Prosecuting WikiLeaks' Assange could be 'difficult' case
Report from Congressional Research Service says prosecution would be unprecedented
Computerworld - Any attempt to criminally prosecute WikiLeaks founder Julian Assange for the ongoing disclosure of classified State Department cables will pose huge challenges for the U.S. government, according to a newly updated report by the Congressional Research Service (CRS).
The 24-page report, released this week, examines the criminal statutes involved in the WikiLeaks case and how they might apply outside the U.S. The report concludes that at least some of the information released by WikiLeaks has national security implications and may indeed by covered under the Espionage Act and other criminal laws on the books.
Even so, actually prosecuting Assange for the disclosures would be unprecedented -- and challenging, the report said.
"We are aware of no case in which a publisher of information obtained through unauthorized disclosure by a government employee has been prosecuted for publishing it," the report bluntly stated. Such an action would have First Amendment implications, and political ramifications "based on concerns about government censorship."
In addition, prosecuting a foreign national whose actions were conducted entirely overseas carries with it certain foreign policy implications and would raise questions related to extraterritorial jurisdiction, the CRS said in its report.
The report comes amid continuing debate about the legal options available to the federal government to hold Assange accountable for the leaks. Some U.S. lawmakers, notably Sen. Joseph Lieberman (I.-Conn) and Sen. Dianne Feinstein (D-Calif.), want Assange prosecuted under the Espionage Act of 1917.
In an opinion piece in the Wall Street Journal on Tuesday, Feinstein said that Assange should be "vigorously prosecuted" for espionage. Feinstein's column quoted an earlier report by the CRS in October that said the government had ample authority to prosecute anyone who actively disseminated information with the intent to damage national security.
"Both elements exist in this case," Feinstein wrote. "The "damage to national security" is beyond question. As for intent, Mr. Assange's own words paint a damning picture."
- Joomla receives patches for zero-day SQL injection vulnerability, other flaws
- NSA used 'European bazaar' to spy on EU citizens
- Target CIO resigns following breach
- Evan Schuman: Mobile IT Roach Motel: Data checks in, but it won't check out
- Sears finds no evidence of data breach -- yet
- Gameover malware is tougher to kill with new rootkit component
- Mobile app for RSA Conference exposes personal data
- UK man charged with hacking Federal Reserve
- Bloomberg clamps down with data-access policies after scandal
- Amazon.com security slip allowed unlimited password guesses on mobile apps
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Is Your Big Data Solution Production-Ready? Read "Is Your Big Data Solution Production-Ready?" now, and discover best practices and actionable steps to implementing a production-ready big data solution.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Legal White Papers | Webcasts