Procedural Experimentation and National Security in the Courts

Total Page:16

File Type:pdf, Size:1020Kb

Procedural Experimentation and National Security in the Courts California Law Review VOL. 106 AUGUST 2018 NO. 4 Copyright © 2018 by California Law Review, Inc., a California Nonprofit Corporation Procedural Experimentation and National Security in the Courts Shirin Sinnar* In the last fifteen years, individuals have brought hundreds of cases challenging government national security practices for violating human rights or civil liberties. Courts have reviewed relatively few of these cases on the merits, often deferring broadly to the executive branch on the grounds that they lack expertise, political accountability, or the ability to protect national security secrets. Yet in cases where courts have permitted civil suits to proceed far enough to decide legal questions, influence policy, or afford litigants relief, they have often experimented with new methods for managing the secret information implicated in many national security cases. These procedures include centralizing cases through Multidistrict Litigation, conducting in camera review of sensitive documents, pressing the government to provide opposing counsel access to secret evidence, appointing special experts of their own, facilitating DOI: https://doi.org/10.15779/Z382B8VC0B. Copyright © 2018 California Law Review, Inc. California Law Review, Inc. (CLR) is a California nonprofit corporation. CLR and the authors are solely responsible for the content of their publications. * John A. Wilson Distinguished Faculty Scholar & Associate Professor of Law, Stanford Law School. Many thanks to Janet Alexander, Carmen Cheung, Jen Daskal, David Dyzenhaus, David Engstrom, Mohammad Fadel, Deborah Hensler, Ramzi Kassem, Alexi Lahav, Amalia Kessler, Dave Marcus, Jenny Martinez, Imran Maskatia, Tim Meyer, Jim Pfander, David Pozen, Kent Roach, Joanna Schwartz, Sudha Setty, Hina Shamsi, Ganesh Sitaraman, David Sklansky, Norman Spaulding, Steve Vladeck, Bob Weisberg, Ingrid Wuerth, and workshop participants at the Seattle Civil Procedure Workshop, the Bay Area Procedure Forum, the Junior Federal Courts Workshop, the Vanderbilt New Voices in Civil Justice Workshop, and faculty workshops at Stanford Law School and the University of Toronto Faculty of Law. I am grateful for research assistance from Margot Adams, Hannah Kieschnick, Mollie Miller, Adrienne Pon, Anna Porto, Colin Scott, Brandon Teachout, Reece Trevor, and the extraordinary librarians at Stanford Law School. 991 992 CALIFORNIA LAW REVIEW [Vol. 106:991 interlocutory review, and deciding cases in an incremental and dynamic fashion. Illuminating this procedural experimentation, this Article contends that courts can address secrecy in national security adjudication in a tailored, pragmatic fashion, rather than deferring to the executive at the threshold. But this account also shows the limits of such strategies: where misapplied, some procedures may fall short of due process, undermine norms of public access and transparency in the courts, reduce pluralism in the adjudication of disputes, or import bias into judicial decision-making. Together, this suggests that courts should adopt these procedures cautiously and with case-specific assessment of their costs and benefits. Panning out from national security litigation, the Article also offers a set of secondary insights for civil procedure more generally: it highlights the role of the executive branch in making procedural law, the costs of certain trans- substantive procedures, and distorted perceptions across the civil–criminal procedure divide. Introduction ............................................................................................ 993 I. The Judicial Role in “National Security” ............................................ 997 A. The Deference Debate ......................................................... 999 B. The Secrecy Rationale for Deference ................................ 1001 II. Procedural Experimentation Over National Security Secrecy ......... 1006 A. Centralization through Multidistrict Litigation ................. 1008 B. In Camera Review ............................................................. 1012 C. Cleared Counsel ................................................................ 1015 D. Court-Appointed Experts and Masters .............................. 1018 E. Facilitating Interlocutory Appellate Review ..................... 1021 F. Incremental and Dynamic Judicial Management .............. 1023 III. The Benefits of Procedural Experimentation ................................. 1026 A. Supplementing Adversarialism ......................................... 1027 B. Spurring the Development of Architecture to Protect Secrets 1030 C. Prompting Executive Reconsideration of Secrecy ............ 1032 D. Countering Cognitive Biases ............................................. 1033 E. Enabling Judicial Learning ................................................ 1036 IV. Secrecy Experimentation and Rule of Law Values ........................ 1037 A. The Due Process Question................................................. 1038 B. Transparency and Public Access to the Courts ................. 1040 C. Threats to Pluralism in Judicial Decision-Making ............ 1043 D. Concerns Over Bias ........................................................... 1045 E. Too Little, Too Late?......................................................... 1047 V. Implications for Civil Procedure ..................................................... 1049 A. Bottom-Up Procedural Innovation .................................... 1050 B. Trans-Substantive Diffusion Across Civil Procedure........ 1054 C. Diffusion Across the Civil-Criminal Procedure Divide .... 1055 2018] PROCEDURAL EXPERIMENTATION 993 Conclusion ............................................................................................ 1060 INTRODUCTION In June 2018, the Supreme Court upheld President Trump’s order banning citizens of multiple, largely Muslim, countries from entering the United States.1 Although the Court’s decision dismayed many for its willingness to overlook the president’s repeated expressions of religious animus, it represented only the latest example of judicial deference to the executive in national security cases. In the last fifteen years, individuals have brought hundreds of cases challenging government counterterrorism policies or national security practices. But courts have resolved few of these cases on the merits, blocking many at the outset on account of the state secrets privilege, standing and immunity doctrines, jurisdictional restrictions, pleading standards, restrictions on the judicial creation of implied constitutional remedies, and other doctrines.2 Although courts cite a range of doctrines as the basis for dismissing these cases, they often profess the same underlying concerns: the sense that courts lack the expertise or political accountability to decide complex, high-stakes questions; the fear that adjudication could reveal national security secrets; or the apprehension that managing highly sensitive information could present intractable administrability challenges. The government pushes hard to convince courts to defer to the executive branch’s positions or to decline review altogether, arguing that a failure to do so will expose the nation to grave threats for which the judges will bear responsibility. Faced with that specter, many courts choose not to intervene. As a result, allegations of human rights violations in a range of contexts—from immigrant detentions to torture to secret surveillance—go unheard.3 Victims of abuse rarely win compensation or even acknowledgment of rights violations, while executive policies remain largely unchecked by judicial review, and important questions of constitutional rights remain unanswered.4 1. See Trump v. Hawaii, No. 17-965, 2018 WL 3116337 (2018). 2. See Stephen I. Vladeck, The Demise of Merits-Based Adjudication in Post-9/11 National Security Litigation, 64 DRAKE L. REV. 1035, 1037–38 (2016); Ashley S. Deeks, The Observer Effect: National Security Litigation, Executive Policy Changes, and Judicial Deference, 82 FORDHAM L. REV. 827, 829 (2013); JAMES E. PFANDER, CONSTITUTIONAL TORTS AND THE WAR ON TERROR xiv–xv (2017). 3. See, e.g., Ziglar v. Abbasi, 137 S. Ct. 1843 (2017) (refusing to authorize a Bivens claim for damages in a constitutional challenge to post-9/11 immigrant detentions); Arar v. Ashcroft, 585 F.3d 559 (2d Cir. 2009) (en banc) (refusing to authorize a Bivens claim for damages arising out of extraordinary rendition); Mohamed v. Jeppesen Dataplan, Inc., 614 F.3d 1070 (9th Cir. 2010) (en banc) (dismissing a challenge to extraordinary rendition and torture based on the state secrets privilege); Clapper v. Amnesty Int’l USA, 133 S. Ct. 1138 (2013) (holding that plaintiffs failed to establish standing to challenge secret surveillance under the Foreign Intelligence Surveillance Act Amendments Act of 2008). 4. For more on the harm presented by this limited judicial review, see generally Vladeck, The Demise of Merits-Based Adjudication, supra note 2; PFANDER, supra note 2. 994 CALIFORNIA LAW REVIEW [Vol. 106:991 Despite this pattern, even before the lower courts invalidated several versions of the travel ban,5 some courts faced with national security questions did permit civil suits to proceed far enough to decide legal questions on the merits, afford litigants some relief, or influence state policy. So far, such cases remain unusual.6 Yet examining them reveals something interesting about the manner in which courts are working through national security cases: in permitting cases
Recommended publications
  • WHISTLEBLOWERS and LEAKERS NEWSLETTER, Series 2, #4, October 3, 2019
    -- OMNI WHISTLEBLOWERS AND LEAKERS NEWSLETTER, Series 2, #4, October 3, 2019. https://jamesrichardbennett.blogspot.com/2019/10/whistleblowers-and-leakers- newsletter-4.html Compiled by Dick Bennett for a Culture of Peace, Justice, and Ecology http://omnicenter.org/donate/ Series 2 #1 May 18, 2015 http://jamesrichardbennett.blogspot.com/2015/05/whistleblowers-and-leakers- newsletter.html #2 Aug. 6, 2016 http://jamesrichardbennett.blogspot.com/2016/08/whistleblowers-and-leakers- newsletter.html #3 Dec. 13, 2018 https://jamesrichardbennett.blogspot.com/2018/12/whistleblower-newsletter-series-2- 3.html CONTENTS: WHISTLEBLOWERS AND LEAKERS NEWSLETTER, Series 2, #4, October 3, 2019. Reporting in the Northwest Arkansas Democrat-Gazette Whistleblower, the Newsletter of Government Accountability Project Bravehearts by Mark Hertsgaard Snowden’s New Book, Permanent Record Jesselyn Radack’s memoir Traitor: The Whistleblower and the American Taliban Whistleblowers Thomas Drake and John Kiriakou Army Reserve Captain, Brittany Ramos Debarros Film: War on Whistleblowers: Free Press and the National Security State TEXTS RECENT ARTICLES IN THE NADG. I can’t compare its reporting of wb and leakers to that of other newspapers, but it is reporting these heroes of truth and democracy, and very well it appears at least at this tense moment in time. Here are examples I have gathered recently (and have in a file) in reverse chronological order. Julian Barnes, et al. (NYT). “Whistleblower Said to Seek Advice Early.” 10-3-19. Hoyt Purvis. “Whistle-blower Claims Demand Gutsy Response.” 10-2-19. Plante. (Tulsa World, Editorial Cartoon). “Save the American Whistleblower.” 10-1-19. D-G Staff. “Schiff: Panel Will Hear from Whistleblower.” 9-30-19.
    [Show full text]
  • State Secrets Protection Act of 2008 (H.R. 5607)
    WASHINGTON LEGISLATIVE OFFICE 915 15th Street, NW Washington, D.C. 20005 (202) 544-1681 Fax (202) 546-0738 State Secrets Protection Act of 2008 (H.R. 5607) What is the state secrets privilege? The state secrets privilege is a common‐law evidentiary rule that permits the government “to block discovery in a lawsuit of any information that, if disclosed, would adversely affect national security.” (Ellsberg v. Mitchell, 709 F.2d 51, 56 (D.C. Cir. 1983); See also, United States v. Reynolds, 345 U.S. 1, 10 (1953); Tenenbaum v. Simonini, 372 F.3d 776, 777 (6th Cir. 2004). What is the problem with the states secrets privilege? Since September 11, 2001, the state secrets privilege has mutated into an alternative form of immunity that is increasingly being used to shield the government and its agents from accountability for systemic violations of the Constitution. In cases challenging the Bush administration’s illegal policies of warrantless surveillance, extraordinary rendition, and torture, for example, the government has asserted the state secrets privilege – not merely to exclude evidence, but as the basis for negating suits in their entirety. The resulting untimely dismissal of important lawsuits has undermined our constitutional system of checks and balances and weakened our national interest in having a government that is accountable to the people. The misuse of the privilege by the executive branch, coupled with the failure of the courts to exercise independent scrutiny over privilege claims, has allowed serious, ongoing abuses of executive power to go unchecked. Because there are currently no statutory standards for the state secrets privilege, there is substantial confusion in the lower courts regarding when the privilege may properly be invoked, and what precisely the privilege may be invoked to protect.
    [Show full text]
  • Democracy Now!: What the Prosecution of NSA Whistleblower Thomas Drake Is Really About 27.12.16 18:18
    Democracy Now!: What the Prosecution of NSA Whistleblower Thomas Drake is Really About 27.12.16 18:18 Buchen Sie hier Ihr Flugerlebnis! flyipilot.de JESSELYN RADACK (/BLOGS/JESSELYN-RADACK) Blog (/blogs/Jesselyn-Radack) Stream (/user/Jesselyn Radack/stream) Democracy Now!: What the Prosecution of NSA Whistleblower Thomas Drake is Really About (/stories/2011/5/18/977111/- ) By Jesselyn Radack (/user/Jesselyn%20Radack) Wednesday May 18, 2011 · 5:06 PM CEST 8 Comments (8 New) (http://www.dailykos.com/story/2011/5/18/977111/-#comments) ! 25 " 0 # (https://twitter.com/intent/tweet? url=http%3A%2F%2Fwww.dailykos.com%2Fstory%2F2011%2F5%2F18%2F977111%2F- &text=Democracy+Now%21%3A+What+the+Prosecution+of+NSA+Whistleblower+Thomas+Drake+is+Really+About) $ RSS I was just on Democracy Now! (/user/Jesselyn (http://www.democracynow.org/2011/5/18/inside_obamas_orw RECOMMENDED LIST % (/USER/RECOMMENDED/HISTORY) Radack/rss.xml) ellian_world_where_whistleblowing) discussing the prosecution of whistleblower Thomas Drake, who used to be a senior Message to my Trump-supporting Facebook executive at the National Security Agency (NSA). I'm glad friends (/stories/2016/12/26/1614776/-Message-to- TAGS people are finally paying attention to this case, thanks to Jane my-Trump-supporting-Facebook-friends) Mayer's explosive cover story in the New Yorker ! 232 & 146 (/stories/2016/12/26/1614776/-Message-to-my-Trump-supporting-Facebook-friends) #Democracy Now Mommadoc (/user/Mommadoc) (/news/Democracy (http://www.newyorker.com/reporting/2011/05/23/110523fa_fa Now) ct_mayer),
    [Show full text]
  • Intelligence Legalism and the National Security Agency's Civil Liberties
    112 Harvard National Security Journal / Vol. 6 ARTICLE Intelligence Legalism and the National Security Agency’s Civil Liberties Gap __________________________ Margo Schlanger* * Henry M. Butzel Professor of Law, University of Michigan. I have greatly benefited from conversations with John DeLong, Mort Halperin, Alex Joel, David Kris, Marty Lederman, Nancy Libin, Rick Perlstein, Becky Richards, and several officials who prefer not to be named, all of whom generously spent time with me, discussing the issues in this article, and many of whom also helped again after reading the piece in draft. I would also like to extend thanks to Sam Bagenstos, Rick Lempert, Daphna Renan, Alex Rossmiller, Adrian Vermeule, Steve Vladeck, Marcy Wheeler, Shirin Sinnar and other participants in the 7th Annual National Security Law Workshop, participants at the University of Iowa law faculty workshop, and my colleagues at the University of Michigan Legal Theory Workshop and governance group lunch, who offered me extremely helpful feedback. Jennifer Gitter and Lauren Dayton provided able research assistance. All errors are, of course, my responsibility. Copyright © 2015 by the Presidents and Fellows of Harvard College and Margo Schlanger. 2015 / Intelligence Legalism and the NSA’s Civil Liberties Gaps 113 Abstract Since June 2013, we have seen unprecedented security breaches and disclosures relating to American electronic surveillance. The nearly daily drip, and occasional gush, of once-secret policy and operational information makes it possible to analyze and understand National Security Agency activities, including the organizations and processes inside and outside the NSA that are supposed to safeguard American’s civil liberties as the agency goes about its intelligence gathering business.
    [Show full text]
  • A Public Accountability Defense for National Security Leakers and Whistleblowers
    A Public Accountability Defense For National Security Leakers and Whistleblowers The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Yochai Benkler, A Public Accountability Defense For National Security Leakers and Whistleblowers, 8 Harv. L. & Pol'y Rev. 281 (2014). Published Version http://www3.law.harvard.edu/journals/hlpr/files/2014/08/ HLP203.pdf Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:12786017 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP A Public Accountability Defense for National Security Leakers and Whistleblowers Yochai Benkler* In June 2013 Glenn Greenwald, Laura Poitras, and Barton Gellman be- gan to publish stories in The Guardian and The Washington Post based on arguably the most significant national security leak in American history.1 By leaking a large cache of classified documents to these reporters, Edward Snowden launched the most extensive public reassessment of surveillance practices by the American security establishment since the mid-1970s.2 Within six months, nineteen bills had been introduced in Congress to sub- stantially reform the National Security Agency’s (“NSA”) bulk collection program and its oversight process;3 a federal judge had held that one of the major disclosed programs violated the
    [Show full text]
  • The State Secrets Privilege: Alternative Remedies in Cases of Torture Abroad
    SCOTT FINAL2 (DO NOT DELETE) 2/6/2016 9:06 AM THE STATE SECRETS PRIVILEGE: ALTERNATIVE REMEDIES IN CASES OF TORTURE ABROAD I. INTRODUCTION A car salesman from Germany, Khaled El-Masri, was at the airport on his way to Macedonia.1 El-Masri was seized and abducted at this airport by Macedonian authorities on the pretense that he was a suspected terrorist.2 The Macedonian authorities held El-Masri captive and tortured him for almost a month whereupon they turned him over to United States CIA agents.3 While in the CIA’s custody, agents allegedly dressed him in a diaper, tracksuit, and earmuffs, then bound and sedated him on a flight to Afghanistan.4 In Afghanistan, he arrived at a prison where he was beaten and interrogated for four months by more agents.5 After four months of captivity and torture, the CIA later found out it had been a case of mistaken identity.6 El-Masri merely had a similar name as a suspected member of a terrorist organization.7 When the agents received the green light to release him two months after this discovery, they blindfolded and transported him to an abandoned road in a foreign country where this average car salesman was left to pick up the pieces of his life.8 The plaintiff in this case suffered irreparable damages, mentally and physically from being held captive and tortured. However, when El-Masri sued in the United States for damages, the case was dismissed because the 1. El-Masri v. Tenet, 437 F. Supp. 2d 530, 532 (E.D.
    [Show full text]
  • End Abuse of the State Secrets Privilege
    End Abuse of the State Secrets Privilege April 27, 2009 The Bush Administration and the State Secrets Privilege During its tenure, the Bush administration sought to centralize power in the executive by any means necessary––both legal and extralegal––in order to carry out its policies without oversight by any other branch of government. In the name of the “war on terror,” the Bush administration spied on American citizens, tortured and abused detainees in Iraq, Afghanistan, Guantanamo and CIA “black sites,” overrode Congressional authority to make war, and carried out abuses of human rights around the globe in defiance of US and international law. When Bush’s unconstitutional actions were challenged in court, the administration resorted more than any previous administration to the “state secrets privilege,” in attempts to prevent these challenges from ever being heard by a court of law and to preserve its own impunity for its illegal actions. Unfortunately, the Obama administration has, to date, continued to follow along the path set by the Bush administration in utilizing the “state secrets privilege” to attempt to block judicial oversight of government policies and actions. Instead, the Obama administration, if it is to uphold its commitment to transparency, must reverse dangerous legal positions taken by the Bush administration in cases brought by victims and survivors of government abuses, including torture and extraordinary rendition. The state secrets privilege is a common-law privilege that allows the head of an executive department to refuse to produce evidence in a court case on the grounds that the evidence is secret information that would harm national security or foreign relations interests if disclosed.
    [Show full text]
  • The Office of Legal Counsel and Torture: the Law As Both a Sword and Shield
    Note The Office of Legal Counsel and Torture: The Law as Both a Sword and Shield Ross L. Weiner* And let me just add one thing. And this is a stark contrast here because we are nation [sic] of laws, and we are a nation of values. The terrorists follow no rules. They follow no laws. We will wage and win this war on terrorism and defeat the terrorists. And we will do so in a way that’s consistent with our values and our laws, and consistent with the direction the President laid out.1 —Scott McClellan, Spokesman to President George W. Bush, June 22, 2004 * J.D., expected May 2009, The George Washington University Law School; B.A., 2004, Colgate University. I would like to thank Kimberly L. Sikora Panza and Charlie Pollack for reading early drafts and guiding me on my way. I am indebted to the editors of The George Washington Law Review for all of their thoroughness and dedication in preparing this Note for publication. Finally, thank you to my parents, Tammy and Marc Levine, and Howard and Patti Weiner, for all their hard work. 1 Press Briefing, White House Counsel Judge Alberto Gonzales, Dep’t of Defense (“DoD”) Gen. Counsel William Haynes, DoD Deputy Gen. Counsel Daniel Dell’Orto, and Army Deputy Chief of Staff for Intelligence Gen. Keith Alexander (June 22, 2004) [hereinafter Press Briefing], available at http://georgewbush-whitehouse.archives.gov/news/releases/2004/06/ 20040622-14.html. February 2009 Vol. 77 No. 2 524 2009] The Law as Both a Sword and a Shield 525 Introduction On September 11, 2001, nineteen men, each a member of al- Qaeda,2 hijacked and crashed four airplanes, killing nearly 3,000 Americans.
    [Show full text]
  • Transcription: Interview with Jesselyn Radack File: JR Cam B.Mp4
    1! Transcription: Interview with Jesselyn Radack File: JR cam B.mp4 ! N Timecodes Speaker Text 1 00:00:00,000 Interviewer if you could state your name for sound check? 00:00:04,100 2 00:00:04,100 Jesselyn Jesselyn Radack, I am with the governament 00:00:08,480 Radack accountability project 3 00:00:08,980 Jesselyn One, two, three, four, five, six, seven, eight, nine, ten. 00:00:17,340 Radack 4 00:00:48,480 Interviewer overview and Lind story 00:01:06,880 5 00:01:06,880 Jesselyn sure I think the Lind... I think my case 00:01:09,200 Radack 6 00:01:09,430 Jesselyn relates to what's going on now because as bad as my 00:01:13,170 Radack case was it's nothing 7 00:01:13,170 Jesselyn compared to what whistleblowers are going through 00:01:15,330 Radack now 8 00:01:15,330 Interviewer no, I like you, you talked before about that it's... 00:01:19,430 9 00:01:19,430 Interviewer that you feel in some way you experienced first stop 00:01:24,780 something yeah 10 00:01:24,780 Interviewer that was that was the first example in some way 00:01:27,110 11 00:01:27,110 Interviewer and in some way also how I look at it also very much 00:01:31,159 a clear example 12 00:01:31,159 Interviewer So in some way I think your grasped in on a whole 00:01:37,819 series of it? 13 00:01:38,020 Jesselyn I think my foreshadowed it I mean it was a federal 00:01:41,600 Radack criminal leak 14 00:01:41,619 Jesselyn investigation 'em..
    [Show full text]
  • The Freedom of Information Act and the Ecology of Transparency
    University of Pennsylvania Law School Penn Law: Legal Scholarship Repository Faculty Scholarship 9-2-2008 The rF eedom of Information Act and the Ecology of Transparency Seth F. Kreimer University of Pennsylvania, [email protected] Follow this and additional works at: http://scholarship.law.upenn.edu/faculty_scholarship Part of the Administrative Law Commons, American Politics Commons, Civil Rights and Discrimination Commons, Communications Law Commons, Constitutional Law Commons, Law and Society Commons, Legislation Commons, Politics Commons, President/Executive Department Commons, Public Affairs, Public Policy and Public Administration Commons, and the Public Law and Legal Theory Commons Recommended Citation Kreimer, Seth F., "The rF eedom of Information Act and the Ecology of Transparency" (2008). Faculty Scholarship. Paper 192. http://scholarship.law.upenn.edu/faculty_scholarship/192 This Article is brought to you for free and open access by Penn Law: Legal Scholarship Repository. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Penn Law: Legal Scholarship Repository. For more information, please contact [email protected]. THE FREEDOM OF INFORMATION ACT AND THE ECOLOGY OF TRANSPARENCY Seth F. Kreimer∗ TABLE OF CONTENTS I. INTRODUCTION: THE FLAWS OF FOIA? .................................1012 II. THE ECOLOGY OF TRANSPARENCY: FOIA AND CONSTITUTIVE STRUCTURE .................................................1016 A. “If a Policy Falls in the Forest and No Trees Are Killed”: The Creation of Records...............................1017 B. A Machine that Won’t Go Of Itself: FOIA Requesters1020 C. FOIA and Spheres of Public Contention .....................1025 1. Prerequisite Knowledge and Public Contention...1025 a. The Problem of Aladdin’s Lamp and the Status of “Deep Secrets” ................................1025 b.
    [Show full text]
  • The Criminalization of Whistleblowing
    THE CRIMINALIZATION OF WHISTLEBLOWING JESSELYN RADACK & KATHLEEN MCCLELLAN1 INTRODUCTION The year 2009 began a disturbing new trend: the criminalization of whistleblowing. The Obama administration has pursued a quiet but relentless campaign against the news media and their sources. This Article focuses on the sources who, more often than not, are whistleblowers. A spate of “leak” prosecutions brought under the Espionage Act2 has shaken the world of whistleblower attorneys, good- government groups, transparency organizations, and civil liberties advocates. The Obama administration has prosecuted fi ve criminal cases 1. Jesselyn Radack is National Security and Human Rights Director at the Government Accountability Project (GAP), a non-profi t organization dedicated to promoting corporate and government accountability by protecting whistleblowers, advancing occupational free speech, and empowering citizen activists. Kathleen McClellan is National Security and Human Rights Counsel at GAP. 2. Espionage Act of 1917, Pub. L. 65-24, 40 Stat. 217 (June 15, 1917). 57 58 THE LABOR & EMPLOYMENT LAW FORUM [Vol. 2:1 under the Espionage Act, which is more than all other presidential administrations combined.3 These “leak” prosecutions send a chilling message to public servants, as they are contrary to President Barack Obama’s pledge of openness and transparency.4 The vast majority of American citizens do not take issue with the proposition that some things should be kept secret, such as sources and methods, nuclear designs, troop movements, and undercover identities.5 However, the campaign to fl ush out media sources smacks of retaliation and intimidation. The Obama administration is right to protect information that might legitimately undermine national security or put Americans at risk.
    [Show full text]
  • Eyewitness to History in Devolution of Democracy and Constitutional Rights Following 9/11 Thomas Drake Walden University
    Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2017 Eyewitness to History in Devolution of Democracy and Constitutional Rights Following 9/11 Thomas Drake Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by Thomas Drake has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. George Larkin, Committee Chairperson, Public Policy and Administration Faculty Dr. Ron Hirschbein, Committee Member, Public Policy and Administration Faculty Dr. Tanya Settles, University Reviewer, Public Policy and Administration Faculty Chief Academic Officer Eric Riedel, Ph.D. Walden University 2017 Abstract Eyewitness to History in Devolution of Democracy and Constitutional Rights Following 9/11 by Thomas A. Drake Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy School of Public Policy and Administration Walden University May 2017 Abstract Many researchers and political experts have commented on the disenfranchisement of the citizenry caused by irresponsible use of power by the government that potentially violates the 4th Amendment rights of millions of people through secret mass surveillance programs. Disclosures of this abuse of power are presumably protected by the 1st Amendment, though when constitutional protections are not followed by the government, the result can be prosecution and imprisonment of whistleblowers.
    [Show full text]