The Three Theories of Prosecution for Julian Assange

In this post, I laid out what the 17 new charges against Julian Assange are. In this, I’ll look more closely at three theories of criminalization here:

  • Theory One: Charging Assange for causing Chelsea Manning to leak classified information by soliciting it generally or specifically (and/or discussing its value before she obtained it)
  • Theory Two: Charging Assange for offering to help crack a password and attempting to obtain the documents that would have been available using it
  • Theory Three: Charging Assange for leaking the identities of US government informants in three different databases

Theory One: Obtaining and disclosing documents that were solicited (Counts 2-4 and 6-14)

Effectively, for three sets of documents, they’ve charged Assange for causing Chelsea Manning to obtain (Charges 2 through 4), Assange obtaining himself (Charges 6 through 8), causing Manning to disclose documents she did not have authorized possession of (Charges 9 through 11), and  causing Manning to disclose legally obtained documents (Charges 12 through 13) for three sets of documents: The Gitmo Detainee Assessment Briefs, the State Department Cables, and the Iraq Rules of Engagement.

Assange is not being charged for publishing anything under this theory (that’s not true under Theory Three). He’s being charged with causing Manning to obtain and disclose them to him.

To accuse Assange of causing Manning to do these things, they show how a Most Wanted Leaks list posted on WikiLeaks until September 2010 resembles what Manning looked for on DOD’s networks and what she sent to Assange.

In addition, they show that Manning and Assange discussed some of these leaks before she obtained them.

For example, on March 7, 2010, Manning asked ASSANGE how valuable the Guantanamo Bay detainee assessment briefs would be. After confirming that ASSANGE thought they had value, on March 8, 2010, Manning told ASSANGE that she was “throwing everything [she had] on JTF GTMO [Joint Task Force, Guantanamo] at [Assange] now.” ASSANGE responded, “ok, great!”

[snip]

Manning later told ASSANGE in reference to the Guantanamo Bay detainee assessment briefs that “after this upload, thats all i really have got left.” I

It argued that Manning downloaded the State Department cables in response to the request for bulk databases on the Wish List.

Further, following ASSANGE’s “curious eyes never run dry” comment, and consistent with WikiLeaks’s solicitation of bulk databases and classified materials of diplomatic significance, as described in paragraphs 2,4-5, between on or about March 28, 2010, and April 9, 2010, Manning used a United States Department of Defense computer to download over 250,000 U.S. Department of State cables, which were classified up to the SECRET level. Manning subsequently uploaded these cables to ASSANGE and WikiLeaks through an SFTP connection to a cloud drop box operated by WikiLeaks, with an X directory that WikiLeaks had designated for Marining’s use. ASSANGE and WikiLeaks later disclosed them to the public.

And it showed that the Iraq Rules of Engagement were on the Wish List.

As of November 2009, WikiLeaks’s “Most Wanted Leaks” for the United States included the following:

[snip]

b. “Military and Intelligence” documents, including documents that the list described as classified up to the SECRET level, for example, “Iraq and Afghanistan Rules of Engagement 2007-2009 (SECRET);”

[snip]

Following ASSANGE’s “curious eyes never run dry” comment, on or about March 22,2010, consistent with WikiLeaks’s “Most Wanted Leaks” solicitation of “Iraq and Afghanistan US Army Rules of Engagement 2007-2009 (SECRET),” as described in paragraphs 4-5, Manning downloaded multiple Iraq rules of engagement files from her Secret Internet Protocol Network computer and burned these files to a CD, and provided them to ASSANGE and WikiLeaks.

Thus, for each of these, the government is saying that soliciting specific classified (or protected) materials amounts to Espionage. This is the theory of prosecution I argued would criminalize people like Jason Leopold, who was clearly engaged in journalism when he specifically asked about a specific Suspicious Activity Report from a source.

Theory Two: Attempted hacking to attempt to obtain the documents available via the hack (Counts 5 and 18)

For one vaguely defined set of documents, DOJ has charged Assange for attempting to help Manning crack a password (which was the single previous charge, which is now Charge 18) in order to attempt to obtain unidentified documents on SIPRNet.

15. In furtherance of this scheme, ASSANGE agreed to assist Manning in cracking a password hash stored on United States Department of Defense computers connected to the Secret Internet Protocol Network, a United States government network used for classified documents and communications, as designated according to Executive Order No. 13526 or its predecessor orders.

I believe (though am not certain) that that’s what the documents charged in Count 5 are about.

Between in or about November 2009 and in or about May 2010, in an offense begun and committed outside of the jurisdiction of any particular state or district of the United States, the defendant, JULIAN PAUL ASSANGE, who will be first brought to the Eastern District of Virginia, and others unknown to the Grand Jury, knowingly and unlawfully attempted to receive and obtain documents, writings, and notes connected with the national defense—^namely, information stored on the Secret Internet Protocol Network classified up to the SECRET level— for the purpose of obtaining information respecting the national defense, knowing and having reason to believe, at the time that he attempted to receive and obtain them, that such materials would be obtained, taken, made, and disposed of by a person contrary to the provisions of Chapter 37 of Title 18 of the United States Code.

This theory also doesn’t charge Assange with publishing information. Rather than charging him for soliciting leaks (Theory One), it charges him with helping to obtain documents Manning was not authorized to obtain by attempting to crack a password to get Administrators privileges.

Releasing the names of informants (Counts 15-17)

For each of three sets of US government informants, there’s also a charge tied to the informants’ identities disclosed in bulk databases.

35. Also following Manning’s arrest, during 2010 and 2011, ASSANGE published via the WikiLeaks website the documents classified up to the SECRET level that he had obtained from Manning, as described in paragraphs 12, 21, and 27, including approximately 75,000 Afghanistan war-related significant activity reports, 400,000 Iraq war-related significant activities reports, 800 Guantanamo Bay detainee assessment briefs, £ind 250,000 U.S. Department of State cables.

36. The significant activity reports from the Afghanistan and Iraq wars that ASSANGE published included names of local Afghans and Iraqis who had provided information to U.S. and coalition forces. The State Department cables that WikiLeaks published included names of persons throughout the world who provided information to the U.S. government in circumstances in which they could reasonably expect that their identities would be kept confidential. These sources included journalists, religious leaders, human rights advocates, and political dissidents who were living in repressive regimes and reported to the United States the abuses of their own government, and the political conditions within their countries, at great risk to their own safety. By publishing these documents without redacting the human sources’ names or other identifying information, ASSANGE created a grave and imminent risk that the innocent people he named would suffer serious physical harm and/or arbitrary detention.

For each database, the indictment looks at several instances of the individuals whose identities were released. It then lays out evidence that Assange knew and did not care that by publishing these identities he would be endangering people.

This is the theory of prosecution that does criminalize the publication of true information. And it criminalizes something that journalists do, at times, do.

The government often tries to classify identities that should not be (as they did with Gina Haspel, to hide her role in torture, for example). When journalists learn these identities they sometimes do choose to ignore admonitions against publication, for good reason. That’s what Assange is accused of doing here, but only on a mass scale. But if this is successful, there’s nothing that will prevent the government from charging people for disclosing classified identities at a smaller scale.

I’m also not sure how, as a foreign citizen, this doesn’t invite retaliation against the US for identifying classified identities of other countries.

image_print
17 replies
  1. CaliLawyer says:

    Not sure what the government gets from all this. They’ve already got his devices, which will likely reveal more criminality. What’s the point of this? The attempted hacking charge gets them into his devices.

    • P J Evans says:

      Discouraging anyone who wants to blow the whistle on illegal actions by government.
      ETA: and especially discouraging reporters who would write those stories.

    • CaliLawyer says:

      He doesn’t have 4th Amendment rights since he’s not a citizen and was on foreign soil, but I’d think they’d do everything they can to minimize due process issues. Chain of custody will be big, and I wonder what kind of surveillance the Ecuadorians might have turned over.

      • P J Evans says:

        The part about foreign soil certainly applies. (The 4th, as written, applies to non-citizens in the US, also: it uses “people”, not “citizens”.)

        • CaliLawyer says:

          That’s the point- the seizure was on Ecuadorian soil. I still think for due process reasons they’ll be very by the book, and are likely working closely with the Brits to ensure a smooth extradition.

          • CaliLawyer says:

            The Ecuadorians did the seizure and so as long as it comported with Ecuadorian process I think he’s SOL.

  2. OldTulsaDude says:

    This has to have been known for some time as otherwise why would Stone have lobbied for an Assange pardon?

    • P J Evans says:

      Stone benefits from “leaks”. Ask who in DOJ would have been in the loop on this, and talking to Stone.

      • CaliLawyer says:

        Anything relevant to Stone in JA’s devices will get turned over to Stone in discovery.

  3. MattyG says:

    The Assange indictments seem to be racing against the unwinding of DTs regime. If the indictments are animated in large part by the desire to fortify the unitary executive in it’s posture against a free press, how much will the discovery of further executive culpability in the the whole Wikileaks mess weaken their hand – or make it seem almost contrary to their purpose? Or have the true unitarians already written DT off and speed ahead with their agenda for as long as still have so much freedom of movement?

  4. Michael says:

    Regarding the releasing of names of informants, I’ve heard a lot of journalists argue that shouldn’t be illegal but I don’t think that they appreciate how that looks to non-journalists, Suppose Bob tells the North Korean government the name of a CIA spy and the spy is executed and his family sent to a concentration camp. Bob should be sent to jail. But suppose Bob publishes the name of the CIA spy and the spy is executed and his family sent to a concentration camp. Bob shouldn’t be sent to jail? That makes no sense to most people.

  5. Peacerme says:

    We need to be committed to a non judgmental stance. We need a filter upon which we all agree. Seek truth before all else. No we can’t find it in its absolute. It’s beyond us. But we can seek it. Commit to attaining it. Go the the process. To seek truth transforms us. We need better marketing for “Truth”!!

  6. viget says:

    NAL, and bmaz et al. may disagree, but I feel like this indictment is solely to spoil any chances that DOJ has at getting info regarding WL involvement in the 2016 elections.

    Not only will prosecution be dicey in the US due to 1A concerns, but what’s the chances that the UK or Sweden will extradite now? These charges could be interpreted as political prosecution, and I think the UK will chose Sweden over the US now.

    This basically ensures Assange will not see the inside of a US courtroom for a long, long time.

  7. Badger Robert says:

    Theory three is the only one that makes a difference to most Americans. The other theories just demonstrate that Assange is a jerk.

  8. mospeck says:

    I’ll go with door number three, Monty..er, Marcy :)

    bmaz- a while back I took your point on avoiding the use of the T word. Now, your point is being illuminated by this new 17 count indictment against Julian Assange, in which the JD is using the E word (“Espionage”). Upshot seems to be that 1st amendment rights for a free press to publish secret information could be changed. That in the future this could be charged as espionage. Sure looks like Trump’s JD is employing a multi-pronged Gerasimov asymmetrical warfare, IW doctrine.
    Hey, credit where credit is due–Trump and Barr are very skilled front men for this Russian strategy, a large part of which seems to be based on taking advantage of the intrinsic slow time constants of the US legal system. U.S. District Judge Amit Mehta certainly felt the urgency, went as fast as possible, and did everything he could do. But then why in his expedited Trump-Mazars nuisance law suit case is the DC court of Appeals choosing to hear opening oral arguments starting 12 July? Why not next week? Also, since AC decision will then certainly be appealed to the Supreme Court, why not expedited to the SC next week?
    After all, it was only last week that Barr put Durham in charge to investigate the Trump-Russia investigation. But now it appears that was simply (a boiling the frogs slowly) front and Barr is defacto in charge, with Trump yesterday vastly expanding his powers to see and then selectively declassify CIA and NSA top secret sources and methods (the fast offensive side of their game). To a non-lawyer it sure looks like the crooked lawyers (Dowd, Sekulow, Lowell, Consovoy, etc.) delay games are winning (defensive side).
    Clearly there are two time constants in play, the fast Putin-Gerasimov-Trump-Barr one and the slow by-the-rules US legal system one. We could lose this thing. I share BayStateLibrul’s rage

  9. OldTulsaDude says:

    How far the republic has fallen when our Justice indicts for releasing classified identities, the president, for purely political purposes, gives his AG the right to do the same thing.

Comments are closed.