SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Margaret Hoisington 2/11/2014 
Argument in Favor of Clemency for Edward Snowden 
Within recent years, the development of information technology has created a 
growing conflict between privacy rights and national security, presenting major 
challenges to the United States legal system. The use of modern technology allows the 
United States government to gather enormous amounts of intelligence, a valuable tool in 
the investigation, prevention and prosecution of criminal or terrorist behavior. However, 
public opinion varies on how constitutional law applies within this context and the 
potential exists for government abuse of power. These are the issues at the center of 
Edward Snowden’s leak of NSA documents, classified information that he had access to 
while working for the National Security Agency (NSA) in Hawaii through subcontractor 
Booz Allen Hamilton. He was employed through Booz Allen for less than three months, 
during which he collected top-secret NSA documents related to the agency’s domestic 
and international surveillance programs. He believed that these leaks would expose 
constitutional violations of the NSA to the public and hopefully prompt reform that 
would lead to increased government transparency. 
The Government Accountability Program (GAP) defines whistleblowing as the 
disclosure of information that is reasonably believed to be evidence of a violation of any 
law, rule, regulation, gross mismanagement, gross waste of funds, abuse of authority or 
substantial and specific danger to public health or safety (McCutcheon, 2014). Although 
many of the violations that Snowden intended to expose remain under investigation or 
considerable debate, at least some of them have been confirmed. In March 2013, the 
Director of National Intelligence, James Clapper, stated before Congress that the NSA
had not intentionally collected information on ordinary Americans, which Snowden knew 
was not true at the time (Greenberg, 2013). Whether or not it is decided that the NSA’s 
domestic surveillance is violates the constitution, it is clear from the information leaked 
that Clapper had lied under oath. If the intelligence community director is known to have 
lied in a public forum on at least one occasion, the credibility of both the director and the 
agencies can be questioned during other instances as well. In December 2013, U.S. 
District Judge Richard Leon ruled that the NSA’s telephone snooping violated the 
constitution (Savage 2013) but then weeks later, U.S. District Judge William Pauley ruled 
that the collection of phone records was legal under Section 215 of the Patriot Act (Perez, 
2013). This sparked considerable debate on whether the collection of the phone data is 
constitutional, prompting movements to amend the act to prevent further abuses in 
violation of First and Fourth Amendment rights. Snowden’s actions provided a catalyst 
for these debates and the demands for reform but they have yet to directly result in any 
clearly measurable threat to the security of the United States. 
Although the disclosures made by Snowden fall within the definition of 
whistleblowing, whistleblower rights are more limited for federal intelligence agency 
employees in order to prevent unauthorized disclosures of information that could pose a 
threat to national security. The Intelligence Community Whistleblower Protection Act of 
1998 (ICWPA) provides a process for federal agency employees to submit urgent 
concerns to Congress with protection from retaliation and to ensure that classified 
information and materials are properly handled. The law defines “urgent concern” as any 
serious problem, abuse, violation of law or Executive order relating to the operations of 
an intelligence activity involving classified information, false statement to Congress or an
action constituting reprisal or threat of reprisal in response to the employee’s report. 
However, the GAP has criticized the ICWPA stating that, “It fails to provide substantive 
protection against retaliatory personnel action and creates no mechanism for corrective 
actions” (Clayton, 2013). 
In the early 2000s, former NSA executive Thomas Drake had opposed an NSA 
program called Trailblazer because of its violation of privacy and other laws, causing him 
to complain internally as outlined by the ICWPA. By 2004 Trailblazer had been deemed 
an expensive failure and the Department of Defense acknowledged the problems at NSA 
but nothing was reported to the public. In 2010, Drake was indicted for violations of the 
Espionage Act after he disclosed information in 2005 to a reporter about fraud and abuse 
at the agency. The case never went to trial and the parties reached a plea agreement in 
which Drake was sentenced to one year of probation and 240 hours of community service 
(Wise, 2011). Snowden has stated that he first attempted to deal with the issues through 
the internal route and that he made a considerable effort to get those with the proper 
clearance to listen and take action. His attempts generated concern from the coworkers 
and supervisors he spoke with but no one was willing to take on the personal risk 
associated with pursuing the matter further. Snowden had been witness to behavior such 
as Clapper’s lie to Congress and knew what resulted when Drake attempted to use the 
procedures of ICWPA so he was aware that any attempts to address his concerns 
internally would most likely fail to elicit any solutions. 
The United States has filed charges against Snowden for theft of government 
property and violation of the Espionage Act by unauthorized communication of national 
defense information and willful communication of classified communications intelligence
information to an unauthorized person (Zakaria & Hosenball, 2013). The Espionage Act 
was passed in 1917 to make it a crime for foreign or domestic spies to provide 
information in an attempt to harm the U.S. or to help its enemies. Before the current 
administration it had only been used six times as a way to prosecute leaker but Snowden 
is the eighth person to be charged under the Espionage Act in this way since the start of 
the Obama administration alone (Caplan, 2013). In United States v. Morison, 488 U.S. 
908 (1988) the act was used for the first time to convict a government official for giving 
classified information to the press, although Morison was later pardoned in 2001. In this 
case the court stated that, “the government must still be required to prove that it was in 
fact “potentially damaging to the United States or might be useful to an enemy”, but in a 
July 2013 ruling, US District Court Judge Kollar-Kotelly disagreed with that precedent, 
saying that the terms of the act do not require proof of any harm (Kim, 2013). Snowden’s 
intent in making the disclosures and whether or not they resulted in any real danger or 
were of value to the public would therefore be inadmissible in court against violations of 
the Espionage Act. 
In 2013, Federal District Judge Richard Leon’s ruling in Klayman v. Obama 
required the government to stop collecting data on the personal calls of the plaintiffs and 
to destroy records of their call history, stating that the NSA program of collecting records 
of phone calls is most likely a violation of the Constitution. He wrote that the government 
wasn’t able to provide “a single instance in which analysis of the N.S.A.’s bulk metadata 
collection actually stopped an imminent attack, or otherwise aided the government in 
achieving any objective that was time-sensitive” (Savage, 2013). The precedent set by 
Smith v. Maryland, 442 U.S. 735 (1979) is that there is no reasonable expectation of
privacy for information supplied to third parties, which was what excluded the NSA 
collection of metadata from protection by the Fourth Amendment. Leon writes that a 
decision from 1979 does not apply today given that the evolution of our relationship with 
phones results in telephone metadata that contains more information and that modern 
technology allows the Government to store and analyze that information in ways that 
qualify it as an unreasonable search . 
Actions taken by the Government in the events leading up to and surrounding 
Snowden’s leaks are grounds upon which it can be charged with violating the First 
Amendment. The United States is a self-governing society in which the power to decide 
on issues of public policy belongs to the citizens and to make these decisions it is 
necessary for them to be able to access all related information without the interference of 
the government. In New York Times co. v. United States, 403 U.S. 713 (1971), which 
involved use of the Espionage Act, the court stated that, “the guarding of military and 
diplomatic secrets at the expense of informed representative government provides no real 
security for our Republic.” More recently the court has also said that, “state action to 
punish the publication of truthful information seldom can satisfy constitutional 
standards.” Bartnicki v. Vopper, 532 U.S. 514 (2001). If the government cannot 
demonstrate a compelling need to enforce punishment of the disclosures in order to 
protect national security, they have violated the First Amendment by restricting access to 
that information and by seeking retribution for the person who exposed it. Within this 
case, the Government violations of First Amendment rights carry more weight than a 
claim of the potential threats to national security. The level of public debate over the
statutes that are at the center of this case would make them an inappropriate basis for the 
prosecution of Snowden and therefore he should be granted clemency.
References 
Edward Snowden. (2014). The Biography Channel website. Retrieved from 
http://www.biography.com/people/edward-snowden-21262897 
Caplan, Lincoln. (2013) "Leaks and Consequences: Why Treating Leakers as Spies Puts 
Journalists at Legal Risk." The American Scholar 82.4: 20+. Academic OneFile. 
Web. 7 Feb. 2014. 
Clayton, Mark. (June 2013). “Edward Snowden: Whistleblowing protections most likely 
won’t help.” Christian Science Monitor. Retrieved 
fromhttp://www.csmonitor.com/USA/Justice/2013/0614/Edward-Snowden- 
Whistle-blowing-protections-most-likely-won-t-help/(page)/2 
Greenberg, Andy. (July 2013). “National Intelligence Director Clapper Apologizes.” 
Forbes. Retrieved from 
http://www.forbes.com/sites/andygreenberg/2013/07/02/national-intelligence-director- 
clapper-apologizes-for-clearly-erroneous-congressional-testimony-on-nsa- 
surveillance/ 
Kim, Douglas. (August 2013). “US District Court Judge Suppresses Whistleblower 
Protections in Favor of Government Secrecy.” Government Accountability 
Project. Retrieved from 
http://www.whistleblower.org/blog/44-2013/2869-us-district-court-judge-suppresses- 
whistleblower-protections-in-favor-of-government-secrecy 
McCutcheon, C. (2014, January 31). Whistleblowers. CQ Researcher, 24, 97-120. 
Retrieved from http://library.cqpress.com/cqresearcher/ 
Savage, Charlie. (December 2013) “Judge Questions Legality of NSA Phone Records.” 
New York Times. Retrieved from
http://www.nytimes.com/2013/12/17/us/politics/federal-judge-rules-against-nsa-phone- 
data-program.html?pagewanted=1&_r=1& 
Perez, Evan. (December 2013) “Judge Rules NSA Collection of Phone Records is 
Legal.” CNN. Retrieved from 
http://www.cnn.com/2013/12/27/justice/nsa-ruling 
Wise, David. (August 2011). “Leaks and the Law: The Story of Thomas Drake.” 
Smithsonian Magazine. Retrieved from 
http://www.smithsonianmag.com/history/leaks-and-the-law-the-story-of-thomas-drake- 
14796786/?all 
Zakaria, T., Hosenball, M. (June 2013). “Edward Snowden Charged with Espionage Over 
NSA Leaks.” Huffington Post. Retrieved from 
http://www.huffingtonpost.com/2013/06/21/edward-snowden-charged_ 
n_3480984.html

Weitere ähnliche Inhalte

Was ist angesagt?

Final Paper Com 300
Final Paper Com 300Final Paper Com 300
Final Paper Com 300
William Beer
 
Civil Liberties.New Intelligence.FinalPaper
Civil Liberties.New Intelligence.FinalPaperCivil Liberties.New Intelligence.FinalPaper
Civil Liberties.New Intelligence.FinalPaper
Paul Dickson
 
Usa patriot act
Usa patriot actUsa patriot act
Usa patriot act
esounds
 
Targeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTargeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the Sky
Teresa Long
 
Edited basic newsgathering and publication speech (00006477)[1]
Edited basic newsgathering and publication speech (00006477)[1]Edited basic newsgathering and publication speech (00006477)[1]
Edited basic newsgathering and publication speech (00006477)[1]
internewsarmenia
 
Internship paper
Internship paperInternship paper
Internship paper
Josiah Rand
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
James Bollen
 
The patriot act
The patriot actThe patriot act
The patriot act
palita Px
 
Appellate Brief Moot Court 2015 (Part 2) Argument
Appellate Brief Moot Court 2015 (Part 2) ArgumentAppellate Brief Moot Court 2015 (Part 2) Argument
Appellate Brief Moot Court 2015 (Part 2) Argument
Jose Gerez
 

Was ist angesagt? (20)

The Background Investigator October 2013 Edition
The Background Investigator October 2013 EditionThe Background Investigator October 2013 Edition
The Background Investigator October 2013 Edition
 
80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillance
 
Case 9 Security vs Privacy
Case 9 Security vs PrivacyCase 9 Security vs Privacy
Case 9 Security vs Privacy
 
Final Paper Com 300
Final Paper Com 300Final Paper Com 300
Final Paper Com 300
 
Civil Liberties.New Intelligence.FinalPaper
Civil Liberties.New Intelligence.FinalPaperCivil Liberties.New Intelligence.FinalPaper
Civil Liberties.New Intelligence.FinalPaper
 
Usa patriot act
Usa patriot actUsa patriot act
Usa patriot act
 
USA Patriot Act
USA Patriot ActUSA Patriot Act
USA Patriot Act
 
Targeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTargeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the Sky
 
Final presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Act
 
Usa Patriot Act
Usa Patriot ActUsa Patriot Act
Usa Patriot Act
 
Privacy and the Government
Privacy and the GovernmentPrivacy and the Government
Privacy and the Government
 
Poliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bgPoliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bg
 
Anger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelationsAnger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelations
 
Edited basic newsgathering and publication speech (00006477)[1]
Edited basic newsgathering and publication speech (00006477)[1]Edited basic newsgathering and publication speech (00006477)[1]
Edited basic newsgathering and publication speech (00006477)[1]
 
The patriot act
The patriot act The patriot act
The patriot act
 
Internship paper
Internship paperInternship paper
Internship paper
 
Excerpt - Georgetown Undergraduate Law Review
Excerpt - Georgetown Undergraduate Law ReviewExcerpt - Georgetown Undergraduate Law Review
Excerpt - Georgetown Undergraduate Law Review
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
The patriot act
The patriot actThe patriot act
The patriot act
 
Appellate Brief Moot Court 2015 (Part 2) Argument
Appellate Brief Moot Court 2015 (Part 2) ArgumentAppellate Brief Moot Court 2015 (Part 2) Argument
Appellate Brief Moot Court 2015 (Part 2) Argument
 

Ähnlich wie Argument for Snowden Clemency

Reply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxReply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docx
carlt4
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
DIPESH30
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
OllieShoresna
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
Callum Craigie
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
elishaoatway
 
Article CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxArticle CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docx
rosemaryralphs52525
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
Toya Shamberger
 
Running Head INTELLIGENCE GATHERING .docx
Running Head INTELLIGENCE GATHERING                              .docxRunning Head INTELLIGENCE GATHERING                              .docx
Running Head INTELLIGENCE GATHERING .docx
wlynn1
 

Ähnlich wie Argument for Snowden Clemency (10)

Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
Reply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxReply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docx
 
Freedoms forsaken
Freedoms forsakenFreedoms forsaken
Freedoms forsaken
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
 
Article CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxArticle CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docx
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
 
Running Head INTELLIGENCE GATHERING .docx
Running Head INTELLIGENCE GATHERING                              .docxRunning Head INTELLIGENCE GATHERING                              .docx
Running Head INTELLIGENCE GATHERING .docx
 

Kürzlich hochgeladen

一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
bd2c5966a56d
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
CssSpamx
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
Airst S
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
Airst S
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for project
VarshRR
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
Airst S
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
Airst S
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
e9733fc35af6
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
Airst S
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
Airst S
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
F La
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
F La
 

Kürzlich hochgeladen (20)

一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy NovicesIt’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for project
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
 

Argument for Snowden Clemency

  • 1. Margaret Hoisington 2/11/2014 Argument in Favor of Clemency for Edward Snowden Within recent years, the development of information technology has created a growing conflict between privacy rights and national security, presenting major challenges to the United States legal system. The use of modern technology allows the United States government to gather enormous amounts of intelligence, a valuable tool in the investigation, prevention and prosecution of criminal or terrorist behavior. However, public opinion varies on how constitutional law applies within this context and the potential exists for government abuse of power. These are the issues at the center of Edward Snowden’s leak of NSA documents, classified information that he had access to while working for the National Security Agency (NSA) in Hawaii through subcontractor Booz Allen Hamilton. He was employed through Booz Allen for less than three months, during which he collected top-secret NSA documents related to the agency’s domestic and international surveillance programs. He believed that these leaks would expose constitutional violations of the NSA to the public and hopefully prompt reform that would lead to increased government transparency. The Government Accountability Program (GAP) defines whistleblowing as the disclosure of information that is reasonably believed to be evidence of a violation of any law, rule, regulation, gross mismanagement, gross waste of funds, abuse of authority or substantial and specific danger to public health or safety (McCutcheon, 2014). Although many of the violations that Snowden intended to expose remain under investigation or considerable debate, at least some of them have been confirmed. In March 2013, the Director of National Intelligence, James Clapper, stated before Congress that the NSA
  • 2. had not intentionally collected information on ordinary Americans, which Snowden knew was not true at the time (Greenberg, 2013). Whether or not it is decided that the NSA’s domestic surveillance is violates the constitution, it is clear from the information leaked that Clapper had lied under oath. If the intelligence community director is known to have lied in a public forum on at least one occasion, the credibility of both the director and the agencies can be questioned during other instances as well. In December 2013, U.S. District Judge Richard Leon ruled that the NSA’s telephone snooping violated the constitution (Savage 2013) but then weeks later, U.S. District Judge William Pauley ruled that the collection of phone records was legal under Section 215 of the Patriot Act (Perez, 2013). This sparked considerable debate on whether the collection of the phone data is constitutional, prompting movements to amend the act to prevent further abuses in violation of First and Fourth Amendment rights. Snowden’s actions provided a catalyst for these debates and the demands for reform but they have yet to directly result in any clearly measurable threat to the security of the United States. Although the disclosures made by Snowden fall within the definition of whistleblowing, whistleblower rights are more limited for federal intelligence agency employees in order to prevent unauthorized disclosures of information that could pose a threat to national security. The Intelligence Community Whistleblower Protection Act of 1998 (ICWPA) provides a process for federal agency employees to submit urgent concerns to Congress with protection from retaliation and to ensure that classified information and materials are properly handled. The law defines “urgent concern” as any serious problem, abuse, violation of law or Executive order relating to the operations of an intelligence activity involving classified information, false statement to Congress or an
  • 3. action constituting reprisal or threat of reprisal in response to the employee’s report. However, the GAP has criticized the ICWPA stating that, “It fails to provide substantive protection against retaliatory personnel action and creates no mechanism for corrective actions” (Clayton, 2013). In the early 2000s, former NSA executive Thomas Drake had opposed an NSA program called Trailblazer because of its violation of privacy and other laws, causing him to complain internally as outlined by the ICWPA. By 2004 Trailblazer had been deemed an expensive failure and the Department of Defense acknowledged the problems at NSA but nothing was reported to the public. In 2010, Drake was indicted for violations of the Espionage Act after he disclosed information in 2005 to a reporter about fraud and abuse at the agency. The case never went to trial and the parties reached a plea agreement in which Drake was sentenced to one year of probation and 240 hours of community service (Wise, 2011). Snowden has stated that he first attempted to deal with the issues through the internal route and that he made a considerable effort to get those with the proper clearance to listen and take action. His attempts generated concern from the coworkers and supervisors he spoke with but no one was willing to take on the personal risk associated with pursuing the matter further. Snowden had been witness to behavior such as Clapper’s lie to Congress and knew what resulted when Drake attempted to use the procedures of ICWPA so he was aware that any attempts to address his concerns internally would most likely fail to elicit any solutions. The United States has filed charges against Snowden for theft of government property and violation of the Espionage Act by unauthorized communication of national defense information and willful communication of classified communications intelligence
  • 4. information to an unauthorized person (Zakaria & Hosenball, 2013). The Espionage Act was passed in 1917 to make it a crime for foreign or domestic spies to provide information in an attempt to harm the U.S. or to help its enemies. Before the current administration it had only been used six times as a way to prosecute leaker but Snowden is the eighth person to be charged under the Espionage Act in this way since the start of the Obama administration alone (Caplan, 2013). In United States v. Morison, 488 U.S. 908 (1988) the act was used for the first time to convict a government official for giving classified information to the press, although Morison was later pardoned in 2001. In this case the court stated that, “the government must still be required to prove that it was in fact “potentially damaging to the United States or might be useful to an enemy”, but in a July 2013 ruling, US District Court Judge Kollar-Kotelly disagreed with that precedent, saying that the terms of the act do not require proof of any harm (Kim, 2013). Snowden’s intent in making the disclosures and whether or not they resulted in any real danger or were of value to the public would therefore be inadmissible in court against violations of the Espionage Act. In 2013, Federal District Judge Richard Leon’s ruling in Klayman v. Obama required the government to stop collecting data on the personal calls of the plaintiffs and to destroy records of their call history, stating that the NSA program of collecting records of phone calls is most likely a violation of the Constitution. He wrote that the government wasn’t able to provide “a single instance in which analysis of the N.S.A.’s bulk metadata collection actually stopped an imminent attack, or otherwise aided the government in achieving any objective that was time-sensitive” (Savage, 2013). The precedent set by Smith v. Maryland, 442 U.S. 735 (1979) is that there is no reasonable expectation of
  • 5. privacy for information supplied to third parties, which was what excluded the NSA collection of metadata from protection by the Fourth Amendment. Leon writes that a decision from 1979 does not apply today given that the evolution of our relationship with phones results in telephone metadata that contains more information and that modern technology allows the Government to store and analyze that information in ways that qualify it as an unreasonable search . Actions taken by the Government in the events leading up to and surrounding Snowden’s leaks are grounds upon which it can be charged with violating the First Amendment. The United States is a self-governing society in which the power to decide on issues of public policy belongs to the citizens and to make these decisions it is necessary for them to be able to access all related information without the interference of the government. In New York Times co. v. United States, 403 U.S. 713 (1971), which involved use of the Espionage Act, the court stated that, “the guarding of military and diplomatic secrets at the expense of informed representative government provides no real security for our Republic.” More recently the court has also said that, “state action to punish the publication of truthful information seldom can satisfy constitutional standards.” Bartnicki v. Vopper, 532 U.S. 514 (2001). If the government cannot demonstrate a compelling need to enforce punishment of the disclosures in order to protect national security, they have violated the First Amendment by restricting access to that information and by seeking retribution for the person who exposed it. Within this case, the Government violations of First Amendment rights carry more weight than a claim of the potential threats to national security. The level of public debate over the
  • 6. statutes that are at the center of this case would make them an inappropriate basis for the prosecution of Snowden and therefore he should be granted clemency.
  • 7. References Edward Snowden. (2014). The Biography Channel website. Retrieved from http://www.biography.com/people/edward-snowden-21262897 Caplan, Lincoln. (2013) "Leaks and Consequences: Why Treating Leakers as Spies Puts Journalists at Legal Risk." The American Scholar 82.4: 20+. Academic OneFile. Web. 7 Feb. 2014. Clayton, Mark. (June 2013). “Edward Snowden: Whistleblowing protections most likely won’t help.” Christian Science Monitor. Retrieved fromhttp://www.csmonitor.com/USA/Justice/2013/0614/Edward-Snowden- Whistle-blowing-protections-most-likely-won-t-help/(page)/2 Greenberg, Andy. (July 2013). “National Intelligence Director Clapper Apologizes.” Forbes. Retrieved from http://www.forbes.com/sites/andygreenberg/2013/07/02/national-intelligence-director- clapper-apologizes-for-clearly-erroneous-congressional-testimony-on-nsa- surveillance/ Kim, Douglas. (August 2013). “US District Court Judge Suppresses Whistleblower Protections in Favor of Government Secrecy.” Government Accountability Project. Retrieved from http://www.whistleblower.org/blog/44-2013/2869-us-district-court-judge-suppresses- whistleblower-protections-in-favor-of-government-secrecy McCutcheon, C. (2014, January 31). Whistleblowers. CQ Researcher, 24, 97-120. Retrieved from http://library.cqpress.com/cqresearcher/ Savage, Charlie. (December 2013) “Judge Questions Legality of NSA Phone Records.” New York Times. Retrieved from
  • 8. http://www.nytimes.com/2013/12/17/us/politics/federal-judge-rules-against-nsa-phone- data-program.html?pagewanted=1&_r=1& Perez, Evan. (December 2013) “Judge Rules NSA Collection of Phone Records is Legal.” CNN. Retrieved from http://www.cnn.com/2013/12/27/justice/nsa-ruling Wise, David. (August 2011). “Leaks and the Law: The Story of Thomas Drake.” Smithsonian Magazine. Retrieved from http://www.smithsonianmag.com/history/leaks-and-the-law-the-story-of-thomas-drake- 14796786/?all Zakaria, T., Hosenball, M. (June 2013). “Edward Snowden Charged with Espionage Over NSA Leaks.” Huffington Post. Retrieved from http://www.huffingtonpost.com/2013/06/21/edward-snowden-charged_ n_3480984.html