SlideShare a Scribd company logo
Margaret Hoisington 2/11/2014 
Argument in Favor of Clemency for Edward Snowden 
Within recent years, the development of information technology has created a 
growing conflict between privacy rights and national security, presenting major 
challenges to the United States legal system. The use of modern technology allows the 
United States government to gather enormous amounts of intelligence, a valuable tool in 
the investigation, prevention and prosecution of criminal or terrorist behavior. However, 
public opinion varies on how constitutional law applies within this context and the 
potential exists for government abuse of power. These are the issues at the center of 
Edward Snowden’s leak of NSA documents, classified information that he had access to 
while working for the National Security Agency (NSA) in Hawaii through subcontractor 
Booz Allen Hamilton. He was employed through Booz Allen for less than three months, 
during which he collected top-secret NSA documents related to the agency’s domestic 
and international surveillance programs. He believed that these leaks would expose 
constitutional violations of the NSA to the public and hopefully prompt reform that 
would lead to increased government transparency. 
The Government Accountability Program (GAP) defines whistleblowing as the 
disclosure of information that is reasonably believed to be evidence of a violation of any 
law, rule, regulation, gross mismanagement, gross waste of funds, abuse of authority or 
substantial and specific danger to public health or safety (McCutcheon, 2014). Although 
many of the violations that Snowden intended to expose remain under investigation or 
considerable debate, at least some of them have been confirmed. In March 2013, the 
Director of National Intelligence, James Clapper, stated before Congress that the NSA
had not intentionally collected information on ordinary Americans, which Snowden knew 
was not true at the time (Greenberg, 2013). Whether or not it is decided that the NSA’s 
domestic surveillance is violates the constitution, it is clear from the information leaked 
that Clapper had lied under oath. If the intelligence community director is known to have 
lied in a public forum on at least one occasion, the credibility of both the director and the 
agencies can be questioned during other instances as well. In December 2013, U.S. 
District Judge Richard Leon ruled that the NSA’s telephone snooping violated the 
constitution (Savage 2013) but then weeks later, U.S. District Judge William Pauley ruled 
that the collection of phone records was legal under Section 215 of the Patriot Act (Perez, 
2013). This sparked considerable debate on whether the collection of the phone data is 
constitutional, prompting movements to amend the act to prevent further abuses in 
violation of First and Fourth Amendment rights. Snowden’s actions provided a catalyst 
for these debates and the demands for reform but they have yet to directly result in any 
clearly measurable threat to the security of the United States. 
Although the disclosures made by Snowden fall within the definition of 
whistleblowing, whistleblower rights are more limited for federal intelligence agency 
employees in order to prevent unauthorized disclosures of information that could pose a 
threat to national security. The Intelligence Community Whistleblower Protection Act of 
1998 (ICWPA) provides a process for federal agency employees to submit urgent 
concerns to Congress with protection from retaliation and to ensure that classified 
information and materials are properly handled. The law defines “urgent concern” as any 
serious problem, abuse, violation of law or Executive order relating to the operations of 
an intelligence activity involving classified information, false statement to Congress or an
action constituting reprisal or threat of reprisal in response to the employee’s report. 
However, the GAP has criticized the ICWPA stating that, “It fails to provide substantive 
protection against retaliatory personnel action and creates no mechanism for corrective 
actions” (Clayton, 2013). 
In the early 2000s, former NSA executive Thomas Drake had opposed an NSA 
program called Trailblazer because of its violation of privacy and other laws, causing him 
to complain internally as outlined by the ICWPA. By 2004 Trailblazer had been deemed 
an expensive failure and the Department of Defense acknowledged the problems at NSA 
but nothing was reported to the public. In 2010, Drake was indicted for violations of the 
Espionage Act after he disclosed information in 2005 to a reporter about fraud and abuse 
at the agency. The case never went to trial and the parties reached a plea agreement in 
which Drake was sentenced to one year of probation and 240 hours of community service 
(Wise, 2011). Snowden has stated that he first attempted to deal with the issues through 
the internal route and that he made a considerable effort to get those with the proper 
clearance to listen and take action. His attempts generated concern from the coworkers 
and supervisors he spoke with but no one was willing to take on the personal risk 
associated with pursuing the matter further. Snowden had been witness to behavior such 
as Clapper’s lie to Congress and knew what resulted when Drake attempted to use the 
procedures of ICWPA so he was aware that any attempts to address his concerns 
internally would most likely fail to elicit any solutions. 
The United States has filed charges against Snowden for theft of government 
property and violation of the Espionage Act by unauthorized communication of national 
defense information and willful communication of classified communications intelligence
information to an unauthorized person (Zakaria & Hosenball, 2013). The Espionage Act 
was passed in 1917 to make it a crime for foreign or domestic spies to provide 
information in an attempt to harm the U.S. or to help its enemies. Before the current 
administration it had only been used six times as a way to prosecute leaker but Snowden 
is the eighth person to be charged under the Espionage Act in this way since the start of 
the Obama administration alone (Caplan, 2013). In United States v. Morison, 488 U.S. 
908 (1988) the act was used for the first time to convict a government official for giving 
classified information to the press, although Morison was later pardoned in 2001. In this 
case the court stated that, “the government must still be required to prove that it was in 
fact “potentially damaging to the United States or might be useful to an enemy”, but in a 
July 2013 ruling, US District Court Judge Kollar-Kotelly disagreed with that precedent, 
saying that the terms of the act do not require proof of any harm (Kim, 2013). Snowden’s 
intent in making the disclosures and whether or not they resulted in any real danger or 
were of value to the public would therefore be inadmissible in court against violations of 
the Espionage Act. 
In 2013, Federal District Judge Richard Leon’s ruling in Klayman v. Obama 
required the government to stop collecting data on the personal calls of the plaintiffs and 
to destroy records of their call history, stating that the NSA program of collecting records 
of phone calls is most likely a violation of the Constitution. He wrote that the government 
wasn’t able to provide “a single instance in which analysis of the N.S.A.’s bulk metadata 
collection actually stopped an imminent attack, or otherwise aided the government in 
achieving any objective that was time-sensitive” (Savage, 2013). The precedent set by 
Smith v. Maryland, 442 U.S. 735 (1979) is that there is no reasonable expectation of
privacy for information supplied to third parties, which was what excluded the NSA 
collection of metadata from protection by the Fourth Amendment. Leon writes that a 
decision from 1979 does not apply today given that the evolution of our relationship with 
phones results in telephone metadata that contains more information and that modern 
technology allows the Government to store and analyze that information in ways that 
qualify it as an unreasonable search . 
Actions taken by the Government in the events leading up to and surrounding 
Snowden’s leaks are grounds upon which it can be charged with violating the First 
Amendment. The United States is a self-governing society in which the power to decide 
on issues of public policy belongs to the citizens and to make these decisions it is 
necessary for them to be able to access all related information without the interference of 
the government. In New York Times co. v. United States, 403 U.S. 713 (1971), which 
involved use of the Espionage Act, the court stated that, “the guarding of military and 
diplomatic secrets at the expense of informed representative government provides no real 
security for our Republic.” More recently the court has also said that, “state action to 
punish the publication of truthful information seldom can satisfy constitutional 
standards.” Bartnicki v. Vopper, 532 U.S. 514 (2001). If the government cannot 
demonstrate a compelling need to enforce punishment of the disclosures in order to 
protect national security, they have violated the First Amendment by restricting access to 
that information and by seeking retribution for the person who exposed it. Within this 
case, the Government violations of First Amendment rights carry more weight than a 
claim of the potential threats to national security. The level of public debate over the
statutes that are at the center of this case would make them an inappropriate basis for the 
prosecution of Snowden and therefore he should be granted clemency.
References 
Edward Snowden. (2014). The Biography Channel website. Retrieved from 
http://www.biography.com/people/edward-snowden-21262897 
Caplan, Lincoln. (2013) "Leaks and Consequences: Why Treating Leakers as Spies Puts 
Journalists at Legal Risk." The American Scholar 82.4: 20+. Academic OneFile. 
Web. 7 Feb. 2014. 
Clayton, Mark. (June 2013). “Edward Snowden: Whistleblowing protections most likely 
won’t help.” Christian Science Monitor. Retrieved 
fromhttp://www.csmonitor.com/USA/Justice/2013/0614/Edward-Snowden- 
Whistle-blowing-protections-most-likely-won-t-help/(page)/2 
Greenberg, Andy. (July 2013). “National Intelligence Director Clapper Apologizes.” 
Forbes. Retrieved from 
http://www.forbes.com/sites/andygreenberg/2013/07/02/national-intelligence-director- 
clapper-apologizes-for-clearly-erroneous-congressional-testimony-on-nsa- 
surveillance/ 
Kim, Douglas. (August 2013). “US District Court Judge Suppresses Whistleblower 
Protections in Favor of Government Secrecy.” Government Accountability 
Project. Retrieved from 
http://www.whistleblower.org/blog/44-2013/2869-us-district-court-judge-suppresses- 
whistleblower-protections-in-favor-of-government-secrecy 
McCutcheon, C. (2014, January 31). Whistleblowers. CQ Researcher, 24, 97-120. 
Retrieved from http://library.cqpress.com/cqresearcher/ 
Savage, Charlie. (December 2013) “Judge Questions Legality of NSA Phone Records.” 
New York Times. Retrieved from
http://www.nytimes.com/2013/12/17/us/politics/federal-judge-rules-against-nsa-phone- 
data-program.html?pagewanted=1&_r=1& 
Perez, Evan. (December 2013) “Judge Rules NSA Collection of Phone Records is 
Legal.” CNN. Retrieved from 
http://www.cnn.com/2013/12/27/justice/nsa-ruling 
Wise, David. (August 2011). “Leaks and the Law: The Story of Thomas Drake.” 
Smithsonian Magazine. Retrieved from 
http://www.smithsonianmag.com/history/leaks-and-the-law-the-story-of-thomas-drake- 
14796786/?all 
Zakaria, T., Hosenball, M. (June 2013). “Edward Snowden Charged with Espionage Over 
NSA Leaks.” Huffington Post. Retrieved from 
http://www.huffingtonpost.com/2013/06/21/edward-snowden-charged_ 
n_3480984.html

More Related Content

What's hot

The Background Investigator October 2013 Edition
The Background Investigator October 2013 EditionThe Background Investigator October 2013 Edition
The Background Investigator October 2013 Edition
Steven Brownstein
 
80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillance
skimkiper
 
Case 9 Security vs Privacy
Case 9 Security vs PrivacyCase 9 Security vs Privacy
Case 9 Security vs Privacy
jbaton
 
Final Paper Com 300
Final Paper Com 300Final Paper Com 300
Final Paper Com 300William Beer
 
Civil Liberties.New Intelligence.FinalPaper
Civil Liberties.New Intelligence.FinalPaperCivil Liberties.New Intelligence.FinalPaper
Civil Liberties.New Intelligence.FinalPaperPaul Dickson
 
Usa patriot act
Usa patriot actUsa patriot act
Usa patriot actesounds
 
Targeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTargeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTeresa Long
 
Final presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Act
gbsmith5
 
Usa Patriot Act
Usa Patriot ActUsa Patriot Act
Usa Patriot Act
waymanside345
 
Privacy and the Government
Privacy and the GovernmentPrivacy and the Government
Privacy and the Government
primeteacher32
 
Poliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bgPoliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bg
Bryan Gaston
 
Anger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelationsAnger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelations
trupassion
 
Edited basic newsgathering and publication speech (00006477)[1]
Edited basic newsgathering and publication speech (00006477)[1]Edited basic newsgathering and publication speech (00006477)[1]
Edited basic newsgathering and publication speech (00006477)[1]internewsarmenia
 
The patriot act
The patriot act The patriot act
The patriot act
Regina Gutierrez
 
Internship paper
Internship paperInternship paper
Internship paperJosiah Rand
 
Excerpt - Georgetown Undergraduate Law Review
Excerpt - Georgetown Undergraduate Law ReviewExcerpt - Georgetown Undergraduate Law Review
Excerpt - Georgetown Undergraduate Law Review
mdespardmoore
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
The patriot act
The patriot actThe patriot act
The patriot actpalita Px
 
Appellate Brief Moot Court 2015 (Part 2) Argument
Appellate Brief Moot Court 2015 (Part 2) ArgumentAppellate Brief Moot Court 2015 (Part 2) Argument
Appellate Brief Moot Court 2015 (Part 2) ArgumentJose Gerez
 

What's hot (20)

The Background Investigator October 2013 Edition
The Background Investigator October 2013 EditionThe Background Investigator October 2013 Edition
The Background Investigator October 2013 Edition
 
80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillance
 
Case 9 Security vs Privacy
Case 9 Security vs PrivacyCase 9 Security vs Privacy
Case 9 Security vs Privacy
 
Final Paper Com 300
Final Paper Com 300Final Paper Com 300
Final Paper Com 300
 
Civil Liberties.New Intelligence.FinalPaper
Civil Liberties.New Intelligence.FinalPaperCivil Liberties.New Intelligence.FinalPaper
Civil Liberties.New Intelligence.FinalPaper
 
Usa patriot act
Usa patriot actUsa patriot act
Usa patriot act
 
USA Patriot Act
USA Patriot ActUSA Patriot Act
USA Patriot Act
 
Targeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTargeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the Sky
 
Final presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Act
 
Usa Patriot Act
Usa Patriot ActUsa Patriot Act
Usa Patriot Act
 
Privacy and the Government
Privacy and the GovernmentPrivacy and the Government
Privacy and the Government
 
Poliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bgPoliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bg
 
Anger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelationsAnger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelations
 
Edited basic newsgathering and publication speech (00006477)[1]
Edited basic newsgathering and publication speech (00006477)[1]Edited basic newsgathering and publication speech (00006477)[1]
Edited basic newsgathering and publication speech (00006477)[1]
 
The patriot act
The patriot act The patriot act
The patriot act
 
Internship paper
Internship paperInternship paper
Internship paper
 
Excerpt - Georgetown Undergraduate Law Review
Excerpt - Georgetown Undergraduate Law ReviewExcerpt - Georgetown Undergraduate Law Review
Excerpt - Georgetown Undergraduate Law Review
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
The patriot act
The patriot actThe patriot act
The patriot act
 
Appellate Brief Moot Court 2015 (Part 2) Argument
Appellate Brief Moot Court 2015 (Part 2) ArgumentAppellate Brief Moot Court 2015 (Part 2) Argument
Appellate Brief Moot Court 2015 (Part 2) Argument
 

Similar to Argument for Snowden Clemency

Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
Don Edwards
 
Reply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxReply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docx
carlt4
 
Freedoms forsaken
Freedoms forsakenFreedoms forsaken
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
DIPESH30
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
OllieShoresna
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
elishaoatway
 
Article CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxArticle CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docx
rosemaryralphs52525
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
Toya Shamberger
 
Running Head INTELLIGENCE GATHERING .docx
Running Head INTELLIGENCE GATHERING                              .docxRunning Head INTELLIGENCE GATHERING                              .docx
Running Head INTELLIGENCE GATHERING .docx
wlynn1
 

Similar to Argument for Snowden Clemency (10)

Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
Reply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxReply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docx
 
Freedoms forsaken
Freedoms forsakenFreedoms forsaken
Freedoms forsaken
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
 
Article CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxArticle CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docx
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
 
Running Head INTELLIGENCE GATHERING .docx
Running Head INTELLIGENCE GATHERING                              .docxRunning Head INTELLIGENCE GATHERING                              .docx
Running Head INTELLIGENCE GATHERING .docx
 

Recently uploaded

Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
johncavitthouston
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
niputusriwidiasih
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
KHURRAMWALI
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
anvithaav
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Thomas (Tom) Jasper
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
ssuser5750e1
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
o6ov5dqmf
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
ssuser0576e4
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
Finlaw Consultancy Pvt Ltd
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
nehatalele22st
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
BridgeWest.eu
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
gaelcabigunda
 

Recently uploaded (20)

Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
 

Argument for Snowden Clemency

  • 1. Margaret Hoisington 2/11/2014 Argument in Favor of Clemency for Edward Snowden Within recent years, the development of information technology has created a growing conflict between privacy rights and national security, presenting major challenges to the United States legal system. The use of modern technology allows the United States government to gather enormous amounts of intelligence, a valuable tool in the investigation, prevention and prosecution of criminal or terrorist behavior. However, public opinion varies on how constitutional law applies within this context and the potential exists for government abuse of power. These are the issues at the center of Edward Snowden’s leak of NSA documents, classified information that he had access to while working for the National Security Agency (NSA) in Hawaii through subcontractor Booz Allen Hamilton. He was employed through Booz Allen for less than three months, during which he collected top-secret NSA documents related to the agency’s domestic and international surveillance programs. He believed that these leaks would expose constitutional violations of the NSA to the public and hopefully prompt reform that would lead to increased government transparency. The Government Accountability Program (GAP) defines whistleblowing as the disclosure of information that is reasonably believed to be evidence of a violation of any law, rule, regulation, gross mismanagement, gross waste of funds, abuse of authority or substantial and specific danger to public health or safety (McCutcheon, 2014). Although many of the violations that Snowden intended to expose remain under investigation or considerable debate, at least some of them have been confirmed. In March 2013, the Director of National Intelligence, James Clapper, stated before Congress that the NSA
  • 2. had not intentionally collected information on ordinary Americans, which Snowden knew was not true at the time (Greenberg, 2013). Whether or not it is decided that the NSA’s domestic surveillance is violates the constitution, it is clear from the information leaked that Clapper had lied under oath. If the intelligence community director is known to have lied in a public forum on at least one occasion, the credibility of both the director and the agencies can be questioned during other instances as well. In December 2013, U.S. District Judge Richard Leon ruled that the NSA’s telephone snooping violated the constitution (Savage 2013) but then weeks later, U.S. District Judge William Pauley ruled that the collection of phone records was legal under Section 215 of the Patriot Act (Perez, 2013). This sparked considerable debate on whether the collection of the phone data is constitutional, prompting movements to amend the act to prevent further abuses in violation of First and Fourth Amendment rights. Snowden’s actions provided a catalyst for these debates and the demands for reform but they have yet to directly result in any clearly measurable threat to the security of the United States. Although the disclosures made by Snowden fall within the definition of whistleblowing, whistleblower rights are more limited for federal intelligence agency employees in order to prevent unauthorized disclosures of information that could pose a threat to national security. The Intelligence Community Whistleblower Protection Act of 1998 (ICWPA) provides a process for federal agency employees to submit urgent concerns to Congress with protection from retaliation and to ensure that classified information and materials are properly handled. The law defines “urgent concern” as any serious problem, abuse, violation of law or Executive order relating to the operations of an intelligence activity involving classified information, false statement to Congress or an
  • 3. action constituting reprisal or threat of reprisal in response to the employee’s report. However, the GAP has criticized the ICWPA stating that, “It fails to provide substantive protection against retaliatory personnel action and creates no mechanism for corrective actions” (Clayton, 2013). In the early 2000s, former NSA executive Thomas Drake had opposed an NSA program called Trailblazer because of its violation of privacy and other laws, causing him to complain internally as outlined by the ICWPA. By 2004 Trailblazer had been deemed an expensive failure and the Department of Defense acknowledged the problems at NSA but nothing was reported to the public. In 2010, Drake was indicted for violations of the Espionage Act after he disclosed information in 2005 to a reporter about fraud and abuse at the agency. The case never went to trial and the parties reached a plea agreement in which Drake was sentenced to one year of probation and 240 hours of community service (Wise, 2011). Snowden has stated that he first attempted to deal with the issues through the internal route and that he made a considerable effort to get those with the proper clearance to listen and take action. His attempts generated concern from the coworkers and supervisors he spoke with but no one was willing to take on the personal risk associated with pursuing the matter further. Snowden had been witness to behavior such as Clapper’s lie to Congress and knew what resulted when Drake attempted to use the procedures of ICWPA so he was aware that any attempts to address his concerns internally would most likely fail to elicit any solutions. The United States has filed charges against Snowden for theft of government property and violation of the Espionage Act by unauthorized communication of national defense information and willful communication of classified communications intelligence
  • 4. information to an unauthorized person (Zakaria & Hosenball, 2013). The Espionage Act was passed in 1917 to make it a crime for foreign or domestic spies to provide information in an attempt to harm the U.S. or to help its enemies. Before the current administration it had only been used six times as a way to prosecute leaker but Snowden is the eighth person to be charged under the Espionage Act in this way since the start of the Obama administration alone (Caplan, 2013). In United States v. Morison, 488 U.S. 908 (1988) the act was used for the first time to convict a government official for giving classified information to the press, although Morison was later pardoned in 2001. In this case the court stated that, “the government must still be required to prove that it was in fact “potentially damaging to the United States or might be useful to an enemy”, but in a July 2013 ruling, US District Court Judge Kollar-Kotelly disagreed with that precedent, saying that the terms of the act do not require proof of any harm (Kim, 2013). Snowden’s intent in making the disclosures and whether or not they resulted in any real danger or were of value to the public would therefore be inadmissible in court against violations of the Espionage Act. In 2013, Federal District Judge Richard Leon’s ruling in Klayman v. Obama required the government to stop collecting data on the personal calls of the plaintiffs and to destroy records of their call history, stating that the NSA program of collecting records of phone calls is most likely a violation of the Constitution. He wrote that the government wasn’t able to provide “a single instance in which analysis of the N.S.A.’s bulk metadata collection actually stopped an imminent attack, or otherwise aided the government in achieving any objective that was time-sensitive” (Savage, 2013). The precedent set by Smith v. Maryland, 442 U.S. 735 (1979) is that there is no reasonable expectation of
  • 5. privacy for information supplied to third parties, which was what excluded the NSA collection of metadata from protection by the Fourth Amendment. Leon writes that a decision from 1979 does not apply today given that the evolution of our relationship with phones results in telephone metadata that contains more information and that modern technology allows the Government to store and analyze that information in ways that qualify it as an unreasonable search . Actions taken by the Government in the events leading up to and surrounding Snowden’s leaks are grounds upon which it can be charged with violating the First Amendment. The United States is a self-governing society in which the power to decide on issues of public policy belongs to the citizens and to make these decisions it is necessary for them to be able to access all related information without the interference of the government. In New York Times co. v. United States, 403 U.S. 713 (1971), which involved use of the Espionage Act, the court stated that, “the guarding of military and diplomatic secrets at the expense of informed representative government provides no real security for our Republic.” More recently the court has also said that, “state action to punish the publication of truthful information seldom can satisfy constitutional standards.” Bartnicki v. Vopper, 532 U.S. 514 (2001). If the government cannot demonstrate a compelling need to enforce punishment of the disclosures in order to protect national security, they have violated the First Amendment by restricting access to that information and by seeking retribution for the person who exposed it. Within this case, the Government violations of First Amendment rights carry more weight than a claim of the potential threats to national security. The level of public debate over the
  • 6. statutes that are at the center of this case would make them an inappropriate basis for the prosecution of Snowden and therefore he should be granted clemency.
  • 7. References Edward Snowden. (2014). The Biography Channel website. Retrieved from http://www.biography.com/people/edward-snowden-21262897 Caplan, Lincoln. (2013) "Leaks and Consequences: Why Treating Leakers as Spies Puts Journalists at Legal Risk." The American Scholar 82.4: 20+. Academic OneFile. Web. 7 Feb. 2014. Clayton, Mark. (June 2013). “Edward Snowden: Whistleblowing protections most likely won’t help.” Christian Science Monitor. Retrieved fromhttp://www.csmonitor.com/USA/Justice/2013/0614/Edward-Snowden- Whistle-blowing-protections-most-likely-won-t-help/(page)/2 Greenberg, Andy. (July 2013). “National Intelligence Director Clapper Apologizes.” Forbes. Retrieved from http://www.forbes.com/sites/andygreenberg/2013/07/02/national-intelligence-director- clapper-apologizes-for-clearly-erroneous-congressional-testimony-on-nsa- surveillance/ Kim, Douglas. (August 2013). “US District Court Judge Suppresses Whistleblower Protections in Favor of Government Secrecy.” Government Accountability Project. Retrieved from http://www.whistleblower.org/blog/44-2013/2869-us-district-court-judge-suppresses- whistleblower-protections-in-favor-of-government-secrecy McCutcheon, C. (2014, January 31). Whistleblowers. CQ Researcher, 24, 97-120. Retrieved from http://library.cqpress.com/cqresearcher/ Savage, Charlie. (December 2013) “Judge Questions Legality of NSA Phone Records.” New York Times. Retrieved from
  • 8. http://www.nytimes.com/2013/12/17/us/politics/federal-judge-rules-against-nsa-phone- data-program.html?pagewanted=1&_r=1& Perez, Evan. (December 2013) “Judge Rules NSA Collection of Phone Records is Legal.” CNN. Retrieved from http://www.cnn.com/2013/12/27/justice/nsa-ruling Wise, David. (August 2011). “Leaks and the Law: The Story of Thomas Drake.” Smithsonian Magazine. Retrieved from http://www.smithsonianmag.com/history/leaks-and-the-law-the-story-of-thomas-drake- 14796786/?all Zakaria, T., Hosenball, M. (June 2013). “Edward Snowden Charged with Espionage Over NSA Leaks.” Huffington Post. Retrieved from http://www.huffingtonpost.com/2013/06/21/edward-snowden-charged_ n_3480984.html