On Monday, Republican presidential candidate Mitt Romney called for the appointment of a special prosecutor to investigate a series of recent leaks that critics charge are designed to bolster the national security credentials of the Obama administration.
Investigations by special prosecutors can take on a life of their own.
Recall that the investigation of the Whitewater real estate deal in Arkansas -- in which Bill and Hillary Clinton actually lost money -- morphed into the scandal of the Monica Lewinsky affair.
During the George W. Bush administration, Scooter Libby, a top aide to Vice President Dick Cheney, was convicted not of leaking the name of CIA officer Valerie Plame but of making false statements to the FBI during its investigation of the leak and also perjuring himself.
The recent leaks involve stories in The New York Times, Newsweek and the Associated Press that range from the hitherto undisclosed role of the United States in cyberattacks on Iran's nuclear facilities to details about the president's decision-making surrounding the selection of the targets of the CIA drone program in Pakistan and Yemen and the penetration by a spy of al Qaeda's Yemeni affiliate.
Earlier this month, Attorney General Eric Holder appointed two senior Department of Justice prosecutors to investigate the leaks, and the FBI is also investigating the matter.
Have those leaks, as Romney claimed on Monday, "put American interests and our people in jeopardy"?
It is not only Republicans making these charges. Well-regarded Democratic Sen. Dianne Feinstein, who heads the powerful Senate Select Committee on Intelligence, told CNN's Wolf Blitzer: "I think what we're seeing, Wolf, is an avalanche of leaks, and it is very, very disturbing. It's dismayed our allies. It puts American lives in jeopardy. It puts our nation's security in jeopardy."
The story that sparked these claims was David Sanger's piece in The New York Times earlier this month about the U.S. role in cyberattacks against Iran's key nuclear enrichment plant at Natanz, revelations that also appear in Sanger's fascinating new book, "Confront and Conceal."
Sanger goes into rich detail about how computer viruses were introduced into the Natanz plant and how they then took over the controls of the finely calibrated centrifuges that the Iranians use to enrich their uranium, causing the centrifuges to spin wildly out of control.
But did this really hurt U.S. national security? After all, the Iranians know that their problems with the centrifuges at Natanz are caused by cyberattacks and have publicly said so for the past two years. On November 29, 2010, Iranian President Mahmoud Ahmadinejad told reporters in Tehran, "They succeeded in creating problems for a limited number of our centrifuges with the software they had installed in electronic parts."
Computer experts around the world who examined the Stuxnet virus, the first computer virus that was introduced into the Iranian nuclear program, concluded two years ago that this was a virus that was so complex that it could only have been generated by a state, and the only two states with the technical know-how and motive to write the code for such a virus were Israel and the United States.
Last year, German computer security expert Ralph Langner, who had discovered the Stuxnet virus when it had first broken out of the Natanz plant, told a conference in California, "My opinion is that the Mossad is involved. ... But, the leading source is not Israel. ... There is only one leading source, and that is the United States."
Sanger's reporting about the cyberattacks on Iran revealed that the code name for the series of computer viruses unleashed on Iran's nuclear program is "Olympic Games" and also laid out some of the modus operandi of the viruses themselves, but since much of this was generally known by the Iranian regime, it is unlikely U.S. national security was really harmed by the disclosures.
In fact, open discussion of the cyberattacks against Iran is in the public interest because three questions about the attacks quickly present themselves:
-- What are the downsides of cyberattacks in a world that is so interconnected by the Internet?
-- Since it is the Pentagon's official position that a serious cyberattack against the United States is a form of warfare, is the U.S. therefore already at war with Iran?
-- When does a covert action against an American enemy rise to a form of warfare that it merits a broader public discussion?
According to Sanger, his sources about Olympic Games included "current and former American, European and Israeli officials involved in the program, as well as a range of outside experts."
So it is fair to assume that Sanger's reporting was hardly dependent on a particular Obama administration official (or officials) but rather, as all good reporters do, Sanger put together a myriad of sources to arrive at the composite picture of Olympic Games that he paints for his readers.
It is therefore quite unlikely that prosecutors will find particular officials behind the leaking but rather that Obama officials gave Sanger some small fragments of the Olympic Games story that he was then also able to piece together with the help of his Israeli and European sources, as well as experts on cybersecurity.
Another story that has critics of the Obama administration steamed is that it has allowed to become public that the president personally approves "kill lists" for CIA drone strikes in Pakistan and Yemen, a story reported both by Jo Becker and Scott Shane in The New York Times and by Daniel Klaidman in Newsweek and in his excellent new book about Obama's counterterrorism policies, "Kill or Capture."
No such criticism attended the Bush administration's decision to turn over to Bob Woodward the highly classified notes from "50 National Security Council and other meetings" that became the basis for Woodward's hagiographic book, "Bush at War," about the campaign to overthrow the Taliban during the fall of 2001.
There is nothing of substance to the criticism that discussion of the "kill lists" endangers national security.
After all, drone attacks are an entirely public form of supposedly secret warfare. A drone strike -- when a bomb or missile appears out of nowhere and incinerates some people in Pakistan's tribal areas or in Yemen -- is a public event. And it's a form of warfare that is, of course, well known to al Qaeda. The documents recovered at Osama bin Laden's Abbottabad compound in Pakistan demonstrate how worried al Qaeda's leaders were about the CIA drone strikes.