National Security Information Flow: From Source to Reporter's Privilege
Bejesky, Robert, St. Thomas Law Review
I INTRODUCTION AND ANALYTICAL FRAMEWORK II CLASSIFICATION III SELECTIVE DECLASSIFICATION IV AUTHORIZED LEAKS V UNAUTHORIZED LEAKS VI REPORTER'S PRIVILEGE AND RISKS VII RECENT HIGH-PROFILE PRECEDENT VIII CONCLUSION
INTRODUCTION AND ANALYTICAL FRAMEWORK
While democracy presumes that government information and proceedings should be open to adequately inform the public on political issues, citizens have no general First Amendment right to access government information. (1) Moreover, because information is classified under national security--partially due to the presumption that the public should not possess some information for its own good--additional restrictions (2) and jurisprudential considerations occasion ataxia. That notwithstanding, when the Freedom of Information Act ("FOIA") was enacted in 1966, Congress espoused that "[a] democratic society requires an informed, intelligent electorate, and the intelligence of the electorate varies as the quantity and quality of its information varies. (3)
Since then, members of the judiciacy have alluded to, and even expanded upon this sentiment. In New York Times Co. v. United States, for example, Justice Douglas emphasized that "[s]ecrecy in government is fundamentally anti-democratic, perpetuating bureaucratic errors. Open debate and discussion of public issues are vital to our national health. (4) Justice Stewart, underscored stasis with secrecy and openness when he explained that "[t]he Constitution itself is neither a Freedom of Information Act nor an Official Secrets Act. (5) Likewise, United States Circuit Court of Appeals Judge Damon Keith opined that "[d]emocracies die behind closed doors.... When government begins closing doors, it selectively controls information rightfully belonging to the people. Selective information is misinformation. (6)
Each of the forgoing contentions, while of a different character, are of equal importance to the following framework, which examines twelve possibilities of national security information flowing to the public.
Correct False Misdeeds Classified 1 2 3 Declassified 4 5 6 Authorized Leak 7 8 9 Unauthorized Leak 10 11 12
First, for the vertical process variable, when data relevant to national security are gathered from confidential sources or methods, they are classified routinely, and other information can be classified by presidential authorization. (7) Second, for the horizontal substantive variable, classified data may be correct or amiss. By comparison, court processes endeavor to validate factual records through transparency, evidentiary rules and procedures, authentication standards, and perjury penalties. (8) Secret data lack these verification protections even though national security estimates, deriving from classified information, can have poignant and widespread societal impact when provided to policy makers and the public. (9) Information and estimates that are declassified and accurate, a movement from Quadrant one to four, may be a dissemination of high public value, while information and estimates that are declassified but false, a movement from Quadrant two to five, are likely to negatively impact public discourse. For the latter, the public is better off without the information, (10) since there is an overestimate or underestimate of threats that may skew informed public choice. (11)
Movements among Quadrants seven, eight, ten, and eleven represent the fact that accurate or inaccurate classified information can be leaked by someone with authority (an "authorized leak") or by someone without authority to declassify (an "unauthorized leak"). An authorized leak may be an anonymous government communication, which is generally disfavored in American jurisprudence because public officials can avoid responsibility for content. (12) An unauthorized leak may also be, and more frequently is, a whistleblower action that endeavors to unveil some government misdeed. (13) If a recipient-journalist or news outlet decides to publish the details of the leak, the journalist or outlet faces a low risk of prosecution; this implicates the reporter privilege question, which is discussed at length below. (14) The source, conversely, may have committed an illegal act, even if the information is accurate and of high public value. (15) Moreover in 2010 and 2011, bills were proposed (and are still pending) in Congress to expand the definition of espionage and, therefore, potentially increase the probability that journalists could be prosecuted. (16)
Sections II, III, IV, and V address the details of this analytical framework with reference to how the president chooses to classify, declassify, or leak government information, or whether an unauthorized leak is made against the president's will. These sections further illustrate that each type of dissemination has disparate value to public discourse. Section VI addresses the flow of classified information from a confidential source to the reporter, as well as the utilities, benefits, and risks inherent in the media outlet's decision to publish the information. Section VII poses and then assays practical questions emanating from the Plame, Miller, and Libby investigation, which recently brought reporter privilege questions to the forefront of public attention.
Failure to maintain secrecy could injure a country when classified national security information is crucial to present day foreign-policy decisions, (17) place diplomacy at a relative disadvantage, involve active military operations, derive from covert sources who were either promised anonymity or remain active, or sire an unwarranted and undesirable public repercussion. White House Executive Orders designate what should be a classified secret, but the president has considerable interpretive latitude and the ultimate decision over what, how, and to what extent information should be classified or declassified is generally unreviewable. (18) Legal standards for classification may appear objective and delimiting, (19) but the quantity of classified government material is massive today. (20) In practice, the president's "principal method of information control" is the "virtually unbridled power to control the flow of national security information .... [via] [t]he classification system." (21) The president can use intelligence to shepherd public opinion, frame issues, …
Questia, a part of Gale, Cengage Learning. www.questia.com
Publication information: Article title: National Security Information Flow: From Source to Reporter's Privilege. Contributors: Bejesky, Robert - Author. Journal title: St. Thomas Law Review. Volume: 24. Issue: 3 Publication date: Summer 2012. Page number: 399+. © Not available. COPYRIGHT 2012 Gale Group.
This material is protected by copyright and, with the exception of fair use, may not be further copied, distributed or transmitted in any form or by any means.