Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> How can you know the information is harmful to you if you don't click on it?

It's not your job to determine if it's harmful to you; it's not your job to determine if it's harmful to national security. That's someone else's job, he did it, and now others have ignored that determination and have released it anyway.

> Rules, if they exist, preventing government employees from reading leaked documents are the actual harm.

Do you deny the legitimacy of state secrets altogether? When you go into a salary negotiation, do you say, 'I'd be willing to make as little as $X'?

If you accept that it's possible for secrets to be legitimate, then you have to accept that there will be secrets you will not be able to personally examine for their legitimacy (because revealing them to you would make them…no longer secret).

Likewise, it's not appropriate for someone in a position of great trust to betray that trust and decide for himself to leak something. One does not put the security of 350 million souls at risk due to the determination of a single man.

Instead, there are procedures in place for those with access to secrets to challenge their classification; there are people whose job ratings improve if they are able to sustain such challenges. The right thing to do, if someone believes something is misclassified, is to follow those procedures and shepherd that case through that system of people.

To do otherwise would be like having a single man with his finger on a nuclear weapon. Sure, he might only unleash it appropriately, but he might not. We have a system for the release of weapons; we have systems in place for the release of information.



When you blindly abide by the rules you will never reveal people abusing this system, as has been done by Snowden. Is this what you would prefer?


> When you blindly abide by the rules you will never reveal people abusing this system

Inspectors general live to find abusers of the system, to pursue and to convict them.


I know this is a really old thread, but I have to ask what happens when the system itself (e.g. domestic surveillance) is the abuse?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: