CINXE.COM
(PDF) Snepp v. United States: The CIA Secrecy Agreement and the First Amendment | Diane Orentlicher - Academia.edu
<!DOCTYPE html> <html > <head> <meta charset="utf-8"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <meta content="width=device-width, initial-scale=1" name="viewport"> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs"> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="zp5G6EMxlkJHuwu+4wbh1UiovBJF8NH1sAzcYXvatJuwZJGK8jO2V2iTHf2XybWx7j/IQyNVparB2sf28NYe3g==" /> <meta name="citation_title" content="Snepp v. United States: The CIA Secrecy Agreement and the First Amendment" /> <meta name="citation_publication_date" content="1981" /> <meta name="citation_journal_title" content="Columbia Law Review" /> <meta name="citation_author" content="Orentlicher, Diane F." /> <meta name="citation_volume" content="81" /> <meta name="citation_issue" content="3" /> <meta name="citation_firstpage" content="662" /> <meta name="citation_issn" content="0010-1958" /> <meta name="twitter:card" content="summary" /> <meta name="twitter:url" content="https://www.academia.edu/79972115/Snepp_v_United_States_The_CIA_Secrecy_Agreement_and_the_First_Amendment" /> <meta name="twitter:title" content="Snepp v. United States: The CIA Secrecy Agreement and the First Amendment" /> <meta name="twitter:description" content="Academia.edu is a platform for academics to share research papers." /> <meta name="twitter:image" content="http://a.academia-assets.com/images/twitter-card.jpeg" /> <meta property="fb:app_id" content="2369844204" /> <meta property="og:type" content="article" /> <meta property="og:url" content="https://www.academia.edu/79972115/Snepp_v_United_States_The_CIA_Secrecy_Agreement_and_the_First_Amendment" /> <meta property="og:title" content="Snepp v. United States: The CIA Secrecy Agreement and the First Amendment" /> <meta property="og:image" content="http://a.academia-assets.com/images/open-graph-icons/fb-paper.gif" /> <meta property="og:description" content="Snepp v. United States: The CIA Secrecy Agreement and the First Amendment" /> <meta property="article:author" content="https://independent.academia.edu/DianeOrentlicher" /> <meta name="description" content="Snepp v. United States: The CIA Secrecy Agreement and the First Amendment" /> <title>(PDF) Snepp v. United States: The CIA Secrecy Agreement and the First Amendment | Diane Orentlicher - Academia.edu</title> <link rel="canonical" href="https://www.academia.edu/79972115/Snepp_v_United_States_The_CIA_Secrecy_Agreement_and_the_First_Amendment" /> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "single_work", 'action': "show", 'controller_action': 'single_work#show', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script> var $controller_name = 'single_work'; var $action_name = "show"; var $rails_env = 'production'; var $app_rev = 'fdfcd03ea2af2a60c31d1f7e544fe08547bcb5a1'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.require = { config: function() { return function() {} } } </script> <script> window.Aedu = window.Aedu || {}; window.Aedu.hit_data = null; window.Aedu.serverRenderTime = new Date(1732726061000); window.Aedu.timeDifference = new Date().getTime() - 1732726061000; </script> <script type="application/ld+json">{"@context":"https://schema.org","@type":"ScholarlyArticle","abstract":null,"author":[{"@context":"https://schema.org","@type":"Person","name":"Diane Orentlicher"}],"contributor":[],"dateCreated":"2022-05-26","dateModified":null,"datePublished":"1981-01-01","headline":"Snepp v. United States: The CIA Secrecy Agreement and the First Amendment","inLanguage":"en","keywords":["Law","Government","States","Courts","Political Science","Secrecy","First Amendment","Columbia School of Law"],"locationCreated":null,"publication":"Columbia Law Review","publisher":{"@context":"https://schema.org","@type":"Organization","name":"JSTOR"},"image":null,"thumbnailUrl":null,"url":"https://www.academia.edu/79972115/Snepp_v_United_States_The_CIA_Secrecy_Agreement_and_the_First_Amendment","sourceOrganization":[{"@context":"https://schema.org","@type":"EducationalOrganization","name":null}]}</script><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/single_work_page/loswp-102fa537001ba4d8dcd921ad9bd56c474abc201906ea4843e7e7efe9dfbf561d.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/body-8d679e925718b5e8e4b18e9a4fab37f7eaa99e43386459376559080ac8f2856a.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/button-3cea6e0ad4715ed965c49bfb15dedfc632787b32ff6d8c3a474182b231146ab7.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/text_button-73590134e40cdb49f9abdc8e796cc00dc362693f3f0f6137d6cf9bb78c318ce7.css" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&family=Gupter:wght@400;500;700&family=IBM+Plex+Mono:wght@300;400&family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-10fa40af19d25203774df2d4a03b9b5771b45109c2304968038e88a81d1215c5.css" /> </head> <body> <div id='react-modal'></div> <div class="js-upgrade-ie-banner" style="display: none; text-align: center; padding: 8px 0; background-color: #ebe480;"><p style="color: #000; font-size: 12px; margin: 0 0 4px;">Academia.edu no longer supports Internet Explorer.</p><p style="color: #000; font-size: 12px; margin: 0;">To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to <a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.querySelector('.js-upgrade-ie-banner').style.display = 'block'; }</script> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span ="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "cf3bdb432d8ce31d21e52e691a1223761743ed940433793af31151fa986d81e9", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="jWuKkMh9W7KzTDX/q4UGGa52PAVWorj1tvhoSXTWKRrzkV3yeX97p5xkI7zfSlJ9COFIVDAHzKrHLnPe/9qDXw==" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://www.academia.edu/79972115/Snepp_v_United_States_The_CIA_Secrecy_Agreement_and_the_First_Amendment" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="tJBzOeM+aOqdnkptYeluKnG9sX6+dMk96HiKuBz3xk3KaqRbUjxI/7K2XC4VJjpO1yrFL9jRvWKZrpEvl/tsCA==" autocomplete="off" /><p>Enter the email address you signed up with and we'll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><input class="btn btn-primary btn-block g-recaptcha js-password-reset-submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" type="submit" value="Email me a link" /></form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account? <a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script> <div class="header--container" id="main-header-container"><div class="header--inner-container header--inner-container-ds2"><div class="header-ds2--left-wrapper"><div class="header-ds2--left-wrapper-inner"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="hide-on-desktop-redesign" style="height: 24px; width: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hide-on-mobile-redesign" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a><div class="header--search-container header--search-container-ds2"><form class="js-SiteSearch-form select2-no-default-pills" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><svg style="width: 14px; height: 14px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="search" class="header--search-icon svg-inline--fa fa-search fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z"></path></svg><input class="header--search-input header--search-input-ds2 js-SiteSearch-form-input" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" /></form></div></div></div><nav class="header--nav-buttons header--nav-buttons-ds2 js-main-nav"><a class="ds2-5-button ds2-5-button--secondary js-header-login-url header-button-ds2 header-login-ds2 hide-on-mobile-redesign" href="https://www.academia.edu/login" rel="nofollow">Log In</a><a class="ds2-5-button ds2-5-button--secondary header-button-ds2 hide-on-mobile-redesign" href="https://www.academia.edu/signup" rel="nofollow">Sign Up</a><button class="header--hamburger-button header--hamburger-button-ds2 hide-on-desktop-redesign js-header-hamburger-button"><div class="icon-bar"></div><div class="icon-bar" style="margin-top: 4px;"></div><div class="icon-bar" style="margin-top: 4px;"></div></button></nav></div><ul class="header--dropdown-container js-header-dropdown"><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/login" rel="nofollow">Log In</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/signup" rel="nofollow">Sign Up</a></li><li class="header--dropdown-row js-header-dropdown-expand-button"><button class="header--dropdown-button">more<svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="caret-down" class="header--dropdown-button-icon svg-inline--fa fa-caret-down fa-w-10" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 320 512"><path fill="currentColor" d="M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z"></path></svg></button></li><li><ul class="header--expanded-dropdown-container"><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/about">About</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/press">Press</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://medium.com/@academia">Blog</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/documents">Papers</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/terms">Terms</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/privacy">Privacy</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/copyright">Copyright</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/hiring"><svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="header--dropdown-row-icon svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg>We're Hiring!</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://support.academia.edu/"><svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="header--dropdown-row-icon svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg>Help Center</a></li><li class="header--dropdown-row js-header-dropdown-collapse-button"><button class="header--dropdown-button">less<svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="caret-up" class="header--dropdown-button-icon svg-inline--fa fa-caret-up fa-w-10" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 320 512"><path fill="currentColor" d="M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z"></path></svg></button></li></ul></li></ul></div> <script src="//a.academia-assets.com/assets/webpack_bundles/fast_loswp-bundle-68aeb1ef1aef1565d873e157d2d062b6c25e45987d206ebd19f7e481aab03137.js" defer="defer"></script><script>window.loswp = {}; window.loswp.author = 54536945; window.loswp.bulkDownloadFilterCounts = {}; window.loswp.hasDownloadableAttachment = true; window.loswp.hasViewableAttachments = true; // TODO: just use routes for this window.loswp.loginUrl = "https://www.academia.edu/login?post_login_redirect_url=https%3A%2F%2Fwww.academia.edu%2F79972115%2FSnepp_v_United_States_The_CIA_Secrecy_Agreement_and_the_First_Amendment%3Fauto%3Ddownload"; window.loswp.translateUrl = "https://www.academia.edu/login?post_login_redirect_url=https%3A%2F%2Fwww.academia.edu%2F79972115%2FSnepp_v_United_States_The_CIA_Secrecy_Agreement_and_the_First_Amendment%3Fshow_translation%3Dtrue"; window.loswp.previewableAttachments = [{"id":86508662,"identifier":"Attachment_86508662","shouldShowBulkDownload":false}]; window.loswp.shouldDetectTimezone = true; window.loswp.shouldShowBulkDownload = true; window.loswp.showSignupCaptcha = false window.loswp.willEdgeCache = false; window.loswp.work = {"work":{"id":79972115,"created_at":"2022-05-26T06:31:29.174-07:00","from_world_paper_id":206354051,"updated_at":"2024-11-25T01:56:17.842-08:00","_data":{"publisher":"JSTOR","grobid_abstract":"595 F.2d at 931. In the course of his employment with the CIA, Snepp had served two tours of duty in South Vietnam. Decent Interval was based upon this experience. Id. at 930. 8. 444 U.S. at 507. 9. Although dozens of former CIA employees have published books relating to CIA activities without submitting manuscripts for prepublication review, see note 227 infra, Snepp was the first person the government sued after publication for violation of the secrecy agreement. In 1972, the CIA brought a prepublication suit against Victor Marchetti, a former employee, when it learned of his plans to publish a book revealing classified information without seeking prior approval from the CIA. The government obtained an injunction requiring Marchetti to submit his manuscript for prepublication review. United States v. Marchetti, 466 F.2d 1309 (4th Cir.), cert. denied, 409 U.S. 1063 (1972). Following the Supreme Court's decision in Snepp, the CIA initiated several postpublication suits against former employees who failed to submit intended publications for prior approval. One of these authors, John Stockwell, has settled out of court, promising to pay any future royalties from his book to the government, and to submit future writings to the CIA for prior approval. See Wash. Post, September 15, 1980, at BII. Another writer, Phillip Agee, has avoided postpublication sanctions for his unapproved publication by successfully arguing that the CIA has selectively enforced its prior approval requirement against authors of manuscripts that are critical of the Agency. Agee v. CIA, 500 F. Supp. 506, 508-09 (D.D.C. 1980). However, the court issued an order threatening to cite Agee for contempt if he failed to submit future writings for prior approval. Id. 10. See 595 F.2d at 935; 444 U.S. at 511; id. at 516 n.2 (Stevens, J., dissenting). 11. Plaintiff's Answers to Defendant's First Set of Interrogatories (Interrogatories Nos. 61(a), 82), United States v. Snepp, 456 F. Supp. 176 (E.D. Va. 1978). 12. See 444 U.S. at 509 n.3. Snepp also asserted defenses based upon contract law. See United States v. Snepp, 456 F. Supp. 176, 177-78 (E.D. Va. 1978). 13. See 456 F. Supp. at 180. 14. The court adopted the finding of the Fourth Circuit in an earlier case considering the CIA secrecy agreement, United States v. Marchetti, 466 F.2d 1309 (4th Cir.), cert. denied, 409 U.S. 1063 (1972) (because \"confidentiality inheres in ... the relationship of the parties ... the law would probably imply a secrecy agreement had there been no formally expressed agreement\"). 456 F. Supp. at 182 (quoting 466 F.2d at 1316). 15. The court did not discuss whether Decent Interval had disclosed information that the CIA could have suppressed. Rather, it focused merely on Snepp's failure to submit the book for prior approval in determining whether Snepp had violated his obligations. See 456 F. Supp. at 181-82.","publication_date":"1981,,","publication_name":"Columbia Law Review","grobid_abstract_attachment_id":"86508662"},"document_type":"paper","pre_hit_view_count_baseline":null,"quality":"high","language":"en","title":"Snepp v. United States: The CIA Secrecy Agreement and the First Amendment","broadcastable":true,"draft":null,"has_indexable_attachment":true,"indexable":true}}["work"]; window.loswp.workCoauthors = [54536945]; window.loswp.locale = "en"; window.loswp.countryCode = "SG"; window.loswp.cwvAbTestBucket = ""; window.loswp.designVariant = "ds_vanilla"; window.loswp.fullPageMobileSutdModalVariant = "control"; window.loswp.useOptimizedScribd4genScript = false; window.loswp.appleClientId = 'edu.academia.applesignon';</script><script defer="" src="https://accounts.google.com/gsi/client"></script><div class="ds-loswp-container"><div class="ds-work-card--grid-container"><div class="ds-work-card--container js-loswp-work-card"><div class="ds-work-card--cover"><div class="ds-work-cover--wrapper"><div class="ds-work-cover--container"><button class="ds-work-cover--clickable js-swp-download-button" data-signup-modal="{"location":"swp-splash-paper-cover","attachmentId":86508662,"attachmentType":"pdf"}"><img alt="First page of “Snepp v. United States: The CIA Secrecy Agreement and the First Amendment”" class="ds-work-cover--cover-thumbnail" src="https://0.academia-photos.com/attachment_thumbnails/86508662/mini_magick20220526-2233-siyx1g.png?1653572376" /><img alt="PDF Icon" class="ds-work-cover--file-icon" src="//a.academia-assets.com/assets/single_work_splash/adobe.icon-574afd46eb6b03a77a153a647fb47e30546f9215c0ee6a25df597a779717f9ef.svg" /><div class="ds-work-cover--hover-container"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">download</span><p>Download Free PDF</p></div><div class="ds-work-cover--ribbon-container">Download Free PDF</div><div class="ds-work-cover--ribbon-triangle"></div></button></div></div></div><div class="ds-work-card--work-information"><h1 class="ds-work-card--work-title">Snepp v. United States: The CIA Secrecy Agreement and the First Amendment</h1><div class="ds-work-card--work-authors ds-work-card--detail"><a class="ds-work-card--author js-wsj-grid-card-author ds2-5-body-md ds2-5-body-link" data-author-id="54536945" href="https://independent.academia.edu/DianeOrentlicher"><img alt="Profile image of Diane Orentlicher" class="ds-work-card--author-avatar" src="//a.academia-assets.com/images/s65_no_pic.png" />Diane Orentlicher</a></div><div class="ds-work-card--detail"><p class="ds-work-card--detail ds2-5-body-sm">1981, Columbia Law Review</p></div><div class="ds-work-card--button-container"><button class="ds2-5-button js-swp-download-button" data-signup-modal="{"location":"continue-reading-button--work-card","attachmentId":86508662,"attachmentType":"pdf","workUrl":"https://www.academia.edu/79972115/Snepp_v_United_States_The_CIA_Secrecy_Agreement_and_the_First_Amendment"}">See full PDF</button><button class="ds2-5-button ds2-5-button--secondary js-swp-download-button" data-signup-modal="{"location":"download-pdf-button--work-card","attachmentId":86508662,"attachmentType":"pdf","workUrl":"https://www.academia.edu/79972115/Snepp_v_United_States_The_CIA_Secrecy_Agreement_and_the_First_Amendment"}"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">download</span>Download PDF</button></div></div></div></div><div data-auto_select="false" data-client_id="331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b" data-doc_id="86508662" data-landing_url="https://www.academia.edu/79972115/Snepp_v_United_States_The_CIA_Secrecy_Agreement_and_the_First_Amendment" data-login_uri="https://www.academia.edu/registrations/google_one_tap" data-moment_callback="onGoogleOneTapEvent" id="g_id_onload"></div><div class="ds-top-related-works--grid-container"><div class="ds-related-content--container ds-top-related-works--container"><h2 class="ds-related-content--heading">Related papers</h2><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="0" data-entity-id="22316027" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/22316027/Unclassified_Fictions_The_CIA_Secrecy_Law_and_the_Dangerous_Rhetoric_of_Authenticity">Unclassified Fictions: The CIA, Secrecy Law, and the Dangerous Rhetoric of Authenticity</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="234958" href="https://osu1.academia.edu/MatthewBirkhold">Matthew H Birkhold</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Unclassified Fictions: The CIA, Secrecy Law, and the Dangerous Rhetoric of Authenticity","attachmentId":42955690,"attachmentType":"pdf","work_url":"https://www.academia.edu/22316027/Unclassified_Fictions_The_CIA_Secrecy_Law_and_the_Dangerous_Rhetoric_of_Authenticity","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/22316027/Unclassified_Fictions_The_CIA_Secrecy_Law_and_the_Dangerous_Rhetoric_of_Authenticity"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="1" data-entity-id="69964853" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/69964853/When_the_Curtain_Must_Be_Drawn_American_Experience_with_Proceedings_Involving_Information_That_for_Reasons_of_National_Security_Cannot_Be_Disclosed">When the Curtain Must Be Drawn: American Experience with Proceedings Involving Information That, for Reasons of National Security, Cannot Be Disclosed</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="78020527" href="https://independent.academia.edu/PeterStrauss1">Peter Strauss</a></div><p class="ds-related-work--metadata ds2-5-body-xs">SSRN Electronic Journal</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"When the Curtain Must Be Drawn: American Experience with Proceedings Involving Information That, for Reasons of National Security, Cannot Be Disclosed","attachmentId":79864008,"attachmentType":"pdf","work_url":"https://www.academia.edu/69964853/When_the_Curtain_Must_Be_Drawn_American_Experience_with_Proceedings_Involving_Information_That_for_Reasons_of_National_Security_Cannot_Be_Disclosed","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/69964853/When_the_Curtain_Must_Be_Drawn_American_Experience_with_Proceedings_Involving_Information_That_for_Reasons_of_National_Security_Cannot_Be_Disclosed"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="2" data-entity-id="98297779" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/98297779/Craig_Roberts_The_Medusa_File_Secret_Crimes_and_Coverups_of_the_U_S_Government_2014_pdf">Craig Roberts The Medusa File Secret Crimes and Coverups of the U.S. Government (2014) pdf</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="13295920" href="https://independent.academia.edu/AnbrCama">Anbr Cama</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Craig Roberts The Medusa File Secret Crimes and Coverups of the U.S. Government (2014) pdf","attachmentId":99687573,"attachmentType":"pdf","work_url":"https://www.academia.edu/98297779/Craig_Roberts_The_Medusa_File_Secret_Crimes_and_Coverups_of_the_U_S_Government_2014_pdf","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/98297779/Craig_Roberts_The_Medusa_File_Secret_Crimes_and_Coverups_of_the_U_S_Government_2014_pdf"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="3" data-entity-id="120710278" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/120710278/Snepp_V_United_States">Snepp V. United States</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="311127396" href="https://independent.academia.edu/franksnepp">frank snepp</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2017</p><p class="ds-related-work--abstract ds2-5-body-sm">For the American intelligence community, the 1970s was a decade to forget. One scandal after another basked in the spotlight of national attention, and by the end of the decade, the accumulated destruction was considerable. Ruined careers, curtailed powers, and diminished public confidence lay amid the wreckage. The 1980s promise great change for the intelligence community. The political mood of the country, as the most recent elections evidence, has shifted dramatically. The people no longer want to hear about corruption and its reform; rather, it is time, they say, to let the professionals do their job. The Supreme Court apparently agrees. In Snepp v. United States,&#39; the Court, without benefit of briefing or oral argument,2 handed the Central Intelligence Agency (CIA) a watershed victory in the Agency&#39;s battle to contain the flow of information to the public. In doing so, the Court granted the Agency even more than it had stated it needed.3 So incredible was the Court&#39;...</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Snepp V. United States","attachmentId":115774151,"attachmentType":"pdf","work_url":"https://www.academia.edu/120710278/Snepp_V_United_States","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/120710278/Snepp_V_United_States"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="4" data-entity-id="57286641" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/57286641/Secrecy_The_communication_dilemma_of_CIA">Secrecy: The communication dilemma of CIA</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="83481814" href="https://independent.academia.edu/GibsonDirk">Dirk Gibson</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Public Relations Review, 1987</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Secrecy: The communication dilemma of CIA","attachmentId":72260016,"attachmentType":"pdf","work_url":"https://www.academia.edu/57286641/Secrecy_The_communication_dilemma_of_CIA","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/57286641/Secrecy_The_communication_dilemma_of_CIA"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="5" data-entity-id="92826700" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/92826700/Aspects_of_the_Executives_Power_Over_National_Security_Matters_Secrecy_Classifications_and_Foreign_Intelligence_Wiretaps">Aspects of the Executive's Power Over National Security Matters: Secrecy Classifications and Foreign Intelligence Wiretaps</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="33851455" href="https://independent.academia.edu/CharlesNesson">Charles Nesson</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Indiana Law Journal, 1974</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Aspects of the Executive's Power Over National Security Matters: Secrecy Classifications and Foreign Intelligence Wiretaps","attachmentId":95732528,"attachmentType":"pdf","work_url":"https://www.academia.edu/92826700/Aspects_of_the_Executives_Power_Over_National_Security_Matters_Secrecy_Classifications_and_Foreign_Intelligence_Wiretaps","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/92826700/Aspects_of_the_Executives_Power_Over_National_Security_Matters_Secrecy_Classifications_and_Foreign_Intelligence_Wiretaps"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="6" data-entity-id="114318026" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/114318026/First_Amendment_Standards_for_Subsequent_Punishment_of_Dissemination_of_Confidential_Government_Information">First Amendment Standards for Subsequent Punishment of Dissemination of Confidential Government Information</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="119693071" href="https://independent.academia.edu/BruceMethven">Bruce Methven</a></div><p class="ds-related-work--metadata ds2-5-body-xs">California Law Review, 1980</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"First Amendment Standards for Subsequent Punishment of Dissemination of Confidential Government Information","attachmentId":111047950,"attachmentType":"pdf","work_url":"https://www.academia.edu/114318026/First_Amendment_Standards_for_Subsequent_Punishment_of_Dissemination_of_Confidential_Government_Information","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/114318026/First_Amendment_Standards_for_Subsequent_Punishment_of_Dissemination_of_Confidential_Government_Information"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="7" data-entity-id="5672425" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/5672425/The_Constitution_and_National_Security_Covert_Action_In_The_Age_of_Intelligence_Oversight">The Constitution & National Security: Covert Action In The Age of Intelligence Oversight</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="7761400" href="https://american.academia.edu/DFagelson">David Fagelson</a></div><p class="ds-related-work--metadata ds2-5-body-xs"> Journal of Law And Politics, 1989</p><p class="ds-related-work--abstract ds2-5-body-sm">The various initiatives undertaken by the Reagan Administration in what has come to be known as the Iran-Contra affair have reignited an old struggle for control over foreign policy.' While the circumstances of this particular controversy are somewhat unusual, the strife between Congress and the Executive has endured, within certain boundaries, since the inception of the Republic. The contours of this debate are well known to anyone with a passing knowledge of the Constitution. Indeed, their familiarity risks obscuring the important principles which are at stake. Yet the sight of a rear admiral and a lieutenant colonel claiming exemption from the law and from political accountability in pursuit of national security goals" helped focus attention on the fundamental constitutional values implicit in the recent political furor. These values are nothing less than the political accountability of the military and the intelligence services, democratic control of foreign policy, and the rule of law. The assertion by President Reagan and his associates of remarkable executive prerogatives in the area of national security requires us to reconsider who, under the Constitution, is entitled to participate in the creation and implementation of foreign policy and how the distribution of this power between the branches of government preserves the delicate balance between secrecy and democracy.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Constitution \u0026 National Security: Covert Action In The Age of Intelligence Oversight","attachmentId":95327667,"attachmentType":"pdf","work_url":"https://www.academia.edu/5672425/The_Constitution_and_National_Security_Covert_Action_In_The_Age_of_Intelligence_Oversight","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/5672425/The_Constitution_and_National_Security_Covert_Action_In_The_Age_of_Intelligence_Oversight"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="8" data-entity-id="33907833" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/33907833/Musaddiqs_Spectre_On_the_Recent_Declassification_of_US_Documents">Musaddiq's Spectre: On the Recent Declassification of US Documents</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="75233" href="https://york.academia.edu/EskandarSadeghiBoroujerdi">Eskandar Sadeghi-Boroujerdi</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Jadaliyya, 2017</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Musaddiq's Spectre: On the Recent Declassification of US Documents","attachmentId":53879135,"attachmentType":"pdf","work_url":"https://www.academia.edu/33907833/Musaddiqs_Spectre_On_the_Recent_Declassification_of_US_Documents","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/33907833/Musaddiqs_Spectre_On_the_Recent_Declassification_of_US_Documents"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="9" data-entity-id="94991883" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/94991883/The_State_Secrets_Privilege_in_the_Post_9_11_Era_30_Pace_L_Rev_778_2010_">The State Secrets Privilege in the Post-9/11 Era, 30 Pace L. Rev. 778 (2010)</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="180672309" href="https://uic.academia.edu/StevenDSchwinn">Steven D. Schwinn</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2010</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The State Secrets Privilege in the Post-9/11 Era, 30 Pace L. Rev. 778 (2010)","attachmentId":97297430,"attachmentType":"pdf","work_url":"https://www.academia.edu/94991883/The_State_Secrets_Privilege_in_the_Post_9_11_Era_30_Pace_L_Rev_778_2010_","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/94991883/The_State_Secrets_Privilege_in_the_Post_9_11_Era_30_Pace_L_Rev_778_2010_"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div></div></div><div class="ds-sticky-ctas--wrapper js-loswp-sticky-ctas hidden"><div class="ds-sticky-ctas--grid-container"><div class="ds-sticky-ctas--container"><button class="ds2-5-button js-swp-download-button" data-signup-modal="{"location":"continue-reading-button--sticky-ctas","attachmentId":86508662,"attachmentType":"pdf","workUrl":null}">See full PDF</button><button class="ds2-5-button ds2-5-button--secondary js-swp-download-button" data-signup-modal="{"location":"download-pdf-button--sticky-ctas","attachmentId":86508662,"attachmentType":"pdf","workUrl":null}"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">download</span>Download PDF</button></div></div></div><div class="ds-below-fold--grid-container"><div class="ds-work--container js-loswp-embedded-document"><div class="attachment_preview" data-attachment="Attachment_86508662" style="display: none"><div class="js-scribd-document-container"><div class="scribd--document-loading js-scribd-document-loader" style="display: block;"><img alt="Loading..." src="//a.academia-assets.com/images/loaders/paper-load.gif" /><p>Loading Preview</p></div></div><div style="text-align: center;"><div class="scribd--no-preview-alert js-preview-unavailable"><p>Sorry, preview is currently unavailable. You can download the paper by clicking the button above.</p></div></div></div></div><div class="ds-sidebar--container js-work-sidebar"><div class="ds-related-content--container"><h2 class="ds-related-content--heading">Related papers</h2><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="0" data-entity-id="94991884" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/94991884/The_State_Secrets_Privilege_in_the_Post_9_11_Era">The State Secrets Privilege in the Post-9/11 Era</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="180672309" href="https://uic.academia.edu/StevenDSchwinn">Steven D. Schwinn</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Pace Law Review, 2010</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The State Secrets Privilege in the Post-9/11 Era","attachmentId":97297429,"attachmentType":"pdf","work_url":"https://www.academia.edu/94991884/The_State_Secrets_Privilege_in_the_Post_9_11_Era","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/94991884/The_State_Secrets_Privilege_in_the_Post_9_11_Era"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="1" data-entity-id="41626511" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/41626511/On_Christopher_Morans_Company_confessions_Secrets_Memoirs_and_the_CIA_Intelligence_and_National_Security_2019">On Christopher Moran's "Company confessions: Secrets, Memoirs and the CIA", Intelligence and National Security, 2019</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="41136616" href="https://kcl.academia.edu/PaulineBlist%C3%A8ne">Pauline Blistène</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Intelligence and National Security, 2019</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"On Christopher Moran's \"Company confessions: Secrets, Memoirs and the CIA\", Intelligence and National Security, 2019","attachmentId":61782931,"attachmentType":"pdf","work_url":"https://www.academia.edu/41626511/On_Christopher_Morans_Company_confessions_Secrets_Memoirs_and_the_CIA_Intelligence_and_National_Security_2019","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/41626511/On_Christopher_Morans_Company_confessions_Secrets_Memoirs_and_the_CIA_Intelligence_and_National_Security_2019"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="2" data-entity-id="13233368" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/13233368/The_Burgeoning_Fissures_of_Dissent_Allen_Dulles_and_the_Selling_of_the_CIA_in_the_Aftermath_of_the_Bay_of_Pigs">The Burgeoning Fissures of Dissent: Allen Dulles and the Selling of the CIA in the Aftermath of the Bay of Pigs</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="10333714" href="https://hull.academia.edu/SimonWillmetts">Simon Willmetts</a></div><p class="ds-related-work--metadata ds2-5-body-xs">History, 2015</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Burgeoning Fissures of Dissent: Allen Dulles and the Selling of the CIA in the Aftermath of the Bay of Pigs","attachmentId":39098983,"attachmentType":"docx","work_url":"https://www.academia.edu/13233368/The_Burgeoning_Fissures_of_Dissent_Allen_Dulles_and_the_Selling_of_the_CIA_in_the_Aftermath_of_the_Bay_of_Pigs","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/13233368/The_Burgeoning_Fissures_of_Dissent_Allen_Dulles_and_the_Selling_of_the_CIA_in_the_Aftermath_of_the_Bay_of_Pigs"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="3" data-entity-id="31096910" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/31096910/Publicizing_Suspicions_of_Espionage_on_the_News_The_Leak_of_the_Felix_S_Bloch_Case">Publicizing Suspicions of Espionage on the News: The Leak of the Felix S. Bloch Case</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="2991142" href="https://independent.academia.edu/AnnvonMehren">Ann von Mehren</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Publicizing Suspicions of Espionage on the News: The Leak of the Felix S. Bloch Case","attachmentId":51531819,"attachmentType":"pdf","work_url":"https://www.academia.edu/31096910/Publicizing_Suspicions_of_Espionage_on_the_News_The_Leak_of_the_Felix_S_Bloch_Case","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/31096910/Publicizing_Suspicions_of_Espionage_on_the_News_The_Leak_of_the_Felix_S_Bloch_Case"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="4" data-entity-id="34277569" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/34277569/THE_CIA_AND_THE_CULT_OF_INTELLIGENCE_by_Victor_Marchetti_1980">THE CIA AND THE CULT OF INTELLIGENCE, by Victor Marchetti, 1980</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="26189388" href="https://independent.academia.edu/GarabetMoumdjian">Garabet K Moumdjian, Ph.D.</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"THE CIA AND THE CULT OF INTELLIGENCE, by Victor Marchetti, 1980","attachmentId":54184370,"attachmentType":"pdf","work_url":"https://www.academia.edu/34277569/THE_CIA_AND_THE_CULT_OF_INTELLIGENCE_by_Victor_Marchetti_1980","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/34277569/THE_CIA_AND_THE_CULT_OF_INTELLIGENCE_by_Victor_Marchetti_1980"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="5" data-entity-id="98808200" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/98808200/The_CIA_Leak_Investigation">The CIA Leak Investigation</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="38116173" href="https://uvu.academia.edu/ElaineEEnglehardt">Elaine E Englehardt</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Teaching Ethics, 2005</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The CIA Leak Investigation","attachmentId":100059603,"attachmentType":"pdf","work_url":"https://www.academia.edu/98808200/The_CIA_Leak_Investigation","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/98808200/The_CIA_Leak_Investigation"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="6" data-entity-id="92760877" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/92760877/Secrecy_and_National_Security_Whistleblowing">Secrecy and National Security Whistleblowing</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="100802533" href="https://independent.academia.edu/DanielEllsberg">Daniel Ellsberg</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Social Research: An International Quarterly</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Secrecy and National Security Whistleblowing","attachmentId":95684559,"attachmentType":"pdf","work_url":"https://www.academia.edu/92760877/Secrecy_and_National_Security_Whistleblowing","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/92760877/Secrecy_and_National_Security_Whistleblowing"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="7" data-entity-id="1075061" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/1075061/Privilege_Wise_and_Patent_and_Trade_Secret_Foolish_How_the_Courts_Misapplication_of_the_Military_and_State_Secrets_Privilege_Violates_the_Constitution_and_">Privilege-Wise and Patent (and Trade Secret) Foolish-How the Courts' Misapplication of the Military and State Secrets Privilege Violates the Constitution and …</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="923936" href="https://uky.academia.edu/DavidaIsaacs">Davida Isaacs</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Berkeley Tech. LJ, 2009</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Privilege-Wise and Patent (and Trade Secret) Foolish-How the Courts' Misapplication of the Military and State Secrets Privilege Violates the Constitution and …","attachmentId":6581913,"attachmentType":"pdf","work_url":"https://www.academia.edu/1075061/Privilege_Wise_and_Patent_and_Trade_Secret_Foolish_How_the_Courts_Misapplication_of_the_Military_and_State_Secrets_Privilege_Violates_the_Constitution_and_","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/1075061/Privilege_Wise_and_Patent_and_Trade_Secret_Foolish_How_the_Courts_Misapplication_of_the_Military_and_State_Secrets_Privilege_Violates_the_Constitution_and_"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="8" data-entity-id="33393120" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/33393120/The_Ethics_of_Espionage_CHAPTER_2">The Ethics of Espionage CHAPTER 2</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="36916566" href="https://suffolk.academia.edu/DavidOConnor">David O'Connor</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Ethics of Espionage CHAPTER 2","attachmentId":53448728,"attachmentType":"docx","work_url":"https://www.academia.edu/33393120/The_Ethics_of_Espionage_CHAPTER_2","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/33393120/The_Ethics_of_Espionage_CHAPTER_2"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="9" data-entity-id="32185405" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/32185405/_In_the_Field_of_Espionage_Theres_No_Such_Thing_as_Peacetime_The_Official_Secrets_Act_and_the_PICNIC_Wiretapping_Program">‘In the Field of Espionage, There's No Such Thing as Peacetime:’ The Official Secrets Act and the PICNIC Wiretapping Program</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="25131256" href="https://myutoronto.academia.edu/DennisMolinaro">Dennis Molinaro</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Canadian Historical Review, 2017</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"‘In the Field of Espionage, There's No Such Thing as Peacetime:’ The Official Secrets Act and the PICNIC Wiretapping Program","attachmentId":54806790,"attachmentType":"pdf","work_url":"https://www.academia.edu/32185405/_In_the_Field_of_Espionage_Theres_No_Such_Thing_as_Peacetime_The_Official_Secrets_Act_and_the_PICNIC_Wiretapping_Program","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/32185405/_In_the_Field_of_Espionage_Theres_No_Such_Thing_as_Peacetime_The_Official_Secrets_Act_and_the_PICNIC_Wiretapping_Program"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="10" data-entity-id="93398666" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/93398666/Born_Secret_The_H_Bomb_the_Progressive_Case_and_National_Security">Born Secret: The H-Bomb, the Progressive Case, and National Security</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="244902376" href="https://independent.academia.edu/RICHARDAQUILARICHARDSON">RICHARD AQUILA RICHARDSON</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Journal of Policy Analysis and Management, 1982</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Born Secret: The H-Bomb, the Progressive Case, and National Security","attachmentId":96146982,"attachmentType":"pdf","work_url":"https://www.academia.edu/93398666/Born_Secret_The_H_Bomb_the_Progressive_Case_and_National_Security","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/93398666/Born_Secret_The_H_Bomb_the_Progressive_Case_and_National_Security"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="11" data-entity-id="44068452" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/44068452/Hacks_Leaks_and_Data_Dumps_The_Right_to_Publish_Illegally_Acquired_Information_Twenty_Years_After_Bartnicki_v_Vopper">Hacks, Leaks, and Data Dumps: The Right to Publish Illegally Acquired Information Twenty Years After Bartnicki v. Vopper</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="192530781" href="https://independent.academia.edu/MazzeoChristina">Christina Mazzeo</a><span>, </span><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="25769538" href="https://marquette.academia.edu/ErikUgland">Erik Ugland</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Washington Law Review, 2021</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Hacks, Leaks, and Data Dumps: The Right to Publish Illegally Acquired Information Twenty Years After Bartnicki v. Vopper","attachmentId":66758275,"attachmentType":"pdf","work_url":"https://www.academia.edu/44068452/Hacks_Leaks_and_Data_Dumps_The_Right_to_Publish_Illegally_Acquired_Information_Twenty_Years_After_Bartnicki_v_Vopper","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/44068452/Hacks_Leaks_and_Data_Dumps_The_Right_to_Publish_Illegally_Acquired_Information_Twenty_Years_After_Bartnicki_v_Vopper"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="12" data-entity-id="39402170" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/39402170/Leaks_and_the_Limits_of_Press_Freedom">Leaks and the Limits of Press Freedom</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="1259358" href="https://uva.academia.edu/EricBoot">Eric Boot</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Ethical Theory and Moral Practice, 2019</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Leaks and the Limits of Press Freedom","attachmentId":59546300,"attachmentType":"pdf","work_url":"https://www.academia.edu/39402170/Leaks_and_the_Limits_of_Press_Freedom","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/39402170/Leaks_and_the_Limits_of_Press_Freedom"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="13" data-entity-id="11832133" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/11832133/_Dis_Informing_the_Peoples_Discretion_Judicial_Deference_Under_the_National_Security_Exemption_of_the_Freedom_of_Information_Act">[Dis-]Informing the People's Discretion: Judicial Deference Under the National Security Exemption of the Freedom of Information Act</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="3808603" href="https://chicago.academia.edu/TomGinsburg">Tom Ginsburg</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"[Dis-]Informing the People's Discretion: Judicial Deference Under the National Security Exemption of the Freedom of Information Act","attachmentId":37235145,"attachmentType":"pdf","work_url":"https://www.academia.edu/11832133/_Dis_Informing_the_Peoples_Discretion_Judicial_Deference_Under_the_National_Security_Exemption_of_the_Freedom_of_Information_Act","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/11832133/_Dis_Informing_the_Peoples_Discretion_Judicial_Deference_Under_the_National_Security_Exemption_of_the_Freedom_of_Information_Act"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="14" data-entity-id="19719626" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/19719626/The_1967_Central_Intelligence_Agency_Scandal_Catalyst_in_a_Transforming_Relationship_between_State_and_People">The 1967 Central Intelligence Agency Scandal: Catalyst in a Transforming Relationship between State and People</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="129355" href="https://rug.academia.edu/TitydeVries">Tity de Vries</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Journal of American History, 2012</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The 1967 Central Intelligence Agency Scandal: Catalyst in a Transforming Relationship between State and People","attachmentId":55721251,"attachmentType":"pdf","work_url":"https://www.academia.edu/19719626/The_1967_Central_Intelligence_Agency_Scandal_Catalyst_in_a_Transforming_Relationship_between_State_and_People","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/19719626/The_1967_Central_Intelligence_Agency_Scandal_Catalyst_in_a_Transforming_Relationship_between_State_and_People"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="15" data-entity-id="80384983" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/80384983/Principled_Spying_The_Ethics_of_Secret_Intelligence_David_Omand_and_Mark_Phythian_Washington_D_C_Georgetown_University_Press_2018_304_pp_32_95_cloth_32_95_eBook">Principled Spying: The Ethics of Secret Intelligence, David Omand and Mark Phythian (Washington, D.C.: Georgetown University Press, 2018), 304 pp., $32.95 cloth, $32.95 eBook</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="229050" href="https://usna.academia.edu/MIkeSkerker">Michael Skerker</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Ethics & International Affairs, 2018</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Principled Spying: The Ethics of Secret Intelligence, David Omand and Mark Phythian (Washington, D.C.: Georgetown University Press, 2018), 304 pp., $32.95 cloth, $32.95 eBook","attachmentId":86784359,"attachmentType":"pdf","work_url":"https://www.academia.edu/80384983/Principled_Spying_The_Ethics_of_Secret_Intelligence_David_Omand_and_Mark_Phythian_Washington_D_C_Georgetown_University_Press_2018_304_pp_32_95_cloth_32_95_eBook","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/80384983/Principled_Spying_The_Ethics_of_Secret_Intelligence_David_Omand_and_Mark_Phythian_Washington_D_C_Georgetown_University_Press_2018_304_pp_32_95_cloth_32_95_eBook"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="16" data-entity-id="121667497" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/121667497/Does_the_First_Amendments_Freedom_of_the_Press_Clause_Place_the_Institutional_Media_Above_the_Law_of_Classified_Secrets">Does the First Amendment's Freedom of the Press Clause Place the Institutional Media Above the Law of Classified Secrets?</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="272873631" href="https://independent.academia.edu/JohnEastman9">John Eastman</a></div><p class="ds-related-work--metadata ds2-5-body-xs">SSRN Electronic Journal, 2006</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Does the First Amendment's Freedom of the Press Clause Place the Institutional Media Above the Law of Classified Secrets?","attachmentId":116493264,"attachmentType":"pdf","work_url":"https://www.academia.edu/121667497/Does_the_First_Amendments_Freedom_of_the_Press_Clause_Place_the_Institutional_Media_Above_the_Law_of_Classified_Secrets","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/121667497/Does_the_First_Amendments_Freedom_of_the_Press_Clause_Place_the_Institutional_Media_Above_the_Law_of_Classified_Secrets"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="17" data-entity-id="4739798" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/4739798/THE_FEDERAL_COURTS_LAW_REVIEW_Wikilaw_Securing_the_Leaks_in_the_Application_of_First_Amendment_Jurisprudence_to_WikiLeaks">THE FEDERAL COURTS LAW REVIEW Wikilaw: Securing the Leaks in the Application of First Amendment Jurisprudence to WikiLeaks</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="3990018" href="https://nyu.academia.edu/NawiUkabiala">Nawi Ukabiala</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"THE FEDERAL COURTS LAW REVIEW Wikilaw: Securing the Leaks in the Application of First Amendment Jurisprudence to WikiLeaks","attachmentId":32055891,"attachmentType":"pdf","work_url":"https://www.academia.edu/4739798/THE_FEDERAL_COURTS_LAW_REVIEW_Wikilaw_Securing_the_Leaks_in_the_Application_of_First_Amendment_Jurisprudence_to_WikiLeaks","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/4739798/THE_FEDERAL_COURTS_LAW_REVIEW_Wikilaw_Securing_the_Leaks_in_the_Application_of_First_Amendment_Jurisprudence_to_WikiLeaks"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="18" data-entity-id="81376585" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/81376585/Foreword_The_NSA_and_the_Legal_Regime_for_Foreign_Intelligence_Surveillance">Foreword: The NSA and the Legal Regime for Foreign Intelligence Surveillance</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="33534" href="https://osu.academia.edu/PeterShane">Peter M Shane</a></div><p class="ds-related-work--metadata ds2-5-body-xs">SSRN Electronic Journal, 2013</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Foreword: The NSA and the Legal Regime for Foreign Intelligence Surveillance","attachmentId":87440329,"attachmentType":"pdf","work_url":"https://www.academia.edu/81376585/Foreword_The_NSA_and_the_Legal_Regime_for_Foreign_Intelligence_Surveillance","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/81376585/Foreword_The_NSA_and_the_Legal_Regime_for_Foreign_Intelligence_Surveillance"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="19" data-entity-id="17771154" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/17771154/Coming_to_Terms_with_Secret_Law_7_Harvard_National_Security_Journal_241_2015_">Coming to Terms with Secret Law, 7 Harvard National Security Journal 241 (2015)</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="35887535" href="https://independent.academia.edu/DakotaRudesill">Dakota S Rudesill</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2015</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Coming to Terms with Secret Law, 7 Harvard National Security Journal 241 (2015)","attachmentId":44511309,"attachmentType":"pdf","work_url":"https://www.academia.edu/17771154/Coming_to_Terms_with_Secret_Law_7_Harvard_National_Security_Journal_241_2015_","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/17771154/Coming_to_Terms_with_Secret_Law_7_Harvard_National_Security_Journal_241_2015_"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="20" data-entity-id="8064923" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/8064923/THE_POLITICS_OF_THE_PENTAGON_PAPERS">THE POLITICS OF THE PENTAGON PAPERS</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="15561763" href="https://independent.academia.edu/arthurwaskow">arthur waskow</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Peace & Change, 1972</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"THE POLITICS OF THE PENTAGON PAPERS","attachmentId":48226448,"attachmentType":"pdf","work_url":"https://www.academia.edu/8064923/THE_POLITICS_OF_THE_PENTAGON_PAPERS","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/8064923/THE_POLITICS_OF_THE_PENTAGON_PAPERS"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="21" data-entity-id="25356903" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/25356903/Review_of_Timothy_Melley_The_Covert_Sphere_Secrecy_Fiction_and_the_National_Security_State_">Review of Timothy Melley, "The Covert Sphere: Secrecy, Fiction, and the National Security State"</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="65387" href="https://uni-erlangen.academia.edu/DrAlexanderDunst">Dr. Alexander Dunst</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2014</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Review of Timothy Melley, \"The Covert Sphere: Secrecy, Fiction, and the National Security State\"","attachmentId":45657531,"attachmentType":"pdf","work_url":"https://www.academia.edu/25356903/Review_of_Timothy_Melley_The_Covert_Sphere_Secrecy_Fiction_and_the_National_Security_State_","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/25356903/Review_of_Timothy_Melley_The_Covert_Sphere_Secrecy_Fiction_and_the_National_Security_State_"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="22" data-entity-id="38183146" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/38183146/State_secrets_in_the_Abu_Omar_case_the_transatlantic_relationship_undermines_the_rule_of_law_in_cases_involving_human_rights_abuses_by_intelligence_services">State secrets in the Abu Omar case: the transatlantic relationship undermines the rule of law in cases involving human rights abuses by intelligence services</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="35798632" href="https://bristol.academia.edu/YashaMaccanico">Yasha Maccanico</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Statewatch news online, 2014</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"State secrets in the Abu Omar case: the transatlantic relationship undermines the rule of law in cases involving human rights abuses by intelligence services","attachmentId":58219951,"attachmentType":"pdf","work_url":"https://www.academia.edu/38183146/State_secrets_in_the_Abu_Omar_case_the_transatlantic_relationship_undermines_the_rule_of_law_in_cases_involving_human_rights_abuses_by_intelligence_services","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/38183146/State_secrets_in_the_Abu_Omar_case_the_transatlantic_relationship_undermines_the_rule_of_law_in_cases_involving_human_rights_abuses_by_intelligence_services"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="23" data-entity-id="33393122" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/33393122/The_Ethics_of_Espionage_CHAPTER_4">The Ethics of Espionage CHAPTER 4</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="36916566" href="https://suffolk.academia.edu/DavidOConnor">David O'Connor</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Ethics of Espionage CHAPTER 4","attachmentId":53448730,"attachmentType":"docx","work_url":"https://www.academia.edu/33393122/The_Ethics_of_Espionage_CHAPTER_4","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/33393122/The_Ethics_of_Espionage_CHAPTER_4"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="24" data-entity-id="101123262" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/101123262/Access_to_Classified_Information_Constitutional_and_Statutory_Dimensions">Access to Classified Information: Constitutional and Statutory Dimensions</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="267411737" href="https://independent.academia.edu/FeinBruce">Bruce Fein</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Wm. & Mary L. Rev., 1984</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Access to Classified Information: Constitutional and Statutory Dimensions","attachmentId":101750338,"attachmentType":"pdf","work_url":"https://www.academia.edu/101123262/Access_to_Classified_Information_Constitutional_and_Statutory_Dimensions","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/101123262/Access_to_Classified_Information_Constitutional_and_Statutory_Dimensions"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div></div><div class="ds-related-content--container"><h2 class="ds-related-content--heading">Related topics</h2><div class="ds-research-interests--pills-container"><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="534" href="https://www.academia.edu/Documents/in/Law">Law</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="2789" href="https://www.academia.edu/Documents/in/Government">Government</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="2821" href="https://www.academia.edu/Documents/in/States">States</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="3680" href="https://www.academia.edu/Documents/in/Courts">Courts</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="4486" href="https://www.academia.edu/Documents/in/Political_Science">Political Science</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="6662" href="https://www.academia.edu/Documents/in/Secrecy">Secrecy</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="115137" href="https://www.academia.edu/Documents/in/First_Amendment">First Amendment</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="658389" href="https://www.academia.edu/Documents/in/Columbia_School_of_Law">Columbia School of Law</a></div></div></div></div></div><div class="footer--content"><ul class="footer--main-links hide-on-mobile"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a rel="nofollow" href="https://medium.com/academia">Blog</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px; position: relative; bottom: -1px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg> <strong>We're Hiring!</strong></a></li><li><a href="https://support.academia.edu/"><svg style="width: 12px; height: 12px; position: relative; bottom: -1px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg> <strong>Help Center</strong></a></li></ul><ul class="footer--research-interests"><li>Find new research papers in:</li><li><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul><ul class="footer--legal-links hide-on-mobile"><li><a href="https://www.academia.edu/terms">Terms</a></li><li><a href="https://www.academia.edu/privacy">Privacy</a></li><li><a href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia ©2024</li></ul></div> </body> </html>