A Word About Leaks

Leaks of classified information are back in the news. Or more precisely, the hunt for leakers is making headlines again. After big news scoops on intelligence programs—involving counterterrorism operations in Yemen, drone strikes and a cyberwar campaign against Iran—lawmakers are accusing the White House of disclosing covert operations to make President Obama look strong on national security in an election year. The Obama administration, which has prosecuted an unprecedented number of government employees for allegedly disclosing classified information to journalists, insists that the president abhors leaks and no one in the White House gave away any national security secrets.

The truth lies somewhere in the middle. And it all depends on how you define the word “leak.” For argument’s sake, let’s consider leaks to be disclosures of classified information. Officials reveal all kinds of information every day that could be sensitive or potentially embarrassing, but isn’t covered by a classification regime.

The next question is whether the leak was authorized.  

Authorized leaking happens all the time in Washington. If the president tells his counterterrorism adviser to give a speech on the United States’ use of drones to kill terrorists—which he did recently—the president has effectively declassified whatever information his adviser relays.

Authorized leaks were also a part of at least one of the recent news scoops that has so many officials in a lather. David E. Sanger, a reporter for The New York Times and the author of the book Confront and Conceal (Crown, 2012), revealed new details about the administration’s cyberwar tactics. Sanger tells us in his book that he was granted access to almost every member of the president’s national security team. Such access is rare and is the result, in part, of a decision by the Obama administration to disclose certain secrets. They might not have been the most startling revelations that Sanger discovered in his reporting—which was surely based on some un-authorized leaks—or even the most secret. But the mere fact that officials were talking with a journalist about intelligence programs meant leaks of some kind were blessed at a high level.      

It’s the unauthorized leaks that tend to cause the most controversy and put government employees in the most danger. How do we know when a leak is unauthorized? For reporters, it can be hard to tell sometimes, but a good indication is if the person sharing the information says, “I could lose my job over this.” Or, “I might go to jail for this.”

Does it follow that the information shared in an unauthorized leak must be more sensitive, more revealing, more potentially damaging to the United States than the authorized leak? Absolutely not.

Former National Security Agency official Thomas Drake was not authorized to talk to journalists when he contacted a reporter for The Baltimore Sun and told her about wasteful spending at NSA. The information he conveyed was nowhere near as sensitive as secrets about drone strikes or cyberwar. And yet, the Justice Department indicted Drake under the 1917 Espionage Act for illegally disclosing classified information.

Drake insisted he’d done no such thing, and the dubious case against him fell apart before it went to trial. But it proved an essential point: In matters of leaks, it’s not the leak itself that’s at issue, but whether it was authorized. When lower level career employees make that decision—however more principled it may be—they’re open to prosecution.

No system of secrecy can work if people are allowed to arbitrarily break its rules. But a decision to leak may be arbitrary, too, even if it was authorized.   

Shane Harris is the author of The Watchers: The Rise of America’s Surveillance State and was a staff writer for Government Executive.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care


When you download a report, your information may be shared with the underwriters of that document.