Mishandling Top Secret Information

Superior Essays
Identification and Punishment for Mishandling Top Secret Information
The handling and use of any information are critical to avoid legal and political implications that arise as a result of exposure of such information to unlawful use. Federal statutes are explicit that those tasked with handling classified information should not have any unauthorized access or disclosure. The law spells the implications that arise in a case of these violations (ODNI 2). However, it is important for us to understand what is meant by top secret information, how to identify mishandled information, and the legal implications or punishments for those involved once proven that indeed they disclosed such information. The essence of this report essay is to discuss
…show more content…
When such officials fail to keep top secret information in proper safes or leave them unsecured in their offices, homes and on their servers, they can be said to have mishandled the information. In 2008, an investigative report prepared by the Justice Department inspector general indicted the former Attorney General Alberto Gonzalez of mishandling top secret information related to the U.S. counterterrorism program. The report noted that such violations can be detrimental to national security (Ryan 1). Accordingly, the report states that despite knowing the top secrecy nature of the program, Gonzalez failed to keep the documents related to the program in secure safes. He also kept them unsecured in his briefcase at his home. Recently, the Democratic Party candidate and former Secretary of state, Hillary Clinton, has been accused of using her personal server to communicate top-secret information. Federal officials and employees are expected to secure classified information in the most secure way and avoid mishandling it for national security reasons (Tucker 1). Again, they need to consider the legal and criminal responsibilities that they may have to face if sufficient evidence is gathered and brought before a court. Any individual, official, or organization mishandling …show more content…
Accordingly, Executive order 13526 of the federal code makes it unlawful to send or store classified information on any electronic device, including emails (ODNI 25). For instance, Bryan Nishimura, a Navy reservist from California, was given a two years’ probation and fined about $ 7,000 in 2015 after he made a guilty plea for mishandling classified information by removing and downloading it on his electronic device. However, federal agencies like the FBI did not have any evidence that Nishimura planned or intended to distribute the classified material. Again, Lyle White, a petty officer, made a guilty plea for the possession of classified information stored on an unsafe hard drive. The officer received a suspended sixty-day sentence and a fine of $ 1,000 for his plea. White was categorical that he took the information to help him train, and had no intentions of communicating or sharing it with anyone (Lucas 1). These cases provide the essential background to criminal and legal responsibilities that can as a result of mishandling top secret information. The federal statutes, state that mishandling of classified information attracts a prison sentence, a fine or both (White

Related Documents

  • Superior Essays

    9/11 Research Paper

    • 1403 Words
    • 6 Pages

    That inability to share made it more difficult for us to arrest the person and charge him criminally, because the two sets of agents could not share information back and forth. That has changed. There is now ample sharing of information, and we can now readily use criminal charges to incapacitate people from doing harm and to improve our human intelligence cadre” (Caproni). While increased government surveillance may make some people uncomfortable, there is now a better chance an event like 9/11 will be…

    • 1403 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Both candidates manifest current “standards for withholding information,” as exemplified by their deceitful actions ranging from hiding government data to shielding medical records. In addition, their “danger[]” from “vulnerability” mindset mirrors that of the spreading isolation in the American population, which hearkens to the authors point. The paranoia of the general populace…

    • 478 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Resolved: The United States federal government should substantially curtail its domestic surveillance. Plan: The government will curtail its surveillance by only viewing collected data by means of a warrant. Intro-After the NSA reported their first transparency avowal, the publisher Omicron Technology Limited stated, “The report said 19,212 "national security letters"—administrative subpoenas that allow the FBI to collect information without a warrant—were issued last year, containing 38,832 requests for information.” These unwarranted leaks are why this problem needs to be solved. That is why we stand resolved that “The United States federal government should substantially curtain its domestic surveillance.…

    • 1880 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    After the attacks of 9/11, nearly 263 government agencies were reorganized as well as the creation of the Department of Homeland security, which nearly doubled the intelligence budget from 2001 (Freedman, 2011). Much of the technology used in surveillance efforts is off-the-shelf and is lacking in innovation. Moreover, the technological boom in the private sector has afforded the Government many avenues in which to collect information on private citizen including social media, cell phone records, GPS information, financial records, medical information and other third-party services that are capable of storing gigabytes of information on an individual (Shamsi & Abado, 2011). This notion leads to the issues of that information’s security…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Brandon Mayfield of Portland, Oregon was an attorney and converted Muslim when he was arrested in 2004 in connection with the Madrid bombings that killed 191 people (Abramson, 2005). The FBI held him for two weeks as a material witness but let him go after admitting that his fingerprints were erroneously matched with another set that were found near the scene of the bombing. This kind of mistake rarely happened; however, it prompted the government to tell Mayfield that his home was secretly searched allowed by a special court order that was authorized for intelligence purposes (Abramson, 2005). According to the American Civil Liberties Union (ACLU), the search was an abuse of the Patriot Act masking a search for evidence to use in a criminal…

    • 1181 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Emails that could potentially contain information about the false claims weapons of mass destruction which were used as an excuse to go into Iraq and the firings of US attorneys for political reasons. The Bush White House also used a private server, in fact 95% of Bush 's chief staffers would emails were on a private email server set up by the RNC. This email loss also made it difficult for congress to investigate the allegedly political firings of 9 US attorneys. When the Senate Judiciary Committee required these emails to be presented, Alberto Gonzalez, Bush’s attorney general, admitted to losing the emails on the on a private email server used on the RNC.…

    • 708 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    Limits Of Confidentiality

    • 842 Words
    • 4 Pages

    Jefferson works with adults on probation and has just heard one of his clients tell how she punishes her six-month- old child which seems excessive to him Human service professionals protect the client 's right to privacy and confidentiality except when such confidentiality would cause serious harm to the client or others, when agency guidelines state otherwise, or under other stated conditions (e.g., local, state, or federal laws). Human service professionals inform clients of the limits of confidentiality prior to the onset of the helping relationship. (“National organization for human services”,2015) Section one standard three, this standard directly applies because the client tells of an act of abuse against a…

    • 842 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    CIA Torture Essay

    • 1687 Words
    • 7 Pages

    “We tortured some folks.” Barack Obama, President of the United States, said in response to the release of the CIA torture report when he addressed post-9/11 America. Senator Dianne Feinstein accused the CIA of spying on the Senate’s intelligence committee. John Brennan, director of the CIA, denied that accusation. However, an investigation brought forth the truth; the CIA had penetrated a computer network used by the Senate Intelligence Committee and found that the Senate was preparing a report that revealed information about the CIA’s detention and interrogation program.…

    • 1687 Words
    • 7 Pages
    Improved Essays
  • Decent Essays

    ENHANCED INTERROGATION TECHNIQUES According to a poll 46% of people who voted said yes EIT should be used. Everyone has heard or seen a threat and/or an act of violence. The military should be able to use Enhanced Interrogation techniques(EIT) because information not freely shared could lead to later events, the information that was gathered to prevent those events, and it could be used as a way to send a message or set an example. Information not freely shared could lead to later events.…

    • 399 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    New technologies are putting more pressure on the boundaries of privacy. New ways are emerging that aid in tracking private information on individuals. No matter what new technology emerges, individual privacy rights should be respected at all levels. Americans are concerned of how to maintain an equilibrium between their personal privacy rights and the need for government to track potential terrorist threats since Edward Snowden leaked National Security Agency's (NSA) documents which included collections of information regarding data from cellphone and internet of millions of Americans. Freedom, privacy and safety are the rights of Americans and should not be compromised to confirm safety from terrorism.…

    • 542 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Patriot Act

    • 596 Words
    • 3 Pages

    The Patriot Act was passed after the terrorist attacks of September 11, 2001. This act allows the government and or federal officials to track and intercept our communications with one another. It also makes new crimes, punishments, and new procedures that we use for terrorists. The history of the Patriot Act, the abuse of our civil liberties, and the current issues with the act lead Americans to feel like they cannot trust their government.…

    • 596 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    National security vs personal privacy has been a hot topic post-9/11. President Obama gave a speech on January 17, 2014 where he stated “in our rush to respond …. , the risk of government overreach – the possibility that we lose some of our core liberties in pursuit of security – also became more pronounced.” (Office of the Press Secretary) Due to the tragic event on September 11th, 2001, our government was placed under extraordinary pressures to find the terrorists and bring them to justice using whatever means possible. This brings around questions regarding ethical dilemmas as they relate to security and our right to privacy.…

    • 978 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    In the United States of America, its citizens would like to believe that the rule of law applies to everyone equally; however, current events create questions in regard to this theory. Democratic Presidential Candidate Hillary Clinton’s lies have far out-shadowed those of her contenders; however, her lies are so often contextualized, excused, and forgotten because of who she is and the purpose her lying supposedly serves. The FBI and the Justice Department have given her a pass on crimes that would land anyone else in prison; in fact, Lt. General Ralph Peters said that, “If I would have done half of what we know Hillary Clinton has done, I’d be on my way to Leavenworth … she is a criminal” (RS, 2015). Apparently, the rule of law does not apply to those who are politically connected to the present administration.…

    • 961 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Responsible authorities should therefore ensure that their electronic recording systems comply with all the requirements of the…

    • 1080 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In this paper the writer will consider the moral and ethical implications of reverse engineering, competitive intelligence, and corporate espionage. This is a moral issue because it involves many facets and perspectives in which morality may be derived, justified, or altogether ill applied. Especially with respect to military projects in which corporate secretes may become important, and perhaps from a national security point of view, vital. This issue is relevant, especially in the in the modern age, because of the ease of access in which sensitive material may be gained. It must be noted that corporate espionage and reverse engineering knows no borders.…

    • 1663 Words
    • 7 Pages
    Improved Essays