Deep Politics Forum
ACCESSING WIKILEAKS VIOLATES ESPIONAGE ACT, USAF SAYS Secrecy News; Steven Aftergood - Printable Version

+- Deep Politics Forum (https://deeppoliticsforum.com/fora)
+-- Forum: Deep Politics Forum (https://deeppoliticsforum.com/fora/forum-1.html)
+--- Forum: Wanted Research Materials, Leads, Documents, Books, Films etc. (https://deeppoliticsforum.com/fora/forum-34.html)
+--- Thread: ACCESSING WIKILEAKS VIOLATES ESPIONAGE ACT, USAF SAYS Secrecy News; Steven Aftergood (/thread-5722.html)



ACCESSING WIKILEAKS VIOLATES ESPIONAGE ACT, USAF SAYS Secrecy News; Steven Aftergood - Bernice Moore - 08-02-2011

ACCESSING WIKILEAKS VIOLATES ESPIONAGE ACT, USAF SAYS

Americans who have accessed the WikiLeaks web site may have violated the Espionage Act, under an extreme interpretation of the law advanced by Air Force officials last week.

Many government agencies have instructed their employees not to download classified materials from the WikiLeaks web site onto unclassified computer systems. The government's position is that although the material is in the public domain, its classification status is unaffected. Therefore, to preserve the integrity of unclassified systems, the leaked classified information should not be accessed on such systems. If it is accessed, it should be deleted.

But on February 3, Air Force Materiel Command (AFMC) at Wright-Patterson Air Force Base issued startling new guidance stating that the leaked documents are protected by the Espionage Act and that accessing them under any circumstances is against the law, not simply a violation of government computer security policy.

"According to AFMC's legal office, Air Force members -- military or civilian -- may not legally access WikiLeaks at home on their personal, non-governmental computers, either. To do so would not only violate the SECAF [Secretary of the Air Force] guidance on this issue,... it would also subject the violator to prosecution for violation of espionage under the Espionage Act," the AFMC legal office said.

Then, in an astounding interpretive leap, the AFMC went on to say that similar prohibitions apply to the relatives of Air Force employees.

"If a family member of an Air Force employee accesses WikiLeaks on a home computer, the family member may be subject to prosecution for espionage under U.S. Code Title 18 Section 793."

This is a breathtaking claim that goes far beyond any previous reading of the espionage statutes.

"That has to be one of the worst policy/legal interpretations I have seen in my entire career," said William J. Bosanko, director of the Information Security Oversight Office, by email.

If taken seriously for a moment, the AFMC guidance raises a host of follow-on questions. What if a family member accessed WikiLeaks on a computer outside the home? What if a non-family member accessed WikiLeaks on the home computer? What if one learns that a neighbor has accessed WikiLeaks in the neighbor's home? Is the Air Force employee obliged to intervene or to report the violation to authorities? And how could any of this possibly be constitutional?

Since the AFMC guidance is not based in existing case law or past practice, these questions have no immediate answers.

Last December, a Department of Homeland Security official complained to Secrecy News that government policy on WikiLeaks produced the incongruous result that "my grandmother would be allowed to access the cables but not me." But if the new Air Force guidance can be believed, this is incorrect because the official's grandmother would be subject to prosecution under the Espionage Act.

In reality, there does not seem to be even a remote possibility that anyone's grandmother would be prosecuted in this way.

Instead, ironically enough, the real significance of the new AFMC guidance could lie in its potential use as evidence for the defense in one of the pending leak prosecutions under the Espionage Act. Defendants might argue that if the Espionage Act can be seriously construed by Air Force legal professionals to render a sizable fraction of the American public culpable of espionage, then the Act truly is impermissibly broad, vague and unconstitutional.

For a standard view of the general subject see "The Protection of Classified Information: The Legal Framework" (pdf), Congressional Research Service, January 10, 2011.


STEPHEN KIM LEAK DEFENSE CITES OVERCLASSIFICATION

"The government routinely overclassifies information," so the mere fact that something is classified is not sufficient to establish that its unauthorized disclosure is prohibited by law, according to a defense motion (pdf) that was filed last week in the case of former State Department contractor Stephen Kim. Mr. Kim was accused under the Espionage Act of leaking classified information to a news reporter, reportedly concerning North Korth's nuclear test program.

"There is no better evidence of this gross overclassification than this very case," the January 31 defense motion said. "Even though the news media has reported extensively on this case, including reporting on the name of the 'foreign country' it believes is at issue..., the prosecution claims that the name of that 'foreign country' is classified."

"Because the system of classification is an imperfect one, the court cannot simply interpret [the espionage statutes] to provide adequate constitutional notice any time the matter at hand pertains to a government employee alleged to have leaked classified information," the defense said in its motion to dismiss the charges against Mr. Kim.

Defense attorneys also argued that "leaking is widespread and has become an essential tool that is frequently employed by officials at every level of government." Yet prosecutions for leaking are comparatively rare, thereby resulting in "arbitrary and discriminatory enforcement." (See related coverage from Josh Gerstein and Marcy Wheeler.)

Perhaps the most interesting and original legal argument presented by the defense is that the use of the Espionage Act to punish unauthorized disclosures of classified information is an improper attempt to expand the definition of treason, whose scope is strictly limited by the Constitution.

The defense explained in a separate January 31 motion (pdf) that the framers of the Constitution, who were themselves "traitors" against the British, deliberately chose to limit the definition of political crimes against the nation to "levying war against [the United States], or... adhering to their Enemies, giving them Aid and Comfort." This definition of treason excluded other types of political actions against the government. In particular, the defense argued, it meant that acts of speech against the government could not be punished as treason.

"Today we typically look to the First Amendment to protect the freedom of speech, but the Framers of the original Constitution expected the Treason Clause to do some heavy lifting on that front, particularly because the First Amendment... was not added to the Constitution until later."

What is happening now, the defense said, is that "the government has taken conduct it alleges to have injured the state [namely leaking] and squeezed it into a successor statute [the Espionage Act] that punishes treason under a different name, but without providing Mr. Kim with the substantive and procedural guarantees that he is entitled to under the Constitution" in a case of treason, such as a requirement for the government to produce two witnesses to the alleged crime.

Mr. Kim is represented by Abbe D. Lowell and his colleagues at McDermott Will & Emery. Government responses to the defense motions are due March 2.


CIA VIEWS RUSSIAN CONCERNS OVER IRAN'S SPACE PROGRAM

Russian experts are persuaded that Iran's space program is serving to advance development of intercontinental ballistic missiles that could be used against targets throughout the Middle East and Russia, according to a CIA review of open source reporting.

"Over the past year Moscow appears to have become more worried about the security implications of assisting Tehran with the further development of its space capability," the November 2010 CIA report (pdf) said.

The CIA document was first reported by Bloomberg News ("Russian Scientists Worried Iran Uses Their Know-How for Missiles" by Roxana Tiron and Anthony Capaccio, February 3). A copy was obtained by Secrecy News. See "Russia: Security Concerns About Iran's Space Program Growing," CIA Open Source Works, November 16, 2010.

In Tehran today, Iranian officials displayed four new prototype satellites that they said would be launched in the near future.


POLITICAL TRANSITION IN TUNISIA, AND MORE FROM CRS

Noteworthy new reports from the Congressional Research Service include the following (all pdf).

"Political Transition in Tunisia," February 2, 2011.

"National Security Letters: Proposals in the 112th Congress," February 1, 2011.

"Murder or Attempted Murder of a Member of Congress and Other Federal Officials and Employees: Implications in Federal Criminal Law and Procedure of Events in Tucson," January 25, 2011.

"The U.S. Foreign-Born Population: Trends and Selected Characteristics," January 18, 2011.


_______________________________________________
Secrecy News is written by Steven Aftergood and published by the Federation of American Scientists.

The Secrecy News Blog is at:
http://www.fas.org/blog/secrecy/


ACCESSING WIKILEAKS VIOLATES ESPIONAGE ACT, USAF SAYS Secrecy News; Steven Aftergood - Bernice Moore - 10-02-2011

http://www.fas.org/blog/secrecy/


** AIR FORCE RESCINDS NEW GUIDANCE ON WIKILEAKS
** DER SPIEGEL ON "STAATSFEIND WIKILEAKS"
** ADMINISTERING CLASSIFICATION POLICY AT ODNI
** CIA ASSESSES FLOODING IN NORTH KOREA


AIR FORCE RESCINDS NEW GUIDANCE ON WIKILEAKS

Secrecy News reported Monday on strange new guidance from the Air Force Materiel Command declaring that Air Force employees and even their family members could be prosecuted under the Espionage Act for accessing the WikiLeaks web site. On Monday night that new guidance was abruptly withdrawn.

Lt. Col. Richard L. Johnson of Air Force Headquarters released this statement:

"Air Force Materiel Command (AFMC) recently published an internal news story that discussed the implications of downloading presumed classified information from WikiLeaks. The release was not previously coordinated with Headquarters Air Force and has been removed from the AFMC website. The Air Force has provided guidance to military members and employees to avoid downloading what could be classified information into Air Force unclassified networks and reminded them that publication of information does not itself constitute declassification of such information. The Air Force guidance did not address family members who are not Air Force members or employees. The Air Force defers to the Department of Justice in all non-military matters related to WikiLeaks."

A copy of the withdrawn release is archived here. See also "US air force backtracks over WikiLeaks ban" by Ewen MacAskill, The Guardian, February 8, and "No espionage charges for airmen on Wikileaks" by Scott Fontaine, Air Force Times, February 8.


DER SPIEGEL ON "STAATSFEIND WIKILEAKS"

"Aftergood is too close to the center of power," said Julian Assange. "He is not an independent fighter for freedom of information."

The passing criticism of me (I'm also "jealous") was the first thing that caught my eye in the new book "Staatsfeind WikiLeaks" by Der Spiegel reporters Marcel Rosenbach and Holger Stark. But the book itself is quite a bit more interesting and perceptive than that.

The authors, who are neither fans nor opponents of WikiLeaks, go out of their way to gather new information about the origins and development of the project. They seek out contrasting perspectives and bring them to bear in interesting and challenging ways. Of course, the story is unfinished.

"WikiLeaks is an organization in transition, with a dialectical relation to the mass media. WikiLeaks has changed journalism, but journalism has also changed WikiLeaks," they write.

See the Spiegel website on "Staatsfeind WikiLeaks" here. An English-language excerpt, published last month, is here.


ADMINISTERING CLASSIFICATION POLICY AT ODNI

At the Office of the Director of National Intelligence, "The original classification of information is rarely necessary," according to an October 2010 ODNI Instruction. But that's because most relevant information is already classified. There is not much need for new classification activity.

Several recent ODNI Instructions that govern the administration of the classification and declassification programs within the Office were released this week under the Freedom of Information Act (all pdf):

"Classification of ODNI Information," ODNI Instruction 80.12, October 25, 2010.

"Original Classification Authority Delegation," ODNI Instruction 80.16, October 21, 2010.

"ODNI Director, Information Management," ODNI Instruction 10.20, May 18, 2009.

"Particular care should be exercised to avoid both over and under classifying ODNI information," the Instructions say.


CIA ASSESSES FLOODING IN NORTH KOREA

CIA analysts studied data on major floods due to rainfall in North Korea since 1996 in order to devise a framework for evaluating the significance of such floods and their likely consequences for North Korean agriculture.

The analysts identified four principal variables: the intensity of the rainfall, the location of the rainfall, the time of year, and damage to non-agricultural infrastructure.

"Rainfall intensity and geography of flooding appear to be key variables with the most impact," their report (pdf) said. "Critical periods in the agricultural growth cycle -- for sowing, growing, and harvesting -- and the scope and severity of infrastructure damage are compounding variables that can magnify the impact of major floods in key food producing areas."

All four elements were present in 1996 and 2007, when flooding produced the most severe agricultural impact. But using the methodology described, analysts judge that the cumulative impact of two instances of heavy rain in 2010 "has been relatively low."

A copy of the CIA report was obtained by Secrecy News. See "North Korea: Assessing the Impact of Flooding on Agricultural Output," CIA Open Source Works, December 15, 2010.


_______________________________________________
Secrecy News is written by Steven Aftergood and published by the Federation of American Scientists.

The Secrecy News Blog is at:
http://www.fas.org/blog/secrecy/