On Wednesday, a federal grand jury indicted Harold ("Hal") Thomas Martin III, a former private contractor for Booz Allen Hamilton, of willful retention of national security information. The 20-count indictment describes his unauthorized retention of documents belonging to the National Security Agency, as well as the Central Intelligence Agency, U.S. Cyber Command, and the National Reconnaissance Office; the theft took place over a period as early as 1996 until August 27, 2016.
Latest in Secrecy: Leaks Prosecutions
Former deputy chairman of the Joint Chiefs of Staff General James "Hoss" Cartwright has been charged with making false statements regarding the leak of classified information on Stuxnet.
It's getting hard to keep track of the U.S. intelligence community leakers without a scorecard.
I'm not sure, but I think so.
From today's editorial, entitled, "Gen. Petraeus's Light Punishment":
Anyone remember Samuel Loring Morrison? Espionage Act nerds certainly do.
Morrison was the first person prosecuted and convicted under the Espionage Act for leaking classified material? Morrison was convicted in the 1980s of leaking satellite photos to Jane's Defense Weekly.
The estimable Chris Jenks writes in from Australia with the following thoughts on my piece yesterday on the David Petraeus plea:
Appreciated your comments on Petraeus. One additional factor which resonates with me and I think most military folks is that Petraeus was a general court martial convening authority for a decade or more. He decided what cases were referred to a court-martial. He decided on the terms of plea deals.
Over at The Intercept, Peter Maass complains that the plea deal for David Petraeus is "yet another example of a senior official treated leniently for the sorts of violations that lower-level officials are punished severely for."
At Bloomberg View, by contrast, columnist Eli Lake argues that, while wrong, Petraeus's sins are just not that big a dea
David Sanger and Martin Fackler write in the NYT that the NSA “drilled into the Chinese networks that connect North Korea to the outside world, picked through connections in Malaysia favored by North Korean hackers and penetrated directly into the North with the help of South Korea and other American allies,” and also placed malware in North Korean computer systems “that
I think I am unusual among former government officials in arguing that the publication of national security secrets can promote democracy and good government. Such publications are often costly, sometimes very costly, to national security – more so than is generally realized. But as I wrote in Power and Constraint, “it does not follow that the media’s pursuit of government secrets is bad for American society, or even for national security, all things consi