{"id":5446,"date":"2021-06-28T05:28:19","date_gmt":"2021-06-28T09:28:19","guid":{"rendered":"https:\/\/journals.law.harvard.edu\/nsj\/?p=5446"},"modified":"2021-07-07T08:39:46","modified_gmt":"2021-07-07T12:39:46","slug":"before-national-security-the-espionage-act-of-1917-and-the-concept-of-national-defense","status":"publish","type":"post","link":"https:\/\/journals.law.harvard.edu\/nsj\/2021\/06\/before-national-security-the-espionage-act-of-1917-and-the-concept-of-national-defense\/","title":{"rendered":"Before \u201cNational Security\u201d: The Espionage Act of 1917 and the Concept of \u201cNational Defense\u201d"},"content":{"rendered":"<p style=\"text-align: center\"><em><strong>Daniel Larsen<\/strong><\/em><a href=\"#_authftn1\" name=\"_authftnref1\">[*]<\/a><\/p>\n<p style=\"text-align: center\">[Full text of this Article in PDF is available at <a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2021\/07\/HNSJ-Vol-12-Larsen-Before-22National-Security22.pdf\">this link<\/a>]<\/p>\n<h1 style=\"text-align: center\"><a name=\"_Toc41044406\"><\/a><a name=\"_Toc32528792\"><\/a>I.\u00a0 \u00a0Introduction<\/h1>\n<p><a style=\"letter-spacing: -0.2px\" href=\"#_authftnref1\" name=\"_authftn1\"><\/a><\/p>\n<p>The Trump Administration\u2019s 2019 indictment of Julian Assange<a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a> under the Espionage Act of 1917<a href=\"#_ftn2\" name=\"_ftnref2\">[2]<\/a> set off a wave of alarm across the press.<a href=\"#_ftn3\" name=\"_ftnref3\">[3]<\/a> A decade earlier, the Obama Administration had launched what was called a \u201cwar on leakers\u201d<a href=\"#_ftn4\" name=\"_ftnref4\">[4]<\/a> as it became the first administration in history to regularly deploy the Espionage Act against sources who passed classified information to journalists.<a href=\"#_ftn5\" name=\"_ftnref5\">[5]<\/a> The Trump Administration became the second.<a href=\"#_ftn6\" name=\"_ftnref6\">[6]<\/a> These leak prosecutions have intensified longstanding scholarly fears that the eventual targets of Espionage Act prosecutions could be journalists themselves.<a href=\"#_ftn7\" name=\"_ftnref7\">[7]<\/a><\/p>\n<p>The fearsomeness of the Espionage Act\u2019s draconian penalties arises from the sheer breadth of the statute\u2019s potential application. The Act provides no limits on who can be charged and it protects all information \u201cconnected with the national defense.\u201d<a href=\"#_ftn8\" name=\"_ftnref8\">[8]<\/a> This all-important term goes undefined in the legislation<a href=\"#_ftn9\" name=\"_ftnref9\">[9]<\/a> and many assume it may encompass \u201canything rationally or conceivably tied to national security.\u201d<a href=\"#_ftn10\" name=\"_ftnref10\">[10]<\/a> Faced with this statute of seemingly immense scope, some legal scholars have sought to contain its reach by raising constitutional objections.<a href=\"#_ftn11\" name=\"_ftnref11\">[11]<\/a> Others also have pleaded for Congress to revise the law, without success,<a href=\"#_ftn12\" name=\"_ftnref12\">[12]<\/a> and for prosecutors and judges to exercise restraint in applying it.<a href=\"#_ftn13\" name=\"_ftnref13\">[13]<\/a><\/p>\n<p>This Article upsets current understandings of the Espionage Act of 1917 by challenging a key, long-engrained assumption about the statute itself. The Espionage Act is not the highly punitive behemoth that shrouds enormous swathes of the government in secrecy, as is presently imagined. The term \u201cnational defense\u201d does not capaciously expand to cover any government secret a prosecutor might deem worth protecting; rather, \u201cnational defense\u201d actually has a highly specific and coherent meaning\u2014one that is dramatically narrower than anyone has realized.<\/p>\n<p>A seminal 1973 <em>Columbia Law Review <\/em>article by Harold Edgar and Benno C. Schmidt, Jr firmly entrenched present assumptions about the enormous breadth of the Espionage Act.<a href=\"#_ftn14\" name=\"_ftnref14\">[14]<\/a> That highly influential article, still held to be the \u201cdefinitive academic survey\u201d of the espionage statutes<a href=\"#_ftn15\" name=\"_ftnref15\">[15]<\/a> and cited in key court decisions,<a href=\"#_ftn16\" name=\"_ftnref16\">[16]<\/a> concluded that the term \u201cnational defense\u201d is \u201cextremely far reaching\u201d and \u201ccomprehends most properly classified information.\u201d<a href=\"#_ftn17\" name=\"_ftnref17\">[17]<\/a> The authors drew this inference largely from an absence of evidence: they puzzled over the text of the Act and its judicial precedents, neither of which provided them much assistance.<a href=\"#_ftn18\" name=\"_ftnref18\">[18]<\/a> They delved into the legislative history, but this inquiry too failed to shed any light on the subject,<a href=\"#_ftn19\" name=\"_ftnref19\">[19]<\/a> leading to the conclusion that \u201dnational defense\u201d must be \u201cwithout principled limitations.\u201d<a href=\"#_ftn20\" name=\"_ftnref20\">[20]<\/a> Their conclusions have gone unquestioned for nearly a half-century.<a href=\"#_ftn21\" name=\"_ftnref21\">[21]<\/a><\/p>\n<p>Edgar and Schmidt, however, were gravely mistaken. What the two scholars failed to realize is that in the early twentieth century, the term \u201cnational defense\u201d actually invoked a widely understood concept of the era \u2014one with a clear construction and reasonably clear boundaries.<a href=\"#_ftn22\" name=\"_ftnref22\">[22]<\/a> Understanding this historical concept solves the puzzles that Edgar and Schmidt struggled to decipher. The text of the Espionage Act actually contains unmistakable indications of how \u201cnational defense\u201d should be interpreted.<a href=\"#_ftn23\" name=\"_ftnref23\">[23]<\/a> The main Supreme Court precedent on the Act, <em>Gorin v. United States<\/em>,<a href=\"#_ftn24\" name=\"_ftnref24\">[24]<\/a> which the two scholars read to require a highly expansive interpretation of \u201cnational defense,\u201d<a href=\"#_ftn25\" name=\"_ftnref25\">[25]<\/a> actually mandates a dramatically narrower one.<a href=\"#_ftn26\" name=\"_ftnref26\">[26]<\/a> Understanding this concept also helps us to notice related statutes that provide clear guidance as to how \u201cnational defense\u201d should be interpreted\u2014including especially the Council of National Defense Act of 1916, which still remains in force.<a href=\"#_ftn27\" name=\"_ftnref27\">[27]<\/a> Understanding this concept also renders the legislative history of the Espionage Act, explored so extensively and unsuccessfully by Edgar and Schmidt,<a href=\"#_ftn28\" name=\"_ftnref28\">[28]<\/a> both easier to comprehend and largely unnecessary as an interpretative tool.<\/p>\n<p>These difficulties in interpreting the meaning of \u201cnational defense\u201d arise from the 1940s. That decade, an entirely new concept, \u201cnational security,\u201d supplanted \u201cnational defense\u201d as the main way of thinking about and discussing the United States\u2019 international vulnerabilities.<a href=\"#_ftn29\" name=\"_ftnref29\">[29]<\/a> Broadly encompassing diplomatic, military, and intelligence matters, \u201cnational security\u201d was widely adopted after World War II precisely because it conceptualized American international vulnerability in an expansive way.<a href=\"#_ftn30\" name=\"_ftnref30\">[30]<\/a> The concept that it replaced, \u201cnational defense,\u201d represented a narrower mode of thinking about the United States\u2019 place in the world, and was associated almost exclusively with military affairs.<a href=\"#_ftn31\" name=\"_ftnref31\">[31]<\/a> As \u201cnational security\u201d achieved ascendancy, the once clear construction of the concept of \u201cnational defense\u201d\u00a0 became lost.<a href=\"#_ftn32\" name=\"_ftnref32\">[32]<\/a> In applying the Espionage Act, the two terms increasingly became conflated, and today they are wrongly assumed to be synonymous.<a href=\"#_ftn33\" name=\"_ftnref33\">[33]<\/a> In fact, the historical understandings of the two concepts were radically different.<\/p>\n<p>This research lies at the intersection of the fields of law and history. Understanding the laws of the past can be assisted by understanding the <em>ideas<\/em> of the past, and in this latter area, scholars of history can provide a unique perspective for their legal counterparts. Historians of U.S. foreign policy have become increasingly interested in the intellectual history of the idea of \u201cnational security\u201d in American history, and of its predecessor concept, \u201cnational defense.\u201d Applying that intellectual history to the Espionage Act leads to a startlingly different understanding of the statute compared with that in the existing legal scholarship and recent legal applications.<\/p>\n<p>Where Edgar and Schmidt\u2019s traditional legal approach failed to attach any coherent limits to the term \u201cnational defense,\u201d<a href=\"#_ftn34\" name=\"_ftnref34\">[34]<\/a> a broader, more historically informed approach readily succeeds in doing so. As the House floor manager of the Espionage Act bill argued in 1917, national defense\u2019s \u201cmeaning is pretty well understood in the minds of the public.\u201d<a href=\"#_ftn35\" name=\"_ftnref35\">[35]<\/a> This Article reconstructs how that understanding was lost and what it was that the public then understood. A broad historical overview shows how the concept of \u201cnational defense\u201d began to disappear around the mid-twentieth century.<a href=\"#_ftn36\" name=\"_ftnref36\">[36]<\/a> An in-depth examination of the sources of the early twentieth century allows us to reconstruct the meaning and boundaries that \u201cnational defense\u201d then invoked.<a href=\"#_ftn37\" name=\"_ftnref37\">[37]<\/a> This historical examination allows us to view the text of the Espionage Act and <em>Gorin <\/em>with new eyes, and to confirm a much narrower understanding of the Act.<a href=\"#_ftn38\" name=\"_ftnref38\">[38]<\/a> This narrower understanding raises grave doubts about the propriety many of the recent and current prosecutions under the Act, as well as serious due process questions.<a href=\"#_ftn39\" name=\"_ftnref39\">[39]<\/a> The Espionage Act not only originally was, but again ought to be, a far less fearsome weapon than anyone has realized.<\/p>\n<hr \/>\n<p><a style=\"letter-spacing: -0.2px\" href=\"#_authftnref1\" name=\"_authftn1\">[*]<\/a> College Lecturer in History (fixed-term) at Trinity College, University of Cambridge. Previously University Lecturer in International Relations (fixed-term) at the University of Cambridge, and Junior Research Fellow at Trinity College, University of Cambridge. PhD 2013, University of Cambridge. I am very grateful to Luke Cavanagh for his detailed comments and research assistance on this article, and to Collin Paschall for his very helpful feedback. I would like to thank the editors of the Harvard National Security Journal for their outstanding and very careful work on this article.<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> Superseding Indictment, United States v. Assange, No.\u00a01:18-cr-111 (E.D. Va. May 23, 2019).<\/p>\n<p><a href=\"#_ftnref2\" name=\"_ftn2\">[2]<\/a> 18 U.S.C. \u00a7\u00a7 793\u201394 (2012).<\/p>\n<p><a href=\"#_ftnref3\" name=\"_ftn3\">[3]<\/a> <em>See, e.g.<\/em>, Brian Barrett, <em>The Latest Julian Assange Indictment is an Assault on Press Freedom<\/em>, Wired (May 23, 2019), https:\/\/www.wired.com\/story\/julian-assange-espionage-act-threaten-press-freedom [https:\/\/perma.cc\/97U7-Z5QJ]; Julian Borger, <em>Indicting a Journalist? What the New Charges against Julian Assange Mean for Free Speech<\/em>, Guardian (May 23, 2019), https:\/\/www.theguardian.com\/media\/2019\/may\/23\/julian-assange-indicted-what-charges-mean-for-free-speech [https:\/\/perma.cc\/V5WE-L5NL]; Massimo Calabresi &amp; W.J. Hennigan, <em>The Danger in Prosecuting Julian Assange for Espionage<\/em>, Time (May 24, 2019), https:\/\/time.com\/5595669\/julian-assange-espionage-act [https:\/\/perma.cc\/RUM6-Y2FG]; Eric Havian, <em>Espionage Act Should Exempt Journalists\u2014Whether Assange Is a \u2018Real\u2019 Reporter or Not<\/em>, Hill (May 28, 2019), https:\/\/thehill.com\/opinion\/cybersecurity\/445783-espionage-act-should-exempt-journalists-whether-assange-is-real; Mathew Ingram, <em>The Case Against Julian Assange Is a Clear Threat to Journalism<\/em>, Colum. Journalism Rev. (April 18, 2019), https:\/\/www.cjr.org\/analysis\/assange-threat-journalism.php [https:\/\/perma.cc\/JH9A-923T]; Jameel Jaffer, <em>The Espionage Act and a Growing Threat to Press Freedom<\/em>, New Yorker (June 25, 2019), https:\/\/www.newyorker.com\/news\/news-desk\/the-espionage-act-and-a-growing-threat-to-press-freedom [https:\/\/perma.cc\/BRJ2-4SDV]; Aryeh Neier, <em>Assange May Have Committed a Crime, But the Espionage Act Is the Wrong Law to Prosecute<\/em>, Just Sec. (June 4, 2019), https:\/\/www.justsecurity.org\/64395\/assange-may-have-committed-a-crime-but-the-espionage-act-is-the-wrong-law-to-prosecute [https:\/\/perma.cc\/X74S-76QA]; Deanna Paul, <em>How the Indictment of Julian Assange Could Criminalize Investigative Journalism<\/em>, Wash. Post (May 27, 2019), https:\/\/www.washingtonpost.com\/national-security\/2019\/05\/27\/how-indictment-julian-assange-could-criminalize-investigative-journalism [https:\/\/perma.cc\/MSM4-UFGS]; James Risen, <em>The Indictment of Julian Assange Under the Espionage Act Is a Threat to the Press and the American People<\/em>, Intercept (May 24, 2019), https:\/\/theintercept.com\/2019\/05\/24\/the-indictment-of-julian-assange-under-the-espionage-act-is-a-threat-to-the-press-and-the-american-people [https:\/\/perma.cc\/HJV5-BS2X]; Stephen Rohde, <em>Julian Assange, the Espionage Act of 1917, and Freedom of the Press<\/em>, Am. Prospect (June 19, 2019), https:\/\/prospect.org\/justice\/julian-assange-espionage-act-1917-freedom-press [https:\/\/perma.cc\/J32C-XARP]; Bruce Shapiro, <em>Trump\u2019s Charges Against Julian Assange Would Effectively Criminalize Investigative Journalism<\/em>, Nation (May 31, 2019), https:\/\/www.thenation.com\/article\/archive\/assange-wikileaks-journalism-free-press [https:\/\/perma.cc\/3RSU-ZWVZ]; Jack Goldsmith, <em>The U.S. Media Is in the Crosshairs of the New Assange Indictment, <\/em>Lawfare (May 24, 2019), https:\/\/www.lawfareblog.com\/us-media-crosshairs-new-assange-indictment [https:\/\/perma.cc\/7NMK-4MD3].<\/p>\n<p><a href=\"#_ftnref4\" name=\"_ftn4\">[4]<\/a> <em>See, e.g.<\/em>, Timothy B. Lee, <em>Everything You Need to Know About Obama\u2019s War on Leakers in One FAQ<\/em>, Wash. Post (May 23, 2013), https:\/\/www.washingtonpost.com\/news\/wonk\/wp\/2013\/05\/23\/everything-you-need-to-know-about-obamas-war-on-leakers-in-one-faq [https:\/\/perma.cc\/7PZF-5W5V]; Greg Price, <em>Obama\u2019s \u2018War on Leakers\u2019 Was More Aggressive Than Trump\u2019s So Far<\/em>, Newsweek (August 4, 2017), https:\/\/www.newsweek.com\/obama-leaks-trump-sessions-646734 [https:\/\/perma.cc\/U7BR-SPN5].<\/p>\n<p><a href=\"#_ftnref5\" name=\"_ftn5\">[5]<\/a> <em>See, e.g.<\/em>, Thomas C. Ellington, <em>The Most Transparent Administration in History?: An Assessment of Official Secrecy in the Obama Administration\u2019s First Term<\/em>, 15 Pub. Integrity 133, 140-42 (2013); Aiden Warren &amp; Alexander Dirksen, <em>Augmenting State Secrets: Obama\u2019s Information War<\/em>, 9 Yale J. Int\u2019l Aff. 68, 72 (2014).<\/p>\n<p><a href=\"#_ftnref6\" name=\"_ftn6\">[6]<\/a> <em>See, e.g.<\/em>, Gabe Rottman, <em>A Typology of Federal News Media \u201cLeak\u201d Cases<\/em>, 93 Tul. L. Rev. 1147, 1157\u201358 (2019).<\/p>\n<p><a href=\"#_ftnref7\" name=\"_ftn7\">[7]<\/a> <em>See, e.g.<\/em>, Harold Edgar &amp; Benno C. Schmidt Jr., <em>The Espionage Statutes and Publication of Defense Information<\/em>, 73 Colum. L. Rev. 929 (1973); Patricia L. Bellia, <em>WikiLeaks and the Institutional Framework for National Security Disclosures<\/em>, 121 Yale L.J. 1448, <em>passim<\/em> (2012); Bruce Brown &amp; Selina MacLaren, <em>Holding the Presidency Accountable: A Path Forward for Journalists and Lawyers<\/em>, 12 Harv. L. &amp; Pol\u2019y Rev. 89, 91 (2018); David McCraw &amp; Stephen Gikow, <em>The End to an Unspoken Bargain? National Security and Leaks in a Post-<\/em>Pentagon Papers<em> World<\/em>, 48 Harv. C.R.-C.L. L. Rev. 473, 502 n.178 (2013); Christopher J. Markham, <em>Punishing the Publishing of Classified Materials: The Espionage Act and Wikileaks<\/em>, 23 B.U. Pub. Int. L.J. 1, 6 (2014); Geoffrey R. Stone, <em>WikiLeaks and the First Amendment<\/em>, 64 Fed. Comm. L.J. 477, 481 (2012); Stephen I. Vladeck, <em>Inchoate Liability and the Espionage Act: The Statutory Framework and the Freedom of the Press<\/em>, 1 Harv. L. &amp; Pol\u2019y Rev. 219, 220, 234 (2007). <em>See also<\/em> Jonathan C. Medow, <em>The First Amendment and the Secrecy State: <\/em>Snepp v. United States, 130 U. Pa. L. Rev. 775 (1982); Dorota Mokrosinska, <em>Why Snowden and not Greenwald? On the Accountability of the Press for Unauthorized Disclosures of Classified Information<\/em>, 39 L. &amp; Phil. 203 (2020); Peter E. Quint, <em>Toward First Amendment Limitations on the Introduction of Evidence: The Problem of United States v. Rosenberg<\/em>, 86 Yale L.J. 1622 (1977); Goldsmith, <em>supra <\/em>note 3.<\/p>\n<p><a href=\"#_ftnref8\" name=\"_ftn8\">[8]<\/a> 18 U.S.C. \u00a7\u00a7 793-94. Other parts of these sections use the phasing \u201crelated to the national defense,\u201d instead of \u201cconnected with the national defense.\u201d<\/p>\n<p><a href=\"#_ftnref9\" name=\"_ftn9\">[9]<\/a> <em>Id<\/em>.<\/p>\n<p><a href=\"#_ftnref10\" name=\"_ftn10\">[10]<\/a> <em>See <\/em>Lindsay B. Barnes, <em>The Changing Face of Espionage: Modern Times Call for Amending the Espionage Act<\/em>, 46 McGeorge L. Rev. 511, 526 (2014).<\/p>\n<p><a href=\"#_ftnref11\" name=\"_ftn11\">[11]<\/a> <em>See <\/em>Stone, <em>supra <\/em>note 7 at 481\u201389 (outlining First Amendment defenses to Espionage Act charges); <em>but see <\/em>Vladeck, <em>supra <\/em>note 7 at 227 (questioning the likely success of such defenses).<\/p>\n<p><a href=\"#_ftnref12\" name=\"_ftn12\">[12]<\/a> Barnes, <em>supra <\/em>note 10 at 513, 521; Edgar &amp; Schmidt, <em>supra <\/em>note 7, at 1077\u201379; Robert D. Epstein, <em>Balancing National Security and Free-Speech Rights: Why Congress Should Revise the Espionage Act<\/em>, 15 CommLaw Conspectus 483, 484 (2007); Mary-Rose Papandrea, <em>The Publication of National Security Information in the Digital Age<\/em>, 5 J. Nat\u2019l Sec. L. &amp; Pol\u2019y 119, 128 (2011). <em>See also<\/em> Josh Zeman, Note, <em>A Slender Reed Upon Which to Rely: Amending the Espionage Act to Protect Whistleblowers<\/em>, 61 Wayne L. Rev. 149 (2015); Note, <em>Plugging the Leak: The Case for a Legislative Resolution of the Conflict between the Demands of Secrecy and the Need for an Open Government<\/em>, 71 Va. L. Rev. 801 (1985).<\/p>\n<p><a href=\"#_ftnref13\" name=\"_ftn13\">[13]<\/a> Mailyn Fidler, <em>First Amendment Sentence Mitigation: Beyond a Public Accountability Defense for Whistleblowers<\/em>, 11 Harv. Nat\u2019l Sec. J. 214 (2020); David J. Ryan, <em>National Security Leaks, The Espionage Act, and Prosecutorial Discretion<\/em>, 6 Homeland &amp; Nat\u2019l Sec. L. Rev. 59 (2018); Pamela Takefman, <em>Curbing Overzealous Prosecution of the Espionage Act: Thomas Andrews Drake and the Case for Judicial Intervention at Sentencing<\/em>, 35 Cardozo L. Rev. 897 (2013).<\/p>\n<p><a href=\"#_ftnref14\" name=\"_ftn14\">[14]<\/a> Edgar &amp; Schmidt, <em>supra <\/em>note 7.<\/p>\n<p><a href=\"#_ftnref15\" name=\"_ftn15\">[15]<\/a> Vladeck, <em>supra <\/em>note 7, at 221 n.8.<\/p>\n<p><a href=\"#_ftnref16\" name=\"_ftn16\">[16]<\/a> United States v. Morison, 844 F.2d 1057, 1066 n.15 (4th Cir. 1988); United States v. Truong Dinh Hung, 629 F.2d 908, 918\u2013919, 926 n.18, 928 (4th Cir. 1980); United States v. Rosen, 445 F. Supp. 2d 602, 611, 616, 616 n.14, 619, 626 n.33, 639 n.54 (E.D. Va. 2006).<\/p>\n<p><a href=\"#_ftnref17\" name=\"_ftn17\">[17]<\/a> Edgar &amp; Schmidt, <em>supra<\/em> note 7, at\u00a0938, 973.<\/p>\n<p><a href=\"#_ftnref18\" name=\"_ftn18\">[18]<\/a> <em>Id<\/em>. at 937\u201339, 945\u201346, 966\u201369, 974\u201385, 998\u201399.<\/p>\n<p><a href=\"#_ftnref19\" name=\"_ftn19\">[19]<\/a> <em>Id<\/em>. at 939\u201344, 946\u201365, 969\u201374, 991\u201396, 1000\u201320, 1040\u201343.<\/p>\n<p><a href=\"#_ftnref20\" name=\"_ftn20\">[20]<\/a> <em>Id<\/em>. at 974.<\/p>\n<p><a href=\"#_ftnref21\" name=\"_ftn21\">[21]<\/a> <em>See<\/em> <em>supra <\/em>notes 7 and 12\u201313.<\/p>\n<p><a href=\"#_ftnref22\" name=\"_ftn22\">[22]<\/a> See infra section IV.<\/p>\n<p><a href=\"#_ftnref23\" name=\"_ftn23\">[23]<\/a> <em>See infra <\/em>section V.B.<\/p>\n<p><a href=\"#_ftnref24\" name=\"_ftn24\">[24]<\/a> 312 U.S. 19 (1941).<\/p>\n<p><a href=\"#_ftnref25\" name=\"_ftn25\">[25]<\/a> <em>See <\/em>Edgar &amp; Schmidt, <em>supra <\/em>note 7, at 974\u201386.<\/p>\n<p><a href=\"#_ftnref26\" name=\"_ftn26\">[26]<\/a> <em>See infra <\/em>section V.A.<\/p>\n<p><a href=\"#_ftnref27\" name=\"_ftn27\">[27]<\/a> Council of National Defense Act of 1916, Pub. L. 64-242, 39 Stat. 619, 649\u2013650 (codified at 50 U.S.C. \u00a7\u00a7 1\u20135 (2012)); <em>see infra <\/em>section IV.A.<\/p>\n<p><a href=\"#_ftnref28\" name=\"_ftn28\">[28]<\/a> <em>See <\/em>Edgar &amp; Schmidt, <em>supra <\/em>note 7, at 939\u201344, 946\u201365, 969\u201374, 991\u201396, 1000\u201320, 1040\u201343.<\/p>\n<p><a href=\"#_ftnref29\" name=\"_ftn29\">[29]<\/a> <em>See<\/em> Daniel Yergin, Shattered Peace: The Origins of the Cold War and the National Security State 193 (1977); Ernest R. May, <em>National Security in American History<\/em>, <em>in<\/em> Rethinking America\u2019s Security: Beyond Cold War To New World Order 95 (Graham Allison &amp; Gregory F. Treverton eds., 1992); Dexter Fergie, <em>Geopolitics Turned Inwards: The Princeton Military Studies Group and the National Security Imagination<\/em>, 43 Dipl. Hist. 644, 644 (2019); Daniel Larsen, <em>Creating an American Culture of Secrecy: Cryptography in Wilson-Era Diplomacy<\/em>, 44 Dipl. Hist. 102, 112 (2020) [hereinafter Larsen, <em>Creating an American Culture<\/em>]; Andrew Preston, <em>Monsters Everywhere: A Genealogy of National Security<\/em>, 38 Dipl. Hist. 477, 479-81 (2014); Emily S. Rosenberg, <em>Commentary: The Cold War and the Discourse of National Security<\/em>, 17 Dipl. Hist. 277, 277 (1993).<\/p>\n<p><a href=\"#_ftnref30\" name=\"_ftn30\">[30]<\/a> <em>See supra <\/em>note 29.<\/p>\n<p><a href=\"#_ftnref31\" name=\"_ftn31\">[31]<\/a> Fergie, <em>supra <\/em>note 29, at 644\u201349, 654, 666\u201370; Dexter Fergie, <em>The Strange Career of \u201cNational Security<\/em>,<em>\u201d<\/em> Atlantic (Sept. 29, 2019) [hereinafter Fergie, <em>The Strange Career of National Security<\/em>], https:\/\/www.theatlantic.com\/ideas\/archive\/2019\/09\/the-strange-career-of-national-security\/598048 [https:\/\/perma.cc\/KM8A-DTZR]; <em>infra <\/em>section IV.<\/p>\n<p><a href=\"#_ftnref32\" name=\"_ftn32\">[32]<\/a> <em>See supra <\/em>note 31; <em>infra <\/em>section III.<\/p>\n<p><a href=\"#_ftnref33\" name=\"_ftn33\">[33]<\/a> <em>See infra <\/em>section III.<\/p>\n<p><a href=\"#_ftnref34\" name=\"_ftn34\">[34]<\/a> Edgar &amp; Schmidt, <em>supra <\/em>note 7, at 943\u201386, 1011\u201312, 1044\u201345, 1076\u201377.<\/p>\n<p><a href=\"#_ftnref35\" name=\"_ftn35\">[35]<\/a> 55 Cong. Rec. 1594 (1917) (statement of Rep. Edwin Webb).<\/p>\n<p><a href=\"#_ftnref36\" name=\"_ftn36\">[36]<\/a> <em>See infra <\/em>section III.<\/p>\n<p><a href=\"#_ftnref37\" name=\"_ftn37\">[37]<\/a> <em>See infra <\/em>section IV.<\/p>\n<p><a href=\"#_ftnref38\" name=\"_ftn38\">[38]<\/a> <em>See infra <\/em>section V.<\/p>\n<p><a href=\"#_ftnref39\" name=\"_ftn39\">[39]<\/a> <em>See infra <\/em>section VI.<a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Daniel Larsen[*] [Full text of this Article in PDF is available at this link] I.\u00a0 \u00a0Introduction The Trump Administration\u2019s 2019 indictment of Julian Assange[1] under the Espionage Act of 1917[2] set off a wave of alarm across the press.[3] A decade earlier, the Obama Administration had launched what was called a \u201cwar on leakers\u201d[4] as it became the first administration in history to regularly deploy the Espionage Act against sources who passed classified information to journalists.[5] The Trump Administration became the second.[6] These leak prosecutions have intensified longstanding scholarly fears that the eventual targets of Espionage Act prosecutions could be [&hellip;]<\/p>\n","protected":false},"author":13020,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_post_was_ever_published":false},"categories":[241,229],"tags":[],"class_list":["post-5446","post","type-post","status-publish","format-standard","hentry","category-main-articles","category-volume-12"],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/peZtUX-1pQ","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts\/5446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/users\/13020"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/comments?post=5446"}],"version-history":[{"count":0,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts\/5446\/revisions"}],"wp:attachment":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/media?parent=5446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/categories?post=5446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/tags?post=5446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}