Analysis: You Know What Really Risks National Security? Leak Investigations

A year ago, The Associated Press discovered a foiled al-Qaida plot. Worried about the safety of an informant in the case, the CIA asked the AP to delay publishing the story until their spy could be secured. The AP agreed.

Five days later, the CIA told the AP that their national security concerns were “no longer an issue.” As a seasoned AP team of reporters and editors made final edits to their scoop, the CIA backtracked and asked the AP to delay the story one more day. New national security concerns?

Nope. The only concern was about public relations. The Obama administration planned to promote the failed plot the next day. Hold the story, the CIA said, and “you can have it exclusively for five minutes” before the White House announces it.

President Obama and Attorney General Eric Holder insist that the leak endangered American lives. But details of the AP-CIA discussions, as reported by The Washington Post, raise serious questions about the gravity of the leak and the administration’s credibility. They also reflect the tense and traditional relationship between journalists and national security officials, a fragile bond of trust that may now be bent or broken. 

In that way, the leak investigation might actually jeopardize national security.

(Disclosure: I worked for the AP for more than 20 years, including a 2008-10 stint as Washington bureau chief.)

After considering the CIA’s outlandish request to postpone for public relations reasons, the AP published its story with no further delay. The White House trumpeted the foiled plot, injecting the national security victory into Obama’s reelection campaign.

Privately, the leak became an obsession to those inside the administration who believed a life-saving anti-terrorism operation had been jeopardized. U.S. officials tell the Los Angeles Times that the informant, reportedly a British subject of Saudi birth, had earned the trust of terrorists and had provided information used to disrupt al-Qaida’s Yemeni affiliate.

The group had trained and outfitted the informant with an underwear bomb designed to pass airport security. He turned it over to his handlers, the Times reported, and the CIA planned to make it appear that the underwear bomb had failed so his infiltration could continue.

When the AP distributed its story May 7, 2012, it disclosed details of the bombing plot, U.S. officials told theTimes, and the potential for using the informant again was lost.

Details of this case raise issues with Obama's leaks-kill-people narrative. First, the AP story did not mention an informant. Second, government officials tell me the CIA never asked the news agency to kill the story. Third, there is reason to doubt claims that the leak prevented the re-infiltration of the informant. Once his suicide mission “failed,” why would al-Qaida trust the informant again?

There is also the question of whether the administration is obligated to notify the American public about a plot to destroy an airliner with a newly developed security-busting bomb. Did the government really plan to keep this secret?

And if the AP story was grave enough to justify an unprecedented extension of police powers, why did the CIA tell the AP that security concerns were resolved?

Finally, why did the White House take a victory lap over the foiled plot?

All this leads me to four tentative conclusions.

The leak inquiry threatens national security. The AP acted responsibly by checking its story with the Obama administration. News organizations do this all the time – not to get permission but to make sure that their stories are accurate and don’t undermine U.S. security.

This practice requires mutual trust between adversaries. The government needs reporters to flag national security stories before harm is done. Journalists need government officials to protest only those stories that pose a legitimate risk to the nation, and not use the relationship to curb political fallout.

What might happen when journalists think they’re being gamed – when delays are sought for news conferences and when fishing expeditions are launched against sources? Journalists might trust government less, share less, and missions might be compromised.

You should be worried about your phone records. The DOJ seized AP records knowing that they would eventually notify the wire service and the intrusion would be widely reported. You don’t have the AP’s power. If the Obama administration would go to these lengths against the world’s oldest and largest news organization, how deep might they dig into your life? If they didn’t give the AP a heads up, why would they ever tell you about seizing of your records?

Obama is intimidating whistleblowers. As I wrote the other day, this story is not just about journalists and their feelings. It’s about good men and women who know about wronging doing in government – and now know that the Obama administration will go to unprecedented lengths to shut them up. It’s an indirect but certain threat to the First Amendment.

The White House has a credibility crisis. After the IRS lied about targeting of conservatives and the White House minimized the State Department’s role in disputed Benghazi talking points, the justification for snooping on the AP raises new questions about the administration’s credibility.

One of those questions is whether the CIA and White House are more concerned about plugging leaks or managing spin.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.