Prosecuting WikiLeaks' Assange could be 'difficult' case
Report from Congressional Research Service says prosecution would be unprecedented
Computerworld - Any attempt to criminally prosecute WikiLeaks founder Julian Assange for the ongoing disclosure of classified State Department cables will pose huge challenges for the U.S. government, according to a newly updated report by the Congressional Research Service (CRS).
The 24-page report, released this week, examines the criminal statutes involved in the WikiLeaks case and how they might apply outside the U.S. The report concludes that at least some of the information released by WikiLeaks has national security implications and may indeed by covered under the Espionage Act and other criminal laws on the books.
Even so, actually prosecuting Assange for the disclosures would be unprecedented -- and challenging, the report said.
"We are aware of no case in which a publisher of information obtained through unauthorized disclosure by a government employee has been prosecuted for publishing it," the report bluntly stated. Such an action would have First Amendment implications, and political ramifications "based on concerns about government censorship."
In addition, prosecuting a foreign national whose actions were conducted entirely overseas carries with it certain foreign policy implications and would raise questions related to extraterritorial jurisdiction, the CRS said in its report.
The report comes amid continuing debate about the legal options available to the federal government to hold Assange accountable for the leaks. Some U.S. lawmakers, notably Sen. Joseph Lieberman (I.-Conn) and Sen. Dianne Feinstein (D-Calif.), want Assange prosecuted under the Espionage Act of 1917.
In an opinion piece in the Wall Street Journal on Tuesday, Feinstein said that Assange should be "vigorously prosecuted" for espionage. Feinstein's column quoted an earlier report by the CRS in October that said the government had ample authority to prosecute anyone who actively disseminated information with the intent to damage national security.
"Both elements exist in this case," Feinstein wrote. "The "damage to national security" is beyond question. As for intent, Mr. Assange's own words paint a damning picture."
- Hackers steal user data from the European Central Bank website, demand money
- Arrests made after international cyber-ring targets StubHub
- SQL injection flaw opens door for Wall Street Journal database hack
- Goodwill Industries probes possible payment card breach
- Aloha point-of-sale terminal, sold on eBay, yields security surprises
- The biggest data breaches of 2014 (so far)
- Blue Shield discloses 18,000 doctors' Social Security numbers
- PF Chang's says breach was 'highly sophisticated criminal operation'
- Breaches exposed 1 in 7 US debit cards in 2013
- New malware program targets banking data
- Improving IT Efficiencies: Four Advantages of Multi-Tenant Data Centers Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded...
- Accelerating Cloud Deployment and Operations with Managed Services Companies that do not have sufficient in-house expertise to either deploy or maintain an IaaS cloud should turn to Managed Service Providers .
- Rethinking IT Operations in the Cloud This paper breaks down the challenges that often prevent the cloud from delivering the fast, flexible and affordable infrastructure companies seek - and...
- Gartner Magic Quadrant for Cloud-Enabled Managed Hosting, North America Cloud-enabled managed hosting brings cloudlike consumption and provisioning attributes to the traditional managed hosting market
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Legal White Papers | Webcasts