Edward Snowden Invokes Nuremberg in Defending His Actions

Here’s his speech:

Hello. My name is Ed Snowden. A little over one month ago, I had family, a home in paradise, and I lived in great comfort. I also had the capability without any warrant to search for, seize, and read your communications. Anyone’s communications at any time. That is the power to change people’s fates.

 

It is also a serious violation of the law. The 4th and 5th Amendments to the Constitution of my country, Article 12 of the Universal Declaration of Human Rights, and numerous statutes and treaties forbid such systems of massive, pervasive surveillance. While the US Constitution marks these programs as illegal, my government argues that secret court rulings, which the world is not permitted to see, somehow legitimize an illegal affair. These rulings simply corrupt the most basic notion of justice – that it must be seen to be done. The immoral cannot be made moral through the use of secret law.

 

I believe in the principle declared at Nuremberg in 1945: “Individuals have international duties which transcend the national obligations of obedience. Therefore individual citizens have the duty to violate domestic laws to prevent crimes against peace and humanity from occurring.”

 

Accordingly, I did what I believed right and began a campaign to correct this wrongdoing. I did not seek to enrich myself. I did not seek to sell US secrets. I did not partner with any foreign government to guarantee my safety. Instead, I took what I knew to the public, so what affects all of us can be discussed by all of us in the light of day, and I asked the world for justice.

 

That moral decision to tell the public about spying that affects all of us has been costly, but it was the right thing to do and I have no regrets.

 

Since that time, the government and intelligence services of the United States of America have attempted to make an example of me, a warning to all others who might speak out as I have. I have been made stateless and hounded for my act of political expression. The United States Government has placed me on no-fly lists. It demanded Hong Kong return me outside of the framework of its laws, in direct violation of the principle of non-refoulement – the Law of Nations. It has threatened with sanctions countries who would stand up for my human rights and the UN asylum system. It has even taken the unprecedented step of ordering military allies to ground a Latin American president’s plane in search for a political refugee. These dangerous escalations represent a threat not just to the dignity of Latin America, but to the basic rights shared by every person, every nation, to live free from persecution, and to seek and enjoy asylum.

 

Yet even in the face of this historically disproportionate aggression, countries around the world have offered support and asylum. These nations, including Russia, Venezuela, Bolivia, Nicaragua, and Ecuador have my gratitude and respect for being the first to stand against human rights violations carried out by the powerful rather than the powerless. By refusing to compromise their principles in the face of intimidation, they have earned the respect of the world. It is my intention to travel to each of these countries to extend my personal thanks to their people and leaders.

 

I announce today my formal acceptance of all offers of support or asylum I have been extended and all others that may be offered in the future. With, for example, the grant of asylum provided by Venezuela’s President Maduro, my asylee status is now formal, and no state has a basis by which to limit or interfere with my right to enjoy that asylum. As we have seen, however, some governments in Western European and North American states have demonstrated a willingness to act outside the law, and this behavior persists today. This unlawful threat makes it impossible for me to travel to Latin America and enjoy the asylum granted there in accordance with our shared rights.

 

This willingness by powerful states to act extra-legally represents a threat to all of us, and must not be allowed to succeed. Accordingly, I ask for your assistance in requesting guarantees of safe passage from the relevant nations in securing my travel to Latin America, as well as requesting asylum in Russia until such time as these states accede to law and my legal travel is permitted. I will be submitting my request to Russia today, and hope it will be accepted favorably.

Citing a Culture of “Verified Trust,” DefCon Asks Feds Not to Come

Even after I wrote this post, few people following the NSA story seem to get that James Clapper’s lie to Ron Wyden was just the culmination of a seven month effort on Wyden’s part to get Keith Alexander to correct two misleading statements he made in an unclassified forum at DefCon last year.

That is, when Wyden asked Clapper “Does the NSA collect any type of data at all on ‘millions or hundreds of millions of Americans’?,” he was trying to correct Alexander’s dodge — by way of introducing the notion of “dossiers” — that the NSA doesn’t collect information on all Americans.

Which we now know, thanks to Edward Snowden’s leaks, it does.

So I’m not surprised that — a year after Alexander made lies that have now been exposed as such — DefCon has asked the Feds not to come. (h/t Brian Krebs)

FEDS, WE NEED SOME TIME APART.

POSTED 7.10.13

For over two decades DEF CON has been an open nexus of hacker culture, a place where seasoned pros, hackers, academics, and feds can meet, share ideas and party on neutral territory. Our community operates in the spirit of openness, verified trust, and mutual respect.

When it comes to sharing and socializing with feds, recent revelations have made many in the community uncomfortable about this relationship. Therefore, I think it would be best for everyone involved if the feds call a “time-out” and not attend DEF CON this year.

This will give everybody time to think about how we got here, and what comes next. [my emphasis]

The other content of Snowden’s leaks aside, the Verizon order and the minimization procedures show that what Alexander did last year was dress up in a hacker costume and lie — not just about the degree to which NSA collects the contacts of all Americans (the lie Ron Wyden worked so hard to correct), but also about the protections offered to people who encrypt their communications (that is, hackers).

As such, any chill between the Feds and hackers should not be laid at Snowden’s feet. They should be laid at General Alexander’s.

Bradley Manning Defense: Good Data Miners Are Data Hogs

I happened to need to consult the PressFreedom transcript of today’s Bradley Manning trial. And came across this exchange, which goes to the heart of the debate on NSA’s dragnet of Americans.

In it, Manning’s lawyer, David Coombs, questioned Chief Warrant Officeer Joshua Ehresman, the ranking officer in the SCIF Manning worked in. Ehresman describes how analysts in Manning’s role were encouraged to consult whatever sources they could get their hands on.

Q And you had earlier said the term data mining, what is data mining?

A That’s pulling everything you can from every bit of intelligence assets you’ve got to help build your products.

Q Would you expect (INAUDIBLE) list of data mining?

A Yes, sir.

Q Why is that?

A Because you can’t go off one source of intelligence to predict something to happen. You have to have other stuff that indicate that it’s going to happen. You can’t just guess.

Q Where do analysts obtain their information that they’re data mining?

A Everywhere, sir. We got them on the SIPR, we got them from the T-Drive. We got them from wherever we could, open source, anything.

Q And correct me if I’m wrong, when I think of the term data mining, what you just described, is basically an analyst looking at everything and anything that they can, at any location just to kind of figure out would this perhaps be relevant to what I’m doing, is that correct, or would you provide a different definition for it?

A Yes, sir.

Q Yes, sir, that’s —

A That’s correct. You’re trying to find out yes or no this is going to happen, and, yes, this is how it’s happened and this is why it’s happening. So you have to confirm or deny your assessment.

Q Now, with regards to I guess when you’re doing this was the any guidance put out that if your you’re data mining you can do everything but go to this particular area on SIPRnet?

A No, sir.

Q So were there any restrictions on what you would data mine on SIPRnet?

A No, sir.

Q Was it common for a soldiers or analysts to data mine?

A Yes, sir.

Q Did analysts also use open source information?

A Yes, sir.

Q And what is open source information?

A That’s regular Internet, sir.

Q How would an analyst use an open source?

A We would get on and check out the web pages or you can check out local newspaper or it’s anything that doesn’t come through our secret or higher confidential webs.

Q And, again, in kind of a general description, how would open source information help your work products?

A Sometimes some of the media had information that we didn’t find out through our patrols or something. We could get patrol report and they would have outside information or a different point of view from what happens. So we would use that in our assessment, sir.

Q And were analysts encouraged to use open source information for their work products?

A Yes, sir.

Q Was there any sort of restriction placed out by the S2 section of you can go to every place besides these sites on open source?

A There was no restriction, sir.

Ehresman would go on to testify that Manning was, “our best analyst by far when it came to developing products.” Manning was, Ehresman testified, “our go-to guy for a lot of our shops, sir.”

This has little to do, directly, with the question of whether Manning will be found guilty or innocent of the charges against him.

But it does demonstrate how impossible the goal of protecting both data mining analysis and privacy is. If you want the (then) Specialist Mannings of the world to do their job well, you need to give them as much information, in relatively unfettered form, as you can.

There’s little way to achieve this goal and, at the same time, protect the data you’re piping out, aside from the honor system. And the honor system relies, in turn, on you — the United States — matching your promises and claims.

US Big-Footing Extraterritoriality Again

The Irish High Court has rejected the request for an arrest warrant for Edward Snowden. While most aspects of the request were in order — the timing of the alleged crimes, Snowden’s role in them — the US somehow neglected to mention where the alleged crimes had occurred. And that’s a problem because if stealing and leaking outside of Ireland is not an Irish crime, Ireland wouldn’t be able to extradite Snowden if he allegedly stole and leaked documents in outside of the US.

Judge Mac Eochaidh said he was satisfied that the US request met a number of the conditions set out in the relevant act for him to grant the arrest warrant. These included the fact it set out the time when the alleged offences took place, the circumstances in which the offences were committed and the degree of involvement of Mr Snowden in the commission of the alleged offences.

However, the judge observed that the request did not state where the offences actually took place – a condition that must be met by such applications.

“The question of where the offence took place is not a minor detail but is a matter which could have very serious consequences in any further stage that might be reached in an extradition process,” the judge wrote.

“That is because if it is the case that the offences took place outside of the territory of the United States of America, the question will arise as to whether there is extraterritorial effect in respect of the US offences, but more importantly, whether the Irish equivalent offences have an extraterritorial effect or aspect to them.”

He continued: “There would need to be sufficient similarity between the two offences in order for there to be an extradition.”

Presumably, the US will come back and say that Snowden stole documents, at least, in Hawaii, and therefore within the US, even if he didn’t leak them until he got to Hong Kong. Unless, of course, revealing what their contractor-hacker was allowed to do with data would get awkward for the US.

Still, given the way the US loves to big-foot extraterritoriality (including in the Viktor Bout case), you have to wonder whether they knew this would be a problem and tried to just ignore silly things like jurisdiction.

In These Times We Can’t Blindly Trust Government to Respect Freedom of Association

One of my friends, who works in a strategic role at American Federation of Teachers, is Iranian-American. I asked him a few weeks ago whom he called in Iran; if I remember correctly (I’ve been asking a lot of Iranian-Americans whom they call in Iran) he said it was mostly his grandmother, who’s not a member of the Republican Guard or even close. Still, according to the statement that Dianne Feinstein had confirmed by NSA Director Keith Alexander, calls “related to Iran” are fair game for queries of the dragnet database of all Americans’ phone metadata.

Chances are slim that my friend’s calls to his grandmother are among the 300 identifiers the NSA queried last year, unless (as is possible) they monitored all calls to Iran. But nothing in the program seems to prohibit it, particularly given the government’s absurdly broad definitions of “related to” for issues of surveillance and its bizarre adoption of a terrorist program to surveil another nation-state. And if someone chose to query on my friend’s calls to his grandmother, using the two-degrees-of-separation query they have used in the past would give the government — not always the best friend of teachers unions — a pretty interesting picture of whom the AFT was partnering with and what it had planned.

In other words, nothing in the law or the known minimization rules of the Business Records provision would seem to protect some of the AFT’s organizational secrets just because they happen to employ someone whose grandmother is in Iran. That’s not the only obvious way labor discussions might come under scrutiny; Colombian human rights organizers with tangential ties to FARC is just one other one.

When I read labor organizer Louis Nayman’s “defense of PRISM,” it became clear he’s not aware of many details of the programs he defended. Just as an example, Nayman misstated this claim:

According to NSA officials, the surveillance in question has prevented at least 50 planned terror attacks against Americans, including bombings of the New York City subway system and the New York Stock Exchange. While such assertions from government officials are difficult to verify independently, the lack of attacks during the long stretch between 9/11 and the Boston Marathon bombings speaks for itself.

Keith Alexander didn’t say NSA’s use of Section 702 and Section 215 have thwarted 50 planned attacks against Americans; those 50 were in the US and overseas. He said only around 10 of those plots were in the United States. That works out to be less than 20% of the attacks thwarted in the US just between January 2009 and October 2012 (though these programs have existed for a much longer period of time, so the percentage must be even lower). And there are problems with three of the four cases publicly claimed by the government — from false positives and more important tips in the Najibullah Zazi case, missing details of the belated arrest of David Headley, to bogus claims that Khalid Ouazzan ever planned to attack NYSE. The sole story that has stood up to scrutiny is some guys who tried to send less than $10,000 to al-Shabaab.

While that doesn’t mean the NSA surveillance programs played no role, it does mean that the government’s assertions of efficacy (at least as it pertains to terrorism) have proven to be overblown.

Yet from that, Nayman concludes these programs have “been effective in keeping us safe” (given Nayman’s conflation of US and overseas, I wonder how families of the 166 Indians Headley had a hand in killing feel about that) and defends giving the government legal access (whether they’ve used it or not) to — among other things — metadata identifying the strategic partners of labor unions with little question.

And details about the success of the program are not the only statements made by top National Security officials that have proven inaccurate or overblown. That’s why Nayman would be far better off relying on Mark Udall and Ron Wyden as sources for whether or not the government can read US person emails without probable cause than misstating what HBO Director David Simon has said (Simon said that entirely domestic communications require probable cause, which is generally but not always true). And not just because the Senators are actually read into these programs. After the Senators noted that Keith Alexander had “portray[ed] protections for Americans’ privacy as being significantly stronger than they actually are” — specifically as it relates to what the government can do with US person communications collected “incidentally” to a target — Alexander withdrew his claims.

Nayman says, “As people who believe in government, we cannot simply assume that officials are abusing their lawfully granted responsibility and authority to defend our people from violence and harm.” I would respond that neither should we simply assume they’re not abusing their authority, particularly given evidence those officials have repeatedly misled us in the past.

Nayman then admits, “We should do all we can to assure proper oversight any time a surveillance program of any size and scope is launched.” But a big part of the problem with these programs is that the government has either not implemented or refused such oversight. Some holes in the oversight of the program are:

  • NSA has not said whether queries of the metadata dragnet database are electronically  recorded; both SWIFT and a similar phone metadata program queries have been either sometimes or always oral, making them impossible to audit
  • Read more

Edward Snowden’s Extradition Request

Screen shot 2013-07-06 at 9.31.58 AMAs I noted last night, Venezuelan President Nicolás Maduro offered Edward Snowden asylum last night. (The Spanish was “hemos decidido” and “he decidido ofrecerle asilio” which included none of the sense of hypothetical that Nicaragua’s President Daniel Ortega used.)

The government has released the extradition request they’ve sent to the Venezuelan government.

Perhaps the most interesting detail is the date: July 3. Way back when Maduro was (unless I’ve lost track of his chronology), still in Russia or Belarus, and when Bolivian President Evo Morales was making a big stink about being “kidnapped” in Vienna.

Since that time, Maduro finished his visit in Belarus. Flew (presumably with a refueling stop somewhere and possibly a stop at home) to Cochabamba, Bolivia, where at least 6 South American leaders either were personally or had sent a representative (in addition to Morales and Maduro, the Presidents of Ecuador, Suriname, Argentina, and Uruguay were present, Brazils Dilma Rousseff had sent a representative, as had, according to some reports, Peru and Chile).

Then Maduro returned home in time for Venezuela’s Independence Day celebration, where he issued his statement offering asylum.

It appears that after the US issued the extradition request to Venezuela, they issued an arrest warrant to Ireland.

Now, perhaps the US has real intelligence saying that Snowden remains in Russia. But these are the people who were sure he was on Morales’ plane just a few days ago. And they don’t really seem all too sure about where Snowden is.

Update: This is one of the few stories I’ve seen that affirmatively said Snowden was still in Russia after Maduro’s departure, based on a single Russian security source.

Update: And this has more Russian sources stating he remains stuck in Russia.

Europe again stuck saying, “They told us they were sure”

The NATO members who refused overflight privileges for Bolivian President Evo Morales are, in the process of trying to justify what they did, revealing more details of what led them to risk such a diplomatic affront. Among other explanations, the Spanish foreign minister explained that “they” told the Spanish “they were sure” Snowden was on board Morales’ plane.

“They told us they were sure… that he was on board,” Mr Garcia-Margallo told Spanish television, without indicating who “they” are.

“And so the reaction of all the European countries that took measures – whether right or wrong – was because of the information that had been passed on. I couldn’t check if it was true or not at that moment because it was necessary to act straight away.”

In point of fact, it’s not yet clear Snowden wasn’t on the plane. While Austrian authorities checked the passports of the known passengers on the plane, they apparently did not conduct a thorough search. And 3 Spaniards who showed up to conduct a search were denied entry (though Morales did stop in the Canary Islands, which would have provided another opportunity to conduct a search on Spanish territory, but by that point Morales was already making a literal international incident about his treatment).

Then yesterday the heads of state from 5 other South American countries gathered in Cochabamba, Bolivia (why not La Paz?) to bitch about the actions of those NATO countries that had insulted Morales. If Snowden was on Morales’ plane, he may well be in any of 6 other countries by now (Brazil’s Dilma Rousseff sent an advisor — and note several attendees would have had to fly over Brazilian airspace to return home).

Or Snowden could be in Austria, which was one of the countries that had said Snowden would need to be in their country before it could consider an asylum request (there were pictures of Morales and Fischer from Morales’ layover that made them look quite jolly).

Or Snowden could still be in Sheremetyevo, though no one has ever seen him there. Russia’s Deputy Foreign Minister Sergei Ryabkov signaled impatience with Snowden today, even though in the past Putin said he would not extradite the leaker. But who knows whether the Russians, who are enjoying this game, are telling the truth?

So Snowden could foreseeably be in Argentina, Austria, Bolivia, Brazil, Ecuador, Russia, Suriname, Uruguay, or Venezuela. And there’s no reason to believe we’d know one way or another.

Meanwhile Ecuador chose yesterday, in the wake of the Morales slight, to complain about a bug placed in its Embassy in London. A bug they claim to have found last month.

Foreign Minister Ricardo Patino told a news conference in Quito the bug was found last month when Ecuadorean technicians reviewed the embassy’s wiring.

Now, Ecuador reportedly found the bug in connection with Patino’s trip to London June 16. Which ought to raise questions about why they’ve chosen this moment to make a stink about it. Did they leave it in place to sow disinformation? In any case, the bug has given Ecuador reason to raise tensions with England, which has avoided the badgering the other NATO European countries have.

So who knows where Snowden is? But in the meantime, US intelligence (presumably the “they” who were “sure” Snowden was on Morales’ plane) has been exposed in another potential false certainty, and the South American nations skeptical of the Washington consensus have reasons to make fun of Europe for playing Washington’s poodle.

This entire stink is supposed to be about America’s omnipotent SIGINT dragnet (the power of which is presumably one of the reasons the NATO members are being so compliant with US demands). But somehow that SIGINT hasn’t pinpointed Snowden yet, and may have gotten badly embarrassed by listening into one of its own bugs.

Update: Nicolas Maduro has granted Snowden asylum, as has Nicaragua’s Daniel Ortega. Which leaves the logistics of getting Snowden to Venezuela if he is not already there.

 

Obama’s Stubbornness and the Risk of Snowden

At the outset of this post, let me lay out my following assumptions (I can’t prove these points, but I suspect them):

  • The documents released so far by Guardian and WaPo — information on the Section 215 program, PRISM, and the PPD on cyberwar — have done negligible damage to our security (indeed, even Sheldon Whitehouse, a big defender of these programs, said the government should have been transparent about them earlier)
  • China already knew the content of Edward Snowden’s public revelations about our hacking into Chinese networks (we know China’s compromises of us, so it is unlikely China, which is more successful and aggressive at hacking than we are, doesn’t know our compromises of it); the revelations on this front so far have served primarily to even out the playing field on mutual accusations of hacking
  • Snowden personally (and his laptops) have information that China and Russia could both find of more use, particularly given that some of our programs targeting them were run out of HI
  • Snowden may also have things that might be of use to others, such as organized crime (If I were planning on longevity and had access, for example, I would take some zero day exploits when I left the NSA, though the street value of them would diminish once NSA had inventoried what I took)
  • The reporting I’ve seen has not confirmed reports that either China or Russia has debriefed Snowden or scanned his computers (indeed, this report on China’s involvement in his departure from Hong Kong suggests they did not talk with him directly)
  • Julian Assange knows where Snowden is, leading to the possibility he has escaped Russia to a country that has not yet been named in reports of Snowden’s escape (named countries have included Venezuela, Cuba, Ecuador, and Iceland)

All of that is a roundabout way of saying that Snowden could do great damage to the US, but may not have yet, and certainly hadn’t by the time he first revealed himself in Hong Kong.

If that’s right, then it seems the Obama approach has been precisely the wrong approach in limiting potential damage to national security. The best way to limit damage, for example, would be to get Snowden to a safe place where our greatest adversaries can’t get to him, where we could make an eternal stink about his asylum there, but still rest easy knowing he wasn’t leaking further secrets. Indeed, if he were exiled in some place like France, we’d likely have more influence over what he was allowed to do than if he gets to Ecuador, for example.

The most likely approach to lead to further damage, however, is to charge him with Espionage. This not only raises the specter of the treatment we’ve given Bradley Manning — giving Snowden Denise Lind’s judgement that Manning’s rights were violated to include in any asylum application — but also easily falls under what states can call political crimes, which permits them to ignore extradition requests. That is, we appear to be pursuing the approach that could lead to greater damage.

By contrast, letting Snowden get someplace safe is perfectly equivalent to letting the CIA off for torture (or, for that matter, James Clapper off for lying to Congress). It’s a violation of rule of law, but it also serves to minimize the tremendous damage the spooks might do to retaliate. Obama has chosen this path already when the criminals were his criminals; he clearly doesn’t have the least bit of compunction of setting aside rule of law for pragmatic reasons. But in Snowden’s case, he seems to be pursuing a strategy that not only might increase the likelihood of damage, but also lets China and Russia retaliate for perceived slights along the way.

All this is just an observation. I believe Obama’s relentless attacks on whistleblowers and his ruthless enforcement of information asymmetry have actually raised the risk of something like this. And he seems to be prioritizing proving the power of the US (which has, thus far, only proved our diminishing influence) over limiting damage Snowden might do.

Update: This fearmongering WaPo article nevertheless quotes a former senior US official admitting that what Snowden has released so far wouldn’t help China or Russia.

A former senior U.S. official said that the material that has leaked publicly would be of limited use to China or Russia but that if Snowden also stole files that outline U.S. cyber-penetration efforts, the damage of any disclosure would be multiplied.

Section 702 Is Used for Terror, Proliferation, AND Hacking

The AP has a story about the way algorithms control Section 702, the legal program for which PRISM provides NSA analysts acces.

And while he also admits that Obama “had expanded the scope of the surveillance,” Michael Hayden makes this false claim (which he actually said on FNS).

Michael Hayden, who led both the NSA and CIA, said the government doesn’t touch the phone records unless an individual is connected to terrorism.

He described on “Fox News Sunday” how it works if a U.S. intelligence agent seized a cellphone at a terrorist hideout in Pakistan.

“It’s the first time you’ve ever had that cellphone number. You know it’s related to terrorism because of the pocket litter you’ve gotten in that operation,” Hayden said. “You simply ask that database, `Hey, any of you phone numbers in there ever talked to this phone number in Waziristan?'”

Here’s how I know this is absolutely false (aside from the language of Section 702 that clearly allows it to be used for foreign intelligence generally so long as it is targeted — which is one of those tricky words– at people not known to be in the US).

Director Clapper — who admittedly engages in least untruthfuls that are too cute by half — claimed this as one of the successes in Section 702.

Communications collected under Section 702 have provided significant and unique intelligence regarding potential cyber threats to the United States, including specific potential network computer attacks. This insight has led to successful efforts to mitigate these threats.

Don’t get me wrong. Using this kind of collection for foreign cyberattacks is entirely appropriate. Indeed, it is probably the very best use of the tool, since it’s it’s a lot easier to engage in cyberattacks — particularly if you’re overseas — using the Internet, whereas the most dangerous terrorists can and no doubt increasingly will find other means to communicate.

So it’s not that I object to using this program to target Chinese hackers. But as you consider the 51% standard that, according to Edward Snowden, NSA analysts have to meet, or if you consider how easily signals taken from any major US-based coverage can meet that 51% standard, understand that NSA is much more likely to make a “mistake” in its geographic screens for American hackers than for American Islamic extremists.

We’ve heard nothing but TERRA TERRA TERRA since these leaks first started. And every time you hear that, you might ask what it would mean if they also mean hacker.

Navy v. Egan, not Just Branzburg v. Hayes, Needs Fixed

Today, 340 new journalists will join the 10 or so who have been covering the Bradley Manning prosecution closely for the last several years; his trial starts today at Fort Meade.

Expect to see a bunch of essays on secrecy to mark the beginning of the trial.

This one, in which Steven Coll calls for the Supreme Court to revisit the Branzburg v. Hayes decision that established a spirit but not a law protecting press sources, has already generated a lot of attention.

In the long run, to rebalance the national-security state and to otherwise revitalize American democracy, the United States requires a Supreme Court willing to deepen protections for investigative reporters, as the majority in Branzburg would not.

Among some other minor factual inaccuracies (including what the AP UndieBomb 2.0 leak was originally about), it includes this claim.

[Obama’s] longest-serving advisers are disciplined and insular to a fault; press leaks offend their aesthetic of power.

While I agree Obama’s advisors are insular to a fault, and agree they revel in an aesthetic of power, they do not despise all press leaks. Even aside from the typical policy debate leaks of classified information, the White House has long reveled in “leaking” classified information to selected members of the press, to get the information out there on its own terms. The tactic is not new — it is precisely the A1 cut-out approach the Bush Administration used to get us into the Iraq War. But the Obama Administration may have expanded its use (that is actually the reason Republicans in Congress were demanding investigations of the leaks that followed the AP story, the ones that, unlike the AP, exposed our mole).

Which is why Coll proposes an inadequate solution to what I agree is the key problem.

Obama inherited a bloated national-security state. It contains far too many official secrets and far too many secret-keepers—more than a million people now hold top-secret clearances. Under a thirty-year-old executive order issued by the White House, the intelligence agencies must inform the Justice Department whenever they believe that classified information has been disclosed illegally to the press. These referrals operate on a kind of automatic pilot, and the system is unbalanced. Prosecutors in Justice’s national-security division initially decide on whether to make a criminal case or to defer to the First Amendment. The record shows that in recent years the division has been bent on action.

I’m not opposed to establishing clearer laws about when a journalist’s sources may be protected. But that can be used — as Dick Cheney tried to use it — as a screen for his exposure of Valerie Plame. Protecting journalists’ sources will not only protect real whistleblowers, but it will also protect the system of official leaks that both Bush and Obama have used to accrue power and avoid accountability.

So not only is fixing Branzburg v. Hayes not enough to fix our “unbalanced … bloated national security state,” it doesn’t get at the underlying problem

As a threshold measure, journalists should be calling for the limitation or repeal of the Espionage Act, which is the real stick Obama is using to cut down on unsanctioned leaks. It’s bad enough for whistleblowers to risk losing their clearance, and with it, a well-compensated livelihood. But as soon as you start talking extended prison sentences, as soon as you start accusing whistleblowers of being worse than an enemy’s spy because they shared damning information with the public generally, that’s going to silence unsanctioned leaks.

Just as importantly, this entire structure of abuse of power rests on a different SCOTUS decision, Navy v. Egan, which gives the Executive absolute control over security clearances (and therefore the less powerful leverage usually wielded against whistleblowers, the ability to strip their clearance), but which has been interpreted by Bush and Obama to give the Executive unfettered authority to determine what is secret and what is not. This decision — which is precisely what David Addington told Scooter Libby he could rely on to justify outing Plame on Cheney’s order — is also what the Obama Administration cited when it refused to litigate al-Haramain and in so doing granted the Bush Administration impunity for illegal wiretapping. The Executive’s claim to have unlimited authority to decide what is secret and not is also what prevents the Senate Intelligence Committee from declassifying the torture report on its own authority. It is also the basis for the authority to stall releasing video of US helicopters gunning down a Reuters team to Reuters under FOIA, which led to Manning leaking it to WikiLeaks himself.

The Obama and Bush Administrations have claimed that no one — not Congress, not the Courts — has the authority to review their arbitrary use of secrecy to accrue more power. That claim is an expansive reading of Navy v. Egan, but thus far not one anyone has challenged before SCOTUS. And that is what has enabled them (with the limited exception of the Plame outing) to avoid all consequences for their asymmetric use of leaks.

So, yes, it would be useful if SCOTUS decided that journalists and others engaging in legitimate investigation can protect sources, especially when investigating national security. But until the underlying system — the Executive’s claim that it can abuse secrecy to protect itself — is changed, secrecy will remain a cancer rotting our democracy.