This is terrible weighing of the costs and benefits of the pardon power. I think Senator Murphy woefully undervalues its utility. /1

In part because the Congress of which he is a part has established no functioning second-look mechanisms for shortening sentences or expunging convictions, commutations and pardons are the only mechanisms for correcting injustices in the federal system. /2
And it's not as if those injustices are rare. Go to any federal correctional facility, and take time to learn who is there and about their cases, and you find literally thousands of people whose sentences were grossly excessive given their offenses. /3
Those people need commutations as a corrective because there is no parole or other second look in place to address that. Some have tried to use compassionate release under the First Step Act, but DOJ tries to block those efforts at every turn and it's a limited option. /4
Presidential commutations are thus the only avenue for these folks. And under President Obama, more than 1,700 regular people (not his cronies) received relief. It was woefully inadequate for the need, but it shows the value of the power. /5
Pardons are essential as well because the collateral consequences of convictions can be devastating for people trying to get housing, employment, and education after being convicted. There is no other way to clear a federal conviction than a pardon. /6
So before Senator Murphy immediately argues for stripping the one tool in place to address all this -- and all because we have someone with no moral compass exercising the power -- he should first set out to enact needed substitutes for what the power is doing. /7
Congress lacks the power to remove the pardon power from the Constitution, so his tweet is empty symbolism. (Though it is dangerous because it will make people think the pardon power is the problem instead of the person currently exercising it.) /8
But he could be pushing for real change through legislation -- second looks of sentencing, expungement options, removing collateral consequences of convictions, eliminating the mandatory minimums that cause so many of the excessive sentences in the first place. /9
As a legislator, that should be his focus. Not this ill-advised tweet that gets the balance of interests wrong precisely because he's not remotely well versed in the utility of the pardon power. If he was, he would never have concluded it's worth getting rid of. /10
Even if Congress had mechanisms in place that served similar functions as the pardon power, inevitably they would be flawed and there would still be instances of injustices that need correction. Thankfully the framers of the Constitution recognized that. /11
That's why the power has such a place of prominence -- right alongside the commander in chief powers. /12
We wouldn't say the president should no longer have those powers simply because a particular president did a terrible job using those powers, and we shouldn't gut the pardon power because the current officeholder is corrupt and has twisted values. /13
The solution to what's happening now is to get a better leader, which we've done. And my hope is that leader will see that the pardon power's utility is critical, and he'll show everyone what a real leader does when wielding it. /end

More from Crime

My students @maxzks and Tushar Jois spent most of the summer going through every piece of public documentation, forensics report, and legal document we could find to figure out how police were “breaking phone encryption”. 1/


This was prompted by a claim from someone knowledgeable, who claimed that forensics companies no longer had the ability to break the Apple Secure Enclave Processor, which would make it very hard to crack the password of a locked, recent iPhone. 2/

We wrote an enormous report about what we found, which we’ll release after the holidays. The TL;DR is kind of depressing:

Authorities don’t need to break phone encryption in most cases, because modern phone encryption sort of sucks. 3/

I’ll focus on Apple here but Android is very similar. The top-level is that, to break encryption on an Apple phone you need to get the encryption keys. Since these are derived from the user’s passcode, you either need to guess that — or you need the user to have entered it. 4/

Guessing the password is hard on recent iPhones because there’s (at most) a 10-guess limit enforced by the Secure Enclave Processor (SEP). There’s good evidence that at one point in 2018 a company called GrayKey had a SEP exploit that did this for the X. See photo. 5/

You May Also Like