Posts

One Year After Collateral Murder Release, DOD’s Networks Are Still Glaring Security Problem

As I have posted several times, the response to WikiLeaks has ignored one entity that bears some responsibility for the leaks: DOD’s IT.

Back in 2008, someone introduced malware to DOD’s computer systems. In response, DOD announced it would no longer allow the use of removable media in DOD networks. Yet that is precisely how Bradley Manning is reported to have gotten the databases allegedly leaked. In other words, had DOD had very basic security measures in place they had already been warned they needed, it would have been a lot harder for anyone to access and leak these documents.

Often, when I have raised this issue, people are simply incredulous that DOD’s classified network would be accessible to removable media (and would have remained so two years after malware was introduced via such means). But it’s even worse than that.

A little-noticed Senate Homeland Security hearing last month (Steven Aftergood is one of the few people who noticed) provided more details about the status of DOD’s networks when the leaks took place and what DOD and the rest of government have done since. The short version is this: for over two months after DOD arrested Bradley Manning for allegedly leaking a bunch of material by downloading information onto a Lady Gaga CD, DOD and the State Department did nothing. In August, only after WikiLeaks published the Afghan War Logs, they started to assess what had gone wrong. And their description of what went wrong reveals not only how exposed DOD was, but how exposed it remains.

Two months to respond

Bradley Manning was arrested on or before May 29. Yet in spite of claims he is alleged to have made in chat logs about downloading three major databases, neither DOD or State started responding to the leak until after the Afghan War Logs were published on July 25, 2010.

The joint testimony of DOD’s Chief Information Officer Teresa Takai and Principal Deputy Under Secretary for Intelligence Thomas Ferguson explains,

On August 12, 2010, immediately following the first release of documents, the Secretary of Defense commissioned two internal DoD studies. The first study, led by the Under Secretary of Defense for Intelligence (USD(I)), directed a review of DoD information security policy. The second study, led by the Joint Staff, focused on procedures for handling classified information in forward deployed areas.

In other words, “immediately” (as in, more than two weeks) after the publication of material that chat logs (published two months earlier) had clearly explained that Manning had allegedly downloaded via Lady Gaga CD months earlier, DOD commissioned two studies.

As State Department Under Secretary of Management Patrick Kennedy explained, their response was no quicker.

When DoD material was leaked in July 2010, we worked with DoD to identify any alleged State Department material that was in WikiLeaks’ possession.

It wasn’t until November–at around the time when NYT was telling State precisely what they were going to publish–that State started responding in earnest. At that time–over four months after chat logs showed Manning claiming to have downloaded 250,000 State cables–State moved its Net Centric Diplomacy database from SIPRNet (that is, the classified network) to JWICS (the Top Secret network).

DOD’s exposed IT networks

Now, frankly, State deserves almost none of the blame here. Kennedy’s testimony made it clear that, while the WikiLeaks leak has led State to enhance their limits on the use of removable media access, they have systems in place to track precisely who is accessing data where.

DOD won’t have that across their system for another year, at least.

There are three big problems with DOD’s information security. First, as the Takai/Ferguson testimony summarized,

Forward deployed units maintained an over-reliance on removable electronic storage media.

It explains further that to make sure people in the field can share information with coalition partners, they have to keep a certain number of computers accessible to removable media.

The most expedient remedy for the vulnerability that led to the WikiLeaks disclosure was to prevent the ability to remove large amounts of data from the classified network. This recommendation, forwarded in both the USD(I) and Joint Staff assessments, considered the operational impact of severely limiting users’ ability to move data from SIPRNet to other networks (such as coalition networks) or to weapons platforms. The impact was determined to be acceptable if a small number of computers retained the ability to write to removable media for operational reasons and under strict controls.

As they did in 2008 after malware was introduced via thumb drive, DOD has promised to shut off access to removable media (note, Ferguson testified thumb drives, but not CDs, have been shut down for “some time”). But 12% of the computers on SIPRNet will still be accessed by removable media, though they are in the process of implementing real-time Host Based Security System tracking of authorized and unauthorized attempts to save information on removable media for those computers.

In response to a very frustrated question from Senator Collins, Ferguson explained that DOD started implementing a Host Based Security System in 2008 (the year DOD got infected with malware). But at the time of the leak, just 40% of the systems in the continental US had that system in place; it was not implemented outside of the US, though. They weren’t implemented overseas, he explained, because a lot of the systems in the field “are cobbled together.”

In any case, HBSS software will be in place by June. (Tech folks: Does this means those computers are still vulnerable to malware introduced by removable media? What about unauthorized software uploads?)

Then there’s data access control. DOD says it can’t (won’t) password protect access to information because managing passwords to control the access of 500,000 people is too onerous for an agency with a budget larger than Australia’s gross national product. Frankly, that may well be a fair approach given the importance of sharing information.

But what is astounding is that DOD is only now implementing public key infrastructure that will, first of all, make it possible to track what people access and–some time after DOD collects that data–to start fine tuning what they can access.

DoD has begun to issue a Public Key Infrastructure (PKI)-based identity credential on a hardened smart card. This is very similar to the Common Access Card (CAC) we use on our unclassified network. We will complete issuing 500,000 cards to our SIPRNet users, along with card readers and software, by the end of 2012. This will provide very strong identification of the person accessing the network and requesting data. It will both deter bad behavior and require absolute identification of who is accessing data and managing that access.

In conjunction with this, all DoD organizations will configure their SIPRNet-based systems to use the PKI credentials to strongly authenticate end-users who are accessing information in the system. This provides the link between end users and the specific data they can access – not just network access. This should, based on our experience on the unclassified networks, be straightforward.

DoD’s goal is that by 2013, following completion of credential issuance, all SIPRNet users will log into their local computers with their SIPRNet PKI/smart card credential. This will mirror what we already do on the unclassified networks with CACs.

[Takai defines what they’re doing somewhat just before 88:00]

Note what this says: DOD is only now beginning to issue the kind of user-based access keys to protect its classified network that medium-sized private companies use. And unless I’m misunderstanding this, it means DOD is only now upgrading the security on its classified system to match what already exists on its unclassified system.

Let’s hope nothing happens between now and that day in 2013 when all this is done.

And this particular problem appears to exist beyond DOD. While the two DIA witnesses mostly blew smoke rather than provide a real sense of where security is at (both blamed WikiLeaks on a “bad apple” rather than shockingly bad information security), the testimony of DNI’s Intelligence Community Intelligence Sharing Executive Corin Stone seems to suggest other parts of the IC area also still implementing the kind of authentication most medium sized corporations employ.

To enable strong network authentication and ensure that networks and systems can authoritatively identify who is accessing classified information, the IC CIO is implementing user authentication technologies and is working with the IC elements to achieve certificate issuance to eligible IC personnel in the first quarter of fiscal year 2012.

So that’s the issue of removable media and individualized access tracking.

Which leaves one more big security hole. According to Takai/Ferguson, DOD didn’t–still didn’t, as of mid-March–have the resources in place to detect anomalous behavior on its networks.

Limited capability currently exists to detect and monitor anomalous behavior on classified computer networks.

This confirms something Manning said in chat logs: no one is following the activity occurring on our networks in Iraq (or anywhere else on SIPRNet, from the sounds of things), and flagging activities that might be an intrusion.

The part of the Takai/Ferguson testimony that details very hazy plans to think about maybe implementing such a system (pages 6-7) is worth a gander just for the number of acronyms of titles of people who are considering maybe what to implement some time in the future. It’s all a bunch of bureaucratic camouflage, IMO, to avoid saying clearly, “we haven’t got it and we haven’t yet figured out how we’re going to get it.” But here are the two most concrete descriptions of what the Department of Defense plans to do to make sure no one is fiddling in their classified networks. First, once they get HBSS completely installed, then they will install an NSA audit program on top of that.

One very promising capability is the Audit Extraction Module (AEM) developed by the National Security Agency (NSA). This software leverages already existing audit capabilities and reports to the network operators on selected audit events that indicate questionable behavior. A great advantage is that it can be integrated into the HBSS we have already installed on the network, and so deployment should be relatively inexpensive and timely. AEM is being integrated into HBSS now and will be operationally piloted this summer.

But in the very next paragraph, Takai/Ferguson admit there are better solutions out there. But DOD (again, with its budget larger than the GNP of most medium sized countries) can’t implement those options.

Commercial counterintelligence and law enforcement tools – mostly used by the intelligence community – are also being examined and will be a part of the overall DoD insider threat program. These tools provide much more capability than the AEM. However, while currently in use in some agencies, they are expensive to deploy and sustain even when used in small, homogeneous networks. Widespread deployment in DoD will be a challenge.

In other words, DOD wants to be the biggest part of the intelligence community. But it and its budget bigger than Brazil’s GNP won’t implement the kind of solutions the rest of the intelligence community use.

Department. Of. Defense.

Now, let me be clear: DOD’s embarrassingly bad information security does not, in any way, excuse Bradley Manning or the other “bad apples” we don’t know about from their oath to protect this information. (Note, there was also testimony that showed DOD’s policies on information sharing were not uniformly accessible, but that’s minor compared to these big vulnerabilities.)

But in a world with even minimal accountability, we’d be talking about fixing this yesterday, not in 2013 (five years, after all, after the malware intrusion). We’d have fired the people who let this vulnerability remain after the malware intrusion. We’d aspire to the best kind of security, rather than declaring helplessness because our very expensive DOD systems were kluged together. And we’d be grateful, to a degree, that this was exposed with as little reported damage as it has caused.

If this information is really classified for good reason, as all the hand-wringers claim, then we ought to be using at least the kind of information security implemented by the private sector a decade ago. But we’re not. And we don’t plan on doing so anytime in the near future.

DOD Considers Illegal Data Mining Part of Capital Crime

I’ve written two posts on the software that Bradley Manning is alleged to have loaded onto SIPRNet (here, here). Wired has now gotten a little more detail about what the software was: DOD says it was some kind of data mining software, though they won’t say of what kind. Wired goes on to suggest that presence of the software may make it easier for DOD to prove intent with Manning (though I rather suspect the idea is to prove collaboration with WikiLeaks personnel; furthermore, Wired’s tie of the data mining software to Manning’s alleged illegal access of the State cables has one problem–that he probably couldn’t access such things after he got demoted).

But the entire time I read the following passages, I couldn’t help but think of the illegal data mining DOD’s component, NSA, conducted on American citizens in 2004 even after Congress had specifically defunded such activities.

Accused WikiLeaks source Pfc. Bradley Manning installed and used unauthorized “data-mining software” on his SIPRnet workstation during the time he allegedly siphoned hundreds of thousands of documents off that classified network, the Army said Friday in response to inquiries from Threat Level.

Manning’s use of unauthorized software was the basis of two allegations filed against him this year in his pending court martial, but the charge sheet listing those allegations was silent on the nature of that software.

On Friday, an Army spokeswoman clarified the charges. “The allegations … refer to data-mining software,” spokeswoman Shaunteh Kelly wrote in an e-mail. “Identifying at this point the specific software program used may potentially compromise the ongoing criminal investigation.”

[snip]

If Manning installed data-mining software on his SIPRnet workstation, that could potentially strengthen the government’s case against the alleged leaker.

After all, Wired at least suggests data mining is proof of guilt. Yet the agency that may be crafting such arguments not only violated privacy laws for years, but continued to data mine Americans for months after Congress had specifically prohibited funding from being used for such things. And DOD now wants to prosecute the person it alleges engaged in such illegal data mining with a capital crime.

Maybe the whole thing would be more credible if our government hadn’t become such a criminal itself?

PJ Crowley Explains Why Manning’s Treatment Is Ridiculous, Counterproductive, and Stupid

PJ Crowley has a very important Guardian piece on why he said the treatment of Bradley Manning was ridiculous, counterproductive, and stupid. After explaining that Manning, if convicted, “should spend a long, long time in prison,” and then claiming that the overall narrative of the State Department cables shows a story of “rightdoing,” he describes how Manning’s treatment undermines our own strategic narrative.

But I understood why the question was asked. Private Manning’s family, joined by a number of human rights organisations, has questioned the extremely restrictive conditions he has experienced at the brig at Marine Corps base Quantico, Virginia. I focused on the fact that he was forced to sleep naked, which led to a circumstance where he stood naked for morning call.

Based on 30 years of government experience, if you have to explain why a guy is standing naked in the middle of a jail cell, you have a policy in need of urgent review. The Pentagon was quick to point out that no women were present when he did so, which is completely beside the point.

Our strategic narrative connects our policies to our interests, values and aspirations. While what we do, day in and day out, is broadly consistent with the universal principles we espouse, individual actions can become disconnected. Every once in a while, even a top-notch symphony strikes a discordant note. So it is in this instance.

The Pentagon has said that it is playing the Manning case by the book. The book tells us what actions we can take, but not always what we should do. Actions can be legal and still not smart. With the Manning case unfolding in a fishbowl-like environment, going strictly by the book is not good enough. Private Manning’s overly restrictive and even petty treatment undermines what is otherwise a strong legal and ethical position.

When the United States leads by example, we are not trying to win a popularity contest. Rather, we are pursuing our long-term strategic interest. The United States cannot expect others to meet international standards if we are seen as falling short. Read more

Frontline Ignores Most Embarrassing “Cause” of WikiLeaks Leak

Greg Mitchell has a preview of the Frontline piece on Bradley Manning today. He points out that the big “scoop” of the story–that Manning’s stepmother called the cops in 2006 after Bradley pulled out a knife during a family fight (but then immediately asked if his dad was okay).

The entire story seems to look to Manning’s psychology to explain his alleged leak of classified information.

Frontline says it will continue its report in May in a one-hour program which will, again, focus on Manning’s personal life and how this “led” to his alleged leak; and his new outbursts, this time in the Army (all reported elsewhere)–and how the Army still gave him access to top-secret documents.

[snip]

The overall tone of tonight’s report is sure to spark debate. Consider that MilitaryTimes opens its report today with this: “Could the global turmoil sparked by Wikileaks have started started with a son’s anger for his father?” NPR’s report is headlined: “Home Life Included a 911 Call.”

Such spin, in the absence of a larger examination of what “led to” the alleged leak, is irresponsible.

If Manning is found to have leaked the cables, he deserves the bulk of responsibility for the leak (though, as Mitchell points out, to explain it, it’d be well to look at his political views and, I’d add, the disclosure requirements for crimes like support for torture exposed in WikiLeaks as well).

But one entity that has thus far avoided all responsibility for the leak are the folks in charge of DOD’s IT. As I have pointed out, DOD’s network security was embarrassingly bad–worse than your average mid-sized corporation. But to make their negligent security even worse, they had already suffered a damaging compromise of their systems when, in 2008, malware was introduced into their system via removable media, the same means by which Manning is alleged to have downloaded the WikiLeaks cables.

Read more

Why Won’t Jeh Johnson Answer Hank Johnson’s Question about Forced Nudity?

The House Armed Services Committee is having a hearing on Law of War Detention. Much of it has focused on Jeh Johnson affirming that military commissions line up with American values. (In other words, it is fairly depressing.)

But an interesting exchange happened when Hank Johnson had his turn. He set up his question by talking about a recent trip to Gitmo. He described the good treatment he saw the detainees being subject to. Jeh Johnson said that we’re following the Geneva Conventions.

Then he said (working from memory), so why is Bradley Manning being subject to worse treatment.

Frankly, Hank Johnson got a few details incorrect (for example, he said that Manning had to wear shackles in his cell). But he went through Manning’s treatment reasonably well.

In response, Jeh Johnson reverted immediately to the importance of pretrial detention. He used the same old lie about Manning being able to talk to others in his cell block. Here’s a rough liveblog:

not in solitary confinement. Public misinformation. It is public that he is currently in classification status called Maximum security. Someone in Max occupies same type of cell that a medium security pretrial detainee. Same time of cell. You could have Max security and medium confinee in the same row of cells and they could converse with one another.

(That would be true if anyone was in a cell close enough to him to be able to talk to, but there isn’t.)

But perhaps most tellingly, Jeh Johnson didn’t address Hank Johnson’s question about the forced nudity Manning is being subject to.

Ultimately, Buck McKeon cut off Hank Johnson, saying that Jeh Johnson could answer him “off the record.” (?) I hope he meant for the record; we shall see.)

But for now, at least, it appears that Jeh Johnson really doesn’t want to talk about why Manning is being subject to a policy implemented–and then rejected–at Gitmo.

Dylan Ratigan, Law Professors and I All Agree: Obama Needs to Explain or End Manning’s Treatment

On Friday, Dylan Ratigan and I had a podcast chat about the treatment of Bradley Manning. Among other things, we talked about the “Constitutional Law Professor” President’s rather bizarre response when DOD told him it was standard procedure to strip an Army man of his clothes because of a trumped up claim that his underwear was a terrible threat to him.

DYLAN: And what does that say to you about our President that he endorses such a ridiculous point of view?

MARCY: I mean for starters it says he’s giving the military way too much leeway. They said, “Well, this is standard operating procedure.” And as I pointed out today in my blog, what they’re doing to Manning, the forced nudity, goes right back to Gitmo and goes right back to the treatment they used with Abu Zubaydah. So him giving — he came in to office and on day 2 said, “We’re going to close Gitmo. We’re going to end these abusive techniques,” and yet when DOD came to him and said, well, you know, it’s all standard procedure to take away a man’s underwear. The President just said, “Oh, okay.”

That’s one of the things a bunch of (real, active) law professors had to say in their letter calling on Obama to explain or end the treatment of Bradley Manning.

The Administration has provided no evidence that Manning’s treatment reflects a concern for his own safety or that of other inmates. Unless and until it does so, there is only one reasonable inference: this pattern of degrading treatment aims either to deter future whistleblowers, or to force Manning to implicate Wikileaks founder Julian Assange in a conspiracy, or both.

If Manning is guilty of a crime, let him be tried, convicted, and punished according to law. But his treatment must be consistent with the Constitution and the Bill of Rights. There is no excuse for his degrading and inhumane pre-trial punishment. As the State Department’s PJ Crowly put it recently, they are “counterproductive and stupid.” And yet Crowley has now been forced to resign for speaking the plain truth.

The Wikileaks disclosures have touched every corner of the world. Now the whole world watches America and observes what it does; not what it says.

President Obama was once a professor of constitutional law, and entered the national stage as an eloquent moral leader. The question now, however, is whether his conduct as Commander in Chief meets fundamental standards of decency. He should not merely assert that Manning’s confinement is “appropriate and meet[s] our basic standards,” as he did recently. He should require the Pentagon publicly to document the grounds for its extraordinary actions –and immediately end those which cannot withstand the light of day.

Obama cannot be a leader on human rights by refusing to challenge a military that, for years, used forced nudity like they’re using with Manning as part of systemic abuse of alleged terrorists.

But that’s what he has been doing.

DOD Gives Manning Caveman Gown, Says They’re Not Humiliating Him

With all the attention focused on Bradley Manning’s treatment yesterday because of PJ Crowley’s ouster, DOD has done a lot of pushback on the notion that taking away Manning’s underwear is “ridiculous, counterproductive, and stupid.”

The pushback has been so effective that a number of journalists have reported that Quantico no longer takes Manning’s underwear away.

So let’s be clear: Quantico is still taking Manning’s underwear away. But they have now given him a gown to wear.

Josh Gerstein did some actual reporting on these gowns. The more elaborate version is made of two layers of backpack grade cordura nylon.

[Ferguson Safety Products founder Lana] Speer said her company’s smocks are made out of a “backpack-type material that was the strongest stuff we could find that could be washed.” She was also blunt about the items being far from fashionable.

“It’s stupid looking,” Speer said.

No offense to Speer (whose concerns deal with genuinely suicidal people), but the picture Ferguson uses to advertise the smocks–with the caveman looking models–doesn’t help make them look any less stupid.

While it’s unclear whether Quantico is using this particular gown or not, one thing is clear: what Manning is forced to wear is not comfortable. Here’s how he described it.

After apparent outside pressure on the Brig due to my mistreatment, I was given a suicide prevention article of clothing called a “smock” by the guards. Although I am still required to strip naked in my cell at night, I am now given the “smock” to wear. At first, I did not want to wear this item of clothing due to how coarse it was and how uncomfortable it felt. However, the Brig now orders me to wear the “smock” at night.

So for those who have gotten confused by DOD’s pushback: they are still taking away Manning’s very dangerous boxers at night (though they allow him to wear such dangerous items during the day). And then, in a bid to pretend they’re not trying to drive Manning crazy, they basically make him sleep in an uncomfortable duffel bag-like garment.

Crowley: “The Impact … for Which I Take Full Responsibility”?

While a number of media outlets have reported one line–“The exercise of power in today’s challenging times and relentless media environment must be prudent and consistent with our laws and values”–from PJ Crowley’s resignation statement, I wanted to remark on a few things in the larger statement.

The unauthorized disclosure of classified information is a serious crime under U.S. law. My recent comments regarding the conditions of the pre-trial detention of Private First Class Bradley Manning were intended to highlight the broader, even strategic impact of discreet actions undertaken by national security agencies every day and their impact on our global standing and leadership. The exercise of power in today’s challenging times and relentless media environment must be prudent and consistent with our laws and values.

Given the impact of my remarks, for which I take full responsibility, I have submitted my resignation as Assistant Secretary for Public Affairs and Spokesman for the Department of State.

I am enormously grateful to President Obama and Secretary Clinton for the high honor of once again serving the American people. I leave with great admiration and affection for my State colleagues, who promote our national interest both on the front lines and in the quiet corners of the world. It was a privilege to help communicate their many and vital contributions to our national security. And I leave with deep respect for the journalists who report on foreign policy and global developments every day, in many cases under dangerous conditions and subject to serious threats. Their efforts help make governments more responsible, accountable and transparent. [my emphasis]

Note, first of all, the sentence, “Given the impact of my remarks, for which I take full responsibility.” That has been interpreted as a reaffirmation of Crowley’s statement that DOD’s treatment of Manning is “ridiculous, counterproductive, and stupid.” But there’s actually some ambiguity to the statement: the antecedent of “for which” could be “remarks,” as has been interpreted, but it also could be “impact.” Given that Crowley has spent years crafting public statements in which any ambiguity would lead to international incident, I suspect the ambiguity, in a written statement issued during a time of heightened attention, is intentional.

If so, this is Crowley making it clear he intended all this to blow up (remember, too, the participants in the MIT session at which Crowley first made his remarks double checked that his statements were on the record before they posted them).

And he tells us that his intent was to raise attention to the impact that certain actions of our national security agencies have on our international standing.

While I hope Crowley has an opportunity to explain precisely which actions he had in mind–aside from Manning’s treatment, of course–I wanted to point to a CAP paper Crowley wrote in 2008, linked by Rortybomb. The paper as a whole is a sound strategy for counter-terrorism (I’m particularly fond of Crowley’s focus on building resilience at home). As Rortybomb points out, Crowley argues that part of the fight against terrorism must be about remaining on the right side of history.

Most of the world now believes, fairly or not, that America is on the wrong side of history. While the Bush administration acknowledged the vital importance of winning hearts and minds in its revised 2006 counterterrorism strategy, too often since 2001, U.S. policies have neither matched our values, nor what we preach to the rest of the world. We are perceived, accurately or not, as operating secret and illegal prisons, condoning torture, denying legal rights, propping up autocratic regimes, and subverting fair elections.

Read more

DOD Continues to Stall on Kucinich’s Request to Visit Bradley Manning

Last we heard of Dennis Kucinich’s request to visit Bradley Manning, the Pentagon had spent a full month referring his request from one official to another rather than respond to his request.

On February 4, Dennis Kucinich asked DOD to allow him to visit Bradley Manning so he could assess his conditions of confinement. On February 8, Robert Gates wrote Kucinich a short note telling him we was referring his request to Secretary of the Army, John McHugh. In a letter dated February 24–but apparently not received in Kucinich’s office until March 1–McHugh told Kucinich he was referring his request to the Assistant Secretary of Defense for Legislative Affairs.

In short, a full month after the date when a member of Congress requested a visit with Manning, DOD is still stalling on a real response with bureaucratic buck-passing.

On Friday, Anti-War Radio’s Scott Horton did an interview with Kucinich. Here’s an update on his quest to visit an American citizen detained less than an hour from Kucinich’s congressional office.

That’s right. I put in a request to the Secretary of Defense who referred me to the Secretary of the Army who referred me to the Secretary of Navy who referred me to the Secretary of Defense and still not an answer on whether or not I can visit.

Kucinich goes on to note he’s a member of the Oversight Committee and that under the Constitution DOD ought to be subject to some accountability.

If these reports keep coming out and they do not permit third parties to come in and make an assessment, I don’t think we can take their word for it. We just can’t.

Obama says DOD has assured him everything they’re doing to Manning is standard. If so, then why are they fighting so hard to prevent a member of Congress from visiting him?

The Brothers Daley Cover Up Abuse of Suspects Again

You may have noticed I snuck away for the weekend. Mr. EW and I decided to take the opportunity of Athenae’s book party to head to Chicago for a weekend. In spite of the fact that Athenae’s book was obviously timed to St. Paddy’s Day, in spite of the fact that I’ve been to Chicago for St. Paddy’s Day before, I somehow forgot there’d be thousands of drunk fake Irishmen in the streets from dawn to dusk.

Gaping at the green river is about as close as my Irish husband wanted to get to one of the legendary St. Patrick’s Day celebrations on earth. (He’s just jealous because Dublin’s celebration sucks shamrock by comparison.)

But I wasn’t entirely ignoring current events. One of the women in my hotel, up from Indiana for the weekend, told me she came up to see “our Mayor Daley” in the parade. “For the last time,” I thought, as I realized how this holiday is a bit of a send-off to the Mayor.

And so I was already thinking about the Daley empire when I read of brother Bill’s reasoned reflection before he determined State Department spokesperson PJ Crowley had to go.

While some White House officials knew of Crowley’s comments, White House chief of staff Bill Daley learned of them when ABC News asked that question of the president. Daley told White House officials of Crowley, “he’s done.”

Another Daley covers up abuse of suspects, I thought.

I was thinking of Richard M’s role in covering up the torture committed by Jon Burge and other Chicago cops.

Last Wednesday, IL Governor Pat Quinn signed a law outlawing the death penalty in Illinois. Next Wednesday, former Chicago Police Commander Jon Burge reports for a four and a half year prison sentence for lying about torturing one suspect–though credible evidence suggests he tortured at least 50 and possibly as many as 200 police suspects. Those are the latest chapters in the long exposure of the systematic torture of black suspects by Burge’s South Chicago detective team, and the wrongful conviction of many of those suspects based on tortured confessions.

And Richard M is in the middle of the scandal, largely because as Cook County’s State’s Attorney he pawned off evidence of torture rather than investigate and prosecute.

Daley was Cook County’s state’s attorney for seven years during the 1980s, and his office approved at least 55 felony murder charges against black males who claim they confessed only after they were beaten, suffocated, burned and electro-shocked by Burge and his detectives.”Many of our men, or sons, fathers, brothers are behind bars for crimes they did not commit,” said one demonstrator Friday.

As demonstrators protested outside City Hall, the mayor attempted to explain this 1982 letter from then-police superintendent Richard Brzeczek expressing concern about torture allegations to then state’s attorney Daley. The mayor said he read it and referred it to subordinates believing the police department had the ultimate responsibility to investigate office misconduct.

“It’s up to the Chicago Police Department. That responsibility lies within them,” Daley said.

“What did Daley do about it? Absolutely nothing. And what does the report say about that? Nothing,” Read more