Feeds

Supremes deputize all US journos

Take this badge off of me...

  • alert
  • submit to reddit

Security for virtualized datacentres

American journalists have effectively been conscripted into the business of law enforcement as a result of the US Supreme Court's refusal to hear an appeal in the case of reporters Matthew Cooper of Time Magazine and Judith Miller of the New York Times.

The two had been ordered incarcerated for eighteen months by district judge Thomas Hogan on charges of civil contempt back in October, because they refused to cooperate in a grand jury investigation into the leaking of CIA agent Valerie Plame's identity.

Both reporters are suspected of having spoken with people in government who have information about the original source of the leak, who committed a crime under the Intelligence Identities Protection Act. They have refused to turn over their notes, citing guarantees of anonymity they gave to their sources.

Right-wing darling and incontinent Bush Administration booster Robert Novak is the reporter who originally published Plame's identity, but he has not been ordered to identify his sources, perhaps because he already ratted them out voluntarily.

Although Cooper's and Miller's work is secondary to Novak's original story, the special prosecutor, Patrick Fitzgerald, insists upon examining their notes. Cooper and Miller argued that the First Amendment protects them and their anonymous sources, which makes perfect sense, because it is impossible for the press to be free, as required by the Bill of Rights, if journalists cannot gather news of criminal activity without ratting out their sources.

Thanks to the Supreme Court's spinelessness in defending the First Amendment against government authoritarianism - the very situation for which it was crafted in the first place - Cooper and Miller will return to district court, where the judge will select the detention facility in which to punish them for doing their jobs.

Meanwhile, to all potential anonymous sources involved in official malfeasance or criminal activity, we have a simple closing message: "Federal agent! Freeze, Dirtbag!"

Man, we've been waiting ages to say that. ®

Internet Security Threat Report 2014

More from The Register

next story
MEN: For pity's sake SLEEP with LOTS of WOMEN - and avoid Prostate Cancer
And, um, don't sleep with other men. If that's what worries you
Jim Beam me up, Scotty! WHISKY from SPAAACE returns to Earth
They're insured for $1m, before you thirsty folks make plans
Now: The REAL APPLE NEWS you need to know
OMG! Gravity's totes amazeballs. Calm down, George Clooney, not your film
Boffins who stare at goats: I do believe they’re SHRINKING
Alpine chamois being squashed by global warming
Let's make an app that POSTS your POO to APPLE HQ
Plus: It's OPEN WARFARE in the Linux greybeard world
Adorkable overshare of words like photobomb in this year's dictionaries
And hipsters are finally defined as self-loathing. Sort of
Not a loyal follower of @BritishMonarchy? You missed The QUEEN*'s first Tweet
Her Maj opens 'Information Age' at the Science Museum
Apple CEO Tim Cook: My well-known gayness is 'a gift from GOD'
'I have benefited from the sacrifice of others'
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.