S. Hrg. 111-834 THE ESPIONAGE STATUTES: A LOOK BACK AND A LOOK FORWARD ======================================================================= HEARING before the SUBCOMMITTEE ON TERRORISM AND HOMELAND SECURITY of the COMMITTEE ON THE JUDICIARY UNITED STATES SENATE ONE HUNDRED ELEVENTH CONGRESS SECOND SESSION __________ MAY 12, 2010 __________ Serial No. J-111-91 __________ Printed for the use of the Committee on the Judiciary U.S. GOVERNMENT PRINTING OFFICE 63-582 WASHINGTON : 2011 ----------------------------------------------------------------------- For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC 20402-0001 PATRICK J. LEAHY, Vermont, Chairman HERB KOHL, Wisconsin JEFF SESSIONS, Alabama DIANNE FEINSTEIN, California ORRIN G. HATCH, Utah RUSSELL D. FEINGOLD, Wisconsin CHARLES E. GRASSLEY, Iowa ARLEN SPECTER, Pennsylvania JON KYL, Arizona CHARLES E. SCHUMER, New York LINDSEY GRAHAM, South Carolina RICHARD J. DURBIN, Illinois JOHN CORNYN, Texas BENJAMIN L. CARDIN, Maryland TOM COBURN, Oklahoma SHELDON WHITEHOUSE, Rhode Island AMY KLOBUCHAR, Minnesota EDWARD E. KAUFMAN, Delaware AL FRANKEN, Minnesota Bruce A. Cohen, Chief Counsel and Staff Director Matt Miner, Republican Chief Counsel ------ Subcommittee on Terrorism and Homeland Security BENJAMIN L. CARDIN, Maryland, Chairman HERB KOHL, Wisconsin JON KYL, Arizona DIANNE FEINSTEIN, California ORRIN G. HATCH, Utah CHARLES E. SCHUMER, New York JEFF SESSIONS, Alabama RICHARD J. DURBIN, Illinois JOHN CORNYN, Texas AL FRANKEN, Minnesota TOM COBURN, Oklahoma EDWARD E. KAUFMAN, Delaware Bill Van Horne, Democratic Chief Counsel Stephen Higgins, Republican Chief Counsel C O N T E N T S ---------- STATEMENTS OF COMMITTEE MEMBERS Page Cardin, Hon. Benjamin L., a U.S. Senator from the State of Maryland....................................................... 1 prepared statement........................................... 35 Kyl, Hon. Jon, a U.S. Senator from the State of Arizona.......... 2 prepared statement........................................... 39 WITNESSES Smith, Jeffrey H., Partner, Arnold and Porter, Washington, DC.... 6 Vladeck, Stephen, I., Professor of Law, American University Washington College of Law, Washington, DC...................... 3 Wainstein, Kenneth L., Partner, O'Melveny and Myers, Washington, DC............................................................. 8 QUESTIONS AND ANSWERS Responses of Jeffrey H. Smith to questions submitted by Senator Cardin......................................................... 24 Responses of Stephen I. Vladeck to questions submitted by Senator Cardin......................................................... 30 Responses of Kenneth L. Wainstein to questions submitted by Senator Cardin................................................. 33 SUBMISSIONS FOR THE RECORD Lowell, Abbe David, Attorney at Law, McDermott Will & Emery, Washington, DC................................................. 43 Smith, Jeffrey H., Partner, Arnold and Porter, Washington, DC.... 48 Vladeck, Stephen, I., Professor of Law, American University Washington College of Law, Washington, DC...................... 61 Wainstein, Kenneth L., Partner, O'Melveny and Myers, Washington, DC............................................................. 75 THE ESPIONAGE STATUTES: A LOOK BACK AND A LOOK FORWARD ---------- WEDNESDAY, MAY 12, 2010 U.S. Senate, Subcommittee on Terrorism and Homeland Security, Committee on the Judiciary, Washington, DC. The Subcommittee met, pursuant to notice, at 11:03 a.m., in room SD-226, Dirksen Senate Office Building, Hon. Benjamin L. Cardin, Chairman of the Subcommittee, presiding. Present: Senators Cardin and Kyl. OPENING STATEMENT OF HON. BENJAMIN L. CARDIN, A U.S. SENATOR FROM THE STATE OF MARYLAND Chairman Cardin. The Subcommittee will come to order. We apologize for the late start. As you know, there were votes on the floor of the Senate. I am going to ask unanimous consent that my entire opening statement be put in the record. [The prepared statement of Chairman Cardin appears as a submission for the record.] Chairman Cardin. I also ask unanimous consent that a letter we received from Abbe Lowell, an attorney and a person I have known for a long time in regards to the challenges he faced in representing defendants under espionage law, also be made part of our record. [The letter appears as a submission for the record.] Chairman Cardin. Let me just start by saying that the purpose of this hearing is to establish a record on the espionage laws of our country. They were developed really in 1917 after World War I to deal with traditional spies who desired to help our enemies. And as Senator Kyl and I were talking about, if you look at the statute, you will see ``code books,'' which I am sure people are wondering what that is today. It was that concern that motivated the Congress in that time to pass laws to protect our country against our enemies, and that statute has now been used to deal with Government officials who leak information and private citizens who get information and share it, but have no desire at all--in fact, they think they are helping our country, not hurting our country. The question is whether these laws are adequate the way that they were drafted, and today we have three witnesses who are really experts in this area. The purpose is not to take immediate action on a specific bill. It is certainly not an effort to try to deal with the ``shield law,'' which has already been acted upon by our Committee. The purpose really is for us to get a better understanding as to how the espionage law works today with today's technology that was not in existence during World War I, and whether we need to look at a different type of a statute to protect our Nation against both spies and those who have sensitive information and unlawfully disclose that information. And I really do thank our three witnesses that are here to share their expertise with the Committee. With that, I would yield to Senator Kyl. STATEMENT OF HON. JON KYL, A U.S. SENATOR FROM THE STATE OF ARIZONA Senator Kyl. Thank you very much, and, Mr. Chairman, thank you for holding this hearing on a subject which is very important and undoubtedly needs to be addressed now. We were talking on the way over about the need probably to replace terms like ``code books'' with ``electronic information'' and things of that sort; ``national defense,'' maybe changing that to ``national security,'' and things of that sort. And we really appreciate the recommendations in the testimony. Mr. Smith, I read your testimony last night, and you had a lot of good ideas in there about that. I also, though, want to focus on something else as well. Let me ask unanimous consent to put my statement in the record. Chairman Cardin. Without objection. [The prepared statement of Senator Kyl appears as a submission for the record.] Senator Kyl. I will just raise the question. I will be interested in the witnesses' basically addressing this issue. We have significant whistleblower statutes on the books now to enable people who have legitimate reasons for disclosing classified information to be able to do so in a protected environment. I do not have a lot of sympathy for people who decide on their own to bypass those statutes, and knowing that the release of information or leak of information to a newspaper, let us say, that is published has the identical effect as releasing that information to a foreign spy would have for the purposes of the enemy, believing that it is OK and then not being able to prosecute it. I would like to get your reaction to that. And with regard to the question of motive, as I recall, the Israeli spy--I have forgotten his first name; Pollard was his last name--had a very good motive. He did not want to hurt the United States at all, but he did want to help his country of Israel. He is serving life in prison because motive in that case did not matter. It was the effect of the leak of the secrets to another government that was the problem. So everybody recognizes that leaks are a problem. Nobody seems to have a good idea about how to stop it. And I did appreciate, again, Mr. Smith, some of the ideas that you had in your testimony. But I would like to delve into that a little bit more during the hearing. So, Mr. Chairman, thank you for, again, raising this very, very important subject, and I think it will be beneficial for our colleagues. Chairman Cardin. Well, thank you, Senator Kyl. I just want to underscore the points that you raised because I think this is critical to trying to understand the espionage laws. I was reading the material for today's hearing and was fascinated by the court in the Rosen case adding a mental state requirement, which I would be interested to see as we develop this hearing as to how the statute has been basically interpreted by the courts over the last 100 years, changing, I think, the original intent of the statute to try to meet current circumstances. But it may not serve all the circumstances that we have to deal with, and you mentioned the whistleblower issues, and that is a good point. Congress passed the whistleblower statute in order to provide a mechanism where a person working for a sensitive agency could come forward in a protected way. Well, if that employee does not use that process, then are these statutes adequate to deal with it? I think the points that you raise are ones I hope that we will address through the three witnesses. We have Stephen Vladeck, who is a Professor of Law at American University School of Law. Professor Vladeck is a nationally recognized expert on the role of the Federal courts in the war on terrorism, and has authored numerous law review articles on espionage statutes and terrorism-related issues. He has also been part of the team of attorneys who have been litigating important national security issues relating to the use of military tribunals at Guantanamo Bay. Jeffrey Smith is currently a partner in the D.C. office of Arnold and Porter. He heads the firm's national and homeland security practice. Mr. Smith previously served as General Counsel of the Central Intelligence Agency and currently serves on the CIA Director Leon Panetta's External Advisory Board. Mr. Smith also serves as General Counsel to the Senate Armed Services Committee, and prior to working in the Senate, he was Assistant Legal Adviser in the State Department and as an Army Judge Advocate General officer. As the head of Arnold and Porter's National homeland security practice, Mr. Smith's clients have included individuals and media organizations involved in leak cases. Finally, Kenneth Wainstein, who is also currently an attorney in private practice and a partner in the D.C. office of O'Melveny and Myers. Mr. Wainstein previously served as the first Assistant Attorney General for National Security during the Bush administration where he was responsible for the supervision of espionage cases, and also formerly served as a United States Attorney for the District of Columbia. Mr. Wainstein also previously served as General Counsel and Chief of Staff to the FBI Director Robert Mueller. So we will start with Mr. Vladeck, and then we will work our way through the witnesses. Thank you. STATEMENT OF STEPHEN I. VLADECK, PROFESSOR OF LAW, AMERICAN UNIVERSITY WASHINGTON COLLEGE OF LAW, WASHINGTON, DC Mr. Vladeck. Thank you, Mr. Chairman and Senator Kyl. It is an honor to testify before the Committee today on such an important but neglected topic. Mr. Chairman, you mentioned the importance of the Espionage Act and its significance in our fight to avoid espionage and the implications for our National security. And I think we can all agree that this is an important goal that really cuts across aisles, cuts across ideologies, et cetera. But as significant as the Espionage Act is, and has been, I think it is fair to say it is also marked by profound and frustrating ambiguities and internal inconsistencies. Attempting to distill clear principles from the state of the Federal espionage laws in 1973, two Columbia Law School professors--Hal Edgar and Benno Schmidt- -lamented that the longer they looked, the less they saw. Instead, as they observed, ``we have lived since World War I in a state of benign indeterminacy about the rules of law governing defense secrets.'' If anything, such benign indeterminacy has only become more pronounced in the four decades since--and, according to some, increasingly less benign. My written testimony elaborates upon the statutory scheme in a bit more detail. But for present purposes, suffice it to say that, in my view, there are four significant problems with the Espionage Act in its current form. The first and most systematic defect to which, Mr. Chairman and Senator Kyl, you both already alluded concerns its ambiguous scope, by which I mean whether it applies to anything beyond classic spying. Enacted to punish ``espionage,'' which Black's Law Dictionary defines as ``The practice of using spies to collect information about what another government or company is doing or plans to do,'' the plain text of the Act fails to require a specific intent either to harm the national security of the United States or to benefit a foreign power. Instead, the Act requires only that the defendant know or have ``reason to believe'' that the wrongfully obtained or disclosed ``national defense information'' is to be used to the injury of the United States, or to the advantage of any foreign nation. As a result, the Act could be applied as currently written to prosecute Government employees or private citizens in cases bearing little resemblance to classic espionage. Such cases could include situations in which a Government employee seeks to reveal the details of an unlawful secret program, or to bring to the attention of the relevant Inspector General or oversight officer the existence of information that was wrongfully classified; and cases in which a private citizen comes into the possession of classified information with no desire to harm our National security. In each of these circumstances, an informed citizen would certainly have ``reason to believe'' that the relevant information, if publicly disclosed, could cause injury to the national security of the United States. That knowledge, though, need not--and often will not--bear any relationship to the defendant's actual motive. And I think we saw this in the Rosen case. Indeed, in his ruling in the Rosen case, Judge Ellis specifically said that the language of the statute leaves open the possibility that defendants could be convicted for these acts, despite some salutary motive, which Senator Kyl already mentioned. Now, I said there were four significant problems with the Espionage Act. Let me briefly describe what I say as the other three key defects, obviously, upon which I would be happy to elaborate. Related to the ambiguous scope of the Espionage Act is the question of how, if at all, it applies to whistleblowers. For example, the Federal Whistleblower Protection Act protects the public disclosure of a violation of any law, rule, or regulation, only ``if such disclosure is not specifically prohibited by law, and if such information is not specifically required by Executive order to be kept secret in the interest of national defense or the conduct of foreign affairs.'' Similar language appears in most of the other Federal whistleblower protection statutes. To be sure, the Federal whistleblower statute, the intelligence community whistleblower statute, and the military whistleblower statute all authorize cleared Government personnel in national security cases to receive information from the putative whistleblower. And yet there is no specific reference in any of these statutes to the Espionage Act or to the very real possibility that those who receive the disclosed information, even if they are ``entitled to receive it'' within the meaning of the Espionage Act--and that itself is hardly clear--might still fall within the ambit of Section 793(d), which prohibits the willful retention of national defense information. Superficially, one easy fix to the whistleblower statutes might be amendments that made clear that the individuals to whom disclosures are supposed to made under these statutes are ``entitled to receive'' such information under the Espionage Act. But Congress might also consider a more general proviso exempting protected disclosures from the Espionage Act altogether. Another important and related ambiguity with the Espionage Act is whether and to what extent it might apply to the press. As with the whistleblower example I just described, a reporter to whom a Government employee leaks classified information could theoretically be prosecuted merely for retaining that information and could almost certainly be prosecuted for disclosing that information, including by publishing it. And yet it seems clear from the legislative history surrounding the original Espionage Act that Section 793(e) was never meant to apply to the press; indeed, three other provisions of the Espionage Act specifically prohibit publication of national defense information, and another, broader limitation on the retention of national security information by the press was specifically scrapped by Congress in 1917, suggesting that the Act is express in those few places where it specifically targets news gathering. Finally, the Espionage Act is also silent as to potential defenses to prosecution. Most significantly, every court to consider the issue has rejected the availability of an ``improper classification'' defense--a claim by the defendant that the information he unlawfully disclosed was, in fact, improperly classified. If true, of course, such a defense would presumably render the underlying disclosure legal. It is entirely understandable, of course, that the Espionage Act nowhere refers to ``classification'' since the modern classification regime post-dates the Act by over 30 years. Nevertheless, given the well-documented concerns today over the overclassification of sensitive governmental information, the absence of such a defense--or, more generally, of any specific reference to classification--is yet another reason why the Espionage Act's potential sweep is so broad. Now, although statutory ambiguity is hardly a vice in the abstract, in the specific context of the Espionage Act, these ambiguities have two distinct--and contradictory--effects. Testifying before Congress in 1979, Anthony Lapham, then the General Counsel of the CIA, put it this way: ``On the one hand the laws stand idle and are not enforced at least in part because their meaning is so obscure, and on the other hand it is likely that the very obscurity of these laws serves to deter perfectly legitimate expression and debate by persons who must be as unsure of their liabilities as I am unsure of their obligations.'' And to whatever extent these problems have always been present, recent developments lend additional urgency to today's endeavor. In addition to the AIPAC case I mentioned earlier, a report released just last week by the Heritage Foundation and the National Association of Criminal Defense Lawyers highlighted the growing concerns among courts and commentators with the problems of vague and potentially overbroad criminal statutes, even in modern criminal laws, let alone antiquated laws like the Espionage Act. Indeed, just last month, the Supreme Court in the crush- video decision reiterated its concern with Congressional statutes that may chill constitutionally protected speech. As Chief Justice Roberts emphasized for an 8-1 majority, the Court ``would not uphold an unconstitutional statute merely because the Government promised to use it responsibly.'' Although it is not my place to make specific recommendations to this Subcommittee with regard to how the Espionage Act might be updated, it does seem clear that the current state of the law is counterproductive regardless of the specific policy goals one might seek to pursue. At the end of his decision in the Rosen case, Judge Ellis specifically suggested that the time was ripe for Congress to revisit the issue, and, Mr. Chairman, I want to thank you and the Committee for taking up his call. Thank you. [The prepared statement of Mr. Vladeck appears as a submission for the record.] Chairman Cardin. Thank you very much for your testimony. Mr. Smith. STATEMENT OF JEFFREY H. SMITH, PARTNER, ARNOLD AND PORTER, WASHINGTON, DC Mr. Smith. Mr. Chairman, Senator Kyl, it is a privilege to be here this morning to address this very important subject. It is often said that the first responsibility of our Government is to provide for the security of our citizens, and doing so means that some information must necessarily be kept secret--from our adversaries and from public disclosure. And the criminal law plays an important role in protecting that information. There is no real debate over whether real spies, the Aldrich Ameses, the Robert Hanssens, the John Walkers, and the Colonel Abels of this world should be prosecuted. However, more difficult questions are presented as we seek to prosecute those who leak properly classified information to the press. It is these leak cases that present the hardest questions. Before turning to the leak questions, let me make three modest suggestions that I think could enhance the ability of the Government to prosecute real spies. And Senator Kyl graciously mentioned a couple of these, as did you, Mr. Chairman. First, the statutes have a long list of documents that include things like signal book--I have no idea what a signal book is and doubt that the Government still has such things. I think one approach would be to replace it with the words ``information in whatever form.'' If that is too vague, perhaps another approach would be to say ``electronic media'' or ``information in electronic form'' in the list. Secondly, the statutes speak of ``information relating to the national defense.'' I am concerned that language is too narrow. It is true, as courts have, as Judge Ellis points out in his August 2006 opinion, interpreted the term broadly to include information dealing with military matters and more generally with matters relating to the foreign policy and intelligence capabilities. But I do think it should be replaced with the term ``national security'' and adopting a definition similar to that in the Executive order, that is to say, ``the national defense or foreign relations.'' And I suggest this because I have had some experience, particularly when I was at the Department of State, where we had a prosecution where we had, frankly, to strain to find documents that had been given through a real spy to the North Vietnamese Government that related to traditional diplomatic exchanges. Third, I suggest the term ``foreign nation'' be changed to ``foreign power,'' similar to that used in FISA, because we are dealing with al Qaeda and Taliban that are not foreign nations. Let me turn to the issue of those who leak classified information. Every administration in which I have served has suffered from leaks that have been truly harmful. And every administration has struggled to solve the problem, but none has had much success. The most recent legislative example was the Shelby amendment in 2002--pardon me, initially 2000. It was vetoed by President Clinton who said it would ``unnecessarily chill legitimate activities that are the heart of a democracy.'' And you will recall the Shelby language was limited only to Government employees, not to the press. But I think President Clinton's veto put his finger on an important issue, and that is the fact that senior Government officials often talk to the press on background, with authorization, and provide information that is, in fact, technically still classified. But they do so anonymously and without taking the formal steps to declassify the information. What often happens is the journalists then will call around, and they will find out other information related to that part that has been disclosed to them that the administration did not want disclosed, but the person who gets the call from the journalist does not know that the backgrounder has occurred, and it can set in motion a tone that suggests to people that the executive branch is not serious about protecting secrets. I do not want to overstate this, but I do think the key to preventing leaks is discipline from the top. In other words, when an administration puts out sensitive information, even in the controlled fashion, in a legitimate effort to inform the public, they can hardly be surprised when, having permitted the press to pull on the first thread, the whole sweater unravels. The matter came up again in 2002-2001, I beg your pardon. Instead of enacting the Shelby amendment, the Congress directed Mr. Ashcroft, then the Attorney General, to submit a report, which he did in October 2002. I believe those recommendations still stand admirably, and I urge the Committee to take a look at those and to work with the administration to try to implement some of those ideas which were designed to prevent unauthorized disclosures. Leaks are a real problem, Mr. Chairman, and I think we need to address them. I have made a few specific suggestions, but I do not think it is necessarily a good idea to open the statute to try to make it easier to prosecute the press. I think that has a lot of issues that just may not--the gain may not be worth the candle. I want to end by quoting one of my most admired law professors. I was in law school when the Pentagon Papers case-- when it was learned that Daniel Ellsberg had admitted to being the source to the New York Times. My professor, who had served a long time in Government, said, ``I know what we should do; we should give him a medal and then send him to prison.'' And that captures, I think, the hard choices that need to be made, and so I commend this Subcommittee for beginning to take a serious look at those hard choices. [The prepared statement of Mr. Smith appears as a submission for the record.] Chairman Cardin. Thank you very much for your testimony. Mr. Wainstein. STATEMENT OF KENNETH L. WAINSTEIN, PARTNER, O'MELVENY AND MYERS, WASHINGTON, DC Mr. Wainstein. Thank you, Mr. Chairman and Senator Kyl, for inviting me to testify before you today along with my two co- panelists, both men of tremendous expertise in the area of counterespionage. Since the attacks of September 11, 2001, I have spent much of my professional career in the national security world, where sensitive sources and methods are really the lifeblood of our National security operations, and I have seen firsthand the important role that sensitive information plays in our National security operations and how those operations can be put in jeopardy whenever that information is compromised. And, unfortunately, the reality is that that information is compromised all too frequently. For purposes of today's discussion, I will focus on two general types of unauthorized disclosures: first, where a Government official passes sensitive information to a foreign agent for money or for some traitorous reason, which is the traditional espionage scenario; and, secondly, where a Government official leaks secrets to the media, maybe out of some base self-interest or maybe out of a genuine desire to expose official wrongdoing and improve Government operations. A key element of stopping both types of disclosures is ensuring that in the appropriate cases we investigate and prosecute those responsible. As you know, however, the Department of Justice has brought a number of strong traditional espionage cases over the years, but it has brought relatively few prosecutions for leaks to the media. That thin track record is not for lack of trying; rather, it is the result of numerous obstacles that stand in the way of building a prosecutable media leak case. Those obstacles include the following: First, as a touchstone matter, it is just downright difficult to identify the leaker in most cases, given the large universe of people who often are privy to the information that was disclosed. Secondly, there are limitations in the Department of Justice's internal regulations, limitations that are in place for all the right First Amendment reasons, but they limit the ability to subpoena and get information from the one party who is in the best position to identify the leaker--i.e., the member of the media who received the leak from the Government official. And, third, even if you can get beyond that challenge and the leaker is identified, the agency whose information is compromised or was compromised by the leak is often reluctant to proceed because of concern that prosecution is just going to result in the disclosure of further sensitive information. Then, finally, even if the Justice Department succeeds in identifying the suspected leaker and indicting the case, it can expect to face a very vigorous offense with a wide variety of cutting edge legal challenges, the kind of litigation we saw in the Rosen and Weissman case that ultimately was dismissed. For all these reasons, leak cases--especially leak cases to the media--are exceptionally challenging, and the question for today is whether any of these obstacles can be addressed by changes to the governing legislation. While I do not see one sort of legislative silver bullet that will overcome all these obstacles, I do see a few areas of legislative initiative the Committee might want to consider. First, for example, the Committee might examine whether Government contractors are adequately covered by the espionage statutes. These statutes were passed well before the influx of contractors into the Government's most secret or sensitive operations, and one of the critical statutes, 50 U.S.C. 783, covers Government employees but does not extend to contractors. Congress could consider putting Government contractors and employees on the same footing in that provision. Congress could also consider a number of amendments to the Classified Information Procedures Act to ensure better protection of classified and sensitive information in our criminal trials. I have listed a number of ideas for such amendments in my written statement, including several that Senator Kyl has proposed. And with the current national discussion about prosecuting more international terrorism cases in our Article III courts, I think now is a good time to consider amending CIPA to enhance our ability to protect sensitive information in our criminal trials. And then in a more general sense, I think Congress can use this hearing and any ensuing hearings to encourage respect at a fundamental level for our Nation's operational secrets. Congress can send the message that it does not condone the unauthorized release of classified information about our National security operations. And it can point out that whistleblowing is no longer a sufficient justification for divulging intelligence community secrets to the public or to the press now that the Intelligence Community Whistleblower Protection Act provides a mechanism where a Government employee who wishes to blow the whistle can actually take that information, that sensitive information, in a protected way to the Intelligence Committees up in Congress. No matter where one stands on the political spectrum or in the current debate about the various national security policy issues of today, we should all recognize that the unchecked leaking of sensitive information can cause grave harm to our National security. Congress plays a very important role in addressing that problem--whether by legislation, by oversight or simply by exhortation--and I applaud the Committee for the initiative it is showing with today's hearing. I appreciate your including me in this important effort, and I stand ready to answer any further questions you may have. [The prepared statement of Mr. Wainstein appears as a submission for the record.] Chairman Cardin. Well, thank you, sir, and I thank all three of you for your testimony. Shortly, this Committee will start the confirmation process of a new Justice to the Supreme Court, and I think there will be consensus among all the members of this Committee that we believe that Congress is the entity to make our laws. And when we see the courts modify our statutes, it reflects either action on the courts that we find inappropriate philosophically, or a failure of Congress to deal with current needs, that needs to be addressed. And I think in the espionage world, it is the latter. Congress has not modernized the statute, and we really need to deal with it. A prosecutor needs to be apolitical. He must look at the statute and say, ``Well, look, if the circumstances fit, it is my responsibility to bring the action.'' So, therefore, Mr. Smith, when you refer to whether a leak is authorized or unauthorized, I am not sure I find that in the criminal statute anywhere. So it does raise a question as to whether the espionage statute in and of itself needs to be focused toward those who are participating in traditional spy activities, and whether the CIPA statute and others need to be strengthened in order to deal with leaks, or whether we can handle both under one statute or not. Mr. Smith. The problem is that the term ``authorized leaks'' has sort of crept into the lexicon because that is what often happens, as we know. And my concern is that it also sets a tone that somehow enables or empowers others to leak. If they see that a very senior official is talking, then they are less constrained not to talk. In terms of handling it as a criminal matter, whether one could make those kinds of distinctions and rewrite the statute so that you focus on different types of disclosures that have different purposes in mind, I do not know. But it certainly undermines the effectiveness of the statute when this sort of practice occurs. And what happens, of course, is that you sometimes find an administration talking about A through D in a particular subject, and they are perfectly happy to have that out in the press and talked about because they think it is a legitimate issue. But then when somebody else puts out F through G on that same set of subjects, they get furious, insist that it is a leak, and refer it to the Justice Department for prosecution and investigation. Now, you almost never find the leaker, but if you did, one could imagine a very difficult set of circumstances that prosecutors would face in trying to prove where the administration had chosen to draw the line between things that they were comfortable being talked about and things they were uncomfortable being talked about. So the question, I think, goes back to, as you alluded to in your opening remarks, about who--as did Senator Kyl--who decides what harm will result. That is principally a governmental function, and it is a very difficult line to draw. Chairman Cardin. Well, I think it just raises the issue of whether we can deal with the espionage statute in isolation. CIPA and the whistleblower and the other related statutes that we have that are aimed at establishing practices that, when you leak information, you are violating those practices. Mr. Smith. I completely agree, Mr. Chairman. If I was not clear, they are linked. There are a number of statutes that fit together, and one ought to look at them comprehensively. Chairman Cardin. Is there a difference here in regard to those who sign a non-disclosure agreement with the Government and those individuals who do not sign a non- disclosure? Does that present a different hurdle in regard to current espionage laws or related statutes? Anybody care to---- Mr. Vladeck. I will take a shot at it. You know, I think, Mr. Chairman, it would depend, and I think that is part of the problem with the Espionage Act, is the ambiguity in the language. You know, various provisions refer to whether the disclosure was authorized or not, whether the individual was lawfully in possession of the information or not. I do not actually think it is a legally dispositive distinction, by which I mean I think you could prosecute an individual under the Espionage Act as currently written, whether they had signed a non-disclosure agreement or not. But I do think that that creates yet another ambiguity. And I suspect that the courts today would find, you know, perhaps more trouble in that ambiguity in the context of a Government employee who had not signed such an agreement; whereas, the one who had signed an agreement might be held to have waived whatever protections he might have had. But I have to say, I think this actually highlights part of the issue here, which is that the statute is written in such general terms at a time before these kinds of agreements would have even been contemplated by Congress, that if that is a distinction that is worth pursuing, I do not think the current text of the statute would support it. Chairman Cardin. Well, one of the complexities here is the statute applies to private citizens, it applies to Government employees, it applies to Government contractors. So there is a whole mix of individuals that this one statute applies to. Mr. Vladeck. Well, if I may, I think Mr. Wainstein already referred to the issue of contractors. The oddity is that separate from Section 783, Section 793(f)(2) refers to reporting to a superior officer that you have the information and that you are potentially in possession of classified information. That presupposes that you have a superior officer. So even on the question of whether the statute applies to non- governmental employees, I think the answer just depends on how you cut it. And I think there are concerns with applying it so broadly when the language seems to contemplate chains of command that you might not see in the private workplace. Chairman Cardin. Do any of you want to comment about the challenges to a prosecutor under the Garrity case where, if the information is required to be disclosed by your employer, it can compromise the ability of a prosecutor to bring that case? Is that something we need to deal with? Mr. Wainstein. Yes, Mr. Chairman, I would be happy to handle that. The concern you are alluding to is a very real concern in criminal prosecutions across the board--whenever you have a Government employee who gets interviewed as part of an investigation into wrongdoing and is told as a condition of your employment you have to submit to this interview, that employee then gives a statement, and that statement then gets factored into an ensuring criminal investigation and prosecution. The problem is that statement was compelled by the Government, and then that can infect the whole prosecution. Because if you have a compelled statement that gets factored into the investigation and the prosecution should not have been using that statement or knowledgeable about the statement because it was compelled against that person's rights, then it can affect the whole prosecution and really undermine it. There was the Blackwater case recently that has gotten a lot of attention where the case got dismissed for fundamentally that reason. It is an issue in espionage cases, though I think the way it typically plays out is there is a protocol in place where, if an intelligence agency, let us say the CIA, thinks there has been a leak, they make a referral to the Department of Justice, and there are these 11 questions. It is a standard form, and the agency whose information was leaked answers these questions, sends them to the Department, and the Department of Justice then decides whether or not to initiate a criminal investigation. If a criminal investigation is initiated, then typically the agency stands down on its administrative process so as not to cause that problem. So there is coordination that avoids that problem, but it is not foolproof. Every now and then, for instance, if a subject of an investigation is working in the agency and there is a criminal investigation going on, that person might just come up for his 5-year re-up on his background and have to go in and be polygraphed. If he is being told, ``You have to be polygraphed'' and is then questioned about ``have you ever disclosed confidential information,'' and that person then admits it, that compelled statement then gets into the investigation and can taint the whole investigation. It is an issue that we typically are able to work around in espionage cases. I am not sure that it is something that actually -for which there is a legislative fix that I can think of, but it is one of the problems. I could not recite all the obstacles to successful leak investigations, but it is one of the ones we have to deal with. Chairman Cardin. All right. Well, thank you. I appreciate that answer. Senator Kyl. Senator Kyl. Thank you. Let me just ask a question. I gather all three of you probably know the answer to this. But in either a leak or an espionage case, I gather that the classification under the law of confidential, secret, and top secret, which--for example, I will just read the middle one. Secret is applied to information ``the unauthorized disclosure of which reasonably could be expected to cause serious damage to the national security.'' And there is a higher standard for top secret, a lower standard for confidential. Is the defense able to go behind that classification in effect to say this information really could not reasonably be expected to cause damage or serious damage. Mr. Vladeck. Senator Kyl, actually I think the case law is pretty clear that the defendant cannot raise that defense. I think there is a Ninth Circuit decision from the 1970s called United States v. Boyle that specifically deals with that question, where it would sort of defeat a purpose to allow the defendant to attack in court whether a document was properly labeled. Senator Kyl. Do the others of you agree? So then the President, in effect, or his agents have determined that fact by classifying the information at a certain level. Is that correct? Do you all agree with that? Mr. Smith. Yes. Senator Kyl. Oaky. Then let me make this observation, and I am just going to quote--I am just going to pick on one of you, Mr. Smith, because you said it, I think, very well: ``Those who become real spies should be prosecuted with the full might of the Government. Those who, without authority, leak to the media or others not authorized to have possession of classified information should similarly be prosecuted.'' Now, that is what I want to get to here, that second category. I think we all agree that as to the first category the statutes can be modernized, cleaned up. That is something that you could usefully help us do, but it is that second category where we have some issues. And let me just posit two general points here and then ask the three of you to get into it. And in your testimony, each of you in some way or other dealt with these problems. You have got the problem of the official leak, and I think, Mr. Wainstein, you made this point in your opening statement, that there can be a concern arise among the people in the agency if they see a lot of official leaks being done apparently with some kind of authority. What does that do to the rule of law and their expectation of deterrence? To me, it undermines it. It is not good. But there is an easy solution to it. You either have someone authorize the leak who is in the position of authorizing it. Presumably that happened, if the excuse is this was an authorized leak of classified information. Somebody had to make the decision that it was OK in this for specific purposes to do it. Well, you can either have that and/or you can declassify the information just before the leak occurs so that there is no question about it. Both of those seem to me to be preferable solutions to not prosecuting because somebody authorized it--or maybe somebody did not authorize it, and it is hard to distinguish. Reaction? Mr. Smith. Since I have spent a fair bit of time thinking about this, Senator--and I think I raised it in my statement-- the concern--you have put your finger on it precisely. In an ideal world, when--let us take a real case example. The Secretary of State--there is an upcoming ministerial meeting. The Secretary of State decides that the press should be ``backgrounded'' on what we are going to talk about. It happens daily. The story in the newspaper the next day says, ``Officials close to the negotiations say'' da, da, da, da, da, but they cannot disclose their names because they spoke on condition of anonymity. That was probably decided at the Secretary of State's morning meeting the day before, cleared with the White House, and they backgrounded the press. Somebody made a decision, however, as to where that line would be drawn between what would be given to the press and what would not be. They also felt that they did not want to officially acknowledge that, let us say, the Deputy Secretary of State spoke on the record about this. They like the anonymity. It gives them flexibility. It gets out there---- Senator Kyl. Anonymity is Okay. No problem there. Mr. Smith. But the problem is nobody then formally declassifies that information so that the documents floating around the Government with the talking points and so on are still technically classified. Senator Kyl. Do you think that is good policy? Or would it not, in fact, be a rather simple and, in fact, important way to solve this problem? Nobody should be leaking information. If the Secretary of State decides that it is a good thing to do, then I am all for it being done. But there should be a simple, quick process by which it can be done, either--you say cleared by the White House. Okay, so that no longer is classified information, correct? Mr. Smith. Right. Senator Kyl. Or--and I do not know how you can do this. I guess we would have to provide in law. It may still be classified, but there is an exception for certain officials to leak the information. Mr. Smith. Well, I certainly would not be in favor of the latter. I think that is unmanageable. But the former, where---- Senator Kyl. But that is what is being done today. Mr. Smith. You are precisely correct, and nobody really seeks to prosecute those cases because nobody refers them to the Justice Department. What does get referred to the Justice Department is people who then leak around the edges of that and go further than the administration wanted. Senator Kyl. Excuse me for interrupting, but because we do not have a clear procedure, it gets to be a pretty gray area as to whether you are--when you get the follow-up call from the reporter, are you really adding to that and so on? We need to make that line bright so that we do not get into the Valerie Plame series of telephone call assumptions as played out a year or so ago. Mr. Smith. I think that is the solution. It may prove very difficult to administer and to make it workable, because one could imagine the Secretary of State not wishing to send around a piece of paper that said, ``Well, I authorize the Deputy Secretary of State to disclose this kind of information.'' But in the absence of that, it does seem to me that you have these other problems, and if we could have a system that acknowledged that and somehow regularized it, I think it would be valuable for a variety of reasons, including hopefully discouraging others from leaking things that should not be leaked. Senator Kyl. Yes, exactly. Thank you. Just in the 20 seconds I have left, comments by the other two panelists on that particular point? Then I will make my second one later. Mr. Wainstein. I am sympathetic to your point, Senator, about the nebulousness of the authority issue, and, you know, I think it is worth pursuing whether there is a brighter line that would be in some ways more easily administrable and maybe even fairer. Mr. Vladeck. And just quickly, because I suspect we will come back to this, I also think that this conversation presupposes that we are all in the same place with regard to the current regime for classification and that we are willing to accept that the current regime for classification works adequately both in ensuring that the right information is classified and that the wrong information is not. And I guess, Senator, I would just say that is not an assumption I am necessarily comfortable making. Senator Kyl. I appreciate that that is a different question, though, and it is one that deserves examination. But we have to start from a premise and--Okay, good. Thank you very much. Chairman Cardin. I want to follow up on Senator Kyl's point because I agree with him, and I want to just go through a couple scenarios. Some of it is personal because we get sensitive and classified information that we read about in the paper, and we are always puzzled as to how much we were restricted. But let us take that Secretary of State example and the person who is responsible to give the information to the communication person who is making it available on background, mistakenly gives pages 1, 2, 3, when they are only supposed to give pages 1 and 2. All the information is classified. Where is the legal responsibility there? I guess I do not understand authorized leaks from the point of view of the criminal culpability under the statute. To me, if you intentionally give our information that is sensitive, there is vulnerability. I understand the court is interpreting this with intent to harm our country, and this is certainly not with intent to harm our country. But how do you draw this line if you do not have in practice a procedure that Senator Kyl has talked about where the information is no longer classified as sensitive or classified? Mr. Smith. Well, I would defer to Mr. Wainstein on the issue of prosecutions because that is difficult. But it does-- you have put your finger on a critical question. I think that in the absence of that kind of a system, I do not know where the criminal culpability should be, but I have seen instances in which a Secretary of State asked an Assistant Secretary of State to background the press, the Assistant Secretary went further than the Secretary wanted, thinking, however, that he was carrying out what the Secretary directed him to do. The Secretary got very, very angry and eventually wrote a letter to the Assistant Secretary. That was a disciplinary action. And it was a lack of clear communication about exactly what the Secretary wanted disclosed. Given the time pressure on these officials, it is hardly a surprise that that happens, but this is a criminal statute where clear lines--we need to make an effort to try to draw as clear a line as possible. Chairman Cardin. That is my point and I think Senator Kyl's point. There needs to be a process here, because let me take it then to someone who is not on the same page here. Someone--let us take from the Congress of the United States--who has been shared the same information in a classified setting and then sees it released by background without name by the administration. Is that Congressman then permitted to share that information and comment on it? I think the answer is no, but where do you draw the line? It seems to me that if you do not have a process that has some transparency to it on the information that is permitted to be released. It is a very fuzzy situation, probably not too much documentation to back this up, and if you get an aggressive prosecutor--who has independence, remember. Our prosecutors do not have to wait for an invitation to investigate. They can do that on their own. Aren't we going down a path that could be extremely difficult to administer? Mr. Smith. It is extremely difficult to administer, and it is often not fair. I have known Members of Congress of both parties to complain that the administration will come up and brief the Congress on some particular project or a program and say this is top secret, you cannot talk about it, and then it leaks that very afternoon. And it leaks in a way that the Members of Congress disagree with because the administration has decided to put out their version of things, and Congress feels constrained from talking to the press and saying, well, we disagree with that, we think it is bad policy. And they are inhibited because of the classification that the administration has put on it. It is not right. I have seen it done--this is truly bipartisan. It is done by both parties in both administrations, and it is not right. And it is certainly not right then to sort of threaten prosecution to somebody, particularly a Member of Congress, who chooses to say something to the press that is counter to what the administration has put out. So greater transparency is critical. How one does that realistically would be difficult. But you are both correct that it is not right the way it is currently working. Chairman Cardin. Well, I think the answer is what Senator Kyl is suggesting. There has to be a transparent process for declassifying that information if it is going to be made available to the public. I mean, the Secretary of State is going to have to say these two pages are just no longer classified and they are available. Therefore, we all know that, and we can comment on it. But to say that it is still classified but the press gets it on background only, preventing the open discussion of it by those who have knowledge of its content is wrong. Mr. Smith. There is a countervailing interest, which is the hard part here, which is that it is important for senior administration officials to put information in the public so that the public will know what is going on and be talking about it. They often do not want to do it in a way that specifically ties officially the administration to that statement. I mean, the FOIA litigation over the years has recognized that as a viable distinction between something that leaks and later an official acknowledgment of the leak, which then does declassify it. So it has its useful part. But what troubles, has always troubled me about it is that there is--who is the decider here? Who gets to decide what is classified and what is not? And I have seen administration officials try to play it both ways, and then to use the criminal law to try to enforce that seems to me deeply troubling. Chairman Cardin. I want to ask one more question, if I might, and that is about the Whistleblower Protection Act, S. 372 in the 111th Congress. I think all three of you are familiar with the operations of the CIA. The whistleblower statute that we have provided--how does that work with the CIA trying to carry out its mission? Is this the right way to provide relief for employees who have concern? Or do you believe it prevents the CIA from--or hampers the CIA in its mission? Mr. Smith. The answer is I do not know, Mr. Chairman. I would be happy to think about that and get back to the Committee. In my experience with the agency over the years, it has not been a problem. But I think it is a question, and with your permission, let me think about it a little bit and get back to the Committee. Chairman Cardin. I appreciate that. [The information referred to appears as a submission for the record.] Mr. Wainstein. I'd like just sort of to talk about the general notion of having a mechanism in place where members of the intelligence community, employees of the intelligence community who see something going wrong that they want to disclose, that they can take it through classified, protected channels and get it to the Intelligence Committees whose job it is to practice oversight and to root out wrongdoing, root out problems. I think that is exactly the mechanism we need to perfect, and I have not studied the new bill, but to the extent that more work should be done to make sure that that process is in place, it works well, there are user-friendly procedures in place so that whistleblowers can get that information up to the Intelligence Committees through the IG, the CIA IG, up to the Intelligence Committees, and then not be retaliated against for it, I am all in favor of it. And I think it is important because the more we have a workable process in place for that, then the less people can justify their unilateral leaks of classified information on the grounds that they were trying to blow the whistle. And a lot of leaks to the media are that, and they are well intentioned at some level. But at the end of the day, they are unilaterally disclosing sensitive information that can cripple our operations. Mr. Vladeck. If I may briefly, Mr. Chairman, I would just add to that. I think relying on the whistleblower statutes makes a lot of sense subject to two points. The first is that presupposes that either the general counsel of the CIA or the Intelligence Committees are in a position to act on this information. And there has certainly at least been some suggestions by commentators and critics that the law actually does not necessarily allow especially the Intelligence Committees to take necessary steps beyond that. I think that is a difficult question. Secondly, even if we all agree that that is the exact process we want to be followed, the Espionage Act is silent as to its interaction with the Whistleblower Protection Act. And so at the very least, I suspect we might find common cause on the notion that one could specifically amend the Espionage Act to exclude protected disclosures under the various Federal whistleblower statutes so that we do not have the concern of a chilling effect that it might be unclear, even where the whistleblower laws appear to apply, that these disclosures will not subject the relevant individuals to prosecution. Chairman Cardin. Thank you. Senator Kyl. Senator Kyl. Thank you, Mr. Chairman. This is a good example of a hearing that could actually produce something useful as opposed to much of what we do. Let me get to---- Chairman Cardin. I think that is a compliment. Senator Kyl. It is very much a compliment. [Laughter.] Senator Kyl. The second main thing that I wanted to get to, we talked during my first questioning about the so-called official leak, and I think we came to a conclusion that there needs to be a brighter line and a better transparency so that the official leak becomes the authorized official statement of unclassified information somehow. The second is the sort of good motive leak, either an individual thinking ``I know better than the President what the administration's policy ought to be, and I am going to leak some information that undercuts his policy,'' knowing that it is going to get out in the public--and it was Jonathan Pollard; I remembered his name--or maybe even this AIPAC case. I only know what I have read about it in the newspaper, but it seemed to me that I recall one of the defenses, or at least discussions in the media was that whatever information may or may not have been exchanged there, it was not with an intention of hurting the United States, and that was Pollard's defense. But it seems to me that that is also dealt with fairly easily by two things, but the statute maybe needs to be amended to guarantee this. Mr. Vladeck, you got close to this, I think, in one comment you made. First of all, there are two things, it seems to me, that easily respond to the mens rea requirement here. One is the classification itself, if, in fact, the classification is a per se determination of harm if the information gets out; and, second, the mens rea here would consist of two other factors: one, knowing that it is unauthorized and intentionally leaked or put out. In other words, you did not mistakenly pick up the wrong page--I think maybe, Mr. Smith, that was your example. You were supposed to release page 2 and 3 and you mistakenly released page 1 as well. You would have to know that what you released was unauthorized; and, second, you would have to do that intentionally. And the harm requirement would be satisfied by the classification itself. It seems to me that as to the person who is doing the leaking, a statute that was clear in those respects would satisfy everything that we need except for--and I am leaving aside, at least for the moment, the publication by a media corporation. In other words, we are not talking about here, at least for the purpose of doing this in pieces right now, prosecuting someone for publishing the information. Leave that aside for a moment. I am just talking about the person who leaks the information. Wouldn't that satisfy the statutory requirements, and if we stated it that way, it would be much clearer and much easier, therefore, to prosecute? Mr. Smith. Let me take a first cut at that, Senator Kyl. If this statute that you are discussing is focused on the Government employee or the person who had authorized access to the classified information, I agree with you, that is pretty close to what the provision in Title 50 does. I am uncomfortable with having it be a per se determination that if the President classified it, that is sufficient. I still think the Government should have some requirement to prove that that, in fact, harm could reasonably be expected to occur because I do not--I am a little suspicious of the administration overclassifying things. Senator Kyl. If I could interrupt you, though, I thought you all three agreed that under the case law today, it is not a defense that the information--in other words, the defense does not go behind the classification to determine the reasonable probability of harm. Mr. Smith. You are correct. That is what the case law is. But I am a little bit of an outlier on this. Senator Kyl. So you are suggesting that standard may need to be modified in some---- Mr. Smith. Yes. Senator Kyl. Okay. Mr. Smith. But the hard part is then when it is then given to somebody else who does not have authorized access to it and whether the statute that you have just outlined should be applied to them. And, again, I think I am pretty comfortable with it absent the---- Senator Kyl. Well, let me just argue with you there 1 second. First of all, you do not want judges who obviously do not have the experience in dealing with classified data that the executive branch that does the classification does. That has been a criticism of giving judges this ultimate determination. Secondly, if the problem is that information is too easily classified, the individual who is doing the leaking still understands that his leak of that is unauthorized, whether he disagrees with that proposition or not. And it seems to me there are other ways that you deal with that other than just deciding to ``take the law into your own hands.'' Mr. Smith. I completely agree with you. My only concern is that I think there does need to be something more to put somebody in jail than simply somebody put a classification stamp on it. I am troubled with that mere fact. Mr. Vladeck. If I may jump in, I would just add to that, Senator Kyl. I also think it is worth noting that the case law to which both Mr. Smith and I adverted largely pre-dates the enactment of the Classified Information Procedures Act and largely pre-dates the sort of belief--the creation of a body of case law where Federal judges have, in fact, become expert to degrees that we may disagree about, at least have some experience in handling classified information in criminal trials. And so it is possible that some of the concerns that led to these decisions, at least initially, have been abated at least somewhat by CIPA. Senator Kyl. Mr. Wainstein. Mr. Wainstein. You will recall that Attorney General Ashcroft was asked to look at this issue, look at--I guess it is called the Shelby bill, which essentially said what it is that you are referring to, Senator, basically said that if you are a Government employee--I think also former Government employee--and you knowingly and intentionally leak classified information, that you committed a crime. I think the concern about overclassification is not case specific; it is just sort of the broader concern that it puts too much authority in the hands of the President to decide what is classified and, therefore, what can be criminally--when someone can be criminally sanctioned for disclosing it. And it might give the Executive too much leeway to maybe classify information that really is more embarrassing and less actually a matter of national security. That is sort of the broader issue. And then, of course, there is the question of even if you had a statute like this, would it really help increase the number of prosecutions? In some ways, it would be easier because, I mean, it means that the prosecution would not have to prove up the harm, the potential harm, so you would not have to go into, let us say, talking about how the information that was disclosed was about some operation over in Europe that we were doing and how that was--really that disclosure was harmful because that operation would have given us the following intelligence benefits. Whenever you have to do that in order to make your case, you stand the risk of having to disclose more information in discovery and in the actual presentation at trial. A statute like this would lower the burden, make it easier to meet the burden, because all you have to show is it is classified. And you would not have the same danger of releasing more classified information. But I think that there are those countervailing concerns about over-classification. Senator Kyl. Do you mind if I just follow up? You say it would lower the burden, but I am still confused. While the--is it Boyd? What is the Ninth Circuit case? Mr. Vladeck. I am sorry. I believe it is United States v. Boyce? Senator Kyl. Boyce. Well, that case may have pre-dated CIPA. It is at least still acknowledged by the three of you as probably the law in this situation until it is further refined. So would what I am proposing really be a change from the law, at least as it pertains to going behind the classification? In other words, would it be setting up a higher standard? Mr. Wainstein. It would not be setting up a higher standard. The prosecutor would not have to prove the harm element. Senator Kyl. But does he have to prove that today beyond the classification? Mr. Wainstein. Yes, the classification helps, but you have to put on additional evidence, typically, and that is what happens. In fact, that is often one of the reasons why a case like this might not be pursued because of the concern that you have to disclose sensitive information in doing that. Senator Kyl. So you have to do that--I am now a little confused. Maybe you can see why. Mr. Vladeck. Senator Kyl, if I may, and I hope this alleviates the confusion. I think that the differences between whether the information counts as national defense information under the Espionage Act versus whether the mens rea that the Supreme Court has read into the statute in the Goren decision that the defendant knew that the information both was national defense information and could harm--knew or had reason to believe that the information, if disclosed, could harm the national security of the United States. So it is not--knowing that it is classified in and of itself may not be enough, especially if any reasonable person would be hard pressed to see how that information, if disclosed, could cause harm. Senator Kyl. So, again, with your permission--and the two of you agree with that reading? Mr. Smith. Yes. Mr. Wainstein. Yes. Senator Kyl. So there is a requirement that the Government, with some degree of burden, prove that the individual knew that national security could be harmed above and beyond the fact that he knew he was leaking classified information. Mr. Vladeck. That is my understanding of the cases, and I think just to go back to Chairman Cardin's point from before, the Supreme Court, I think, has adopted that construction largely to save what it thought would be constitutional difficulties with the lack of such a requirement, at least in 1941. Mr. Smith. And my experience with these cases is the fact that it was classified is used as evidence to establish that it relates to national security--pardon me, relates to national defense and that its disclosure would cause harm. So it is--the first thing that prosecutors do is say, Was this properly classified and why? Senator Kyl. Well, if I could then, just to summarize my view on this, it seems to me, with that clarification--and I really appreciate that--that with that further requirement, it is hard to justify a good-motive leak when, in order to prosecute such a case, you would have to establish that he knew that he was potentially harming the national defense of the United States. Mr. Vladeck. Senator Kyl, this just goes back to a point I made in my opening statement, and perhaps you and I just disagree on this. I think there is a difference, though, between knowing that the information you are disclosing may potentially harm the United States and having that be the motivation for why you are disclosing it. There might be good faith separate from your knowledge. Perhaps you are not the right person to make that calculation if you are the Government employee, but I would resist the assumption that an employee could never have good faith simply because he knows that the information is classified. Chairman Cardin. On that point, Senator Kyl, it seems to me you are all saying, though, that, leaving the publication issue aside, as Senator Kyl has suggested--we really do not want that to be the focus of our work here today. But what you are saying is that you do limit this to Government or former Government employees like the so-called Shelby bill, that it should not apply to private individuals. I am again talking about the Rosen case, clearly one that is before us. Do you believe that is a different standard? Mr. Smith. In the case of the person who had--the laws and the regulations speak in terms of people who had authorized access. That is either Government employees, former Government employees, or contractors. There I think the Government has been able to prosecute these cases. I think the fact that it was classified, that the individual knew it was classified, and disclosed it without some kind of formal authority, that ought to be prosecuted. In the case of the--the Rosen case, you will recall that the man at the Department of Defense named Franklin who gave them the information was prosecuted, and he is in jail for a long time. That I think is proper. I think what we are talking about is making it easier to prosecute those cases by doing some of the things we are talking about, perhaps working in some of the idea that if it is properly--that if it is classified, that should be sufficient, but the Government would still have to--I think we are all, at least most of us are agreeing that simply the fact that it has got a classification stamp on it should not be sufficient to send somebody to jail for 25 years. I think you need a little bit more than that. The difficulty comes in when it gets into the hands of somebody who did not have authorized access. If that person then passes it to a foreign government intentionally knowing that the foreign government is interested in it, then I think that, too, should be a crime. If the person to whom it is passed seeks to publish it, either in a newspaper or puts it on Facebook or a blog someplace, then that gets a little bit harder because presumably the person is putting it out there because he or she believes that somehow it is important to talk about. That still, in my mind, is a crime, but the motive and the purpose gets a little bit more complicated there because they may genuinely believe that it is a mistake that this particular issue is not being discussed. So perhaps we need to have a statute with different types of action, different intents, and different punishments, depending on the actor and the intent. Mr. Vladeck. And if I may, I come at this from a slightly different perspective, from the sort of academic long view. I think the problem, Mr. Chairman, with going past the individuals who are authorized to have the information is that it becomes very difficult, as Mr. Smith says, to draw the line once you get into the unauthorized access category. You said you wanted to bracket the question on publication. I think that makes sense. But I think that is the elephant in the room here, which is that once we cross the line from those individuals who are legally entitled to receive the information to those who are not as a category, that question comes into the conversation. And so---- Chairman Cardin. It certainly does, but we are really trying to concentrate here on people who specifically are giving information out to individuals more so than the news media issue. Mr. Vladeck. And I think that that goes to--I agree with Mr. Smith's suggestion that we might think of--if I take it to be a suggestion, that in those cases we might look at a more rigid intent requirement as compared to the Government employee or the contractor who should simply by virtue of his office know and be required to hold onto this information. The private person we might think about changing the standards because of these concerns. Chairman Cardin. Senator Kyl. Senator Kyl. Well, Mr. Chairman, let me just say I have got a lot of other questions. I also have a lot of other meetings because we were so late here. This is an excellent panel. I really hope that we can call upon you as we start to try to formalize how we might want to respond to all of this for your advice in helping us craft ideas for our colleagues perhaps. I really appreciate all three of you informing the Committee. It was a very helpful hearing, and I hope we can count on your free advice in the future here. Chairman Cardin. Well, let me just echo what Senator Kyl has said. The purpose of this hearing was for us to gather information, to get better informed, and to start a record in this Committee as to the challenges we have. It clearly will require us to look beyond just the espionage statute itself. CIPA clearly is involved, the whistleblower statutes. It is certainly an issue also concerning not just the passing on of information but publishing. We understand that is an issue that ultimately comes into the equation, but what we were looking at is to try to set up the right formula for the types of activities that compromise our National security. I think as Mr. Smith said, changing the definition is one I think we all would agree needs to be done. This has been very, very helpful to us. The hearing record will remain open for 1 week for additional questions and statements, and I thank our three witnesses. We stand adjourned. [Whereupon, at 12:13 p.m., the Subcommittee was adjourned.] [Questions and answers and submissions for the record follow.] [GRAPHIC] [TIFF OMITTED] 63582.001 [GRAPHIC] [TIFF OMITTED] 63582.002 [GRAPHIC] [TIFF OMITTED] 63582.003 [GRAPHIC] [TIFF OMITTED] 63582.004 [GRAPHIC] [TIFF OMITTED] 63582.005 [GRAPHIC] [TIFF OMITTED] 63582.006 [GRAPHIC] [TIFF OMITTED] 63582.007 [GRAPHIC] [TIFF OMITTED] 63582.008 [GRAPHIC] [TIFF OMITTED] 63582.009 [GRAPHIC] [TIFF OMITTED] 63582.010 [GRAPHIC] [TIFF OMITTED] 63582.011 [GRAPHIC] [TIFF OMITTED] 63582.012 [GRAPHIC] [TIFF OMITTED] 63582.013 [GRAPHIC] [TIFF OMITTED] 63582.014 [GRAPHIC] [TIFF OMITTED] 63582.015 [GRAPHIC] [TIFF OMITTED] 63582.016 [GRAPHIC] [TIFF OMITTED] 63582.017 [GRAPHIC] [TIFF OMITTED] 63582.018 [GRAPHIC] [TIFF OMITTED] 63582.019 [GRAPHIC] [TIFF OMITTED] 63582.020 [GRAPHIC] [TIFF OMITTED] 63582.021 [GRAPHIC] [TIFF OMITTED] 63582.022 [GRAPHIC] [TIFF OMITTED] 63582.023 [GRAPHIC] [TIFF OMITTED] 63582.024 [GRAPHIC] [TIFF OMITTED] 63582.025 [GRAPHIC] [TIFF OMITTED] 63582.026 [GRAPHIC] [TIFF OMITTED] 63582.027 [GRAPHIC] [TIFF OMITTED] 63582.028 [GRAPHIC] [TIFF OMITTED] 63582.029 [GRAPHIC] [TIFF OMITTED] 63582.030 [GRAPHIC] [TIFF OMITTED] 63582.031 [GRAPHIC] [TIFF OMITTED] 63582.032 [GRAPHIC] [TIFF OMITTED] 63582.033 [GRAPHIC] [TIFF OMITTED] 63582.034 [GRAPHIC] [TIFF OMITTED] 63582.035 [GRAPHIC] [TIFF OMITTED] 63582.036 [GRAPHIC] [TIFF OMITTED] 63582.037 [GRAPHIC] [TIFF OMITTED] 63582.038 [GRAPHIC] [TIFF OMITTED] 63582.039 [GRAPHIC] [TIFF OMITTED] 63582.040 [GRAPHIC] [TIFF OMITTED] 63582.041 [GRAPHIC] [TIFF OMITTED] 63582.042 [GRAPHIC] [TIFF OMITTED] 63582.043 [GRAPHIC] [TIFF OMITTED] 63582.044 [GRAPHIC] [TIFF OMITTED] 63582.045 [GRAPHIC] [TIFF OMITTED] 63582.046 [GRAPHIC] [TIFF OMITTED] 63582.047 [GRAPHIC] [TIFF OMITTED] 63582.048 [GRAPHIC] [TIFF OMITTED] 63582.049 [GRAPHIC] [TIFF OMITTED] 63582.050 [GRAPHIC] [TIFF OMITTED] 63582.051 [GRAPHIC] [TIFF OMITTED] 63582.052 [GRAPHIC] [TIFF OMITTED] 63582.053 [GRAPHIC] [TIFF OMITTED] 63582.054 [GRAPHIC] [TIFF OMITTED] 63582.055 [GRAPHIC] [TIFF OMITTED] 63582.056