S. Hrg. 111-834
THE ESPIONAGE STATUTES: A LOOK BACK AND A LOOK FORWARD
=======================================================================
HEARING
before the
SUBCOMMITTEE ON TERRORISM
AND HOMELAND SECURITY
of the
COMMITTEE ON THE JUDICIARY
UNITED STATES SENATE
ONE HUNDRED ELEVENTH CONGRESS
SECOND SESSION
__________
MAY 12, 2010
__________
Serial No. J-111-91
__________
Printed for the use of the Committee on the Judiciary
U.S. GOVERNMENT PRINTING OFFICE
63-582 WASHINGTON : 2011
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC
area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC
20402-0001
PATRICK J. LEAHY, Vermont, Chairman
HERB KOHL, Wisconsin JEFF SESSIONS, Alabama
DIANNE FEINSTEIN, California ORRIN G. HATCH, Utah
RUSSELL D. FEINGOLD, Wisconsin CHARLES E. GRASSLEY, Iowa
ARLEN SPECTER, Pennsylvania JON KYL, Arizona
CHARLES E. SCHUMER, New York LINDSEY GRAHAM, South Carolina
RICHARD J. DURBIN, Illinois JOHN CORNYN, Texas
BENJAMIN L. CARDIN, Maryland TOM COBURN, Oklahoma
SHELDON WHITEHOUSE, Rhode Island
AMY KLOBUCHAR, Minnesota
EDWARD E. KAUFMAN, Delaware
AL FRANKEN, Minnesota
Bruce A. Cohen, Chief Counsel and Staff Director
Matt Miner, Republican Chief Counsel
------
Subcommittee on Terrorism and Homeland Security
BENJAMIN L. CARDIN, Maryland, Chairman
HERB KOHL, Wisconsin JON KYL, Arizona
DIANNE FEINSTEIN, California ORRIN G. HATCH, Utah
CHARLES E. SCHUMER, New York JEFF SESSIONS, Alabama
RICHARD J. DURBIN, Illinois JOHN CORNYN, Texas
AL FRANKEN, Minnesota TOM COBURN, Oklahoma
EDWARD E. KAUFMAN, Delaware
Bill Van Horne, Democratic Chief Counsel
Stephen Higgins, Republican Chief Counsel
C O N T E N T S
----------
STATEMENTS OF COMMITTEE MEMBERS
Page
Cardin, Hon. Benjamin L., a U.S. Senator from the State of
Maryland....................................................... 1
prepared statement........................................... 35
Kyl, Hon. Jon, a U.S. Senator from the State of Arizona.......... 2
prepared statement........................................... 39
WITNESSES
Smith, Jeffrey H., Partner, Arnold and Porter, Washington, DC.... 6
Vladeck, Stephen, I., Professor of Law, American University
Washington College of Law, Washington, DC...................... 3
Wainstein, Kenneth L., Partner, O'Melveny and Myers, Washington,
DC............................................................. 8
QUESTIONS AND ANSWERS
Responses of Jeffrey H. Smith to questions submitted by Senator
Cardin......................................................... 24
Responses of Stephen I. Vladeck to questions submitted by Senator
Cardin......................................................... 30
Responses of Kenneth L. Wainstein to questions submitted by
Senator Cardin................................................. 33
SUBMISSIONS FOR THE RECORD
Lowell, Abbe David, Attorney at Law, McDermott Will & Emery,
Washington, DC................................................. 43
Smith, Jeffrey H., Partner, Arnold and Porter, Washington, DC.... 48
Vladeck, Stephen, I., Professor of Law, American University
Washington College of Law, Washington, DC...................... 61
Wainstein, Kenneth L., Partner, O'Melveny and Myers, Washington,
DC............................................................. 75
THE ESPIONAGE STATUTES: A LOOK BACK AND A LOOK FORWARD
----------
WEDNESDAY, MAY 12, 2010
U.S. Senate,
Subcommittee on Terrorism and Homeland Security,
Committee on the Judiciary,
Washington, DC.
The Subcommittee met, pursuant to notice, at 11:03 a.m., in
room SD-226, Dirksen Senate Office Building, Hon. Benjamin L.
Cardin, Chairman of the Subcommittee, presiding.
Present: Senators Cardin and Kyl.
OPENING STATEMENT OF HON. BENJAMIN L. CARDIN, A U.S. SENATOR
FROM THE STATE OF MARYLAND
Chairman Cardin. The Subcommittee will come to order. We
apologize for the late start. As you know, there were votes on
the floor of the Senate.
I am going to ask unanimous consent that my entire opening
statement be put in the record.
[The prepared statement of Chairman Cardin appears as a
submission for the record.]
Chairman Cardin. I also ask unanimous consent that a letter
we received from Abbe Lowell, an attorney and a person I have
known for a long time in regards to the challenges he faced in
representing defendants under espionage law, also be made part
of our record.
[The letter appears as a submission for the record.]
Chairman Cardin. Let me just start by saying that the
purpose of this hearing is to establish a record on the
espionage laws of our country. They were developed really in
1917 after World War I to deal with traditional spies who
desired to help our enemies. And as Senator Kyl and I were
talking about, if you look at the statute, you will see ``code
books,'' which I am sure people are wondering what that is
today.
It was that concern that motivated the Congress in that
time to pass laws to protect our country against our enemies,
and that statute has now been used to deal with Government
officials who leak information and private citizens who get
information and share it, but have no desire at all--in fact,
they think they are helping our country, not hurting our
country. The question is whether these laws are adequate the
way that they were drafted, and today we have three witnesses
who are really experts in this area.
The purpose is not to take immediate action on a specific
bill. It is certainly not an effort to try to deal with the
``shield law,'' which has already been acted upon by our
Committee. The purpose really is for us to get a better
understanding as to how the espionage law works today with
today's technology that was not in existence during World War
I, and whether we need to look at a different type of a statute
to protect our Nation against both spies and those who have
sensitive information and unlawfully disclose that information.
And I really do thank our three witnesses that are here to
share their expertise with the Committee.
With that, I would yield to Senator Kyl.
STATEMENT OF HON. JON KYL, A U.S. SENATOR FROM THE STATE OF
ARIZONA
Senator Kyl. Thank you very much, and, Mr. Chairman, thank
you for holding this hearing on a subject which is very
important and undoubtedly needs to be addressed now. We were
talking on the way over about the need probably to replace
terms like ``code books'' with ``electronic information'' and
things of that sort; ``national defense,'' maybe changing that
to ``national security,'' and things of that sort. And we
really appreciate the recommendations in the testimony. Mr.
Smith, I read your testimony last night, and you had a lot of
good ideas in there about that.
I also, though, want to focus on something else as well.
Let me ask unanimous consent to put my statement in the record.
Chairman Cardin. Without objection.
[The prepared statement of Senator Kyl appears as a
submission for the record.]
Senator Kyl. I will just raise the question. I will be
interested in the witnesses' basically addressing this issue.
We have significant whistleblower statutes on the books now to
enable people who have legitimate reasons for disclosing
classified information to be able to do so in a protected
environment. I do not have a lot of sympathy for people who
decide on their own to bypass those statutes, and knowing that
the release of information or leak of information to a
newspaper, let us say, that is published has the identical
effect as releasing that information to a foreign spy would
have for the purposes of the enemy, believing that it is OK and
then not being able to prosecute it. I would like to get your
reaction to that.
And with regard to the question of motive, as I recall, the
Israeli spy--I have forgotten his first name; Pollard was his
last name--had a very good motive. He did not want to hurt the
United States at all, but he did want to help his country of
Israel. He is serving life in prison because motive in that
case did not matter. It was the effect of the leak of the
secrets to another government that was the problem.
So everybody recognizes that leaks are a problem. Nobody
seems to have a good idea about how to stop it. And I did
appreciate, again, Mr. Smith, some of the ideas that you had in
your testimony. But I would like to delve into that a little
bit more during the hearing.
So, Mr. Chairman, thank you for, again, raising this very,
very important subject, and I think it will be beneficial for
our colleagues.
Chairman Cardin. Well, thank you, Senator Kyl. I just want
to underscore the points that you raised because I think this
is critical to trying to understand the espionage laws. I was
reading the material for today's hearing and was fascinated by
the court in the Rosen case adding a mental state requirement,
which I would be interested to see as we develop this hearing
as to how the statute has been basically interpreted by the
courts over the last 100 years, changing, I think, the original
intent of the statute to try to meet current circumstances. But
it may not serve all the circumstances that we have to deal
with, and you mentioned the whistleblower issues, and that is a
good point. Congress passed the whistleblower statute in order
to provide a mechanism where a person working for a sensitive
agency could come forward in a protected way. Well, if that
employee does not use that process, then are these statutes
adequate to deal with it? I think the points that you raise are
ones I hope that we will address through the three witnesses.
We have Stephen Vladeck, who is a Professor of Law at
American University School of Law. Professor Vladeck is a
nationally recognized expert on the role of the Federal courts
in the war on terrorism, and has authored numerous law review
articles on espionage statutes and terrorism-related issues. He
has also been part of the team of attorneys who have been
litigating important national security issues relating to the
use of military tribunals at Guantanamo Bay.
Jeffrey Smith is currently a partner in the D.C. office of
Arnold and Porter. He heads the firm's national and homeland
security practice. Mr. Smith previously served as General
Counsel of the Central Intelligence Agency and currently serves
on the CIA Director Leon Panetta's External Advisory Board. Mr.
Smith also serves as General Counsel to the Senate Armed
Services Committee, and prior to working in the Senate, he was
Assistant Legal Adviser in the State Department and as an Army
Judge Advocate General officer. As the head of Arnold and
Porter's National homeland security practice, Mr. Smith's
clients have included individuals and media organizations
involved in leak cases.
Finally, Kenneth Wainstein, who is also currently an
attorney in private practice and a partner in the D.C. office
of O'Melveny and Myers. Mr. Wainstein previously served as the
first Assistant Attorney General for National Security during
the Bush administration where he was responsible for the
supervision of espionage cases, and also formerly served as a
United States Attorney for the District of Columbia. Mr.
Wainstein also previously served as General Counsel and Chief
of Staff to the FBI Director Robert Mueller.
So we will start with Mr. Vladeck, and then we will work
our way through the witnesses. Thank you.
STATEMENT OF STEPHEN I. VLADECK, PROFESSOR OF LAW, AMERICAN
UNIVERSITY WASHINGTON COLLEGE OF LAW, WASHINGTON, DC
Mr. Vladeck. Thank you, Mr. Chairman and Senator Kyl. It is
an honor to testify before the Committee today on such an
important but neglected topic.
Mr. Chairman, you mentioned the importance of the Espionage
Act and its significance in our fight to avoid espionage and
the implications for our National security. And I think we can
all agree that this is an important goal that really cuts
across aisles, cuts across ideologies, et cetera.
But as significant as the Espionage Act is, and has been, I
think it is fair to say it is also marked by profound and
frustrating ambiguities and internal inconsistencies.
Attempting to distill clear principles from the state of the
Federal espionage laws in 1973, two Columbia Law School
professors--Hal Edgar and Benno Schmidt- -lamented that the
longer they looked, the less they saw. Instead, as they
observed, ``we have lived since World War I in a state of
benign indeterminacy about the rules of law governing defense
secrets.'' If anything, such benign indeterminacy has only
become more pronounced in the four decades since--and,
according to some, increasingly less benign.
My written testimony elaborates upon the statutory scheme
in a bit more detail. But for present purposes, suffice it to
say that, in my view, there are four significant problems with
the Espionage Act in its current form.
The first and most systematic defect to which, Mr. Chairman
and Senator Kyl, you both already alluded concerns its
ambiguous scope, by which I mean whether it applies to anything
beyond classic spying. Enacted to punish ``espionage,'' which
Black's Law Dictionary defines as ``The practice of using spies
to collect information about what another government or company
is doing or plans to do,'' the plain text of the Act fails to
require a specific intent either to harm the national security
of the United States or to benefit a foreign power. Instead,
the Act requires only that the defendant know or have ``reason
to believe'' that the wrongfully obtained or disclosed
``national defense information'' is to be used to the injury of
the United States, or to the advantage of any foreign nation.
As a result, the Act could be applied as currently written
to prosecute Government employees or private citizens in cases
bearing little resemblance to classic espionage. Such cases
could include situations in which a Government employee seeks
to reveal the details of an unlawful secret program, or to
bring to the attention of the relevant Inspector General or
oversight officer the existence of information that was
wrongfully classified; and cases in which a private citizen
comes into the possession of classified information with no
desire to harm our National security. In each of these
circumstances, an informed citizen would certainly have
``reason to believe'' that the relevant information, if
publicly disclosed, could cause injury to the national security
of the United States. That knowledge, though, need not--and
often will not--bear any relationship to the defendant's actual
motive. And I think we saw this in the Rosen case.
Indeed, in his ruling in the Rosen case, Judge Ellis
specifically said that the language of the statute leaves open
the possibility that defendants could be convicted for these
acts, despite some salutary motive, which Senator Kyl already
mentioned.
Now, I said there were four significant problems with the
Espionage Act. Let me briefly describe what I say as the other
three key defects, obviously, upon which I would be happy to
elaborate.
Related to the ambiguous scope of the Espionage Act is the
question of how, if at all, it applies to whistleblowers. For
example, the Federal Whistleblower Protection Act protects the
public disclosure of a violation of any law, rule, or
regulation, only ``if such disclosure is not specifically
prohibited by law, and if such information is not specifically
required by Executive order to be kept secret in the interest
of national defense or the conduct of foreign affairs.''
Similar language appears in most of the other Federal
whistleblower protection statutes.
To be sure, the Federal whistleblower statute, the
intelligence community whistleblower statute, and the military
whistleblower statute all authorize cleared Government
personnel in national security cases to receive information
from the putative whistleblower. And yet there is no specific
reference in any of these statutes to the Espionage Act or to
the very real possibility that those who receive the disclosed
information, even if they are ``entitled to receive it'' within
the meaning of the Espionage Act--and that itself is hardly
clear--might still fall within the ambit of Section 793(d),
which prohibits the willful retention of national defense
information. Superficially, one easy fix to the whistleblower
statutes might be amendments that made clear that the
individuals to whom disclosures are supposed to made under
these statutes are ``entitled to receive'' such information
under the Espionage Act. But Congress might also consider a
more general proviso exempting protected disclosures from the
Espionage Act altogether.
Another important and related ambiguity with the Espionage
Act is whether and to what extent it might apply to the press.
As with the whistleblower example I just described, a reporter
to whom a Government employee leaks classified information
could theoretically be prosecuted merely for retaining that
information and could almost certainly be prosecuted for
disclosing that information, including by publishing it. And
yet it seems clear from the legislative history surrounding the
original Espionage Act that Section 793(e) was never meant to
apply to the press; indeed, three other provisions of the
Espionage Act specifically prohibit publication of national
defense information, and another, broader limitation on the
retention of national security information by the press was
specifically scrapped by Congress in 1917, suggesting that the
Act is express in those few places where it specifically
targets news gathering.
Finally, the Espionage Act is also silent as to potential
defenses to prosecution. Most significantly, every court to
consider the issue has rejected the availability of an
``improper classification'' defense--a claim by the defendant
that the information he unlawfully disclosed was, in fact,
improperly classified. If true, of course, such a defense would
presumably render the underlying disclosure legal. It is
entirely understandable, of course, that the Espionage Act
nowhere refers to ``classification'' since the modern
classification regime post-dates the Act by over 30 years.
Nevertheless, given the well-documented concerns today over the
overclassification of sensitive governmental information, the
absence of such a defense--or, more generally, of any specific
reference to classification--is yet another reason why the
Espionage Act's potential sweep is so broad.
Now, although statutory ambiguity is hardly a vice in the
abstract, in the specific context of the Espionage Act, these
ambiguities have two distinct--and contradictory--effects.
Testifying before Congress in 1979, Anthony Lapham, then the
General Counsel of the CIA, put it this way: ``On the one hand
the laws stand idle and are not enforced at least in part
because their meaning is so obscure, and on the other hand it
is likely that the very obscurity of these laws serves to deter
perfectly legitimate expression and debate by persons who must
be as unsure of their liabilities as I am unsure of their
obligations.''
And to whatever extent these problems have always been
present, recent developments lend additional urgency to today's
endeavor. In addition to the AIPAC case I mentioned earlier, a
report released just last week by the Heritage Foundation and
the National Association of Criminal Defense Lawyers
highlighted the growing concerns among courts and commentators
with the problems of vague and potentially overbroad criminal
statutes, even in modern criminal laws, let alone antiquated
laws like the Espionage Act. Indeed, just last month, the
Supreme Court in the crush- video decision reiterated its
concern with Congressional statutes that may chill
constitutionally protected speech. As Chief Justice Roberts
emphasized for an 8-1 majority, the Court ``would not uphold an
unconstitutional statute merely because the Government promised
to use it responsibly.''
Although it is not my place to make specific
recommendations to this Subcommittee with regard to how the
Espionage Act might be updated, it does seem clear that the
current state of the law is counterproductive regardless of the
specific policy goals one might seek to pursue. At the end of
his decision in the Rosen case, Judge Ellis specifically
suggested that the time was ripe for Congress to revisit the
issue, and, Mr. Chairman, I want to thank you and the Committee
for taking up his call.
Thank you.
[The prepared statement of Mr. Vladeck appears as a
submission for the record.]
Chairman Cardin. Thank you very much for your testimony.
Mr. Smith.
STATEMENT OF JEFFREY H. SMITH, PARTNER, ARNOLD AND PORTER,
WASHINGTON, DC
Mr. Smith. Mr. Chairman, Senator Kyl, it is a privilege to
be here this morning to address this very important subject.
It is often said that the first responsibility of our
Government is to provide for the security of our citizens, and
doing so means that some information must necessarily be kept
secret--from our adversaries and from public disclosure. And
the criminal law plays an important role in protecting that
information.
There is no real debate over whether real spies, the
Aldrich Ameses, the Robert Hanssens, the John Walkers, and the
Colonel Abels of this world should be prosecuted. However, more
difficult questions are presented as we seek to prosecute those
who leak properly classified information to the press. It is
these leak cases that present the hardest questions.
Before turning to the leak questions, let me make three
modest suggestions that I think could enhance the ability of
the Government to prosecute real spies. And Senator Kyl
graciously mentioned a couple of these, as did you, Mr.
Chairman.
First, the statutes have a long list of documents that
include things like signal book--I have no idea what a signal
book is and doubt that the Government still has such things. I
think one approach would be to replace it with the words
``information in whatever form.'' If that is too vague, perhaps
another approach would be to say ``electronic media'' or
``information in electronic form'' in the list.
Secondly, the statutes speak of ``information relating to
the national defense.'' I am concerned that language is too
narrow. It is true, as courts have, as Judge Ellis points out
in his August 2006 opinion, interpreted the term broadly to
include information dealing with military matters and more
generally with matters relating to the foreign policy and
intelligence capabilities. But I do think it should be replaced
with the term ``national security'' and adopting a definition
similar to that in the Executive order, that is to say, ``the
national defense or foreign relations.'' And I suggest this
because I have had some experience, particularly when I was at
the Department of State, where we had a prosecution where we
had, frankly, to strain to find documents that had been given
through a real spy to the North Vietnamese Government that
related to traditional diplomatic exchanges.
Third, I suggest the term ``foreign nation'' be changed to
``foreign power,'' similar to that used in FISA, because we are
dealing with al Qaeda and Taliban that are not foreign nations.
Let me turn to the issue of those who leak classified
information. Every administration in which I have served has
suffered from leaks that have been truly harmful. And every
administration has struggled to solve the problem, but none has
had much success.
The most recent legislative example was the Shelby
amendment in 2002--pardon me, initially 2000. It was vetoed by
President Clinton who said it would ``unnecessarily chill
legitimate activities that are the heart of a democracy.'' And
you will recall the Shelby language was limited only to
Government employees, not to the press.
But I think President Clinton's veto put his finger on an
important issue, and that is the fact that senior Government
officials often talk to the press on background, with
authorization, and provide information that is, in fact,
technically still classified. But they do so anonymously and
without taking the formal steps to declassify the information.
What often happens is the journalists then will call around,
and they will find out other information related to that part
that has been disclosed to them that the administration did not
want disclosed, but the person who gets the call from the
journalist does not know that the backgrounder has occurred,
and it can set in motion a tone that suggests to people that
the executive branch is not serious about protecting secrets. I
do not want to overstate this, but I do think the key to
preventing leaks is discipline from the top.
In other words, when an administration puts out sensitive
information, even in the controlled fashion, in a legitimate
effort to inform the public, they can hardly be surprised when,
having permitted the press to pull on the first thread, the
whole sweater unravels.
The matter came up again in 2002-2001, I beg your pardon.
Instead of enacting the Shelby amendment, the Congress directed
Mr. Ashcroft, then the Attorney General, to submit a report,
which he did in October 2002. I believe those recommendations
still stand admirably, and I urge the Committee to take a look
at those and to work with the administration to try to
implement some of those ideas which were designed to prevent
unauthorized disclosures.
Leaks are a real problem, Mr. Chairman, and I think we need
to address them. I have made a few specific suggestions, but I
do not think it is necessarily a good idea to open the statute
to try to make it easier to prosecute the press. I think that
has a lot of issues that just may not--the gain may not be
worth the candle.
I want to end by quoting one of my most admired law
professors. I was in law school when the Pentagon Papers case--
when it was learned that Daniel Ellsberg had admitted to being
the source to the New York Times. My professor, who had served
a long time in Government, said, ``I know what we should do; we
should give him a medal and then send him to prison.'' And that
captures, I think, the hard choices that need to be made, and
so I commend this Subcommittee for beginning to take a serious
look at those hard choices.
[The prepared statement of Mr. Smith appears as a
submission for the record.]
Chairman Cardin. Thank you very much for your testimony.
Mr. Wainstein.
STATEMENT OF KENNETH L. WAINSTEIN, PARTNER, O'MELVENY AND
MYERS, WASHINGTON, DC
Mr. Wainstein. Thank you, Mr. Chairman and Senator Kyl, for
inviting me to testify before you today along with my two co-
panelists, both men of tremendous expertise in the area of
counterespionage.
Since the attacks of September 11, 2001, I have spent much
of my professional career in the national security world, where
sensitive sources and methods are really the lifeblood of our
National security operations, and I have seen firsthand the
important role that sensitive information plays in our National
security operations and how those operations can be put in
jeopardy whenever that information is compromised. And,
unfortunately, the reality is that that information is
compromised all too frequently.
For purposes of today's discussion, I will focus on two
general types of unauthorized disclosures: first, where a
Government official passes sensitive information to a foreign
agent for money or for some traitorous reason, which is the
traditional espionage scenario; and, secondly, where a
Government official leaks secrets to the media, maybe out of
some base self-interest or maybe out of a genuine desire to
expose official wrongdoing and improve Government operations.
A key element of stopping both types of disclosures is
ensuring that in the appropriate cases we investigate and
prosecute those responsible. As you know, however, the
Department of Justice has brought a number of strong
traditional espionage cases over the years, but it has brought
relatively few prosecutions for leaks to the media. That thin
track record is not for lack of trying; rather, it is the
result of numerous obstacles that stand in the way of building
a prosecutable media leak case. Those obstacles include the
following:
First, as a touchstone matter, it is just downright
difficult to identify the leaker in most cases, given the large
universe of people who often are privy to the information that
was disclosed.
Secondly, there are limitations in the Department of
Justice's internal regulations, limitations that are in place
for all the right First Amendment reasons, but they limit the
ability to subpoena and get information from the one party who
is in the best position to identify the leaker--i.e., the
member of the media who received the leak from the Government
official.
And, third, even if you can get beyond that challenge and
the leaker is identified, the agency whose information is
compromised or was compromised by the leak is often reluctant
to proceed because of concern that prosecution is just going to
result in the disclosure of further sensitive information.
Then, finally, even if the Justice Department succeeds in
identifying the suspected leaker and indicting the case, it can
expect to face a very vigorous offense with a wide variety of
cutting edge legal challenges, the kind of litigation we saw in
the Rosen and Weissman case that ultimately was dismissed.
For all these reasons, leak cases--especially leak cases to
the media--are exceptionally challenging, and the question for
today is whether any of these obstacles can be addressed by
changes to the governing legislation.
While I do not see one sort of legislative silver bullet
that will overcome all these obstacles, I do see a few areas of
legislative initiative the Committee might want to consider.
First, for example, the Committee might examine whether
Government contractors are adequately covered by the espionage
statutes. These statutes were passed well before the influx of
contractors into the Government's most secret or sensitive
operations, and one of the critical statutes, 50 U.S.C. 783,
covers Government employees but does not extend to contractors.
Congress could consider putting Government contractors and
employees on the same footing in that provision.
Congress could also consider a number of amendments to the
Classified Information Procedures Act to ensure better
protection of classified and sensitive information in our
criminal trials. I have listed a number of ideas for such
amendments in my written statement, including several that
Senator Kyl has proposed. And with the current national
discussion about prosecuting more international terrorism cases
in our Article III courts, I think now is a good time to
consider amending CIPA to enhance our ability to protect
sensitive information in our criminal trials.
And then in a more general sense, I think Congress can use
this hearing and any ensuing hearings to encourage respect at a
fundamental level for our Nation's operational secrets.
Congress can send the message that it does not condone the
unauthorized release of classified information about our
National security operations. And it can point out that
whistleblowing is no longer a sufficient justification for
divulging intelligence community secrets to the public or to
the press now that the Intelligence Community Whistleblower
Protection Act provides a mechanism where a Government employee
who wishes to blow the whistle can actually take that
information, that sensitive information, in a protected way to
the Intelligence Committees up in Congress.
No matter where one stands on the political spectrum or in
the current debate about the various national security policy
issues of today, we should all recognize that the unchecked
leaking of sensitive information can cause grave harm to our
National security. Congress plays a very important role in
addressing that problem--whether by legislation, by oversight
or simply by exhortation--and I applaud the Committee for the
initiative it is showing with today's hearing.
I appreciate your including me in this important effort,
and I stand ready to answer any further questions you may have.
[The prepared statement of Mr. Wainstein appears as a
submission for the record.]
Chairman Cardin. Well, thank you, sir, and I thank all
three of you for your testimony.
Shortly, this Committee will start the confirmation process
of a new Justice to the Supreme Court, and I think there will
be consensus among all the members of this Committee that we
believe that Congress is the entity to make our laws. And when
we see the courts modify our statutes, it reflects either
action on the courts that we find inappropriate
philosophically, or a failure of Congress to deal with current
needs, that needs to be addressed. And I think in the espionage
world, it is the latter. Congress has not modernized the
statute, and we really need to deal with it.
A prosecutor needs to be apolitical. He must look at the
statute and say, ``Well, look, if the circumstances fit, it is
my responsibility to bring the action.'' So, therefore, Mr.
Smith, when you refer to whether a leak is authorized or
unauthorized, I am not sure I find that in the criminal statute
anywhere. So it does raise a question as to whether the
espionage statute in and of itself needs to be focused toward
those who are participating in traditional spy activities, and
whether the CIPA statute and others need to be strengthened in
order to deal with leaks, or whether we can handle both under
one statute or not.
Mr. Smith. The problem is that the term ``authorized
leaks'' has sort of crept into the lexicon because that is what
often happens, as we know. And my concern is that it also sets
a tone that somehow enables or empowers others to leak. If they
see that a very senior official is talking, then they are less
constrained not to talk.
In terms of handling it as a criminal matter, whether one
could make those kinds of distinctions and rewrite the statute
so that you focus on different types of disclosures that have
different purposes in mind, I do not know. But it certainly
undermines the effectiveness of the statute when this sort of
practice occurs. And what happens, of course, is that you
sometimes find an administration talking about A through D in a
particular subject, and they are perfectly happy to have that
out in the press and talked about because they think it is a
legitimate issue. But then when somebody else puts out F
through G on that same set of subjects, they get furious,
insist that it is a leak, and refer it to the Justice
Department for prosecution and investigation.
Now, you almost never find the leaker, but if you did, one
could imagine a very difficult set of circumstances that
prosecutors would face in trying to prove where the
administration had chosen to draw the line between things that
they were comfortable being talked about and things they were
uncomfortable being talked about.
So the question, I think, goes back to, as you alluded to
in your opening remarks, about who--as did Senator Kyl--who
decides what harm will result. That is principally a
governmental function, and it is a very difficult line to draw.
Chairman Cardin. Well, I think it just raises the issue of
whether we can deal with the espionage statute in isolation.
CIPA and the whistleblower and the other related statutes that
we have that are aimed at establishing practices that, when you
leak information, you are violating those practices.
Mr. Smith. I completely agree, Mr. Chairman. If I was not
clear, they are linked. There are a number of statutes that fit
together, and one ought to look at them comprehensively.
Chairman Cardin. Is there a difference here in regard to
those who sign a non-disclosure agreement with the Government
and those individuals who do not sign a non- disclosure? Does
that present a different hurdle in regard to current espionage
laws or related statutes? Anybody care to----
Mr. Vladeck. I will take a shot at it. You know, I think,
Mr. Chairman, it would depend, and I think that is part of the
problem with the Espionage Act, is the ambiguity in the
language. You know, various provisions refer to whether the
disclosure was authorized or not, whether the individual was
lawfully in possession of the information or not.
I do not actually think it is a legally dispositive
distinction, by which I mean I think you could prosecute an
individual under the Espionage Act as currently written,
whether they had signed a non-disclosure agreement or not. But
I do think that that creates yet another ambiguity. And I
suspect that the courts today would find, you know, perhaps
more trouble in that ambiguity in the context of a Government
employee who had not signed such an agreement; whereas, the one
who had signed an agreement might be held to have waived
whatever protections he might have had.
But I have to say, I think this actually highlights part of
the issue here, which is that the statute is written in such
general terms at a time before these kinds of agreements would
have even been contemplated by Congress, that if that is a
distinction that is worth pursuing, I do not think the current
text of the statute would support it.
Chairman Cardin. Well, one of the complexities here is the
statute applies to private citizens, it applies to Government
employees, it applies to Government contractors. So there is a
whole mix of individuals that this one statute applies to.
Mr. Vladeck. Well, if I may, I think Mr. Wainstein already
referred to the issue of contractors. The oddity is that
separate from Section 783, Section 793(f)(2) refers to
reporting to a superior officer that you have the information
and that you are potentially in possession of classified
information. That presupposes that you have a superior officer.
So even on the question of whether the statute applies to non-
governmental employees, I think the answer just depends on how
you cut it. And I think there are concerns with applying it so
broadly when the language seems to contemplate chains of
command that you might not see in the private workplace.
Chairman Cardin. Do any of you want to comment about the
challenges to a prosecutor under the Garrity case where, if the
information is required to be disclosed by your employer, it
can compromise the ability of a prosecutor to bring that case?
Is that something we need to deal with?
Mr. Wainstein. Yes, Mr. Chairman, I would be happy to
handle that. The concern you are alluding to is a very real
concern in criminal prosecutions across the board--whenever you
have a Government employee who gets interviewed as part of an
investigation into wrongdoing and is told as a condition of
your employment you have to submit to this interview, that
employee then gives a statement, and that statement then gets
factored into an ensuring criminal investigation and
prosecution. The problem is that statement was compelled by the
Government, and then that can infect the whole prosecution.
Because if you have a compelled statement that gets factored
into the investigation and the prosecution should not have been
using that statement or knowledgeable about the statement
because it was compelled against that person's rights, then it
can affect the whole prosecution and really undermine it.
There was the Blackwater case recently that has gotten a
lot of attention where the case got dismissed for fundamentally
that reason.
It is an issue in espionage cases, though I think the way
it typically plays out is there is a protocol in place where,
if an intelligence agency, let us say the CIA, thinks there has
been a leak, they make a referral to the Department of Justice,
and there are these 11 questions. It is a standard form, and
the agency whose information was leaked answers these
questions, sends them to the Department, and the Department of
Justice then decides whether or not to initiate a criminal
investigation. If a criminal investigation is initiated, then
typically the agency stands down on its administrative process
so as not to cause that problem.
So there is coordination that avoids that problem, but it
is not foolproof. Every now and then, for instance, if a
subject of an investigation is working in the agency and there
is a criminal investigation going on, that person might just
come up for his 5-year re-up on his background and have to go
in and be polygraphed. If he is being told, ``You have to be
polygraphed'' and is then questioned about ``have you ever
disclosed confidential information,'' and that person then
admits it, that compelled statement then gets into the
investigation and can taint the whole investigation.
It is an issue that we typically are able to work around in
espionage cases. I am not sure that it is something that
actually -for which there is a legislative fix that I can think
of, but it is one of the problems. I could not recite all the
obstacles to successful leak investigations, but it is one of
the ones we have to deal with.
Chairman Cardin. All right. Well, thank you. I appreciate
that answer.
Senator Kyl.
Senator Kyl. Thank you.
Let me just ask a question. I gather all three of you
probably know the answer to this. But in either a leak or an
espionage case, I gather that the classification under the law
of confidential, secret, and top secret, which--for example, I
will just read the middle one. Secret is applied to information
``the unauthorized disclosure of which reasonably could be
expected to cause serious damage to the national security.''
And there is a higher standard for top secret, a lower standard
for confidential.
Is the defense able to go behind that classification in
effect to say this information really could not reasonably be
expected to cause damage or serious damage.
Mr. Vladeck. Senator Kyl, actually I think the case law is
pretty clear that the defendant cannot raise that defense. I
think there is a Ninth Circuit decision from the 1970s called
United States v. Boyle that specifically deals with that
question, where it would sort of defeat a purpose to allow the
defendant to attack in court whether a document was properly
labeled.
Senator Kyl. Do the others of you agree? So then the
President, in effect, or his agents have determined that fact
by classifying the information at a certain level. Is that
correct? Do you all agree with that?
Mr. Smith. Yes.
Senator Kyl. Oaky. Then let me make this observation, and I
am just going to quote--I am just going to pick on one of you,
Mr. Smith, because you said it, I think, very well: ``Those who
become real spies should be prosecuted with the full might of
the Government. Those who, without authority, leak to the media
or others not authorized to have possession of classified
information should similarly be prosecuted.''
Now, that is what I want to get to here, that second
category. I think we all agree that as to the first category
the statutes can be modernized, cleaned up. That is something
that you could usefully help us do, but it is that second
category where we have some issues. And let me just posit two
general points here and then ask the three of you to get into
it. And in your testimony, each of you in some way or other
dealt with these problems. You have got the problem of the
official leak, and I think, Mr. Wainstein, you made this point
in your opening statement, that there can be a concern arise
among the people in the agency if they see a lot of official
leaks being done apparently with some kind of authority. What
does that do to the rule of law and their expectation of
deterrence? To me, it undermines it. It is not good. But there
is an easy solution to it. You either have someone authorize
the leak who is in the position of authorizing it. Presumably
that happened, if the excuse is this was an authorized leak of
classified information. Somebody had to make the decision that
it was OK in this for specific purposes to do it.
Well, you can either have that and/or you can declassify
the information just before the leak occurs so that there is no
question about it.
Both of those seem to me to be preferable solutions to not
prosecuting because somebody authorized it--or maybe somebody
did not authorize it, and it is hard to distinguish. Reaction?
Mr. Smith. Since I have spent a fair bit of time thinking
about this, Senator--and I think I raised it in my statement--
the concern--you have put your finger on it precisely. In an
ideal world, when--let us take a real case example. The
Secretary of State--there is an upcoming ministerial meeting.
The Secretary of State decides that the press should be
``backgrounded'' on what we are going to talk about. It happens
daily. The story in the newspaper the next day says,
``Officials close to the negotiations say'' da, da, da, da, da,
but they cannot disclose their names because they spoke on
condition of anonymity. That was probably decided at the
Secretary of State's morning meeting the day before, cleared
with the White House, and they backgrounded the press.
Somebody made a decision, however, as to where that line
would be drawn between what would be given to the press and
what would not be. They also felt that they did not want to
officially acknowledge that, let us say, the Deputy Secretary
of State spoke on the record about this. They like the
anonymity. It gives them flexibility. It gets out there----
Senator Kyl. Anonymity is Okay. No problem there.
Mr. Smith. But the problem is nobody then formally
declassifies that information so that the documents floating
around the Government with the talking points and so on are
still technically classified.
Senator Kyl. Do you think that is good policy? Or would it
not, in fact, be a rather simple and, in fact, important way to
solve this problem? Nobody should be leaking information. If
the Secretary of State decides that it is a good thing to do,
then I am all for it being done. But there should be a simple,
quick process by which it can be done, either--you say cleared
by the White House. Okay, so that no longer is classified
information, correct?
Mr. Smith. Right.
Senator Kyl. Or--and I do not know how you can do this. I
guess we would have to provide in law. It may still be
classified, but there is an exception for certain officials to
leak the information.
Mr. Smith. Well, I certainly would not be in favor of the
latter. I think that is unmanageable. But the former, where----
Senator Kyl. But that is what is being done today.
Mr. Smith. You are precisely correct, and nobody really
seeks to prosecute those cases because nobody refers them to
the Justice Department. What does get referred to the Justice
Department is people who then leak around the edges of that and
go further than the administration wanted.
Senator Kyl. Excuse me for interrupting, but because we do
not have a clear procedure, it gets to be a pretty gray area as
to whether you are--when you get the follow-up call from the
reporter, are you really adding to that and so on? We need to
make that line bright so that we do not get into the Valerie
Plame series of telephone call assumptions as played out a year
or so ago.
Mr. Smith. I think that is the solution. It may prove very
difficult to administer and to make it workable, because one
could imagine the Secretary of State not wishing to send around
a piece of paper that said, ``Well, I authorize the Deputy
Secretary of State to disclose this kind of information.'' But
in the absence of that, it does seem to me that you have these
other problems, and if we could have a system that acknowledged
that and somehow regularized it, I think it would be valuable
for a variety of reasons, including hopefully discouraging
others from leaking things that should not be leaked.
Senator Kyl. Yes, exactly. Thank you.
Just in the 20 seconds I have left, comments by the other
two panelists on that particular point? Then I will make my
second one later.
Mr. Wainstein. I am sympathetic to your point, Senator,
about the nebulousness of the authority issue, and, you know, I
think it is worth pursuing whether there is a brighter line
that would be in some ways more easily administrable and maybe
even fairer.
Mr. Vladeck. And just quickly, because I suspect we will
come back to this, I also think that this conversation
presupposes that we are all in the same place with regard to
the current regime for classification and that we are willing
to accept that the current regime for classification works
adequately both in ensuring that the right information is
classified and that the wrong information is not. And I guess,
Senator, I would just say that is not an assumption I am
necessarily comfortable making.
Senator Kyl. I appreciate that that is a different
question, though, and it is one that deserves examination. But
we have to start from a premise and--Okay, good. Thank you very
much.
Chairman Cardin. I want to follow up on Senator Kyl's point
because I agree with him, and I want to just go through a
couple scenarios. Some of it is personal because we get
sensitive and classified information that we read about in the
paper, and we are always puzzled as to how much we were
restricted.
But let us take that Secretary of State example and the
person who is responsible to give the information to the
communication person who is making it available on background,
mistakenly gives pages 1, 2, 3, when they are only supposed to
give pages 1 and 2. All the information is classified.
Where is the legal responsibility there? I guess I do not
understand authorized leaks from the point of view of the
criminal culpability under the statute. To me, if you
intentionally give our information that is sensitive, there is
vulnerability. I understand the court is interpreting this with
intent to harm our country, and this is certainly not with
intent to harm our country. But how do you draw this line if
you do not have in practice a procedure that Senator Kyl has
talked about where the information is no longer classified as
sensitive or classified?
Mr. Smith. Well, I would defer to Mr. Wainstein on the
issue of prosecutions because that is difficult. But it does--
you have put your finger on a critical question. I think that
in the absence of that kind of a system, I do not know where
the criminal culpability should be, but I have seen instances
in which a Secretary of State asked an Assistant Secretary of
State to background the press, the Assistant Secretary went
further than the Secretary wanted, thinking, however, that he
was carrying out what the Secretary directed him to do. The
Secretary got very, very angry and eventually wrote a letter to
the Assistant Secretary. That was a disciplinary action. And it
was a lack of clear communication about exactly what the
Secretary wanted disclosed.
Given the time pressure on these officials, it is hardly a
surprise that that happens, but this is a criminal statute
where clear lines--we need to make an effort to try to draw as
clear a line as possible.
Chairman Cardin. That is my point and I think Senator Kyl's
point. There needs to be a process here, because let me take it
then to someone who is not on the same page here. Someone--let
us take from the Congress of the United States--who has been
shared the same information in a classified setting and then
sees it released by background without name by the
administration. Is that Congressman then permitted to share
that information and comment on it? I think the answer is no,
but where do you draw the line? It seems to me that if you do
not have a process that has some transparency to it on the
information that is permitted to be released. It is a very
fuzzy situation, probably not too much documentation to back
this up, and if you get an aggressive prosecutor--who has
independence, remember. Our prosecutors do not have to wait for
an invitation to investigate. They can do that on their own.
Aren't we going down a path that could be extremely difficult
to administer?
Mr. Smith. It is extremely difficult to administer, and it
is often not fair. I have known Members of Congress of both
parties to complain that the administration will come up and
brief the Congress on some particular project or a program and
say this is top secret, you cannot talk about it, and then it
leaks that very afternoon. And it leaks in a way that the
Members of Congress disagree with because the administration
has decided to put out their version of things, and Congress
feels constrained from talking to the press and saying, well,
we disagree with that, we think it is bad policy. And they are
inhibited because of the classification that the administration
has put on it. It is not right. I have seen it done--this is
truly bipartisan. It is done by both parties in both
administrations, and it is not right. And it is certainly not
right then to sort of threaten prosecution to somebody,
particularly a Member of Congress, who chooses to say something
to the press that is counter to what the administration has put
out.
So greater transparency is critical. How one does that
realistically would be difficult. But you are both correct that
it is not right the way it is currently working.
Chairman Cardin. Well, I think the answer is what Senator
Kyl is suggesting. There has to be a transparent process for
declassifying that information if it is going to be made
available to the public. I mean, the Secretary of State is
going to have to say these two pages are just no longer
classified and they are available. Therefore, we all know that,
and we can comment on it. But to say that it is still
classified but the press gets it on background only, preventing
the open discussion of it by those who have knowledge of its
content is wrong.
Mr. Smith. There is a countervailing interest, which is the
hard part here, which is that it is important for senior
administration officials to put information in the public so
that the public will know what is going on and be talking about
it. They often do not want to do it in a way that specifically
ties officially the administration to that statement. I mean,
the FOIA litigation over the years has recognized that as a
viable distinction between something that leaks and later an
official acknowledgment of the leak, which then does declassify
it. So it has its useful part.
But what troubles, has always troubled me about it is that
there is--who is the decider here? Who gets to decide what is
classified and what is not? And I have seen administration
officials try to play it both ways, and then to use the
criminal law to try to enforce that seems to me deeply
troubling.
Chairman Cardin. I want to ask one more question, if I
might, and that is about the Whistleblower Protection Act, S.
372 in the 111th Congress. I think all three of you are
familiar with the operations of the CIA. The whistleblower
statute that we have provided--how does that work with the CIA
trying to carry out its mission? Is this the right way to
provide relief for employees who have concern? Or do you
believe it prevents the CIA from--or hampers the CIA in its
mission?
Mr. Smith. The answer is I do not know, Mr. Chairman. I
would be happy to think about that and get back to the
Committee. In my experience with the agency over the years, it
has not been a problem. But I think it is a question, and with
your permission, let me think about it a little bit and get
back to the Committee.
Chairman Cardin. I appreciate that.
[The information referred to appears as a submission for
the record.]
Mr. Wainstein. I'd like just sort of to talk about the
general notion of having a mechanism in place where members of
the intelligence community, employees of the intelligence
community who see something going wrong that they want to
disclose, that they can take it through classified, protected
channels and get it to the Intelligence Committees whose job it
is to practice oversight and to root out wrongdoing, root out
problems.
I think that is exactly the mechanism we need to perfect,
and I have not studied the new bill, but to the extent that
more work should be done to make sure that that process is in
place, it works well, there are user-friendly procedures in
place so that whistleblowers can get that information up to the
Intelligence Committees through the IG, the CIA IG, up to the
Intelligence Committees, and then not be retaliated against for
it, I am all in favor of it. And I think it is important
because the more we have a workable process in place for that,
then the less people can justify their unilateral leaks of
classified information on the grounds that they were trying to
blow the whistle. And a lot of leaks to the media are that, and
they are well intentioned at some level. But at the end of the
day, they are unilaterally disclosing sensitive information
that can cripple our operations.
Mr. Vladeck. If I may briefly, Mr. Chairman, I would just
add to that. I think relying on the whistleblower statutes
makes a lot of sense subject to two points. The first is that
presupposes that either the general counsel of the CIA or the
Intelligence Committees are in a position to act on this
information. And there has certainly at least been some
suggestions by commentators and critics that the law actually
does not necessarily allow especially the Intelligence
Committees to take necessary steps beyond that. I think that is
a difficult question.
Secondly, even if we all agree that that is the exact
process we want to be followed, the Espionage Act is silent as
to its interaction with the Whistleblower Protection Act. And
so at the very least, I suspect we might find common cause on
the notion that one could specifically amend the Espionage Act
to exclude protected disclosures under the various Federal
whistleblower statutes so that we do not have the concern of a
chilling effect that it might be unclear, even where the
whistleblower laws appear to apply, that these disclosures will
not subject the relevant individuals to prosecution.
Chairman Cardin. Thank you.
Senator Kyl.
Senator Kyl. Thank you, Mr. Chairman. This is a good
example of a hearing that could actually produce something
useful as opposed to much of what we do.
Let me get to----
Chairman Cardin. I think that is a compliment.
Senator Kyl. It is very much a compliment.
[Laughter.]
Senator Kyl. The second main thing that I wanted to get to,
we talked during my first questioning about the so-called
official leak, and I think we came to a conclusion that there
needs to be a brighter line and a better transparency so that
the official leak becomes the authorized official statement of
unclassified information somehow.
The second is the sort of good motive leak, either an
individual thinking ``I know better than the President what the
administration's policy ought to be, and I am going to leak
some information that undercuts his policy,'' knowing that it
is going to get out in the public--and it was Jonathan Pollard;
I remembered his name--or maybe even this AIPAC case. I only
know what I have read about it in the newspaper, but it seemed
to me that I recall one of the defenses, or at least
discussions in the media was that whatever information may or
may not have been exchanged there, it was not with an intention
of hurting the United States, and that was Pollard's defense.
But it seems to me that that is also dealt with fairly
easily by two things, but the statute maybe needs to be amended
to guarantee this. Mr. Vladeck, you got close to this, I think,
in one comment you made.
First of all, there are two things, it seems to me, that
easily respond to the mens rea requirement here. One is the
classification itself, if, in fact, the classification is a per
se determination of harm if the information gets out; and,
second, the mens rea here would consist of two other factors:
one, knowing that it is unauthorized and intentionally leaked
or put out. In other words, you did not mistakenly pick up the
wrong page--I think maybe, Mr. Smith, that was your example.
You were supposed to release page 2 and 3 and you mistakenly
released page 1 as well. You would have to know that what you
released was unauthorized; and, second, you would have to do
that intentionally. And the harm requirement would be satisfied
by the classification itself.
It seems to me that as to the person who is doing the
leaking, a statute that was clear in those respects would
satisfy everything that we need except for--and I am leaving
aside, at least for the moment, the publication by a media
corporation. In other words, we are not talking about here, at
least for the purpose of doing this in pieces right now,
prosecuting someone for publishing the information. Leave that
aside for a moment. I am just talking about the person who
leaks the information. Wouldn't that satisfy the statutory
requirements, and if we stated it that way, it would be much
clearer and much easier, therefore, to prosecute?
Mr. Smith. Let me take a first cut at that, Senator Kyl. If
this statute that you are discussing is focused on the
Government employee or the person who had authorized access to
the classified information, I agree with you, that is pretty
close to what the provision in Title 50 does.
I am uncomfortable with having it be a per se determination
that if the President classified it, that is sufficient. I
still think the Government should have some requirement to
prove that that, in fact, harm could reasonably be expected to
occur because I do not--I am a little suspicious of the
administration overclassifying things.
Senator Kyl. If I could interrupt you, though, I thought
you all three agreed that under the case law today, it is not a
defense that the information--in other words, the defense does
not go behind the classification to determine the reasonable
probability of harm.
Mr. Smith. You are correct. That is what the case law is.
But I am a little bit of an outlier on this.
Senator Kyl. So you are suggesting that standard may need
to be modified in some----
Mr. Smith. Yes.
Senator Kyl. Okay.
Mr. Smith. But the hard part is then when it is then given
to somebody else who does not have authorized access to it and
whether the statute that you have just outlined should be
applied to them. And, again, I think I am pretty comfortable
with it absent the----
Senator Kyl. Well, let me just argue with you there 1
second. First of all, you do not want judges who obviously do
not have the experience in dealing with classified data that
the executive branch that does the classification does. That
has been a criticism of giving judges this ultimate
determination.
Secondly, if the problem is that information is too easily
classified, the individual who is doing the leaking still
understands that his leak of that is unauthorized, whether he
disagrees with that proposition or not. And it seems to me
there are other ways that you deal with that other than just
deciding to ``take the law into your own hands.''
Mr. Smith. I completely agree with you. My only concern is
that I think there does need to be something more to put
somebody in jail than simply somebody put a classification
stamp on it. I am troubled with that mere fact.
Mr. Vladeck. If I may jump in, I would just add to that,
Senator Kyl. I also think it is worth noting that the case law
to which both Mr. Smith and I adverted largely pre-dates the
enactment of the Classified Information Procedures Act and
largely pre-dates the sort of belief--the creation of a body of
case law where Federal judges have, in fact, become expert to
degrees that we may disagree about, at least have some
experience in handling classified information in criminal
trials. And so it is possible that some of the concerns that
led to these decisions, at least initially, have been abated at
least somewhat by CIPA.
Senator Kyl. Mr. Wainstein.
Mr. Wainstein. You will recall that Attorney General
Ashcroft was asked to look at this issue, look at--I guess it
is called the Shelby bill, which essentially said what it is
that you are referring to, Senator, basically said that if you
are a Government employee--I think also former Government
employee--and you knowingly and intentionally leak classified
information, that you committed a crime.
I think the concern about overclassification is not case
specific; it is just sort of the broader concern that it puts
too much authority in the hands of the President to decide what
is classified and, therefore, what can be criminally--when
someone can be criminally sanctioned for disclosing it. And it
might give the Executive too much leeway to maybe classify
information that really is more embarrassing and less actually
a matter of national security. That is sort of the broader
issue.
And then, of course, there is the question of even if you
had a statute like this, would it really help increase the
number of prosecutions? In some ways, it would be easier
because, I mean, it means that the prosecution would not have
to prove up the harm, the potential harm, so you would not have
to go into, let us say, talking about how the information that
was disclosed was about some operation over in Europe that we
were doing and how that was--really that disclosure was harmful
because that operation would have given us the following
intelligence benefits. Whenever you have to do that in order to
make your case, you stand the risk of having to disclose more
information in discovery and in the actual presentation at
trial.
A statute like this would lower the burden, make it easier
to meet the burden, because all you have to show is it is
classified. And you would not have the same danger of releasing
more classified information. But I think that there are those
countervailing concerns about over-classification.
Senator Kyl. Do you mind if I just follow up? You say it
would lower the burden, but I am still confused. While the--is
it Boyd? What is the Ninth Circuit case?
Mr. Vladeck. I am sorry. I believe it is United States v.
Boyce?
Senator Kyl. Boyce. Well, that case may have pre-dated
CIPA. It is at least still acknowledged by the three of you as
probably the law in this situation until it is further refined.
So would what I am proposing really be a change from the law,
at least as it pertains to going behind the classification? In
other words, would it be setting up a higher standard?
Mr. Wainstein. It would not be setting up a higher
standard. The prosecutor would not have to prove the harm
element.
Senator Kyl. But does he have to prove that today beyond
the classification?
Mr. Wainstein. Yes, the classification helps, but you have
to put on additional evidence, typically, and that is what
happens. In fact, that is often one of the reasons why a case
like this might not be pursued because of the concern that you
have to disclose sensitive information in doing that.
Senator Kyl. So you have to do that--I am now a little
confused. Maybe you can see why.
Mr. Vladeck. Senator Kyl, if I may, and I hope this
alleviates the confusion. I think that the differences between
whether the information counts as national defense information
under the Espionage Act versus whether the mens rea that the
Supreme Court has read into the statute in the Goren decision
that the defendant knew that the information both was national
defense information and could harm--knew or had reason to
believe that the information, if disclosed, could harm the
national security of the United States. So it is not--knowing
that it is classified in and of itself may not be enough,
especially if any reasonable person would be hard pressed to
see how that information, if disclosed, could cause harm.
Senator Kyl. So, again, with your permission--and the two
of you agree with that reading?
Mr. Smith. Yes.
Mr. Wainstein. Yes.
Senator Kyl. So there is a requirement that the Government,
with some degree of burden, prove that the individual knew that
national security could be harmed above and beyond the fact
that he knew he was leaking classified information.
Mr. Vladeck. That is my understanding of the cases, and I
think just to go back to Chairman Cardin's point from before,
the Supreme Court, I think, has adopted that construction
largely to save what it thought would be constitutional
difficulties with the lack of such a requirement, at least in
1941.
Mr. Smith. And my experience with these cases is the fact
that it was classified is used as evidence to establish that it
relates to national security--pardon me, relates to national
defense and that its disclosure would cause harm. So it is--the
first thing that prosecutors do is say, Was this properly
classified and why?
Senator Kyl. Well, if I could then, just to summarize my
view on this, it seems to me, with that clarification--and I
really appreciate that--that with that further requirement, it
is hard to justify a good-motive leak when, in order to
prosecute such a case, you would have to establish that he knew
that he was potentially harming the national defense of the
United States.
Mr. Vladeck. Senator Kyl, this just goes back to a point I
made in my opening statement, and perhaps you and I just
disagree on this. I think there is a difference, though,
between knowing that the information you are disclosing may
potentially harm the United States and having that be the
motivation for why you are disclosing it. There might be good
faith separate from your knowledge. Perhaps you are not the
right person to make that calculation if you are the Government
employee, but I would resist the assumption that an employee
could never have good faith simply because he knows that the
information is classified.
Chairman Cardin. On that point, Senator Kyl, it seems to me
you are all saying, though, that, leaving the publication issue
aside, as Senator Kyl has suggested--we really do not want that
to be the focus of our work here today. But what you are saying
is that you do limit this to Government or former Government
employees like the so-called Shelby bill, that it should not
apply to private individuals. I am again talking about the
Rosen case, clearly one that is before us. Do you believe that
is a different standard?
Mr. Smith. In the case of the person who had--the laws and
the regulations speak in terms of people who had authorized
access. That is either Government employees, former Government
employees, or contractors. There I think the Government has
been able to prosecute these cases. I think the fact that it
was classified, that the individual knew it was classified, and
disclosed it without some kind of formal authority, that ought
to be prosecuted. In the case of the--the Rosen case, you will
recall that the man at the Department of Defense named Franklin
who gave them the information was prosecuted, and he is in jail
for a long time. That I think is proper.
I think what we are talking about is making it easier to
prosecute those cases by doing some of the things we are
talking about, perhaps working in some of the idea that if it
is properly--that if it is classified, that should be
sufficient, but the Government would still have to--I think we
are all, at least most of us are agreeing that simply the fact
that it has got a classification stamp on it should not be
sufficient to send somebody to jail for 25 years. I think you
need a little bit more than that.
The difficulty comes in when it gets into the hands of
somebody who did not have authorized access. If that person
then passes it to a foreign government intentionally knowing
that the foreign government is interested in it, then I think
that, too, should be a crime. If the person to whom it is
passed seeks to publish it, either in a newspaper or puts it on
Facebook or a blog someplace, then that gets a little bit
harder because presumably the person is putting it out there
because he or she believes that somehow it is important to talk
about. That still, in my mind, is a crime, but the motive and
the purpose gets a little bit more complicated there because
they may genuinely believe that it is a mistake that this
particular issue is not being discussed.
So perhaps we need to have a statute with different types
of action, different intents, and different punishments,
depending on the actor and the intent.
Mr. Vladeck. And if I may, I come at this from a slightly
different perspective, from the sort of academic long view. I
think the problem, Mr. Chairman, with going past the
individuals who are authorized to have the information is that
it becomes very difficult, as Mr. Smith says, to draw the line
once you get into the unauthorized access category. You said
you wanted to bracket the question on publication. I think that
makes sense. But I think that is the elephant in the room here,
which is that once we cross the line from those individuals who
are legally entitled to receive the information to those who
are not as a category, that question comes into the
conversation. And so----
Chairman Cardin. It certainly does, but we are really
trying to concentrate here on people who specifically are
giving information out to individuals more so than the news
media issue.
Mr. Vladeck. And I think that that goes to--I agree with
Mr. Smith's suggestion that we might think of--if I take it to
be a suggestion, that in those cases we might look at a more
rigid intent requirement as compared to the Government employee
or the contractor who should simply by virtue of his office
know and be required to hold onto this information. The private
person we might think about changing the standards because of
these concerns.
Chairman Cardin. Senator Kyl.
Senator Kyl. Well, Mr. Chairman, let me just say I have got
a lot of other questions. I also have a lot of other meetings
because we were so late here. This is an excellent panel. I
really hope that we can call upon you as we start to try to
formalize how we might want to respond to all of this for your
advice in helping us craft ideas for our colleagues perhaps. I
really appreciate all three of you informing the Committee. It
was a very helpful hearing, and I hope we can count on your
free advice in the future here.
Chairman Cardin. Well, let me just echo what Senator Kyl
has said. The purpose of this hearing was for us to gather
information, to get better informed, and to start a record in
this Committee as to the challenges we have. It clearly will
require us to look beyond just the espionage statute itself.
CIPA clearly is involved, the whistleblower statutes. It is
certainly an issue also concerning not just the passing on of
information but publishing. We understand that is an issue that
ultimately comes into the equation, but what we were looking at
is to try to set up the right formula for the types of
activities that compromise our National security. I think as
Mr. Smith said, changing the definition is one I think we all
would agree needs to be done.
This has been very, very helpful to us. The hearing record
will remain open for 1 week for additional questions and
statements, and I thank our three witnesses. We stand
adjourned.
[Whereupon, at 12:13 p.m., the Subcommittee was adjourned.]
[Questions and answers and submissions for the record
follow.]
[GRAPHIC] [TIFF OMITTED] 63582.001
[GRAPHIC] [TIFF OMITTED] 63582.002
[GRAPHIC] [TIFF OMITTED] 63582.003
[GRAPHIC] [TIFF OMITTED] 63582.004
[GRAPHIC] [TIFF OMITTED] 63582.005
[GRAPHIC] [TIFF OMITTED] 63582.006
[GRAPHIC] [TIFF OMITTED] 63582.007
[GRAPHIC] [TIFF OMITTED] 63582.008
[GRAPHIC] [TIFF OMITTED] 63582.009
[GRAPHIC] [TIFF OMITTED] 63582.010
[GRAPHIC] [TIFF OMITTED] 63582.011
[GRAPHIC] [TIFF OMITTED] 63582.012
[GRAPHIC] [TIFF OMITTED] 63582.013
[GRAPHIC] [TIFF OMITTED] 63582.014
[GRAPHIC] [TIFF OMITTED] 63582.015
[GRAPHIC] [TIFF OMITTED] 63582.016
[GRAPHIC] [TIFF OMITTED] 63582.017
[GRAPHIC] [TIFF OMITTED] 63582.018
[GRAPHIC] [TIFF OMITTED] 63582.019
[GRAPHIC] [TIFF OMITTED] 63582.020
[GRAPHIC] [TIFF OMITTED] 63582.021
[GRAPHIC] [TIFF OMITTED] 63582.022
[GRAPHIC] [TIFF OMITTED] 63582.023
[GRAPHIC] [TIFF OMITTED] 63582.024
[GRAPHIC] [TIFF OMITTED] 63582.025
[GRAPHIC] [TIFF OMITTED] 63582.026
[GRAPHIC] [TIFF OMITTED] 63582.027
[GRAPHIC] [TIFF OMITTED] 63582.028
[GRAPHIC] [TIFF OMITTED] 63582.029
[GRAPHIC] [TIFF OMITTED] 63582.030
[GRAPHIC] [TIFF OMITTED] 63582.031
[GRAPHIC] [TIFF OMITTED] 63582.032
[GRAPHIC] [TIFF OMITTED] 63582.033
[GRAPHIC] [TIFF OMITTED] 63582.034
[GRAPHIC] [TIFF OMITTED] 63582.035
[GRAPHIC] [TIFF OMITTED] 63582.036
[GRAPHIC] [TIFF OMITTED] 63582.037
[GRAPHIC] [TIFF OMITTED] 63582.038
[GRAPHIC] [TIFF OMITTED] 63582.039
[GRAPHIC] [TIFF OMITTED] 63582.040
[GRAPHIC] [TIFF OMITTED] 63582.041
[GRAPHIC] [TIFF OMITTED] 63582.042
[GRAPHIC] [TIFF OMITTED] 63582.043
[GRAPHIC] [TIFF OMITTED] 63582.044
[GRAPHIC] [TIFF OMITTED] 63582.045
[GRAPHIC] [TIFF OMITTED] 63582.046
[GRAPHIC] [TIFF OMITTED] 63582.047
[GRAPHIC] [TIFF OMITTED] 63582.048
[GRAPHIC] [TIFF OMITTED] 63582.049
[GRAPHIC] [TIFF OMITTED] 63582.050
[GRAPHIC] [TIFF OMITTED] 63582.051
[GRAPHIC] [TIFF OMITTED] 63582.052
[GRAPHIC] [TIFF OMITTED] 63582.053
[GRAPHIC] [TIFF OMITTED] 63582.054
[GRAPHIC] [TIFF OMITTED] 63582.055
[GRAPHIC] [TIFF OMITTED] 63582.056