{"id":31645,"date":"2022-05-11T21:33:56","date_gmt":"2022-05-11T21:33:56","guid":{"rendered":"https:\/\/cjstudents.com\/index.php\/2022\/05\/11\/why-the-justice-department-is-unlikely-to-investigate-the-supreme-court-leak\/"},"modified":"2022-05-11T21:33:56","modified_gmt":"2022-05-11T21:33:56","slug":"why-the-justice-department-is-unlikely-to-investigate-the-supreme-court-leak","status":"publish","type":"post","link":"https:\/\/cjstudents.com\/index.php\/2022\/05\/11\/why-the-justice-department-is-unlikely-to-investigate-the-supreme-court-leak\/","title":{"rendered":"Why the Justice Department Is Unlikely to Investigate the Supreme Court Leak"},"content":{"rendered":"<p> [ad_1]<\/p>\n<div>\n<h2 class=\"css-xactqe eoo0vm40\" id=\"link-d0777a5\">What leaks have been treated as crimes in the past?<\/h2>\n<p class=\"css-at9mc1 evys1bk0\">Leaks of classified information.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">Federal law criminalizes the unauthorized disclosure of national security secrets. Specifically, under the Espionage Act, it is a felony to disclose, to someone not authorized to receive it, information related to the national defense that could be used to harm the United States or aid a foreign adversary. And a small handful of specific types of information \u2014 like nuclear secrets, the identities of covert agents and techniques for surveillance of intelligence communications \u2014 are separately protected by criminal laws.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">But a draft opinion about abortion rights law is not a national security secret.<\/p>\n<h2 class=\"css-xactqe eoo0vm40\" id=\"link-1218cc90\">What about treating the leak as theft of government property?<\/h2>\n<p class=\"css-at9mc1 evys1bk0\">Treating the leak of a copy of an unclassified document as theft of government property would break new ground and is barred by <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.justice.gov\/archives\/jm\/criminal-resource-manual-1664-protection-government-property-theft-government-information\" title=\"\" rel=\"noopener noreferrer\">a written Justice Department policy<\/a>. A prosecutorial manual states that \u201ca government employee who, for the primary purpose of public exposure of the material, reveals a government document to which he or she gained access lawfully or by non-trespassory means would not be subject to criminal prosecution for the theft.\u201d<\/p>\n<p class=\"css-at9mc1 evys1bk0\">There are other problems. Among them, the \u201ctheft\u201d statute is an awkward fit for the act of taking a copy of a document whose rightful owner still has full use of it, unlike stealing a tangible object. In the private sector, intellectual property laws bar such unlawful copying \u2014 but government files are not copyrighted.<\/p>\n<h2 class=\"css-xactqe eoo0vm40\" id=\"link-33b6726e\">Are there other novel ideas floating around?<\/h2>\n<p class=\"css-at9mc1 evys1bk0\">Yes, several. All those would be novel in a leak case and carry various problems.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">For example, some commentators have pointed to a law that makes it a <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/18\/1512\" title=\"\" rel=\"noopener noreferrer\">crime to corruptly obstruct an official proceeding<\/a>. But among other challenges, that route depends on understanding what the effect \u2014 and the intended effect \u2014 of the disclosure was, which is still the subject of wild speculation.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">Others have pointed to the crime of <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/18\/1030\" title=\"\" rel=\"noopener noreferrer\">exceeding one\u2019s lawful access to a computer<\/a>. But nothing in the public record suggests a hacking occurred. And just last year, <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.nytimes.com\/2021\/06\/03\/us\/supreme-court-computer-crime.html\" title=\"\" rel=\"noopener\">the Supreme Court narrowed the scope of that law<\/a> to exclude people who have lawful access to a system but download something from it for an unauthorized purpose.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">Commentators have also pointed to a law that makes it a crime to unlawfully remove <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/18\/2071\" title=\"\" rel=\"noopener noreferrer\">a judicial record<\/a>. But it is not clear that law covers a situation in which someone made a copy but left the original intact; in <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/casetext.com\/case\/united-states-v-hitselberger-5\" title=\"\" rel=\"noopener noreferrer\">a 2014 case<\/a> in the District of Columbia, a judge said the statute criminalized only \u201cthe obliteration of information from the record of public affairs.\u201d<\/p>\n<p class=\"css-at9mc1 evys1bk0\">\u201cOne has the sense that some people are so offended by the leak that they want it not only to be wrong, but they also want it to be illegal,\u201d said Steven Aftergood, the director of the Project on Government Secrecy at the Federation of American Scientists. \u201cLots of things are wrong that are not illegal.\u201d<\/p>\n<\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.nytimes.com\/2022\/05\/11\/us\/politics\/supreme-court-leak.html\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] What leaks have been treated as crimes in the past? Leaks of classified information&#8230;.<\/p>\n","protected":false},"author":1,"featured_media":31646,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-31645","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-policy"],"_links":{"self":[{"href":"https:\/\/cjstudents.com\/index.php\/wp-json\/wp\/v2\/posts\/31645","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cjstudents.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cjstudents.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cjstudents.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cjstudents.com\/index.php\/wp-json\/wp\/v2\/comments?post=31645"}],"version-history":[{"count":0,"href":"https:\/\/cjstudents.com\/index.php\/wp-json\/wp\/v2\/posts\/31645\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cjstudents.com\/index.php\/wp-json\/wp\/v2\/media\/31646"}],"wp:attachment":[{"href":"https:\/\/cjstudents.com\/index.php\/wp-json\/wp\/v2\/media?parent=31645"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cjstudents.com\/index.php\/wp-json\/wp\/v2\/categories?post=31645"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cjstudents.com\/index.php\/wp-json\/wp\/v2\/tags?post=31645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}