Protecting More Than the Front Page: Codifying a Reporter╎s Privilege for Digital and Citizen Journalists
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Case 1:13-Cv-03994-WHP Document 42-1 Filed 09/04/13 Page 1 of 15
Case 1:13-cv-03994-WHP Document 42-1 Filed 09/04/13 Page 1 of 15 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK AMERICAN CIVIL LIBERTIES UNION; AMERICAN CIVIL LIBERTIES UNION FOUNDATION; NEW YORK CIVIL LIBERTIES UNION; and NEW YORK CIVIL LIBERTIES UNION FOUNDATION, Plaintiffs, v. No. 13-cv-03994 (WHP) JAMES R. CLAPPER, in his official capacity as Director of National Intelligence; KEITH B. ALEXANDER, in his ECF CASE official capacity as Director of the National Security Agency and Chief of the Central Security Service; CHARLES T. HAGEL, in his official capacity as Secretary of Defense; ERIC H. HOLDER, in his official capacity as Attorney General of the United States; and ROBERT S. MUELLER III, in his official capacity as Director of the Federal Bureau of Investigation, Defendants. BRIEF AMICI CURIAE OF THE REPORTERS COMMITTEE FOR FREEDOM OF THE PRESS AND 18 NEWS MEDIA ORGANIZATIONS IN SUPPORT OF PLAINTIFFS’ MOTION FOR A PRELIMINARY INJUNCTION Of counsel: Michael D. Steger Bruce D. Brown Counsel of Record Gregg P. Leslie Steger Krane LLP Rob Tricchinelli 1601 Broadway, 12th Floor The Reporters Committee New York, NY 10019 for Freedom of the Press (212) 736-6800 1101 Wilson Blvd., Suite 1100 [email protected] Arlington, VA 22209 (703) 807-2100 Case 1:13-cv-03994-WHP Document 42-1 Filed 09/04/13 Page 2 of 15 TABLE OF CONTENTS TABLE OF AUTHORITIES .......................................................................................................... ii STATEMENT OF INTEREST ....................................................................................................... 1 SUMMARY OF ARGUMENT…………………………………………………………………1 ARGUMENT……………………………………………………………………………………2 I. The integrity of a confidential reporter-source relationship is critical to producing good journalism, and mass telephone call tracking compromises that relationship to the detriment of the public interest……………………………………….2 A There is a long history of journalists breaking significant stories by relying on information from confidential sources…………………………….4 B. -
2003 Iraq War: Intelligence Or Political Failure?
2003 IRAQ WAR: INTELLIGENCE OR POLITICAL FAILURE? A Thesis submitted to the Faculty of The School of Continuing Studies and of The Graduate School of Arts and Sciences in partial fulfillment of the requirements for the degree of Master of Arts in Liberal Studies By Dione Brunson, B.A. Georgetown University Washington, D.C. April, 2011 DISCLAIMER THE VIEWS EXPRESSED IN THIS ACADEMIC RESEARCH PAPER ARE THOSE OF THE AUTHOR AND DO NOT REFLECT THE OFFICIAL POLICIES OR POSITIONS OF THE U.S. GOVERNMENT, DEPARTMENT OF DEFENSE, OR THE U.S. INTELLIGENCE COMMUNITY. ALL INFORMATION AND SOURCES FOR THIS PAPER WERE DRAWN FROM OPEN SOURCE MATERIALS. ii 2003 IRAQ WAR: INTELLIGENCE OR POLITICAL FAILURE? Dione Brunson, B.A. MALS Mentor: Ralph Nurnberger, Ph.D. ABSTRACT The bold U.S. decision to invade Iraq in 2003 was anchored in intelligence justifications that would later challenge U.S. credibility. Policymakers exhibited unusual bureaucratic and public dependencies on intelligence analysis, so much so that efforts were made to create supporting information. To better understand the amplification of intelligence, the use of data to justify invading Iraq will be explored alongside events leading up to the U.S.-led invasion in 2003. This paper will examine the use of intelligence to invade Iraq as well as broader implications for politicization. It will not examine the justness or ethics of going to war with Iraq but, conclude with the implications of abusing intelligence. iii ACKNOWLEDGMENTS Thank you God for continued wisdom. Thank you Dr. Nurnberger for your patience. iv DEDICATION This work is dedicated to Mom and Dad for their continued support. -
Nate Silver's Punditry Revolution
Nate Silver’s punditry revolution By Cameron S. Brown Jerusalem Post, November 6, 2012 Whether or not US President Barack Obama is re-elected will not just determine the future of politics, it is also likely to influence the future of political punditry as well. The media has been following the US elections with two very, very different narratives. Apart from the obvious – i.e. Democrat versus Republican—opinions were divided between those who thought the race was way too close to call and those who predicted with great confidence that Obama was far more likely to win. Most of the media—including the most respected outlets—continued with the traditional focus on the national polls. Even when state-level polls were cited, analyses often cherry-picked the more interesting polls or ones that suited the specific bias of the pundit. While on occasion this analysis has given one candidate or another an advantage of several points, more often than not they declared the race “neck-and-neck,” and well within any given poll’s margin of error. The other narrative was born out of a new, far more sophisticated political analysis than has ever been seen in the mass media before. Nate Silver, a young statistician who was part of the “Moneyball” revolution in professional baseball, has brought that same methodological rigor to political analysis. The result is that Silver is leading a second revolution: this time in the world of political punditry. In his blog, “Five Thirty-Eight,” (picked up this year by the New York Times), Silver put his first emphasis on the fact that whoever wins the national vote does not actually determine who wins the presidency. -
Drowning in Data 15 3
BRENNAN CENTER FOR JUSTICE WHAT THE GOVERNMENT DOES WITH AMERICANS’ DATA Rachel Levinson-Waldman Brennan Center for Justice at New York University School of Law about the brennan center for justice The Brennan Center for Justice at NYU School of Law is a nonpartisan law and policy institute that seeks to improve our systems of democracy and justice. We work to hold our political institutions and laws accountable to the twin American ideals of democracy and equal justice for all. The Center’s work ranges from voting rights to campaign finance reform, from racial justice in criminal law to Constitutional protection in the fight against terrorism. A singular institution — part think tank, part public interest law firm, part advocacy group, part communications hub — the Brennan Center seeks meaningful, measurable change in the systems by which our nation is governed. about the brennan center’s liberty and national security program The Brennan Center’s Liberty and National Security Program works to advance effective national security policies that respect Constitutional values and the rule of law, using innovative policy recommendations, litigation, and public advocacy. The program focuses on government transparency and accountability; domestic counterterrorism policies and their effects on privacy and First Amendment freedoms; detainee policy, including the detention, interrogation, and trial of terrorist suspects; and the need to safeguard our system of checks and balances. about the author Rachel Levinson-Waldman serves as Counsel to the Brennan Center’s Liberty and National Security Program, which seeks to advance effective national security policies that respect constitutional values and the rule of law. -
United States Court of Appeals for the SECOND CIRCUIT
Case 14-2985, Document 88, 12/15/2014, 1393895, Page1 of 64 14-2985-cv IN THE United States Court of Appeals FOR THE SECOND CIRCUIT In the Matter ofd a Warrant to Search a Certain E-mail Account Controlled and Maintained by Microsoft Corporation, MICROSOFT CORPORATION, Appellant, —v.— UNITED STATES OF AMERICA, Appellee. ON APPEAL FROM THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORK BRIEF OF AMICI CURIAE MEDIA ORGANIZATIONS IN SUPPORT OF APPELLANT LAURA R. HANDMAN ALISON SCHARY DAVIS WRIGHT TREMAINE LLP 1919 Pennsylvania Avenue NW, Suite 800 Washington, DC 20006 (202) 973-4200 Attorneys for Amici Curiae Media Organizations Case 14-2985, Document 88, 12/15/2014, 1393895, Page2 of 64 OF COUNSEL Indira Satyendra David Vigilante John W. Zucker CABLE NEWS NETWORK , INC . ABC, INC . One CNN Center 77 West 66th Street, 15th Floor Atlanta, GA 30303 New York, NY 10036 Counsel for Cable News Network, Counsel for ABC, Inc. Inc. Richard A. Bernstein Andrew Goldberg SABIN , BERMANT & GOULD LLP THE DAILY BEAST One World Trade Center 555 West 18th Street 44th Floor New York, New York 10011 New York, NY 10007 Counsel for The Daily Beast Counsel for Advance Publications, Company LLC Inc. Matthew Leish Kevin M. Goldberg Cyna Alderman FLETCHER HEALD & HILDRETH NEW YORK DAILY NEWS 1300 North 17th Street, 11th Floor 4 New York Plaza Arlington, VA 22209 New York, NY 10004 Counsel for the American Counsel for Daily News, L.P. Society of News Editors and the Association of Alternative David M. Giles Newsmedia THE E.W. SCRIPPS COMPANY 312 Walnut St., Suite 2800 Scott Searl Cincinnati, OH 45202 BH MEDIA GROUP Counsel for The E.W. -
Intelligence Legalism and the National Security Agency's Civil Liberties
112 Harvard National Security Journal / Vol. 6 ARTICLE Intelligence Legalism and the National Security Agency’s Civil Liberties Gap __________________________ Margo Schlanger* * Henry M. Butzel Professor of Law, University of Michigan. I have greatly benefited from conversations with John DeLong, Mort Halperin, Alex Joel, David Kris, Marty Lederman, Nancy Libin, Rick Perlstein, Becky Richards, and several officials who prefer not to be named, all of whom generously spent time with me, discussing the issues in this article, and many of whom also helped again after reading the piece in draft. I would also like to extend thanks to Sam Bagenstos, Rick Lempert, Daphna Renan, Alex Rossmiller, Adrian Vermeule, Steve Vladeck, Marcy Wheeler, Shirin Sinnar and other participants in the 7th Annual National Security Law Workshop, participants at the University of Iowa law faculty workshop, and my colleagues at the University of Michigan Legal Theory Workshop and governance group lunch, who offered me extremely helpful feedback. Jennifer Gitter and Lauren Dayton provided able research assistance. All errors are, of course, my responsibility. Copyright © 2015 by the Presidents and Fellows of Harvard College and Margo Schlanger. 2015 / Intelligence Legalism and the NSA’s Civil Liberties Gaps 113 Abstract Since June 2013, we have seen unprecedented security breaches and disclosures relating to American electronic surveillance. The nearly daily drip, and occasional gush, of once-secret policy and operational information makes it possible to analyze and understand National Security Agency activities, including the organizations and processes inside and outside the NSA that are supposed to safeguard American’s civil liberties as the agency goes about its intelligence gathering business. -
Policy Approaches to the Encryption Debate
CONTENTS Introduction 1 Encryption: An overview 2 The “Going Dark” problem and the backdoor debate 2 Question One: Is a backdoor necessary or useful? 4 Lack of empirical evidence 4 Legal restrictions 5 Efficacy and utility of already available technology 6 Associated policy recommendations 8 Collect quantitative evidence of need 8 Increase resources and training for law enforcement 8 Question Two: Is there a passable technical solution? 9 Associated policy recommendations 10 Conduct adversarial testing 10 Question Three: Is there a workable policy implementation? 10 Associated policy recommendations 12 Conduct scenario planning 12 Conclusion 12 About the authors 13 R STREET POLICY STUDY NO. 133 March 2018 individual rights and public security if strong encryption is compromised. These polarized views have left policymakers at an impasse. However, such seemingly irreconcilable perspectives on POLICY APPROACHES TO THE either side of the debate arise primarily because encryption ENCRYPTION DEBATE policy is treated as a thought experiment, often with over- simplified facts coupled with a great deal of certainty. For example, the most commonly employed hypothetical scenar- Charles Duan, Arthur Rizer, io involves the following: an encrypted message or communi- Zach Graves and Mike Godwin cation that—if only the government were able read it—would reveal the secrets required to stop a deadly attack or to bring INTRODUCTION a terrorist to justice. fierce debate has been ongoing for many years over This resembles another famous thought experiment: the strong computer encryption of communications and “ticking time bomb,” where torturing a suspect is the guar- data, which can both deliver security and privacy for anteed and only means to defuse the bomb.2 While this latter individuals but also make it difficult for the intelli- conundrum has also generated volumes of polarized debate, Agence and law enforcement communities to perform their its most pragmatic solution is one that can also be applied surveillance and investigative duties. -
True Conservative Or Enemy of the Base?
Paul Ryan: True Conservative or Enemy of the Base? An analysis of the Relationship between the Tea Party and the GOP Elmar Frederik van Holten (s0951269) Master Thesis: North American Studies Supervisor: Dr. E.F. van de Bilt Word Count: 53.529 September January 31, 2017. 1 You created this PDF from an application that is not licensed to print to novaPDF printer (http://www.novapdf.com) Page intentionally left blank 2 You created this PDF from an application that is not licensed to print to novaPDF printer (http://www.novapdf.com) Table of Content Table of Content ………………………………………………………………………... p. 3 List of Abbreviations……………………………………………………………………. p. 5 Chapter 1: Introduction…………………………………………………………..... p. 6 Chapter 2: The Rise of the Conservative Movement……………………….. p. 16 Introduction……………………………………………………………………… p. 16 Ayn Rand, William F. Buckley and Barry Goldwater: The Reinvention of Conservatism…………………………………………….... p. 17 Nixon and the Silent Majority………………………………………………….. p. 21 Reagan’s Conservative Coalition………………………………………………. p. 22 Post-Reagan Reaganism: The Presidency of George H.W. Bush……………. p. 25 Clinton and the Gingrich Revolutionaries…………………………………….. p. 28 Chapter 3: The Early Years of a Rising Star..................................................... p. 34 Introduction……………………………………………………………………… p. 34 A Moderate District Electing a True Conservative…………………………… p. 35 Ryan’s First Year in Congress…………………………………………………. p. 38 The Rise of Compassionate Conservatism…………………………………….. p. 41 Domestic Politics under a Foreign Policy Administration……………………. p. 45 The Conservative Dream of a Tax Code Overhaul…………………………… p. 46 Privatizing Entitlements: The Fight over Welfare Reform…………………... p. 52 Leaving Office…………………………………………………………………… p. 57 Chapter 4: Understanding the Tea Party……………………………………… p. 58 Introduction……………………………………………………………………… p. 58 A three legged movement: Grassroots Tea Party organizations……………... p. 59 The Movement’s Deep Story…………………………………………………… p. -
Article: Why Dylann Roof Is a Terrorist Under Federal Law, and Why It Matters
ARTICLE: WHY DYLANN ROOF IS A TERRORIST UNDER FEDERAL LAW, AND WHY IT MATTERS Winter, 2017 Reporter 54 Harv. J. on Legis. 259 * Length: 19820 words Author: Jesse J. Norris 1 * Highlight After white supremacist Dylann Roof killed nine African-Americans at a Charleston, South Carolina church, authorities declined to refer to the attack as terrorism. Many objected to the government's apparent double standard in its treatment of Muslim versus non-Muslim extremists and called on the government to treat the massacre as terrorism. Yet the government has neither charged Roof with a terrorist offense nor labeled the attack as terrorism. This Article argues that although the government was unable to charge Roof with terrorist crimes because of the lack of applicable statutes, the Charleston massacre still qualifies as terrorism under federal law. Roof's attack clearly falls under the government's prevailing definition of domestic terrorism. It also qualifies for a terrorism sentencing enhancement, or at least an upward departure from the sentencing guidelines, as well as for the terrorism aggravating factor considered by juries in deciding whether to impose the death penalty. Labeling Roof's attack as terrorism could have several important implications, not only in terms of sentencing, but also in terms of government accountability, the prudent allocation of counterterrorism resources, balanced media coverage, and public cooperation in preventing terrorism. For these reasons, this Article contends that the government should treat the Charleston massacre, and similar ideologically motivated killings, as terrorism. This Article also makes two policy suggestions meant to facilitate a more consistent use of the term terrorism. -
How Noninstitutionalized Media Change the Relationship Between the Public and Media Coverage of Trials
06__WHEELER__CONTRACT PROOF.DOC 11/18/2008 11:41:41 AM HOW NONINSTITUTIONALIZED MEDIA CHANGE THE RELATIONSHIP BETWEEN THE PUBLIC AND MEDIA COVERAGE OF TRIALS MARCY WHEELER* I INTRODUCTION Justice Brennan’s concurring opinion in Nebraska Press Ass’n v. Stuart1 puts citizenship and the public at the heart of the purpose of media coverage of legal proceedings: Commentary and reporting on the criminal justice system is at the core of the First Amendment values, for the operation and integrity of that system is of crucial import to citizens concerned with the administration of government. Secrecy of judicial action can only breed ignorance and distrust of courts and suspicion concerning the competence and impartiality of judges; free and robust reporting, criticism, and debate can contribute to public understanding of the rule of law and to comprehension of the functioning of the entire criminal justice system, as well as improve the quality of that system by subjecting it to the cleansing effects of exposure and public accountability.2 That is, media coverage of legal proceedings should further the public understanding of those proceedings and of the legal system generally and should foster oversight over its functioning. Unfortunately, much coverage of legal proceedings now serves to increase ratings rather than to increase the public’s understanding of the justice system.3 Moreover, examples like early coverage of the Duke lacrosse case show that the press can exacerbate—rather than expose—abuses of the judicial system and the legal system generally. Since the advent of the Internet, however, additional media outlets—like blogs and wikis—have begun to change the relationship between media Copyright © 2008 by Marcy Wheeler. -
Fake News and Misinformation Policy Lab Practicum (Spring 2017)
ST ANFORD Fake News & Misinformation Policy Practicum 2017 PRACTICUM RESEARCFacebookH TEAM: Research Team Jacob Finkel, JD ’19, Steven Jiang,Mufan BS ’17, Luo, PhD ‘22 Mufan Luo, PhD ’22, Rebecca Mears, JD/MPP ’19, Danaë Metaxa-Kakavouli, PhD ’20Camille, Peeples, JD ‘18 Camille Peeples, JD ’18, BrendanArjun Sasso, Shenoy,JD ’19, JD ‘19 Arjun Shenoy, JD ’19, Vincent Sheu, JD/MS ’18 , Nicolás Torres-Echeverry, JSM ’17 Google Research Team INSTRUCTOR AND PROJECTDanaë LEAD MetaxaS: -Kakavouli, PhD ‘20 Nicolás Torres-Echeverry, JSM ‘17 SENATOR RUSS FEINGOLD Edwin A. Heafey, Jr., Visiting Professor of Law Luciana Herman, Ph.D. Twitter Research Team Lecturer in Law Program Director, Law and Policy LabJacob Finkel, JD ‘19 Steven Jiang, BS ‘17 Ashwin Aravind, JD ‘18 Teaching Assistant Rebecca Mears, JD/MPP ‘19 Katie Joseff, MA ‘19 Research Assistant Reddit Research Team October POLICY CLIENT: Brendan Sasso, JD ‘19 Hewlett Foundation MadisonVincent Initiative Sheu, JD/MS ’18 2017 1 Acknowledgements This report reflects the research and analysis of an inter-disciplinary law and graduate student team enrolled in the Stanford Law School Fake News and Misinformation Policy Lab Practicum (Spring 2017). Under the guidance of instructor Senator Russ Feingold, the Edwin A. Heafey Visiting Professor of Law, the practicum surveyed the roles of four major online platforms in the spread of fake news beginning with the 2016 U.S. election. Assisting Senator Feingold in the practicum were Policy Lab Program Director and Lecturer Luciana Herman, Ph.D., and Teaching Assistant Ashwin Aravind, J.D. ’18. Brendan Sasso, J.D. ’19, served as the exceptional lead student editor for the report. -
Breaking the Spin Cycle: Teaching Complexity in the 19.3
Lane Glisson 461 Breaking the Spin Cycle: Teaching Complexity in the 19.3. Age of Fake News portal Lane Glisson publication, abstract: This article describes a discussion-based approach for teaching college students to identify the characteristics of ethical journalism and scholarly writing, by comparingfor fake news with credible information in a strategically planned slideshow. Much has been written on the need to instruct our students about disinformation. This librarian shares a lesson plan that engages students’ critical thinking skills by using a blend of humor, analysis, and a compelling visual presentation. The teaching method is contextualized by research on the distrust of the press and scientific evidence since the rise of hyper-partisan cable news, Russian trollaccepted farms, and alternative facts. and Introduction edited, Throughout our culture, the old notions of “truth” and “knowledge” are in danger of being replaced by the new ones of “opinion,” “perception” and “credibility.” copy Michio Kakutani1 What if truth is not an absolute or a relative, but a skill—a muscle, like memory, that collectively we have neglected so much that we have grown measurably weaker at using it? How might we rebuild it, going from chronic to bionic? reviewed, Kevin Young2 npeer 2015, I knew I had a problem. After several years of teaching library instruction is classes, I noticed that my conception of factual- ity and that of my students had diverged. Most Most students preferred Istudents preferred Google and YouTube to do their mss. Google and YouTube to do research. When asked in my classes how they dis- cerned the credibility of a website, most shrugged their research.