Posts

Chain of Command: Some Violations of Military Discipline Are More Equal Than Others

The other day, Teddy Partridge noted a second instance of someone in the military–the previous one being the Commander-in-Chief–weighing in on Bradley Manning’s guilt.

Echoing his commander in chief in issuing statements that provide improper command influence in the trial of Bradley Manning, the Chairman of the Joint Chiefs of Staff, Gen. Martin Dempsey, stated unequivocally that Manning broke the law.

To review, here’s what Barack Obama said when asked about Bradley Manning in April 2011:

And if you’re in the military… And I have to abide by certain rules of classified information. If I were to release material I weren’t allowed to, I’d be breaking the law.

We’re a nation of laws! We don’t let individuals make their own decisions about how the laws operate. He broke the law.

It appears that President Obama’s highest military officer agrees with him:

The Joint Chiefs chairman also was asked about Manning, the alleged WikiLeaks contributor, and whether Dempsey thought Manning should be viewed as a political prisoner, whistle-blower or traitor.

“We’re a nation of laws. He did violate the law,” Dempsey said.

Meanwhile, Staff Sergeant Robert Bales has not even been charged yet–his lawyer, John Henry Browne, says the military has neither forensics nor a confession incriminating him!–but Generals are sending Browne messages wishing him the best in his defense of Bales.

Browne added that he has received hundreds of emails, including from some generals and other military figures, who wished him luck in the case.

Don’t get me wrong. I hope Browne does his best to give Bales a robust defense. And as I’ve noted repeatedly, I’m not at all convinced that the killings occurred as the military currently claims they did; if so I hope Browne proves that, too.

But I would be shocked if any generals wrote David Coombs, Bradley Manning’s lawyer, to wish him luck in defending a tough, unpopular client. Yet both men–Manning and Bales–are alleged to have violated military discipline in ways that hurt our efforts.

Update: Fixed my misspelling of Bales’ name.

Leak Prosecutions: Enforcing Secrecy Asymmetry Does Not Equate to Rule of Law

Matt Miller has a piece in the Daily Beast defending the Obama Administration’s prosecutions of leakers. Now, as Josh Gerstein notes, Miller makes his work easier by cherry-picking which cases to discuss; he doesn’t mention Thomas Drake, who was pretty clearly trying to expose waste and fraud (as well as the government’s choice to spend more money to provide less privacy protection). And he doesn’t mention Bradley Manning, who is alleged to have leaked at least some materials that expose war crimes and a lot more than expose abuse (though note, DOD, not DOJ, is prosecuting Manning).

But Miller’s argument suffers from a much bigger problem. He operates under the assumption that the sole crux of legitimacy arises from a distinction between whistleblower and leaker that he presents as absolute.

To start with, that distinction isn’t absolute (as Manning’s case makes clear). But even with John Kiriakou, whom Miller does discuss, it’s not absolute. Recall what Kiriakou was charged with: leaking the identity of a still covert officer involved in the torture program, being one of up to 23 people who leaked that Deuce Martinez–who was not covert–was involved in the torture program (though didn’t do the torture), and lying to the CIA Publication Review Board about the classification of a surveillance technique details of which have been readily available for decades (and which seems to be related to the Secret PATRIOT GPS application targeting American citizens in probable violation of the Fourth Amendment). In other words, two people involved in an illegal program and one technique that was probably improperly classified and since become another questionably legal executive branch spying technique.

But the entire investigation arose because defense attorneys with Top Secret clearance used the covert officer’s name in a still-sealed filing about the abuse their client had suffered at the hand of the US, possibly–though we don’t know–at the hand of the covert officer (because he is covert, the defense attorneys did not use the officer’s name or picture with their client).

Now, I have no way of knowing (nor does Miller) Kiriakou’s motive, and his case will probably end in a plea, meaning we’ll never get to learn it at trial. But the very genesis of the case–the defense attorneys’ attempts to learn who had tortured their clients so as to be able to adequately represent them–arises from the government’s failure to prosecute anyone for torture and its insistence on withholding arguably relevant information from legal teams, presumably in part to prevent them from attaining any redress for that torture in courts.

So regardless of Kiriakou’s motive, to argue for the legitimacy of his prosecution as events have transpired is to distract from the larger system in which the government uses secrecy to avoid legal consequences for its own crimes–regardless of what that does for justice.

And it’s not just with Gitmo detainees’ lawyers that the government has withheld information to prevent justice being done. It did that with al-Haramain, the Maher Arar suit, Jeppesen Dataplan–the list of times when the government has claimed something, even a widely known fact, is super duper secret just so it can’t be sued or prosecuted is getting quite long and tired. And, of course, it continues to do it with the Anwar al-Awlaki killing, preferring inconsistent claims of Glomar and state secrets to full accounting not just of Awlaki’s killing, but of the claims about Presidential power more generally.

Read more

Uniforms and WikiLeaks in the Discussion of the Anwar al-Awlaki Killing

This panel discussion between former State Department spokesperson PJ Crowley, former Gitmo Chief Prosecutor Colonel Morris Davis, and ACLU’s Jameel Jaffer is one of the more nuanced, interesting discussions on the Anwar al-Awlaki killing. Not surprisingly, it was shown on Al Jazeera English, not, say, NBC.

One highlight, for me, came when Davis pointed out that the CIA, not JSOC, had targeted Awlaki. That’s significant because it effectively made whoever pulled the trigger an unlawful enemy combatant, just as Omar Khadr was (the government argued in his military commission) for engaging in hostilities without wearing a uniform. Of course, Davis ended the discussion by noting that we’re the big kid on the block, so we’ll never be held accountable for the things we prosecute others for.

More interesting still came when PJ Crowley cited this WikiLeaks cable, reporting on a January 2, 2010 meeting between Ali Abdullah Saleh and David Petraeus back in his CentCom days, to show that Yemen was secretly supporting us on drone strikes, including the one that targeted Awlaki on December 24, 2009 (well before, it should be noted, the OLC had authorized his killing).

AQAP STRIKES: CONCERN FOR CIVILIAN CASUALTIES ———————————————

¶4.(S/NF) Saleh praised the December 17 and 24 strikes against AQAP but said that “mistakes were made” in the killing of civilians in Abyan. The General responded that the only civilians killed were the wife and two children of an AQAP operative at the site, prompting Saleh to plunge into a lengthy and confusing aside with Deputy Prime Minister Alimi and Minister of Defense Ali regarding the number of terrorists versus civilians killed in the strike. (Comment: Saleh’s conversation on the civilian casualties suggests he has not been well briefed by his advisors on the strike in Abyan, a site that the ROYG has been unable to access to determine with any certainty the level of collateral damage. End Comment.) AQAP leader Nassr al-Wahishi and extremist cleric Anwar al-Awlaki may still be alive, Saleh said, but the December strikes had already caused al-Qaeda operatives to turn themselves in to authorities and residents in affected areas to deny refuge to al-Qaeda. Saleh raised the issue of the Saudi Government and Jawf governorate tribal sheikh Amin al-Okimi, a subject that is being reported through other channels.

SHIFTING AIRSTRIKE STRATEGIES

—————————–

¶5.(S/NF) President Obama has approved providing U.S. intelligence in support of ROYG ground operations against AQAP targets, General Petraeus informed Saleh. Saleh reacted coolly, however, to the General’s proposal to place USG personnel inside the area of operations armed with real-time, direct feed intelligence from U.S. ISR platforms overhead. “You cannot enter the operations area and you must stay in the joint operations center,” Saleh responded. Any U.S. casualties in strikes against AQAP would harm future efforts, Saleh asserted. Saleh did not have any objection, however, to General Petraeus’ proposal to move away from the use of cruise missiles and instead have U.S. fixed-wing bombers circle outside Yemeni territory, “out of sight,” and engage AQAP targets when actionable intelligence became available. Saleh lamented the use of cruise missiles that are “not very accurate” and welcomed the use of aircraft-deployed precision-guided bombs instead. “We’ll continue saying the bombs are ours, not yours,” Saleh said, prompting Deputy Prime Minister Alimi to joke that he had just “lied” by telling Parliament that the bombs in Arhab, Abyan, and Shebwa were American-made but deployed by the ROYG.

I find Crowley’s citation of it notable because, while as State Department spokesperson, he strongly argued for the humane treatment of Bradley Manning (and got fired for it), he also routinely criticized the WikiLeaks leaks of State Department cables.

Yet even he now finds himself relying on them to try to understand what the government did when it targeted an American citizen. Read more

RickyLeaks

In a post at the Document Exploitation blog, Douglas Cox reminds us of how Crazy Pete Hoekstra and Rick Santorum pressured the government to make all of Saddam’s documents–including a plan for a nuke–available on the InterToobz.

The drive towards this unprecedented doc dump arose in earnest in late 2005 and early 2006 when the continuing public debate over the justifications for the 2003 Iraq invasion turned towards the possibility of untapped evidence in the captured documents from Iraq.  Could they contain, for instance, “smoking gun” evidence of links between Saddam and al-Qaeda?  Stephen F. Hayes at the Weekly Standard, for example, had an impressive series of pieces during this period on his attempts to obtain access to some of the captured Iraqi documents both via the Pentagon press office and via repeated FOIA requests. He also covered growing calls in Congress for the release of the material.  See in particular his “Where Are the Pentagon Papers?” in November 2005, “Down the Memory Hole: The Pentagon sits on the documents of the Saddam Hussein regime” in December, and both “Saddam’s Terror Training Camps: What the documents captured from the former Iraqi regime reveal — and why they should all be made public” and “Read All About It: Prewar Iraqi documents are of more than academic interest” from January 2006.

In March 2006, both then-Rep. Pete Hoekstra and then-Sen. Rick Santorum took action by introducing nearly identical bills in the House and Senate that required the “Director of National Intelligence to release documents captured in Afghanistan or Iraq during Operation Desert Storm, Operation Enduring Freedom, or Operation Iraqi Freedom.”

This led Gawker to make the obvious analogy to WikiLeaks.

Catholic scold Rick Santorum thinks Julian Assange is a “terrorist”—and ought to be prosecuted as such—for his role in releasing thousands of pages of classified documents on the internet. He ought to know: In 2006, Sen. Rick Santorum literally forced the U.S. government to dump thousands of pages of classified records concerning Iraq onto the web, including detailed plans for building a nuclear weapon, so that right-wing bloggers could search them for evidence of Saddam Hussein’s phantom WMD.

[snip]

No less an authority than former Bush chief of staff Andrew Card said at the time that the release was stupid, and that Director of National Intelligence John Negroponte had opposed Santorum’s push for release: “John Negroponte warned us that we don’t know what’s in these documents, so these are being put out at some risk, and that was a warning that he put out right when they first released the documents.”

ODNI of course took the documents down, but not before they were grabbed by anyone and everyone who may have been interested in designing a nuclear weapon.

A spokesman for Santorum did not respond to a request for comment.

Maybe now that he has effectively called himself a terrorist Santorum will start campaigning against Obama’s use of drones to target American citizens?

(Max Sawicky gets full credit for the post title.)

According to DOD Inspector General Definition, Bradley Manning Did Not “Leak”

The unclassified version of the DOD Inspector General report on leaks within DOD over the last three years (that is, during the Obama Administration) defines “leak” this way.

Unauthorized disclosure of SCI [Secure Compartmented Information] to the public which is defined as: “A communication or physical transfer of [SCI]information to an unauthorized recipient.” DoDD 5210.50, Section 3.2, “Unauthorized Disclosure of Classified Information to the Public,” dated July 22, 2005. [second bracket original]

A leak is a leak of Secure Compartmented Information, not just classified information.

To be sure, the report’s own insertion of that second bracket makes it clear this definition applies to this report. Congress focused on SCI information when it ordered the IG to do the report in a classified annex of this fiscal year’s Defense Appropriation:

The investigation shall contain the following: an inventory of the leaks of SCI data including those attributed to a “senior administration official” from the past three calendar years; the actions taken to investigation each of the events; which of the investigations were referred to the Department of Justice; and what additional actions were taken after the Department of Justice investigation.

The House Appropriations Committee didn’t require the IG to inventory all classified leaks, just the SCI ones.

Nevertheless, as defined, Bradley Manning’s alleged leaks are classified, not SCI.

Whereas this report shows that people from Obama’s Administration, including at least one senior administration official, have been leaking SCI.

We confirmed with DoD components that some unauthorized disclosures of SCI to the public did occur within DoD between December 23, 2008 and December 23, 2011. Among the unauthorized SCI disclosures to the public reported, a DoD Senior Official was directly attributed as a source of unauthorized SCI disclosures to the public. DoD components also reported that they followed established DoD guidance and procedures for forwarding unauthorized disclosure cases to the Department of Justice for action when appropriate.

Now, again, this report is the unclassified version; I’m sure the report provided more detail in the classified version sent to the Chair and Ranking Member of 10 different committees and subcommittees.

But note what this results paragraph doesn’t say. While it confirms at least one of the leaks from a senior administration official was unauthorized, it only cataloged the unauthorized leaks, suggesting there may be more SCI leaks that were authorized (consider, for example, the leaks of a range of compartment names to Bob Woodward, which John Rizzo suggested were part of “one big authorized disclosure,” or reported cooperation between DOD and CIA and Hollywood on the movie about Osama bin Laden’s killing, itself the subject of a different investigation).

Further, while Congress mandated the IG do so, this unclassified report does not explain what happened to these SCI leak referrals at DOJ. Has DOJ been pursuing the SCI leaks by senior administration officials as diligently as it has pursued people like Thomas Drake, who was charged with retaining information, much of it of disputed classification?

One thing’s clear: whether to make political hay or out of genuine concern about the Administration leaks, Congress is honing in on how many of these leaks were authorized and whether DOJ investigated the unauthorized ones. Granted, the most interesting results here remain classified (let’s see whether the 10 committees and subcommittees can withstand the temptation of leaking a classified report on leaking).

But it does begin to show that the Administration that has accused more leakers of “espionage” than all others combined itself leaks far more sensitive information.

(h/t Steven Aftergood who first reported on the IG Report)

Bill Keller Blames Leak Arrests that Preceded WikiLeaks on WikiLeaks

Bill Keller has another narcissistic column attacking Julian Assange. The whole thing is rubbish not worth your time, but I did want to unpack the complaint with which Keller ends his column.

“A lot of attention has been focused on WikiLeaks and its colorful proprietors,” Aftergood told me. “But the real action, it turns out, is not at the publisher level; it’s at the source level. And there aren’t a lot of sources as prolific or as reckless as Bradley Manning allegedly was.”

For good reason. The Obama administration has been much more aggressive than its predecessors in pursuing and punishing leakers. The latest case, the arrest last month of John Kiriakou, a former C.I.A. terrorist-hunter accused of telling journalists the names of colleagues who participated in the waterboarding of Qaeda suspects, is symptomatic of the crackdown. It is this administration’s sixth criminal case against an official for confiding to the media, more than all previous presidents combined. The message is chilling for those entrusted with keeping legitimate secrets and for whistleblowers or officials who want the public to understand how our national security is or is not protected.

Here’s the paradox the documentaries have overlooked so far: The most palpable legacy of the WikiLeaks campaign for transparency is that the U.S. government is more secretive than ever. [my emphasis]

The Obama Administration has charged 6 people with some kind of espionage charge for leaking:

  • Thomas Drake was indicted on April 10, 2010, just days after the release of the Collateral Murder video and before Bradley Manning first contacted Adrian Lamo; he was charged for purported leaks going back to February 2006
  • Shamai Leibowitz was first investigated in mid-2009, before Manning leaked anything to WikiLeaks; he was charged on December 4, 2009 and sentenced on May 24, 2010, the day the government was first learning about Lamo’s conversations with Manning
  • Stephen Jin-Woo Kim was indicted on August 19, 2010, around the time DOD first started trying to figure out what Manning allegedly sent to WikiLeaks; he is alleged to have leaked in June 2009
  • Manning was arrested on May 29, 2010 and will be formally charged this week for leaks allegedly starting in November 2009
  • Jeffrey Sterling was indicted on December 22, 2010, around the time the government was trying to pressure Manning into testifying about Assange; his leaks allegedly started in 2001
  • John Kiriakou was charged on January 23, 2012 for leaks dating back to 2007

All the non-WikiLeaks leaks allegedly took place before Manning’s. All were formally charged before Manning, and all but two men were arrested before Manning.

And yet Bill Keller, in a demonstration of his typical reporting skill though not Newtonian physics, suggests that WikiLeaks caused the crackdown on leaks.

Read more

Honorable Military Whistleblower: Why Daniel Davis Is and Bradley Manning Is Not

One of the hottest, and most important, stories of the last week has been that broken by Scott Shane in the New York Times, on February 5th, of Army Lt. Col. Daniel L. Davis’ stunning report on the unmitigated duplicity and disaster that characterizes the American war in Afghanistan. It painted the story of a man, Davis, committed to his country, to his service and to the truth but internally tortured by the futility and waste he saw in Afghanistan, and the deception of the American public and their Congressional representatives by the Pentagon and White House.

And then, late last month, Colonel Davis, 48, began an unusual one-man campaign of military truth-telling. He wrote two reports, one unclassified and the other classified, summarizing his observations on the candor gap with respect to Afghanistan. He briefed four members of Congress and a dozen staff members, spoke with a reporter for The New York Times, sent his reports to the Defense Department’s inspector general — and only then informed his chain of command that he had done so.

Concurrent with Shane’s NYT article, Davis himself published an essay overview of what he knew and saw in the Armed Forces Journal.

The one thing that was not released with either Shane or Davis’ article was the actual Davis report itself, at least the unclassified version thereof. The unclassified Davis report has now been published, in its entire original form, by Michael Hastings in Rolling Stone in The Afghanistan Report the Pentagon Doesn’t Want You to Read.

The report is every bit as detailed, factually supported and damning as the articles by Shane and Davis portrayed. It is a must, but disturbing, read. If the American people care about economic waste and efficacy and morality of their foreign military projection, both the Obama Administration and the Pentagon will be browbeat with the picture and moment of sunlight Daniel Davis has provided. Jim White has penned an excellent discussion of the details of the Davis report.

My instant point here, however, is how Davis conducted himself in bringing his sunlight, and blowing the whistle, on wrongful US governmental and military conduct. Davis appears to have attempted to carefully marshal his evidence, separated the classified from the unclassified, released only unclassified reportage himself and to the press, taken the classified reportage to appropriate members of Congress and the DOD Inspector General, and notified his chain of command. Davis insured that, while the classified information and facts were protected from inappropriate and reckless release, they could not be buried by leveraging his unclassified press publication. In short, Daniel Davis is the epitome of a true military whistleblower, both in fact, and Read more

On the Manning Art. 32, Court Secrecy & Nat. Sec. Cases

I somehow stumbled into an article for The Nation by Rainey Reitman entitled Access Blocked to Bradley Manning’s Hearing. To make a long story short, in a Twitter exchange today with Ms. Reitman and Kevin Gosztola of Firedoglake (who has done yeoman’s work covering the Manning hearing), I questioned some of the statements and inferences made in Ms. Reitman’s report. She challenged me to write on the subject, so here I am.

First, Ms. Reitman glibly offered to let me use her work as “foundation” to work off of. Quite frankly, not only was my point not originally to particularly go further; my point, in fact, was that her foundation was deeply and materially flawed.

Reitman starts off with this statement:

The WikiLeaks saga is centered on issues of government transparency and accountability, but the public is being strategically denied access to the Manning hearing, one of the most important court cases in our lifetime.

While the “WikiLeaks saga” is indeed centered on transparency and accountability for many of us, that simply is not the case in regard to the US Military prosecution of Pvt. Bradley Manning. The second you make that statement about the UCMJ criminal prosecution of Manning, you have stepped off the tracks of reality and credibility in court reportage and analysis. The scope of Manning’s Article 32 hearing was/is were the crimes detailed in the charging document committed and is there reason to believe Manning committed them. Additionally, in an Article 32 hearing, distinct from a civilian preliminary hearing, there is limited opportunity for personal mitigating information to be adduced in order to argue for the Investigating Officer to recommend non-judicial punishment as opposed to court martial trial. That is it. There is no concern or consideration of “transparency and accountability”, within the ambit suggested by Ms. Reitman, in the least.

Calling the Manning Article 32 hearing “one of the most important court cases in our lifetime” is far beyond hyperbole. First off, it is, for all the breathless hype, a relatively straight forward probable cause determination legally and, to the particular military court jurisdiction it is proceeding under, it is nothing more than that. The burden of proof is light, and the issues narrow and confined to that which is described above. The grand hopes, dreams and principles of the Manning and WikiLeaks acolytes simply do not fit into this equation no matter how much they may want them to. Frankly, it would be a great thing to get those issues aired in this country; but this military UCMJ proceeding is not, and will not be, the forum where that happens.

Moving on, Reitman raises the specter of “the death penalty” for Manning. While the death penalty remains a technical possibility under one of the charges, the prosecution has repeatedly stated it will not be sought and, after all the statements on the record in that regard, there is simply no reason to embellish otherwise. Reitman next states:

This case will show much about the United States’s tolerance for whistleblowers who show the country in an unflattering light.

No, it most certainly will not. In fact, the Manning criminal military prosecution has nothing whatsoever to do with “whistleblowers”. Despite the loose and wild eyed use of the term “whistleblower” in popular culture, not to mention by supporters of Bradley Manning, the concept Read more

Václav Havel: From the Prague Spring to the Velvet Revolution to the Year of the Protestor

We’re an empire now. And when we act, we create our own reality. –Senior Bush Advisor to Ron Suskind

 

It can be said, therefore, that ideology, as that instrument of internal communication which assures the power structure of inner cohesion is, in the post-totalitarian system, something that transcends the physical aspects of power, something that dominates it to a considerable degree, and therefore, tends to assure its continuity as well. It is one of the pillars of the system’s external stability. This pillar, however, is built on a very unstable foundation. It is built on lies. It works only as long as people are willing to live within the lie. –Václav Havel, “Power of the Powerless

In his essay, Power of the Powerless, Václav Havel described how citizens of “post-totalitarian” societies perform certain rituals–his central example was a green grocer putting the sign, “Workers of the World, Unite!” in his shop window every morning, but he saw the “dictatorship of consumption” to work similarly–to signify their adherence to the ideology on which power in the system rests. The system relies on (and rewards, with access to a comfortable livelihood) the universal performance of such rituals to sustain the ideology that gives the raw power behind the system some legitimacy. He argued that if people began to live within the truth–stopped putting up the sign every morning and paid the consequences in terms of lost benefits–it might expose the lie behind the myths people told themselves about their society.

But the moment someone breaks through in one place, when one person cries out, “the emperor is naked!”–when a single person breaks the rules of the game, thus exposing it as a game–everything suddenly appears in another light and the whole crust seems then to be made of a tissue on the point of tearing and disintegrating uncontrollably.

Read more

Operation Buckshot Yankee and WikiLeaks

Ellen Nakashima had a long article on Thursday using the 2008 thumb drive infection of DOD’s networks (including, she mentions in passing, the top-secret JWICS system) to describe the evolution of our approach to cybersecurity.

The whole thing is worth a close reading. But I’m particularly interested (as always) in reading it with WikiLeaks in mind. As Nakashima notes after describing the supposedly stringent response to the 2008 infection, which included “banning” thumb drives, Bradley Manning is suspected of downloading entire databases via the same means, removable media.

As the NSA worked to neutralize Agent.btz on its government computers, Strategic Command, which oversees deterrence strategy for nuclear weapons, space and cyberspace, raised the military’s information security threat level. A few weeks later, in November, an order went out banning the use of thumb drives across the Defense Department worldwide. It was the most controversial order of the operation.

Agent.btz had spread widely among military computers around the world, especially in Iraq and Afghanistan, creating the potential for major losses of intelligence. Yet the ban generated backlash among officers in the field, many of whom relied on the drives to download combat imagery or share after-action reports.

[snip]

The ban on thumb drives has been partially lifted because other security measures have been put in place.

Read more