27 February 2013

Leaks

Two US works on secrecy and leaks ....

'The Leaky Leviathan: Why the Government Condemns and Condones Unlawful Disclosures of Information' by David Pozen in (2013, forthcoming) Harvard Law Review argues that
The United States government leaks like a sieve. Presidents denounce the constant flow of classified information to the media from unauthorized, anonymous sources. National security professionals decry the consequences. And yet the laws against leaking are almost never enforced. Throughout U.S. history, fewer than a dozen criminal cases have been brought against suspected leakers. There is a dramatic disconnect between the way our laws and our leaders condemn leaking in the abstract and the way they condone it in practice.
This article challenges the standard account of this disconnect, which emphasizes the difficulties of apprehending and prosecuting offenders, and advances an alternative theory of leaking. The executive branch's "leakiness" is often taken to be a sign of institutional failure. The article argues it is better understood as an adaptive response to external liabilities (such as the mistrust generated by presidential secret-keeping and media manipulation) and internal pathologies (such as overclassification and bureaucratic fragmentation) of the modern administrative state. The leak laws are so rarely enforced not only because it is hard to punish violators, but also because key institutional actors share overlapping interests in maintaining a permissive culture of classified information disclosures. Permissiveness does not entail anarchy, however, as a nuanced system of informal social controls has come to supplement, and all but supplant, the formal disciplinary scheme. In detailing these claims, the article maps the rich sociology of governmental leak regulation and explores a range of implications for executive power, national security, democracy, and the rule of law.
Posen comments that 
Ours is a polity saturated with, vexed by, and dependent upon leaks. The Bay of Pigs, the Pentagon Papers, warrantless wiretapping by the National Security Agency at home, targeted killings by the Central Intelligence Agency abroad: The contours of these and countless other government activities have emerged over the years through anonymous disclosures of confidential information to the press. Across the ideological spectrum, many Americans believe both that leaking “is a problem of major proportions” and that “our particular form of government wouldn’t work without it.” Episodically, leaks generate political frenzy. The country is in such a period at this writing. Mass releases of classified defense documents and diplomatic cables through WikiLeaks, followed by a series of news stories about some of the government’s most closely held national security programs, have unleashed a torrent of legislative and media responses, of recriminations and justifications. This “latest outbreak of leak panic” will soon fade; a new iteration will arrive in due course.
Our comprehension of leaking has not kept pace with our fascination. Even accounting for the secrecy that obscures its workings, the ratio of heat to light in commentary on the subject is extreme. Some valuable progress has been made. Journalists and ex-officials have chronicled the role of leaks in their work. Students of government and the press have limned leaks’ different forms and motivations. Legal theorists have considered their First Amendment implications. Yet for a variety of reasons, the literature reflects only a rudimentary understanding of leaks’ consequences, inside and outside government. More surprising, because the questions are more tractable, scholars have devoted scant attention to the constitutive elements of the leak, as a legal and bureaucratic concept, or to the policies the executive branch has developed to enforce relevant prohibitions. We know something about the phenomenology and constitutionality of leaks but next to nothing about how the government deals with them.
This Article begins to reveal that world. Drawing on a range of theoretical perspectives and original sources - interviews with journalists and executive branch officials, plus records requested through the Freedom of Information Act (FOIA) - it offers the first sustained account of the regulatory regime applicable to leaking. Superficially straightforward, this regime turns out to be an intricate ecosystem. At the most general level, the Article demonstrates that the story behind the U.S. government’s longstanding failure to enforce the laws against leaking is far more complicated, and far more interesting, than has been appreciated. More specifically, the Article argues that the executive branch has never prioritized criminal, civil, or administrative enforcement against leakers; that a nuanced set of informal social controls has come to supplement, and nearly supplant, the formal disciplinary scheme; that much of what we call leaking occurs in a gray area between full authorization and no authorization, so that it is neither “leaks” nor “plants” but what I will term pleaks that dominate this discursive space; that the executive’s toleration of these disclosures is a rational, power-enhancing strategy and not simply a product of prosecutorial limitations, a feature not a bug of the system; and that to appreciate these dynamics is to illuminate important facets of presidential power, bureaucratic governance, and the national security state in America today.
These claims require extensive elaboration. As a way into them, consider two features that mark the United States’ legal approach to unsanctioned disclosures of protected information. First, and most significantly, even though the Espionage Act of 1917 and other statutes broadly criminalize the gathering, receipt, and dissemination of national defense-related information and even though every modern president has decried the practice, an enormous amount of leaking to the press appears to occur and to go unpunished. The federal government has brought fewer than a dozen media leak prosecutions in the 96 years since the Espionage Act was enacted, six of them under the current administration. Available evidence suggests that civil and administrative sanctions are only marginally more common. Let us call this the punitive/permissive divide: The statutes on the books concerning leaks, and the political rhetoric associated with them, are so harsh, and yet the government’s actual treatment of the activity seems to have been so mild. There is a dramatic disconnect between the way our laws and our leaders purport to condemn leaking and the way they condone it - a rampant, pervasive culture of it - in practice.
Second, the courts have indicated that while the government has expansive legal authority to prosecute employees who leak, it has minimal authority to stop reporters who receive leaks from broadcasting what they learn, either through ex post penalties or prior restraints. In all cases, it seems, the government would have to prove a reporter’s actions threatened grave, immediate harm to national security interests. (It is hard to be sure because the government has never indicted one.) Let us call this the source/distributor divide: The First Amendment has been understood to provide so little protection for the leaker and yet so much protection for the journalist who knowingly publishes the fruits of the leaker’s illicit conduct and thereby enables the very harm - revelation of sensitive information to the public and to foreign adversaries - that the leak laws were designed to combat. In other areas of criminal law, downstream users of illegally obtained material are not similarly insulated from liability.
As a descriptive or diagnostic matter, the literature has pointed to several factors to explain the existence of these features. The leak laws are so rarely enforced, it is said, because the Justice Department finds it so difficult, at the investigatory stage, to identify culprits and so difficult, at the adjudicatory stage, to bring successful cases without divulging additional sensitive information. Courts and prosecutors have privileged journalists over leakers, it is said, because of the former’s special First Amendment status and the latter’s consent to nondisclosure as a condition of employment. Throughout these discussions, the comparison is often drawn to the United Kingdom’s notorious Official Secrets Act. Whatever else might be true of our legal and political regime for regulating leaks, virtually everyone agrees the United States would never abide such a sweeping criminal prohibition.
As a normative or justificatory matter, few have celebrated this “disorderly situation.” Many believe it to be regrettable if not outrageous. National security hawks and opposition members of Congress routinely call for legislative strengthening of the leak laws and more vigorous executive enforcement, including against members of the media. Civil libertarians have assailed the last two administrations’ “war” on leaking and sought federal shield legislation for journalists and enhanced doctrinal protections for their sources. The most thoughtful and influential defenses of the status quo—by Alexander Bickel, Jack Goldsmith, and Geoffrey Stone—are self-consciously ambivalent. They do not attempt to idealize or even rationalize the punitive/permissive and source/distributor divides, so much as to highlight the factors confounding any effort to strike an optimal balance in this area between national security needs and other democratic and constitutional goods. These analyses are also spare. They rely on discrete case studies and high-level constitutional theory to identify relevant values, precedents, and tradeoffs; they do not make any systematic inquiry into patterns and practices of leaking or enforcement or into the functional and strategic dimensions of the leak-law regime.
This Article aims to show why our “disorderly situation” cannot be understood without such inquiry and to explicate a more satisfying logic, a richer model, that better accounts for the seemingly incoherent law of leaks. The core claim is that the status quo, although ritualistically condemned by those in power, has served a wide variety of governmental ends at the same time as it has efficiently kept most disclosures within tolerable bounds. The leak laws are so rarely enforced not only because it is difficult to punish violators, but also because key institutional players share overlapping interests in vilifying leakers while maintaining a permissive culture of classified information disclosures.
The executive branch is where most of the action takes place. With respect to the punitive/permissive divide, commentators have widely assumed the executive would prefer to bring more cases, and then looked to constraints on realizing that preference. By concentrating on barriers to prosecution, these accounts overlook the ways in which powerful actors benefit from leak-law violations, as well as the ways in which leaking may be punished in the absence of a criminal proceeding, or indeed any formal sanction. The executive’s “leakiness” is often taken to be a sign of institutional failure. It may be better understood as an adaptive response to key external liabilities - such as the mistrust generated by presidential secret-keeping and media manipulation - and internal pathologies - uch as overclassification and fragmentation across a sprawling bureaucracy - of the modern administrative state. Once these affirmative interests in leaking are identified, the source/distributor divide also begins to look a little less puzzling. To criminalize leaking at the publication stage, as well as the transmission stage, would not only raise difficult First Amendment concerns but also risk compromising the government’s instrumental use of the press.
Part I of the Article reviews the legal landscape and the available evidence on how leaks are used and punished. Part II first details the shortcomings of constraint-based rationales for the government’s permissiveness, and then advances an alternative explanatory theory grounded in the executive branch interests served by leakiness. These interests include preserving ambiguity as to the origins of unattributed disclosures and therefore the communicative flexibility of top officials, signaling trustworthiness, facilitating richer internal information flows, pacifying constituencies for transparency in Congress, the media, and civil society, and mitigating the classification system’s political and deliberative costs. Part III further fleshes out this account by uncovering and assessing the informal enforcement model that the executive appears, behind closed doors, to have applied to leaking. Part IV returns to the source/distributor divide and to the recent uptick in prosecutions and draws out additional evaluative and descriptive implications—including the surprising insight that the U.S. and U.K. legal regimes on leaks have, at least in their observable aspects, substantially converged.
Before proceeding further, several notes are in order. Throughout the pages that follow, the focus is on the U.S. federal executive branch and its information control practices relating to national security, broadly defined to include many matters of foreign policy. Some of the Article’s arguments may well carry over to other types of leaks, to other types of institutions, to subnational levels of government, maybe also to other mature democracies. At points, I will briefly discuss possible extrapolations. But national security leaks raise a number of distinct concerns and have always driven the legal conversation. Their treatment by the world’s dominant military power will, I trust, be of sufficient interest to many.
The heart of the Article is the positive analysis in Parts II and III and the window it provides into the regulation of leaking. While I hope in Part IV to draw some fruitful linkages to broader
questions in democratic, constitutional, and security theory, and while I hope more generally to facilitate normative projects of varied stripes, the Article is principally concerned with demonstrating how leaking works. The overriding aim is to provide an explanation (not a justification) for this regulatory regime in terms of the intersecting desires, beliefs, and constraints of presidents, political appointees, civil servants, legislators, journalists, and the institutions they populate. Although I cannot directly establish the intentions of many of these actors or rule out evolutionary factors—for instance, a natural tendency for the leakier components of government to gain in relative political power and thereby to propagate their disclosure norms—the Article tries to the extent possible to provide microfoundations for its theory, to specify mechanisms that reduce leakiness to the individual level.
Some pieces of the analysis were informed by roughly two-dozen interviews I conducted with current and former officials who have worked on top secret issues across the executive branch, as well as by my own experiences in government. Most of these officials served in a legal capacity. Almost all of the interviews were “on background,” which is to say the interviewees asked not to be identified and I agreed. The unsettling brand of methodological mimesis that results - this is an Article about anonymous government sources that itself relies on anonymous government sources—is not lost on me. I would have preferred to conduct interviews on the record and yet, like so many journalists and several scholars before me, I soon learned that few were willing to discuss anything interesting under those ground rules. Minimizing validity concerns, however, all points drawn from the interviews are consistent with the publicly available evidence, including the returns from my own FOIA requests, which I cite throughout. The interviews proved more confirmatory than revelatory. They deepened but did not transform my understanding of this evidence.
A final caveat: While I try in this Article to shine light on an opaque corner of the law, I certainly do not mean to suggest that I have fully uncovered, much less “solved,” the inner workings of the leak regime. The phenomenon of leaking is sufficiently heterogeneous and complex as to resist monolithic characterization. Perhaps the most generalizable contribution the Article aims to make is to point the way to new conceptual, theoretical, and empirical approaches to studying the subject.
'The Implausibility of Secrecy' by Mark Fenster comments that
Government secrecy frequently fails. Despite the executive branch’s obsessive hoarding of certain kinds of documents and its constitutional authority to do so, recent high-profile events - among them the WikiLeaks episode, the Obama administration’s celebrated leak prosecutions, and the widespread disclosure by high-level officials of flattering confidential information to sympathetic reporters - undercut the image of a state that can classify and control its information. The effort to control government information requires human, bureaucratic, technological, and textual mechanisms that regularly founder or collapse in an administrative state, sometimes immediately and sometimes after an interval. Leaks, mistakes, open sources - each of these constitutes a path out of the government’s informational clutches. As a result, permanent, long-lasting secrecy of any sort and to any degree is costly and difficult to accomplish.
This article argues that information control is an implausible goal. It critiques some of the foundational assumptions of constitutional and statutory laws that seek to regulate information flows, in the process countering and complicating the extensive literature on secrecy, transparency, and leaks that rest on those assumptions. By focusing on the functional issues relating to government information and broadening its study beyond the much-examined phenomenon of leaks, the article catalogs and then illustrates in a series of case studies the formal and informal means by which information flows out of the state. These informal means play an especially important role in limiting both the ability of state actors to keep secrets and the extent to which formal legal doctrines can control the flow of government information. The same bureaucracy and legal regime that keep open government laws from creating a transparent state also keep the executive branch from creating a perfect informational dam. The article draws several implications from this descriptive, functional argument for legal reform and for the study of administrative and constitutional law.
Fenster concludes that
Deep, long-lasting secrecy proves quite difficult to accomplish in practice. The formal legal limits on secrecy, as well as the informal means by which information flows out of the state, perform the crucial service of making the state more visible. We should not, however, mistake this movement of information for “transparency,” or even for a step towards a gloriously transparent state. As I have argued elsewhere, we can never achieve a perfectly visible government—and, in fact, we would not even want one if it were achievable. The concept of “transparency,” like the concept of “secrecy,” assumes the law’s ability to control information, an assumption belied by decades of frustrating experience with open government laws.  Both concepts are implausible.
This is no reason to despair. Here, I note three implications of this implausibility for understanding and responding to government secrecy— recognizing it as a political practice subject to political accountability, conceding law’s limits as a means to control information, and developing legal reforms that can hasten official disclosure.
First, secrecy is, paradoxically, a very public issue, and one for which excessively secretive officials can be held politically accountable. As Vice President Cheney has himself noted, secrecy can both fail, revealing the information it sought to hide, and be exposed and criticized as an undemocratic practice. In the “leaky city” of the nation’s capitol, Cheney wrote in an essay published three years after Iran-Contra, no secret stays buried too long, and no president’s failed cover-ups go unpunished. Indeed, the Minority Report itself conceded that President Reagan was forced “to pay a stiff political price” not only for his appointees’ illegal actions in Iran-Contra, but also for their secrecy and attempted concealment of the program. The more secrets, and the deeper they are kept, the greater the risk that the President takes in keeping them—a risk that can prove effective as an alternative to formal laws and legal proceedings in disciplining the executive branch. Such political costs cannot replace the formal legal limitations on secrecy that open government laws (not to mention, for criminal conspiracies and perjury, criminal laws) provide, but they serve as a mechanism by which the informal limits on secrecy can punish wrongdoers.
This understanding of secrecy as a tool whose use has potential political costs suggests a more foundational informal check on information control. If “the cover up is worse than the crime,” as the conventional wisdom teaches about Watergate, then secrecy appears to have an ethical dimension based upon a widely-shared, intuitive distinction between legitimate and illegitimate secrecy. Although it lacks precise meaning, the concept of “transparency” functions as a nearly universal liberal democratic value, as is the notion that some secrets are too dangerous to a nation and society to warrant disclosure. Partisans might disagree about whether an individual instance of secrecy is excessive, but in doing so they must frame their arguments in widely-acknowledged and –used terms. The NEPDG episode illustrates this well: NEPDG’s policy development process appeared absurdly secretive, as opponents and even members of the administration noted, and its secrecy provided the administration no political benefit and likely exacted political costs.  The more significant and pervasive secrecy that followed in the Bush administration’s post-9/11 anti-terrorism campaign, which the NEPDG episode launched and rehearsed, proved more temporarily effective at controlling information. But information about many of the administration’s programs, from the torture of prisoners and detainees to the warrantless wiretaps of domestic communications, ultimately leaked to the public over the course of the administration’s second term. By the end of the Bush presidency, the administration - and especially Vice President Cheney - had become quite politically unpopular, at least partially because of the seemingly unethical nature of its excessive secrecy. Barack Obama explicitly included open government as a platform in his 2008 campaign, in part to contrast himself with the Bush-Cheney White House. The first implication of secrecy’s implausibility, then, is that it reveals the political nature of information control, and it demonstrates how politics serves both as a key motivation to use secrecy and as a crucial check on its overuse. It also reveals the necessity of these informal means of secrecy, and the importance of avoiding draconian leak laws  and excessive prosecution of those who do leak.
A second implication of secrecy’s implausibility is the shift it suggests for the study of secrecy and transparency away from a binary, black-and-white conception of the state as either open and transparent or closed and opaque. As Part V illustrated in its description of historic covert operations, events that are kept in deep secrecy become known as their details leak out over time, whether through formal or informal channels. Most events exist in a gray world of partial secrecy and partial disclosure, where even information about events whose existence the government denies is available from open sources, and where even events about which the government has made broad disclosures remain somewhat secret and mysterious. Government information is not subject to control via an on-off switch; instead, it appears incrementally over time, both around and in spite of the literal and figurative black marks of government efforts to control its spread.
Third, and as a consequence of the shift from a binary understanding of secrecy and disclosure, legal reform should focus on temporal commitments to disclosure that force the state to recognize the decreasing value of once secret information and require the state, as a default duty, to release documents after a certain interval. This would formalize and hasten a process that is likely to occur in any event. Laws and regulations have moved in this direction, albeit with varying degrees of success. These include the mandatory declassification of most documents after a certain time period under the current Executive Order establishing the classification system,  and the staged release of presidential documents under the Presidential Records Act.
The fact that neither commitment has proven entirely successful suggests (as ever) the stubborn tendency of the administrative state and the constitutional privilege granted to the executive to resist the disclosure of information. Recall, however, the formal and informal means that enable a President and executive branch to control information in certain circumstances for a period of time. This authority, whose logic is entrenched in the Constitution, will not disappear. If they are properly implemented and enforced, time-based reforms can help compel the regular release of records and force the executive branch to recognize disclosure’s inevitability. Law can neither perfect secrecy nor cure its excesses, but - working in a manner consistent with secrecy’s implausibility and the difficulty of information control - it might ameliorate some of its ill effects.