Constraints on the Efforts of Government Intelligence Whistleblowers Barak Bullock | University of Texas, Austin

Total Page:16

File Type:pdf, Size:1020Kb

Constraints on the Efforts of Government Intelligence Whistleblowers Barak Bullock | University of Texas, Austin Barriers to Transparency: Constraints on the Efforts of Government Intelligence Whistleblowers Barak Bullock | University of Texas, Austin Edward Snowden’s disclosure of secret National Security Agency documents in 2013 was the most monu- mental leak of classified intelligence files in history. In the process of leaking the documents and sustaining their relevance in the public’s eyes, Snowden was faced with constraints on his ability to max- imize the reformative power of the leak. These constraints were rhetorical and nonrhetorical, meaning they could be changed through discourse, or could not. Concepts from rhetorical scholarship, such as rhetorical situation and topoi, can help define these various constraints. The main analysis of this essay is an application of these concepts to editorials and news articles related to Snowden and other whis- tleblowers, such as Chelsea Manning, Julian Assange, Daniel Ellsberg, William Binney, and Thomas Drake. Snowden encountered the same constraints as these previous whistleblowers, suggesting they are per- sistent barriers that future whistleblowers will also have to confront. On June 5th, 2013, British daily newspaper interview identifying the leaker of the docu- The Guardian published a classified top-se- ment as Edward Snowden, an employee of cret intelligence document taken from the NSA contractor Booz Allen Hamilton. Three National Security Agency. It was a secret weeks prior, Snowden secretly left his job, court order drafted by the Foreign home, and long-time girlfriend in Hawaii for Intelligence Surveillance Court, which Hong Kong, where he leaked an enormous revealed that the US telecommunications cache of classified documents to journalists giant Verizon was being forced to hand over Glenn Greenwald, Laura Poitras, and Ewen the metadata of millions of US customers to MacAskill. In the interview, Snowden stated the NSA. With their metadata collection the power to spy on others afforded to him as program, the NSA could identify callers’ a senior analyst disturbed him, and declared numbers, locations, the time and duration that the public should decide whether they of calls, and other unique identifiers of any approve of the NSA’s activities (Greenwald, American customer. The document proved Poitras, and MacAskill). In an article posted that under the Obama administration, the June 11th, Snowden told The Guardian, “My phone records of millions of Americans sole motive is to inform the public as to that were “being collected indiscriminately and which is done in their name and that which is in bulk—regardless of whether they [were] done against them” (Greenwald, Poitras and suspected of any wrongdoing” (Greenwald, MacAskill). In little less than a week, the exis- “NSA”). This was only one of dozens of tence of the most powerful digital surveillance high-impact documents that were pub- apparatus on Earth—and the story behind lished in the following weeks and months. the man who exposed it—had been brought Then, on June 9th, The Guardianposted an to light. 32 | Young Scholars in Writing The Snowden leak—which officials asserted in divergent ways. To their supporters, they to contain approximately 1.8 million docu- were whistleblowers—“people who revealed ments from American, British and Australian wrongdoing within an organization to the spy agencies—was called “the biggest theft of public or to those in positions of authority” US secrets in history” by the Pentagon (Strohm (“Whistleblower”)—and therefore were to be and Wilber), and “the most catastrophic loss protected. To their opponents, the leakers’ to British intelligence ever” by UK security efforts to unveil government secrets jeopar- expert Sir David Omand (“Snowden Leaks”). dized precious lives or costly operations, and It unleashed a whirlwind of blockbuster they deserved to be criminally prosecuted as headlines, commanded the attention of gov- traitors or terrorists. So are these people ernments, news agencies, and citizens all whistleblowers or not? This is an important around the world, and engendered dramatic question with far-reaching ramifications for debates on the ethics of whistleblowing, sur- how leakers like these are treated by the law. veillance, and national security. Public Whistleblowers in all kinds of occupations discussion born from the leaks focused on the are ostensibly protected from retaliation by massive global surveillance program built by their employers, since the act of whistleblow- the US government, and on Snowden himself. ing is, at its core, an ethical decision to But Snowden was not the first to leak sensi- disclose illegal or unethical conduct by an tive intelligence documents to the public in agent or organization. These kinds of laws, an act of political protest. There is a lineage of such as the Whistleblower Protection Act of leakers that precedes Snowden in the realm of 1989, recognize the tremendous value that American government secrets. Among them whistleblowers can offer in precipitating cor- is Chelsea Manning, who released thousands rective measures, since problems no one of military reports, State Department cables, knows of are not often solved. Ellsberg’s leak and assessments of detainees from of the Pentagon Papers, which facilitated a Guantanamo Bay to the publishing site massive erosion in support for the Vietnam WikiLeaks, and is currently serving a 35-year War, is emblematic of the political impact prison sentence (Tate); Julian Assange, the that whistleblowing can have. lead editor of WikiLeaks, who has been Legally speaking, defining someone like trapped in London’s Ecuadorean embassy Snowden as a whistleblower or traitor has since 2012 under the threat of extradition to important consequences. Calling someone the US for his involvement in Manning’s who leaks secrets a “whistleblower” explic- leak; Daniel Ellsberg, the leaker of the itly praises their actions, and calls any Pentagon Papers in 1971, who escaped a sen- retaliation against them into question. tence of over 100 years when the government’s Those against the leaker’s actions may give case against him was undone by the him or her a condemnatory title like “trai- Watergate scandal. And lastly, Thomas Drake tor,” “spy,” or “terrorist,” which denounces and William Binney, two NSA employees their intentions as malicious, and their who were punished for speaking out against disclosures as dangerous. Even the seeming- an intrusive and costly spying program ly-neutral “leaker” can be detrimental to a named Trailblazer. whistleblower’s case, since it does not con- In the energetic discourse that surrounded note legal protection. This makes the their leaks, these five people were characterized attribution of “whistleblower” an important Bullock | 33 point of contention in discourse surround- disclosures are still at stake. Because this pat- ing leak events, as it supports either the tern of rhetorical constraints effectively leaker’s legal protection or punishment. targets the ability of the leaker—and poten- But the consequences of these discussions tial future leakers—to be defined as extend beyond the fates of the leakers them- whistleblowers (along with the attendant selves. As mentioned earlier, the potential protections of that term), it should not only chance that foreign governments or terrorists be studied closely by the public, but should will take advantage of leaked information, be examined within the purview of rhetoric. and that harm will come to innocents as a Rhetorical scholarship gives us tools to result, often accompanies the charges of analyze the effects of different definitions of betrayal. Conversely, if a government whis- terms and to identify a pattern of recurrent tleblower reveals convincing evidence of arguments. If one is to observe how the defi- wrongdoing without endangering lives, nition of these leakers’ actions is manipulated attempts to destroy the whistleblower dimin- by a recurring collection of constraints, then ish the reformative power of those leaks, and it is surely a job for rhetoric. Specifically, may inhibit others from speaking out. It is these constraints can be unpacked with two clear, then, that the stakes involved in leaks of concepts from rhetorical theory, namely the government intelligence are high—not just rhetorical situation and topoi. I use these con- for leakers, but for the security of the nation cepts in tandem to identify the struggles of as well—and warrant the public’s under- these leakers as either rhetorical or nonrhetor- standing of these issues. ical constraints, of which the rhetorical One way to help the public reach this variations take the form of argumentative understanding is to analyze certain barriers topoi. The rhetorical situation is defined below, that Snowden and the other leakers faced and precedes an investigation of Snowden’s when attempting to bring attention to the nonrhetorical constraints, while topoi will be waste, irresponsibility, or illegality they introduced immediately before the section encountered. Many of these barriers are detailing Snowden’s rhetorical constraints. attacks on the leakers’ actions, while others My dichotomy of rhetorical and nonrhetori- are institutional or legal barriers. Surveying cal constraints is derived from a now-standard their experiences demonstrates that Snowden concept in rhetorical scholarship, the rhetori- and the others each faced a combination of cal situation. The rhetorical situation, these constraints, which essentially served to theorized by Lloyd Bitzer in 1968, consists of deprive
Recommended publications
  • USA V JULIAN ASSANGE EXTRADITION HEARING When
    USA V JULIAN ASSANGE EXTRADITION HEARING When: Part 1: 24th February -28th February Part 2: 18th May - 5th June Where: Woolwich Crown Court/Belmarsh Magistrate's Court, which is adjacent to HMP Belmarsh (See end of this briefing for travel advice). Magistrate: Vanessa Baraitser Defence team: Solicitor Gareth Peirce (Birnberg, Peirce & Partners), lead Barristers Edward Fitzgerald QC, Doughty Street Chambers, Mark Summers QC, Matrix Chambers The US is seeking to imprison Julian Assange for obtaining and publishing the 2010/2011 leaks, which exposed the reality of the Bush Administration's "War on Terror": Collateral Murder (Rules of Engagement), Afghan War Diaries, Iraq War Logs, Cablegate, and The Guantanamo Files. The US began its criminal investigation against Julian Assange and WikiLeaks in early 2010. After several years, the Obama administration decided not to prosecute WikiLeaks because of the precedent that this would set against media organisations. In January 2017, the campaign to free Mr. Assange's alleged source Chelsea Manning was successful and President Obama gave her a presidential commutation and freed her from prison. In August 2017 an attempt was made under the Trump administration to pressure Mr. Assange into saying things that would be politically helpful to the President. After Mr. Assange did not comply, he was indicted by the Trump Administration and the extradition request was set in motion. Chelsea Manning was re-imprisoned due to her refusal to cooperate with the grand jury against WikiLeaks. President Trump has declared that the press is "the enemy of the people" (https://www.nytimes.com/2017/02/17/business/trump-calls-the-news-media-the-enemy-of-the- people.html).
    [Show full text]
  • UNITED STATES DISTRICT COURT DISTRICT of MARYLAND LEADERS of a BEAUTIFUL STRUGGLE Et Al., Plaintiffs, V. BALTIMORE POLICE DEPART
    Case 1:20-cv-00929-RDB Document 2-1 Filed 04/09/20 Page 1 of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ase 1:20-cv-00929-RDB Document 2-1 Filed 04/09/20 Page 2 of 44 $)80%',-'+,"$%"$(' ' ,#*!"'()'#+,`(%-,-"&'1111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111'66! -5,%($+4,-(5'111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111'Q! )#4,+#!'*#4D.%(+5$'111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111'<! -1! 37B6;96FFI'111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111'<!
    [Show full text]
  • DF- 201S~ 0009·7
    Approved for release by ODNI on 06-24-2016, FOIA Case #DF-2015-00330 DF- 201s~ 0009·7 From: Sonia Roubini <[email protected]> Sent Wednesday, January 21, 2015 11:45 AM Ml 2 1 2015 To: DNI-FOIA Subject Freedom of Information Act request Attachments: ACLU FOIA request, government impersonation.pdf Dear Ms. Hudson, Please find attached a Freedom of Information Act request, as submitted by the Speech, Privacy, and Technology Project atthe ACLU. All best, Sonia Sonia Roubini Paralegal Speech, Privacy & Technology Project American Civil Liberties Union 125 Broad St., New York, NY 10004 • 212.519.7885 • [email protected] www.aclu.ora IJ Li 1 Approved for release by ODNI on 06-24-2016, FOIA Case #DF-2015-00330 II. ACLU At-<lRI ' 4~ Cl•I LIBFRTIES UN10t, I January 21, 2015 VIA FACSIMILE OR ELECTRONIC MAll. Central.Intelligence Agency Information and Privacy Coordinator Central Intelligence Agency Washington, DC 20505 Fax: {703) 613-3007 Drug Enforcement Administration Katherine L. Myrick, Chief Freedom of Information Operations Unit POI/Records Management Section AIHlllCAM CIVIL LlllllTIES Department of Justice UlllON FOUNDATION NATIONllL OFFICE 700 Army Navy Drive 125 BROAI> STREET. 18TH FL. West Building, 6th Floor NEW YORK. Nl 10004-2400 Arlington, VA 22202 T/212.549.2500 WWW .ACLU.ORG Fax: {202) 307-8556 Email: [email protected] Defense Intelligence Agency ATTN: DAN-IA (FOIA) 200 MacDill Blvd Washington, DC 20340-5100 Fax: (301) 394-5356 Email: [email protected] Director of National Intelligence Jennifer L. Hudson Director, Information Management Division Office of the Director of National Intelligence Washington, DC 20511 Fax: (703) 874-8910 Email: [email protected] National Security Agency NSA FOIA Requester Service Center POC: Cindy Blacker NSA FOIA Requester Service Center/DJ4 9800 Savage Road, Suite 6248 Ft.
    [Show full text]
  • Surveillance and Privacy: Can They Coexist?
    June 28, 2017 Annual Conference Transcript Surveillance and Privacy: Can They Coexist? Hon. Matthew Olsen Former Director, NCTC Liza Goitein, Co-Director, Liberty and National Security Program Brennan Center for Justice Carrie Cordero, Counsel ZwillGen PLLC Ben Wizner, Project Director American Civil Liberties Union Ellen Nakashima, National Security Reporter The Washington Post Adam Klein, Senior Fellow Center for a New American Security Begin Transcript ADAM KLEIN: (In progress) – so since 9/11, our intelligence community has developed powerful, sophisticated surveillance capabilities for the digital age. Now, for years these developments stayed in the shadows, popping up occasionally in major newspapers but the significance of those reports wasn’t really appreciated until 2013, when a certain set of disclosures triggered a massive global debate that continues today. Now, our leader in CNAS, Michèle Flournoy, likes to say that our job is to go to the (pain ?). What she means by that is we have to take on the difficult issues that policymakers need answers on. In that spirit, CNAS has entered this debate and discussion over the future of surveillance policy. Last December, Michèle, Richard Fontaine and I issued a lengthy report with 61 recommendations to guide the future of surveillance policy. Since then, we’ve continued to build out our capabilities in this area, adding former Director of National Intelligence Jim Clapper as a distinguished adjunct fellow and also Matt Olsen, whom I’ll introduce momentarily. So, with that, let me introduce our panel for this lunch discussion. We’ve brought you some of the most thoughtful, most interesting, insightful and knowledgeable people operating in this space around surveillance, privacy, civil liberties and technology.
    [Show full text]
  • Recours Abusifs Au Secret D'état Et À La Sécurité Nationale
    Version provisoire Recours abusifs au secret d’état et à la sécurité nationale: obstacles au contrôle parlementaire et judiciaire des violations des droits de l’homme 1 Rapport Rapporteur : Dick Marty, Suisse, Alliance des démocrates et des libéraux pour l’Europe A. Projet de résolution 1. L’Assemblée considère que le contrôle judiciaire et parlementaire du gouvernement et de ses agents revêt une importance cruciale pour l’Etat de droit et la démocratie. Cela s’applique aussi, et surtout, aux organes dits spéciaux dont les activités sont généralement tenues secrètes. Les services de renseignements et de sécurité de l’Etat, dont l’existence ne saurait être mise an cause, ne doivent cependant pas devenir un « Etat dans l’Etat » dispensé de rendre compte de leurs actes, sous peine de l’émergence d’une culture d’impunité néfaste qui minerait le fondement même des institutions démocratiques. 2. Dans leur lutte contre le terrorisme, les gouvernements invoquent de plus en plus souvent le « secret d’état » ou la « sécurité nationale » afin d’éviter que leurs actions ne fassent l’objet d’un contrôle judiciaire ou parlementaire. 3. Dans certains pays, et notamment aux Etats-Unis, la notion de secret d’état est utilisée pour protéger les agents de l’exécutif et leurs responsables de poursuites pénales pour des crimes tels que des enlèvements et des actes de torture, ou pour empêcher les victimes de demander des dommages et intérêts. Les Etats-Unis ont également refusé de coopérer, en particulier, avec les autorités judiciaires de l’Allemagne, de la Lituanie et de la Pologne dans le cadre de procédures pénales ouvertes dans ces pays suite aux nombreux éléments de preuves d’enlèvements, de détentions secrètes et de transferts illégaux de détenus (voir Résolution 1507 et Recommandation 1754 (2006) et Résolution 1562 et Recommandation 1801 (2007) de l’Assemblée).
    [Show full text]
  • L'homme Le Plus Recherché Au Monde (Wired)
    legrandsoir.info http://www.legrandsoir.info/l-homme-le-plus-recherche-au-monde-wired.html L’homme le plus recherché au monde (Wired) 12 novembre 2014 Le message arrive sur ma "machine propre", un MacBook Air chargé uniquement avec un logiciel de chiffrement sophistiqué. « Changement dans les plans », dit mon contact. « Soyez dans le hall de l’Hôtel …... à 13 heures. Apportez un livre et attendez que ES vous retrouve. » ES, c’est Edward Snowden, l’homme le plus recherché au monde. Depuis près de neuf mois, je tente de réaliser une interview de lui - voyageant à Berlin, deux fois à Rio de Janeiro, et plusieurs fois à New York pour parler avec la poignée de ses confidents qui peuvent organiser une réunion. Entre autres choses, je tiens à répondre à une question qui me brûle les lèvres : qu’est-ce qui a poussé Snowden à diffuser des centaines de milliers de documents top-secrets, des révélations qui ont mis à nu la grande portée des programmes de surveillance nationaux du gouvernement ? En mai, j’ai reçu un courriel de son avocat, et avocat de l’ACLU [organisation de défense des droits civiques aux Etats-Unis - NdT ] Ben Wizner, confirmant que Snowden me rencontrera à Moscou et me laissera traîner et discuter avec lui pour ce qui s’est finalement révèlé être trois journées entières réparties sur plusieurs semaines. C’est la plus longue période qu’un journaliste a été autorisé à passer avec lui depuis qu’il est arrivé en Russie en Juin 2013. Mais les détails du rendez-vous sont restés entourés de mystère.
    [Show full text]
  • SNOWDEN NEWSLETTER #9, October 13, 2019 Publisher’S Summary D.D
    -- OMNI SNOWDEN NEWSLETTER #9, https://jamesrichardbennett.blogspot.com/2019/10/omnis-snowden- newsletter-9-october-13.html Compiled by Dick Bennett for a Culture of Peace, Justice, and Ecology. (#1 July 9, 2013; #2 Nov. 1, 2013; #3 Feb. 15, 2014; #4 April 15, 2014; #5 May 25, 2014; #6 Dec. 4, 2014; #7 August 15, 2015; #8, Sept. 18, 2016) Thanks to Marc Quigley for entering all of these newsletters in OMNI’s web site. http://omnicenter.org/donate/ PLEASE POST MY NEWSLETTERS ON YOUR FACEBOOK. PERMANENT RECORD Edward Snowden Metropolitan Books BUY THE BOOK CONTENTS: OMNI’S SNOWDEN NEWSLETTER #9, October 13, 2019 Publisher’s Summary D.D. Guttenplan’s Review Excerpt from Book Glenn Greenwald’s Commentary Dick, “Permanent Record” Contents of #8 Metropolitan Books Henry Holt and Co. 352 Pages Publisher’s Summary (book jacket) Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down. In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it.
    [Show full text]
  • Standing After Snowden: Lessons on Privacy Harm from National Security Surveillance Litigation
    University of Colorado Law School Colorado Law Scholarly Commons Articles Colorado Law Faculty Scholarship 2017 Standing After Snowden: Lessons on Privacy Harm from National Security Surveillance Litigation Margot E. Kaminski University of Colorado Law School Follow this and additional works at: https://scholar.law.colorado.edu/articles Part of the Business Organizations Law Commons, Constitutional Law Commons, Internet Law Commons, Litigation Commons, National Security Law Commons, Privacy Law Commons, and the Supreme Court of the United States Commons Citation Information Margot E. Kaminski, Standing After Snowden: Lessons on Privacy Harm from National Security Surveillance Litigation, 66 DEPAUL L. REV. 413 (2017), available at https://scholar.law.colorado.edu/ articles/724. Copyright Statement Copyright protected. Use of materials from this collection beyond the exceptions provided for in the Fair Use and Educational Use clauses of the U.S. Copyright Law may violate federal law. Permission to publish or reproduce is required. This Article is brought to you for free and open access by the Colorado Law Faculty Scholarship at Colorado Law Scholarly Commons. It has been accepted for inclusion in Articles by an authorized administrator of Colorado Law Scholarly Commons. For more information, please contact [email protected]. +(,121/,1( Citation: Margot E. Kaminski, Standing after Snowden: Lessons on Privacy Harm from National Security Surveillance Litigation, 66 DePaul L. Rev. 413, 438 (2017) Provided by: William A. Wise Law Library Content downloaded/printed from HeinOnline Thu Aug 31 15:02:42 2017 -- Your use of this HeinOnline PDF indicates your acceptance of HeinOnline's Terms and Conditions of the license agreement available at http://heinonline.org/HOL/License -- The search text of this PDF is generated from uncorrected OCR text.
    [Show full text]
  • Known Unknowns
    \\jciprod01\productn\H\HLC\48-2\HLC204.txt unknown Seq: 1 13-JUN-13 14:34 Known Unknowns Jameel Jaffer* I. “SECRECY” One hundred sixty-six men are imprisoned at the U.S. Naval Station at Guant´anamo Bay.1 Many of these men the government intends to imprison indefinitely without charge or trial.2 Some, though, will be tried for war crimes, and most of these, including those alleged to have planned the 9/11 attacks, will be tried not before regular criminal courts, but before military commissions.3 These commissions are convened at “Camp Justice,” a col- lection of low-slung, prefabricated structures built on a former military air- field several miles from the base’s detention facilities.4 The principal courtroom is in most respects unremarkable. The judge presides from a raised bench at the front of the room. There is a witness box to each side of the bench. Against the wall to the judge’s right is a long, narrow box that can seat as many as thirty jurors. There are similar courtrooms in cities across the United States and around the world. What distinguishes the courtroom at Guant´anamo from others is that, in place of the railing that customarily separates trial participants from the pub- lic gallery behind them, there is a floor-to-ceiling barrier of soundproofed glass.5 Those who travel to Guant´anamo to observe the proceedings — jour- nalists, representatives of civil society organizations, and family members of those who died in the 9/11 attacks — are seated behind the glass and listen * Deputy Legal Director, American Civil Liberties Union Foundation; Fellow, Open Soci- ety Foundations; Visiting Fellow, Information Society Project, Yale Law School.
    [Show full text]
  • Whistleblowers Update 2016
    Whistleblowers Update 2016 As the Obama presidency comes to a close, the man who promised to protect whistleblowers has prosecuted and imprisoned more whistleblowers than all presidents before him combined. Writing about his legacy on whistleblowers, Salon.com headlined an article with “Obama’s unprecedented war on whistleblowers” in which they concluded, “This administration fears the noise of democracy, preferring the silence of compliance.” MotherJones.com in “Obama's War on Whistleblowers” stated “his aggressive prosecution of whistleblowers is a president who believes himself above the law, and seems convinced that he alone has a preternatural ability to determine right from wrong.” MoveOn.org stated, “Disturbingly, the Obama administration has criminally prosecuted more whistleblowers under the Espionage Act than all other past administrations combined.” Politifact.com investigated that charge and gave it a “true” rating. Did you notice anything about those first three sources I just quoted? Are they right-wing conservative news sources? Hardly, they are just the opposite. Even The Huffington Post headlined “Obama Whistleblower Prosecution Leads To Chilling Effect On Press.” They mention the Marine officer Franz Gayl (inadequate protection against IEDs in Iraq); Lockheed Martin project manager Michael DeKort (security flaws in the Coast Guard’s Deepwater Project); Department of Justice attorney Thomas Tamm (who exposed Bush’s wiretapping program) - all of whom have been prosecuted, fired, and shunned.” http://www.columbiadailyherald.com/opinion/columns/obama-s-war- whistleblowers I think of the American government as public employees. That makes us, the public, the employers. I can think of no place besides the government where the employees get to hide what they are really doing from their employers.
    [Show full text]
  • Intelligence Squared U.S. Debates
    Intelligence Squared U.S. - 1 - February 12, 2014 Andrea Bussell | 718.522.7171 [email protected] Rebecca Shapiro | 718.522.7171 [email protected] Mark Satlof | 718.522.717 [email protected] Intelligence Squared U.S. Snowden was justified For the Motion: Daniel Ellsberg, Ben Wizner Against the Motion: Andrew McCarthy, James Woolsey Moderator: John Donvan AUDIENCE RESULTS Before the debate: After the debate: 29% FOR 54% FOR 29% AGAINST 35% AGAINST 42% UNDECIDED 11% UNDECIDED Start Time: (18:48:00) John Donvan: And, as always, we start these debates by bringing on the person who brought Intelligence Squared U.S. to the New York stage. He frames the evening for us, talks about why we’re doing this debate, why it matters, and a little bit of what we’re likely to see. So let’s now please welcome to the stage, Mr. Robert Rosenkranz. [applause] Hi Bob. Robert Rosenkranz: Hi, John. John Donvan: So, Bob, this one--we do one of these a month, at least once a month--this one sold out faster than any that we've ever put up, and we know that there have been people calling for the last several days begging for tickets. Why -- what's going on with this topic? Why this one? Prepared by National Capitol Contracting 200 N. Glebe Rd., #1016 Arlington, VA 22203 Intelligence Squared U.S. - 2 - Robert Rosenkranz: Well, this debate, first of all, touches such an emotional hot button. I mean, people's reaction to Snowden are really extreme in either direction, and they feel very committed to their views.
    [Show full text]
  • Journalism and the NSA Revelations
    EXTRACT JOURNALISM AND THE NSA REVELATIONS PRIVACY, SECURITY AND THE PRESS EDITED BY RISTO KUNELIUS, HEIKKI HEIKKILÄ, ADRIENNE RUSSELL AND DMITRY YaGODIN REUTERS INSTITUTE forthe STUDY of JOURNALISM Published by I.B.Tauris & Co. Ltd in association with the Reuters Institute for the Study of Journalism, University of Oxford Journalism and the NSA Revelations.indd 3 06/03/17 10:10 pm EXTRACT EXTRACT The Reuters Institute for the Study of Journalism at the University of Oxford aims to serve as the leading international forum for a productive engagement between scholars from a wide range of disciplines and practitioners of journalism. As part of this mission, we publish work by academics, journalists, and media industry professionals focusing on some of the most important issues facing journalism around the world today. All our books are reviewed by both our Editorial Committee and expert readers. Our books, however, remain the work of authors writing in their individual capacities, not a collective expression of views from the Institute. EDITORIAL COMMITTEE Timothy Garton Ash Ian Hargreaves David Levy Geert Linnebank John Lloyd Rasmus Kleis Nielsen James Painter Alan Rusbridger Jean Seaton Katrin Voltmer The Reuters Institute would like to acknowledge the assistance of Matthew Powers and John Lloyd as readers on behalf of the Institute. Journalism and the NSA Revelations.indd 2 06/03/17 10:10 pm EXTRACT Published in 2017 by I.B.Tauris & Co. Ltd London • New York www.ibtauris.com Copyright editorial selection © 2017 Risto Kunelius, Heikki
    [Show full text]