THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGZac Darcy
USA Government wiretapping activities is a very controversial issue. Undoubtedly this technology can
assist law enforced authority to detect / identify unlawful or hostile activities; however, this task raises
severe privacy concerns. In this paper, we have discussed this complex information technology issue of
governmental wiretapping and how it effects both public and private liberties. Legislation has had a
major impact on the uses and the stigma of wiretapping for the war on terrorism. This paper also
analyzes the ethical and legal concerns inherent when discussing the benefits and concerns of
wiretapping. The analysis has concluded with the effects of wiretapping laws as they relate to future
government actions in their fight against terrorists.
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGZac Darcy
USA Government wiretapping activities is a very controversial issue. Undoubtedly this technology can
assist law enforced authority to detect / identify unlawful or hostile activities; however, this task raises
severe privacy concerns. In this paper, we have discussed this complex information technology issue of
governmental wiretapping and how it effects both public and private liberties. Legislation has had a
major impact on the uses and the stigma of wiretapping for the war on terrorism. This paper also
analyzes the ethical and legal concerns inherent when discussing the benefits and concerns of
wiretapping. The analysis has concluded with the effects of wiretapping laws as they relate to future
government actions in their fight against terrorists.
Anger swells after NSA phone records collection revelationstrupassion
The scale of America's surveillance state was laid bare on Thursday as senior politicians revealed that the US counter-terrorism effort had swept up swaths of personal data from the phone calls of millions of citizens for years.
After the revelation by the Guardian of a sweeping secret court order that authorised the FBI to seize all call records from a subsidiary of Verizon, the Obama administration sought to defuse mounting anger over what critics described as the broadest surveillance ruling ever issued.
small descripction between securtity and liberty. The patriot act.
We learned that with teh patriot act you do not have liberty because the government can look up into your personal life.
Causes of the Growing Conflict Between Privacy and SecurityDon Edwards
The struggle of maintaining an acceptable level of individual privacy is inherent in any society which values group protection from both internal and external threats. This paper illustrates the competing priorities that are the source of the conflict between privacy and security.
Reply to below posting in a paragraph of at least five sentences by.docxcarlt4
Reply to below posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions.
1)
Edward Snowden is a hero or a criminal
Edward Snowden, a low-level private contractor to the US-based National Security Agency (NSA), breached moral confidentiality and secrecy obligations by engaging in unauthorized accessing, retrieving and/or releasing of a large volume of confidential data from NSA to the press and, possibly, to foreign powers. Edward Snowden (born June 21, 1983) is a computer programmer who worked as a subcontractor for the National Security Agency (NSA). Snowden collected top-secret documents regarding NSA domestic surveillance practices that he found disturbing and leaked them. During his years of IT work, Snowden had noticed the far reach of the NSA's everyday surveillance.
“While working for Booz Allen, Snowden began copying top-secret NSA documents.”
(Biography.com, 2019) After he had compiled a large store of documents, Snowden told his NSA supervisor that he needed a leave of absence for medical reasons, stating he had been diagnosed with epilepsy. On May 20, 2013, Snowden took a flight to Hong Kong, China. (Biography.com, 2019)
As mentioned by author Rouse in her article referring, he leaked and also raised questions about data sovereignty and how secure a company's data really is if it's stored by a cloud provider based in the United States. In 2014, almost 90% of respondents to a survey commissioned by security consultancy NTT Communications said they were changing their cloud-buying behavior as a result of Snowden’s revelations. Just over half said they are carrying out greater due diligence on cloud providers than ever before, and more than four-fifths responded that they would seek out more training on data protection laws. (Rouse, 2015)
Snowden has also been accused of irregularities under the Espionage Law for knowingly discovering mysterious national security data. When these charges were opened, newspapers quickly guaranteed that he was accused of undercover work. Such cases are not exactly accurate. Undercover work is commonly characterized as
"the act of spying ... to acquire data on plans and exercises, particularly from an external government."
(Richa, (2015) Although there have been hypotheses as to whether the nations to which Snowden fled (Russia and China) have kept their records, there is still no evidence that he has continued to his advantage or helped them easily as would be the case. The situation with great recognition. (Richa, (2015)
Contrary to Snowden’s claim about wanting to stand up for his fellow Americans, the information he leaked actually created more harm than good.
“The majority of the information that he shared is about the U.S. spying on foreign nations and not its domestic operations.”
(Rachel Segal, 2019) As such, he risked damaging America’s relatio.
Anger swells after NSA phone records collection revelationstrupassion
The scale of America's surveillance state was laid bare on Thursday as senior politicians revealed that the US counter-terrorism effort had swept up swaths of personal data from the phone calls of millions of citizens for years.
After the revelation by the Guardian of a sweeping secret court order that authorised the FBI to seize all call records from a subsidiary of Verizon, the Obama administration sought to defuse mounting anger over what critics described as the broadest surveillance ruling ever issued.
small descripction between securtity and liberty. The patriot act.
We learned that with teh patriot act you do not have liberty because the government can look up into your personal life.
Causes of the Growing Conflict Between Privacy and SecurityDon Edwards
The struggle of maintaining an acceptable level of individual privacy is inherent in any society which values group protection from both internal and external threats. This paper illustrates the competing priorities that are the source of the conflict between privacy and security.
Reply to below posting in a paragraph of at least five sentences by.docxcarlt4
Reply to below posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions.
1)
Edward Snowden is a hero or a criminal
Edward Snowden, a low-level private contractor to the US-based National Security Agency (NSA), breached moral confidentiality and secrecy obligations by engaging in unauthorized accessing, retrieving and/or releasing of a large volume of confidential data from NSA to the press and, possibly, to foreign powers. Edward Snowden (born June 21, 1983) is a computer programmer who worked as a subcontractor for the National Security Agency (NSA). Snowden collected top-secret documents regarding NSA domestic surveillance practices that he found disturbing and leaked them. During his years of IT work, Snowden had noticed the far reach of the NSA's everyday surveillance.
“While working for Booz Allen, Snowden began copying top-secret NSA documents.”
(Biography.com, 2019) After he had compiled a large store of documents, Snowden told his NSA supervisor that he needed a leave of absence for medical reasons, stating he had been diagnosed with epilepsy. On May 20, 2013, Snowden took a flight to Hong Kong, China. (Biography.com, 2019)
As mentioned by author Rouse in her article referring, he leaked and also raised questions about data sovereignty and how secure a company's data really is if it's stored by a cloud provider based in the United States. In 2014, almost 90% of respondents to a survey commissioned by security consultancy NTT Communications said they were changing their cloud-buying behavior as a result of Snowden’s revelations. Just over half said they are carrying out greater due diligence on cloud providers than ever before, and more than four-fifths responded that they would seek out more training on data protection laws. (Rouse, 2015)
Snowden has also been accused of irregularities under the Espionage Law for knowingly discovering mysterious national security data. When these charges were opened, newspapers quickly guaranteed that he was accused of undercover work. Such cases are not exactly accurate. Undercover work is commonly characterized as
"the act of spying ... to acquire data on plans and exercises, particularly from an external government."
(Richa, (2015) Although there have been hypotheses as to whether the nations to which Snowden fled (Russia and China) have kept their records, there is still no evidence that he has continued to his advantage or helped them easily as would be the case. The situation with great recognition. (Richa, (2015)
Contrary to Snowden’s claim about wanting to stand up for his fellow Americans, the information he leaked actually created more harm than good.
“The majority of the information that he shared is about the U.S. spying on foreign nations and not its domestic operations.”
(Rachel Segal, 2019) As such, he risked damaging America’s relatio.
Our unstable world has left many American’s to consider the costs and benefits of national security and civil rights. This paper briefly reviews the States Secret Privilege, Foreign Intelligence Surveillance Act (FISA), and The Patriot Act. In response to the attacks to our financial capital in New York and our nation’s defense department, The Patriot Act was enacted. These expansive powers granted to protect our security are examined in terms of how the impact upon potential limitations to our Constitutional Rights.
Krempley 1
POL 300
Google/Multi-National Corporations, International Surveillance, and Human Rights
Abstract
The many news reports on cyber security, identity theft, Wikileaks, and NSA intelligence gathering programs over the past few years have shown the international community that the World Wide Web is anything but a safe place to store sensitive information, or any information for that matter. This study will examine how closely multi-national corporations in the information technology sector, such as Google, are involved with national governments on these issues. The study will analyze events in the U.S. and China and attempt to uncover whether or not these have directly infringed upon peoples’ basic human rights.
Question
With emerging information regarding the NSA's PRISM program and China's "Golden Shield Project", has either country directly infringed on peoples' basic human rights?
Hypothesis
As more information is uncovered regarding the true nature of the aims of these internationally implemented programs, it has become increasingly clear that there have been multiple violations of peoples' human rights in both the United States and China with their respective monitoring programs.
The NSA and the PRISM Project
"Since September 11th, 2001, the United States government has dramatically increased the ability of its intelligence agencies to collect and investigate information on both foreign subjects and US citizens. Some of these surveillance programs, including a secret program called PRISM, capture the private data of citizens who are not suspected of any connection to terrorism or any wrongdoing." (Sottek&Kopstein, 2013) Under the guise of a "war on terror", the United States government has consistently upped its efforts to gather as much information as possible regarding the activities of international and domestic citizens alike. Most U.S. citizens were wholly unaware that the government had been running a secret filtration program to determine threat levels of individual citizens both domestically and abroad. This PRISM project and its intentions have recently been leaked in the Edward Snowden fiasco that took the country and the media by storm.
"PRISM is a tool used by the US National Security Agency (NSA) to collect private electronic data belonging to users of major internet services like Gmail, Facebook, Outlook, and others. It’s the latest evolution of the US government’s post-9/11 electronic surveillance efforts, which began under President Bush with the Patriot Act, and expanded to include the Foreign Intelligence Surveillance Act (FISA) enacted in 2006 and 2007." (Sottek&Kopstein, 2013) FISA, "...may be the most powerful court you have never heard of -- operating out of a bunker-like complex blocks from the Capitol and the White House -- sealed tightly to prevent eavesdropping.The FISA Court's larger mission is to decide whether to grant certain types of government requests-- wiretapping, data anal ...
Cyber Espionage The Silent Crime of Cyberspace Virginia GOllieShoresna
Cyber Espionage: The Silent Crime of Cyberspace
Virginia Greiman
Boston University, Boston, USA
[email protected]
Abstract: In recent years, the disclosure of secrets through cyber infiltration of America’s largest intelligence organization,
the National Security Agency (NSA), has raised the fears of veteran intelligence officials and close allies around the globe that
no institution or government is secure from those who roam the discrete halls of cyberspace. Although espionage has existed
since before the days of the Greek mythological Trojan horse, no one could have envisioned the sophisticated use of
espionage in today’s networked world. Espionage has been used for political and military intelligence and economic and
industrial pursuits with a lack of understanding of all of the impacts on our daily lives. In the context of foreign or international
law, espionage is sometimes characterized as lawless, without controls or regulation, and it rarely distinguishes between
economic and security based cyber espionage. Through empirical analysis this paper explores the treatment of espionage
under various legal systems including those countries and regions considered the most advanced at cyber espionage, the
United States, the United Kingdom, Russia and China. To provide greater insight into the different perspectives of cyber
espionage from a legal standpoint, this paper distinguishes the law of national intelligence collection from the criminal laws
of economic/industrial espionage on the domestic front. The purpose of this research is to analyze the development of cyber
espionage as a preferred means of contemporary warfare, as well as a tool for economic and political intelligence. The paper
concludes by responding to the challenges faced by nation-states in the development of an effective legal system governing
espionage at the domestic and international level.
Keywords: cyber espionage, cybercrime, foreign surveillance, national intelligence, economic espionage, cyber warfare
1. Introduction
Although many countries all over the world are committing cyber espionage, the United States, Russia, and China
represent the most sophisticated cyber spying capabilities (Senate, 2014). A 2011 Report by the Office of the
National Counterintelligence Executive (ONCIX) suggested that the rise of cyberspace as a platform for
innovation and storage of trade secrets was greatly enhancing the risks faced by American firms. The report also
found that the United States remains the prime target for foreign economic collection and industrial espionage
by virtue of its global technological leadership and innovation (ONCIX, 2011).
Cyber espionage has also become an accepted and even preferred means of warfare. That is not to say that
cyber espionage will replace traditional means of warfare, but it is already affecting the nature of nation-state
conflict. Dunn Cavelty (2012) suggests that this shift began with the Cold War ...
Edward J. Snowden, the thirty-year-old former National Security Agen.docxelishaoatway
Edward J. Snowden, the thirty-year-old former National Security Agency contractor who handed over a treasure trove of classified documents about U.S. government surveillance to the Washington Post and Britain's Guardian, is a hero to some and a traitor to others. He claims to have acted out of a sense of outrage over the NSA's indiscriminate collection of the phone and internet records of Americans, decrying the danger such intrusive government oversight poses to democracy and privacy. Snowden subsequently fled to Hong Kong, and from there to Moscow. His eventual destination appears to be Ecuador, Cuba, or Venezuela.
Snowden's efforts to elude U.S. authorities cast an ambiguous light on his motives; the countries where he has sought refuge are not known for upholding the sort of democratic values he claims to be defending. While demanding accountability from the U.S. government, he appears to be seeking immunity for his own actions. Snowden's purposes and fate, however, should be of secondary concern. However misguided his actions may have been, they have reopened a much-needed debate about the reach and authority of what is often called the National Security State. While defending the NSA programs, even President Barack Obama seems to welcome that debate. "You can't have 100 percent security and also then have 100 percent privacy and zero inconvenience," Obama noted when asked about Snowden's leaks. "We're going to have to make some choices as a society. ... There are trade-offs involved."
Administration officials and members of Congress say the government's extensive surveillance programs are crucial to preventing terrorist attacks, and that Snowden has done real damage to efforts to keep Americans safe. Because almost all the relevant information remains classified, it is difficult to assess that claim. NSA officials have now promised to make public details of some of the dozens of terrorist plots they say the massive data-collection effort, called Prism, has helped thwart. That sort of disclosure is long overdue. Although Prism was approved by the Foreign Intelligence Surveillance Act court and is monitored by the intelligence committees of Congress, many Americans were shocked to learn that the government now stores their phone and internet records for possible use in future investigations. While the government is prohibited from listening to the tracked calls, it uses sophisticated algorithms to trace calling patterns. If a series of related calls seems suspicious, the NSA or FBI then gets a warrant from the FISA court to investigate further. No abuse of those procedures has come to light. Still, the mere existence of such records in the government's hands, information that might easily be exploited for political purposes, should concern every American.
It is axiomatic that fighting clandestine terrorist groups requires clandestine methods. Sources and allies must be protected; in preemptive actions the element of surprise must be prese.
Article CritiqueThis assignment provides you with an opportunity t.docxrosemaryralphs52525
Article Critique
This assignment provides you with an opportunity to read an article and then to share your thoughts about the article by critiquing the details, including the decisions made.In order to access the resource below, you must first log into the myCSU Student Portal and access the AcademicOneFile database within the CSU Online Library.This article includes details and assertions about the ethical choices/decisions made by Edward J. Snowden, a formerNational Security Agency (NSA) contractor. Here is the reference citation for the article:Securing our liberty. (2013). Commonweal, 140(12), 5.After reading the article, draft a two-page response by discussing the U.S. government’s decision to acquire phone andinternet data without disclosing its intentions to citizens. For this assignment, consider the NSA as an organization (i.e.,business) and Snowden as a manager. How have the decisions of this event impacted the fairness of the U.S.government, its citizens, and Snowden? How did ethics, perhaps, influence Snowden’s decision to leak information? Inthis event, what is the greater good and also the consequences/sacrifices of that greater good? Based on the details ofthis event, what can we learn about making important decisions as a leader and manager?This event was covered by several news and media organizations, so there should be plenty of articles in the library.Conduct a bit more research in the online library related to this event involving Edward Snowden and the U.S.government—see what else you can discover about the event to determine an appropriate punishment, if any, forSnowden’s conduct. Include at least one additional source from the library in your response.The purpose of this assignment is for you to think critically about managers (and other leaders) making importantdecisions, and the process managers use to make important decisions. Consider how important it is to collect all of thefacts before making an important decision, such as those involving fairness and ethics.Use APA Style to format your response. Proofread your work, and submit it in Blackboard for grading.Information about accessing the Blackboard Grading Rubric for this assignment is provided below.
Below is the article.
Edward J. Snowden, the thirty-year-old former National Security Agency contractor who handed over a treasure trove of classified documents about U.S. government surveillance to the Washington Post and Britain's Guardian, is a hero to some and a traitor to others. He claims to have acted out of a sense of outrage over the NSA's indiscriminate collection of the phone and internet records of Americans, decrying the danger such intrusive government oversight poses to democracy and privacy. Snowden subsequently fled to Hong Kong, and from there to Moscow. His eventual destination appears to be Ecuador, Cuba, or Venezuela.
Snowden's efforts to elude U.S. authorities cast an ambiguous light on his motives; the countries where he has sought refuge.
Running Head: INTELLIGENCE GATHERING 1
INTELLIGENCE GATHERING
The Intelligence Gathering Debate
Joshua Rodgers
HSM 101 Introduction to Homeland Security
Instructor: Raymond Edwards
04/08/2019
The Intelligence Gathering Debate
Everyone would agree that the world has experienced increased incidences of terrorism in different countries leading to the loss of thousands of lives. This necessitated changing how intelligence is gathered and handled. For example, the September 11 attack on the American soil prompted changes in the security measures to protect the country from more attacks. These changes highlighted the challenges posed by technological advancement and how it impacts intelligence gathering (Gray, 2016). Moreover, there are concerns about infringing on privacy rights in the name of intelligence gathering and oftentimes, the 4th Amendment to the Federal Constitution is cited in arguing against interfering with the right to privacy in gathering intelligence. This paper provides a comprehensive view of intelligence gathering.
Question I
There is no doubt that intelligence plays a crucial role in the intensified fight against terrorism both within the United States and across the globe. For instance, it plays a pivotal role in diminishing the tactical effects and strategies employed by terrorists. In other words, it is seen as the best weapon in the war against terrorism. Actionable intelligence plays an important role in defending a nation against threats and improving emergency response (Gray, 2016). More importantly, it enables a country to beef up security and prevent terror attacks. Equally, an effective intelligence system in place gets the right information to the right people at the right time thus enabling the Department of Homeland Security to respond in time and extinguish terror attacks before they happen.
Question II
There are several constitutional issues that are raised regarding the gathering of intelligence. For example, many legal scholars argue that personal privacy must be protected at all costs from the encroachment of a surveillance state (Gregory, 2016). It is therefore important to appreciate that there is a complex relationship between intelligence gathering for national security and the need to safeguard individual privacy. According to the Federal Constitution, the 4th Amendment prohibits unreasonable search and seizure. Unfortunately, technology has increasingly become sophisticated and this may necessitate the need to change the law in order to legal battles they may be raised with regards to the gathering of intelligence without violating the law.
Question III
It is imperative to appreciate the fact that the United States Federal government may collect emails, cell phones, and other electronic data from American citizens witho.
WINDING UP of COMPANY, Modes of DissolutionKHURRAMWALI
Winding up, also known as liquidation, refers to the legal and financial process of dissolving a company. It involves ceasing operations, selling assets, settling debts, and ultimately removing the company from the official business registry.
Here's a breakdown of the key aspects of winding up:
Reasons for Winding Up:
Insolvency: This is the most common reason, where the company cannot pay its debts. Creditors may initiate a compulsory winding up to recover their dues.
Voluntary Closure: The owners may decide to close the company due to reasons like reaching business goals, facing losses, or merging with another company.
Deadlock: If shareholders or directors cannot agree on how to run the company, a court may order a winding up.
Types of Winding Up:
Voluntary Winding Up: This is initiated by the company's shareholders through a resolution passed by a majority vote. There are two main types:
Members' Voluntary Winding Up: The company is solvent (has enough assets to pay off its debts) and shareholders will receive any remaining assets after debts are settled.
Creditors' Voluntary Winding Up: The company is insolvent and creditors will be prioritized in receiving payment from the sale of assets.
Compulsory Winding Up: This is initiated by a court order, typically at the request of creditors, government agencies, or even by the company itself if it's insolvent.
Process of Winding Up:
Appointment of Liquidator: A qualified professional is appointed to oversee the winding-up process. They are responsible for selling assets, paying off debts, and distributing any remaining funds.
Cease Trading: The company stops its regular business operations.
Notification of Creditors: Creditors are informed about the winding up and invited to submit their claims.
Sale of Assets: The company's assets are sold to generate cash to pay off creditors.
Payment of Debts: Creditors are paid according to a set order of priority, with secured creditors receiving payment before unsecured creditors.
Distribution to Shareholders: If there are any remaining funds after all debts are settled, they are distributed to shareholders according to their ownership stake.
Dissolution: Once all claims are settled and distributions made, the company is officially dissolved and removed from the business register.
Impact of Winding Up:
Employees: Employees will likely lose their jobs during the winding-up process.
Creditors: Creditors may not recover their debts in full, especially if the company is insolvent.
Shareholders: Shareholders may not receive any payout if the company's debts exceed its assets.
Winding up is a complex legal and financial process that can have significant consequences for all parties involved. It's important to seek professional legal and financial advice when considering winding up a company.
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselThomas (Tom) Jasper
Military Commissions Trial Judiciary, Guantanamo Bay, Cuba. Notice of the Chief Defense Counsel's detailing of LtCol Thomas F. Jasper, Jr. USMC, as Detailed Defense Counsel for Abd Al Hadi Al-Iraqi on 6 August 2014 in the case of United States v. Hadi al Iraqi (10026)
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
Agrarian Reform Policies in the Philippines: a quiz
Argument for Snowden Clemency
1. Margaret Hoisington 2/11/2014
Argument in Favor of Clemency for Edward Snowden
Within recent years, the development of information technology has created a
growing conflict between privacy rights and national security, presenting major
challenges to the United States legal system. The use of modern technology allows the
United States government to gather enormous amounts of intelligence, a valuable tool in
the investigation, prevention and prosecution of criminal or terrorist behavior. However,
public opinion varies on how constitutional law applies within this context and the
potential exists for government abuse of power. These are the issues at the center of
Edward Snowden’s leak of NSA documents, classified information that he had access to
while working for the National Security Agency (NSA) in Hawaii through subcontractor
Booz Allen Hamilton. He was employed through Booz Allen for less than three months,
during which he collected top-secret NSA documents related to the agency’s domestic
and international surveillance programs. He believed that these leaks would expose
constitutional violations of the NSA to the public and hopefully prompt reform that
would lead to increased government transparency.
The Government Accountability Program (GAP) defines whistleblowing as the
disclosure of information that is reasonably believed to be evidence of a violation of any
law, rule, regulation, gross mismanagement, gross waste of funds, abuse of authority or
substantial and specific danger to public health or safety (McCutcheon, 2014). Although
many of the violations that Snowden intended to expose remain under investigation or
considerable debate, at least some of them have been confirmed. In March 2013, the
Director of National Intelligence, James Clapper, stated before Congress that the NSA
2. had not intentionally collected information on ordinary Americans, which Snowden knew
was not true at the time (Greenberg, 2013). Whether or not it is decided that the NSA’s
domestic surveillance is violates the constitution, it is clear from the information leaked
that Clapper had lied under oath. If the intelligence community director is known to have
lied in a public forum on at least one occasion, the credibility of both the director and the
agencies can be questioned during other instances as well. In December 2013, U.S.
District Judge Richard Leon ruled that the NSA’s telephone snooping violated the
constitution (Savage 2013) but then weeks later, U.S. District Judge William Pauley ruled
that the collection of phone records was legal under Section 215 of the Patriot Act (Perez,
2013). This sparked considerable debate on whether the collection of the phone data is
constitutional, prompting movements to amend the act to prevent further abuses in
violation of First and Fourth Amendment rights. Snowden’s actions provided a catalyst
for these debates and the demands for reform but they have yet to directly result in any
clearly measurable threat to the security of the United States.
Although the disclosures made by Snowden fall within the definition of
whistleblowing, whistleblower rights are more limited for federal intelligence agency
employees in order to prevent unauthorized disclosures of information that could pose a
threat to national security. The Intelligence Community Whistleblower Protection Act of
1998 (ICWPA) provides a process for federal agency employees to submit urgent
concerns to Congress with protection from retaliation and to ensure that classified
information and materials are properly handled. The law defines “urgent concern” as any
serious problem, abuse, violation of law or Executive order relating to the operations of
an intelligence activity involving classified information, false statement to Congress or an
3. action constituting reprisal or threat of reprisal in response to the employee’s report.
However, the GAP has criticized the ICWPA stating that, “It fails to provide substantive
protection against retaliatory personnel action and creates no mechanism for corrective
actions” (Clayton, 2013).
In the early 2000s, former NSA executive Thomas Drake had opposed an NSA
program called Trailblazer because of its violation of privacy and other laws, causing him
to complain internally as outlined by the ICWPA. By 2004 Trailblazer had been deemed
an expensive failure and the Department of Defense acknowledged the problems at NSA
but nothing was reported to the public. In 2010, Drake was indicted for violations of the
Espionage Act after he disclosed information in 2005 to a reporter about fraud and abuse
at the agency. The case never went to trial and the parties reached a plea agreement in
which Drake was sentenced to one year of probation and 240 hours of community service
(Wise, 2011). Snowden has stated that he first attempted to deal with the issues through
the internal route and that he made a considerable effort to get those with the proper
clearance to listen and take action. His attempts generated concern from the coworkers
and supervisors he spoke with but no one was willing to take on the personal risk
associated with pursuing the matter further. Snowden had been witness to behavior such
as Clapper’s lie to Congress and knew what resulted when Drake attempted to use the
procedures of ICWPA so he was aware that any attempts to address his concerns
internally would most likely fail to elicit any solutions.
The United States has filed charges against Snowden for theft of government
property and violation of the Espionage Act by unauthorized communication of national
defense information and willful communication of classified communications intelligence
4. information to an unauthorized person (Zakaria & Hosenball, 2013). The Espionage Act
was passed in 1917 to make it a crime for foreign or domestic spies to provide
information in an attempt to harm the U.S. or to help its enemies. Before the current
administration it had only been used six times as a way to prosecute leaker but Snowden
is the eighth person to be charged under the Espionage Act in this way since the start of
the Obama administration alone (Caplan, 2013). In United States v. Morison, 488 U.S.
908 (1988) the act was used for the first time to convict a government official for giving
classified information to the press, although Morison was later pardoned in 2001. In this
case the court stated that, “the government must still be required to prove that it was in
fact “potentially damaging to the United States or might be useful to an enemy”, but in a
July 2013 ruling, US District Court Judge Kollar-Kotelly disagreed with that precedent,
saying that the terms of the act do not require proof of any harm (Kim, 2013). Snowden’s
intent in making the disclosures and whether or not they resulted in any real danger or
were of value to the public would therefore be inadmissible in court against violations of
the Espionage Act.
In 2013, Federal District Judge Richard Leon’s ruling in Klayman v. Obama
required the government to stop collecting data on the personal calls of the plaintiffs and
to destroy records of their call history, stating that the NSA program of collecting records
of phone calls is most likely a violation of the Constitution. He wrote that the government
wasn’t able to provide “a single instance in which analysis of the N.S.A.’s bulk metadata
collection actually stopped an imminent attack, or otherwise aided the government in
achieving any objective that was time-sensitive” (Savage, 2013). The precedent set by
Smith v. Maryland, 442 U.S. 735 (1979) is that there is no reasonable expectation of
5. privacy for information supplied to third parties, which was what excluded the NSA
collection of metadata from protection by the Fourth Amendment. Leon writes that a
decision from 1979 does not apply today given that the evolution of our relationship with
phones results in telephone metadata that contains more information and that modern
technology allows the Government to store and analyze that information in ways that
qualify it as an unreasonable search .
Actions taken by the Government in the events leading up to and surrounding
Snowden’s leaks are grounds upon which it can be charged with violating the First
Amendment. The United States is a self-governing society in which the power to decide
on issues of public policy belongs to the citizens and to make these decisions it is
necessary for them to be able to access all related information without the interference of
the government. In New York Times co. v. United States, 403 U.S. 713 (1971), which
involved use of the Espionage Act, the court stated that, “the guarding of military and
diplomatic secrets at the expense of informed representative government provides no real
security for our Republic.” More recently the court has also said that, “state action to
punish the publication of truthful information seldom can satisfy constitutional
standards.” Bartnicki v. Vopper, 532 U.S. 514 (2001). If the government cannot
demonstrate a compelling need to enforce punishment of the disclosures in order to
protect national security, they have violated the First Amendment by restricting access to
that information and by seeking retribution for the person who exposed it. Within this
case, the Government violations of First Amendment rights carry more weight than a
claim of the potential threats to national security. The level of public debate over the
6. statutes that are at the center of this case would make them an inappropriate basis for the
prosecution of Snowden and therefore he should be granted clemency.
7. References
Edward Snowden. (2014). The Biography Channel website. Retrieved from
http://www.biography.com/people/edward-snowden-21262897
Caplan, Lincoln. (2013) "Leaks and Consequences: Why Treating Leakers as Spies Puts
Journalists at Legal Risk." The American Scholar 82.4: 20+. Academic OneFile.
Web. 7 Feb. 2014.
Clayton, Mark. (June 2013). “Edward Snowden: Whistleblowing protections most likely
won’t help.” Christian Science Monitor. Retrieved
fromhttp://www.csmonitor.com/USA/Justice/2013/0614/Edward-Snowden-
Whistle-blowing-protections-most-likely-won-t-help/(page)/2
Greenberg, Andy. (July 2013). “National Intelligence Director Clapper Apologizes.”
Forbes. Retrieved from
http://www.forbes.com/sites/andygreenberg/2013/07/02/national-intelligence-director-
clapper-apologizes-for-clearly-erroneous-congressional-testimony-on-nsa-
surveillance/
Kim, Douglas. (August 2013). “US District Court Judge Suppresses Whistleblower
Protections in Favor of Government Secrecy.” Government Accountability
Project. Retrieved from
http://www.whistleblower.org/blog/44-2013/2869-us-district-court-judge-suppresses-
whistleblower-protections-in-favor-of-government-secrecy
McCutcheon, C. (2014, January 31). Whistleblowers. CQ Researcher, 24, 97-120.
Retrieved from http://library.cqpress.com/cqresearcher/
Savage, Charlie. (December 2013) “Judge Questions Legality of NSA Phone Records.”
New York Times. Retrieved from
8. http://www.nytimes.com/2013/12/17/us/politics/federal-judge-rules-against-nsa-phone-
data-program.html?pagewanted=1&_r=1&
Perez, Evan. (December 2013) “Judge Rules NSA Collection of Phone Records is
Legal.” CNN. Retrieved from
http://www.cnn.com/2013/12/27/justice/nsa-ruling
Wise, David. (August 2011). “Leaks and the Law: The Story of Thomas Drake.”
Smithsonian Magazine. Retrieved from
http://www.smithsonianmag.com/history/leaks-and-the-law-the-story-of-thomas-drake-
14796786/?all
Zakaria, T., Hosenball, M. (June 2013). “Edward Snowden Charged with Espionage Over
NSA Leaks.” Huffington Post. Retrieved from
http://www.huffingtonpost.com/2013/06/21/edward-snowden-charged_
n_3480984.html