the source of leaked documents detailing the surveillance programs of the National Security [&hellip;]<\/p>\n","protected":false},"author":81,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3,1],"tags":[],"coauthors":[742],"class_list":["post-6712","post","type-post","status-publish","format-standard","hentry","category-amicus","category-uncategorized"],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/peZrWS-1Kg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/journals.law.harvard.edu\/crcl\/wp-json\/wp\/v2\/posts\/6712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journals.law.harvard.edu\/crcl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.harvard.edu\/crcl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/crcl\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/crcl\/wp-json\/wp\/v2\/comments?post=6712"}],"version-history":[{"count":0,"href":"https:\/\/journals.law.harvard.edu\/crcl\/wp-json\/wp\/v2\/posts\/6712\/revisions"}],"wp:attachment":[{"href":"https:\/\/journals.law.harvard.edu\/crcl\/wp-json\/wp\/v2\/media?parent=6712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/crcl\/wp-json\/wp\/v2\/categories?post=6712"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/crcl\/wp-json\/wp\/v2\/tags?post=6712"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/crcl\/wp-json\/wp\/v2\/coauthors?post=6712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}