November 26, 2025 / by 

 

Michael Mukasey Doubles Down on the Sophism

The most interesting aspect of Michael Mukasey’s retort to John McCain’s op-ed calling him a liar is not the content–that’s the same old trite sophism–but rather the publication details of it.

It appears not under Mukasey’s byline, but under Dick Cheney’s speech-writer’s byline, complete with a picture. And when he introduces Mukasey’s words, Marc Thiessen doesn’t use any of those trappings of grammar or publication we normally use to indicate direct quotations from others, like quotation marks or a blockquote. Rather, Thiessen just says “here is his statement:” and then launches right into “Senator McCain described as “false” my statement that Khalid Sheikh Mohammed broke under harsh interrogation…”

The seamlessness between Thiessen and Mukasey speaking in the first person all has the wonderful effect of emphasizing that Mukasey’s original statement was simply another product of Dick Cheney’s torture apologist PR campaign. In a bid to salvage the moral capitulations Mukasey made to become Attorney General, he now speaks in the voice of Dick Cheney’s flack.

And note the rather incredible ethical lapse here? McCain’s op-ed, remember, was published in the WaPo, the same paper Mukasey–I mean Thiessen’s–response is in. At current count, McCain’s op-ed has 778 Tweets and 5837 recommendations–22 times as many recommendations as Thiessen’s own op-ed on torture published two days earlier. [Update: And Greg Sargent did a post on McCain’s Senate speech, which itself has 6661 recommends at this point.] Whether McCain’s op-ed made Fred Hiatt vomit or not, it has brought the WaPo a great deal of traffic and attention, precisely what newspapers generally like to do with their op-ed pages. Generate controversy, influence debate, get traffic.

But Thiessen didn’t link McCain’s op-ed! He prevented the WaPo from enjoying the stickiness that a heated debate conducted within its own pages can give.

Of course, he also made it a lot more difficult for his–um, I mean Mukasey’s–readers to compare Mukasey’s rebuttal with McCain’s own op-ed. Thiessen–um, I mean Mukasey–must hope that readers don’t see that McCain’s claim had everything to do with whether torturing Khalid Sheikh Mohammed led to Osama bin Laden, whereas Thiessen’s–um, I mean Mukasey’s rebuttal–clings to KSM’s use of a nickname that the US already knew. Or maybe Thiessen–um, I mean Mukasey–didn’t want his readers to know that KSM lied under torture and actually hindered the hunt for OBL, even after Thiessen’s–um, I mean Mukasey’s–cherished torture was used.

Or maybe Thiessen–um, I mean Mukasey–is hiding the much more powerful argument McCain made (which, as Amy Davidson lays out, was unfortunately diminished by McCain’s call for no prosecutions), in which McCain talks about the moral imperative not to torture.

As we debate how the United States can best influence the course of the Arab Spring, can’t we all agree that the most obvious thing we can do is stand as an example of a nation that holds an individual’s human rights as superior to the will of the majority or the wishes of government? Individuals might forfeit their life as punishment for breaking laws, but even then, as recognized in our Constitution’s prohibition of cruel and unusual punishment, they are still entitled to respect for their basic human dignity, even if they have denied that respect to others.

All of these arguments have the force of right, but they are beside the most important point. Ultimately, this is more than a utilitarian debate. This is a moral debate. It is about who we are.

You see, this is all about Thiessen–um, I mean Mukasey–engaging in another round of sophism, of setting facts loose in a haze of illogical statements to confuse readers. To allow readers to see a clear assertion that torture violates America’s claims to moral standing might clarify what Thiessen and those he speaks for are trying so desperately to muddle.


Yemen’s Head of Al Qaeda Scrambles to Make Anwar al-Awlaki Al Qaeda’s #3

It’s now a perennial joke. Every time we kill the next Number Three in al Qaeda, we joke about how no one wants to take that guy’s place.

Which was my first impression when I read this bit from ProPublica’s review of what the intelligence from Osama bin Laden’s compound has thus far revealed.

Bin Laden also managed to retain authority over al Qaeda’s affiliates in Yemen, North Africa and Iraq, the U.S. official said.

“It was not the same degree of detailed involvement, but he played a huge role in leadership,” the U.S. official said.

[snip]

Intelligence gathered months before the raid revealed a tell-tale exchange with the al Qaeda leader in Yemen. The leader, a Yemeni, wrote to bin Laden with a surprising proposal: He suggested that he step down as chief of the affiliate in favor of Anwar al-Awlaki, a Yemeni-American ideologue. Awlaki’s influence has been revealed in a string of recent plots against the U.S., including the attempted Christmas bombing on a Detroit-bound flight in 2009.

The leader explained that naming Awlaki as his replacement would be a propaganda coup. It would take advantage of the cleric’s popularity among Westerners, especially Americans, and have a strong impact on recruitment, according to the counterterror official.

The leader in Pakistan rejected the proposal, however, according to the official. “Bin laden’s message was essentially, I know you. I trust you. Let’s keep things the way they are.” [my emphasis]

Note, though, that this intelligence didn’t come from the raid, though it appears to have been leaked by the same “US official” (who is not a counterterrorism official) leaking the findings of the raid.

The report is interesting for a number of reasons.

First, because, aside from the raid, where were we getting intelligence on OBL’s reported letter-based exchanges? Where were we getting both sides of written exchanges between Yemen and OBL “months before the raid”?

Then there’s this bit, from a “senior intelligence official” who rolled out the OBL home movies last week. After being asked, for a second time, whether the cache at OBL’s compound revealed anything about al-Awlaki, he made what I assume to be a very odd misstatement–or a remarkable truth.

Q: And is Awlaki a possible successor as part of that?

SR. INTEL OFFICIAL: I think we addressed Awlaki before, but–

(Cross talk.)

Q: — to bin Laden? Is that shown in the records?

SR. INTEL OFFICIAL: I can’t say specifically at this point whether that’s in the records, per se, or in the documents, but, you know, it would be highly unsurprising if bin Laden didn’t know about Anwar al-Awlaki.

Let’s unpack the grammar of this, the official transcript: It would be highly unsurprising (meaning, it would not be surprising, meaning it would be likely) if bin Laden didn’t (that’s “did not”) know about Anwar al-Awlaki. It would be likely that bin Laden did not know about al-Awlaki.

That can’t be right. That can’t be what the SIO meant to say. Obviously, OBL at least knew about al-Awlaki. I mean, we saw him watching the tellie, right? Al-Awlaki’s all over the tellie.

But of course, the ProPublica exchange, from intelligence collected months before the raid and offered in support of the assertion that “Bin Laden also managed to retain authority over al Qaeda’s affiliates in Yemen but without “the same degree of detailed involvement” shows that OBL doesn’t care all that much–or doesn’t trust–Anwar al-Awlaki. Indeed, elsewhere the ProPublica report describes OBL’s criticism of Inspire magazine, produced by an American in Yemen. That is, OBL made what ProPublica rightly suggests are rather incredible complaints about a magazine that filled the same niche al-Awlaki does: popularized outreach to English speakers.

It seems like OBL doesn’t care that much for the Americans waging jihad, in English, in Yemen.

All of which brings us to the reason so many journalists are asking these questions about al-Awlaki.

You know, the drone strike targeting an American citizen? The drone strike launched just days after OBL’s death, which led a lot of people to believe it was a direct response to something we found in OBL’s compound? The drone strike on a guy that this US official at least suggests OBL doesn’t trust all that much?

That drone strike?

But then there’s the final implication of all this. People within al Qaeda are feeding into the notoriety we’re according al-Awlaki for trying to bomb him so much. The insiders appear to not trust him. But they recognize that he’s a great figure for propaganda.

At least partly because we made him one.

There’s something very hinky with the intelligence on al-Awlaki we found–or didn’t find–in OBL’s compound. Charitably, this “US official” who spoke to ProPublica might just be feinting, discussing outdated information to lead al-Awlaki to let his guard down (though if that’s true, shouldn’t we assume everything else he said is propaganda, too?). More likely, he’s answering the umpteenth question about any ties between intelligence we found at OBL’s compound and our attempt to assassinate al-Awlaki last week, with no due process.

And the best explanation he can offer is months old intelligence, showing that OBL doesn’t trust al-Awlaki.


Corporate Fairy Tales in Afghanistan

It’s a corporate fairy tale: working class boy joins the military, goes into banking, brings the joys of mineral exploitation to exotic locales.

From Congo to Colombia, from Iraq to Sierra Leone, [Ian] Hannam [the JP Morgan banker overseeing the development of a gold mine in Afghanistan] and his small team of soldiers-turned-bankers and advisers did business with oligarchs, gem dealers, and former mercenaries. He could be bracingly direct. When he landed in Baghdad for a meeting with Iraq’s oil minister, the minister asked, “What are you here for?”

“I’m here to make five new Iraqi billionaires every year for the next 10 years,” Hannam said with a twinkle in his eyes.

And it ends, I guess, as corporate fairy tales do: with the mineral riches finally being liberated from the oppressive soil.

But at least someone will have begun releasing the wealth trapped in Afghanistan’s stones.

It’s all the bits in between that raise eyebrows about the viability of our little project in Afghanistan and the structure of our empire. While the story focuses on Hannam, the JP Morgan banker, it’s as much a story about General Petraeus.

Then, in 2009, mining in Afghanistan got the push it needed — from the U.S. military. Petraeus had been appointed commander of U.S. Central Command, which had ultimate authority over Afghanistan. He realized that a U.S. exit from Afghanistan depended on getting the country’s economy running.

[snip]

Realizing that conventional foreign-aid organizations weren’t getting the job done, Petraeus moved a crack economic stabilization team from Iraq into Afghanistan. That team quickly realized that mining would be key.

And Deputy Under Secretary for Defense Paul Brinkley.

Hannam was at the banquet hall for a reception thrown by the Trade Bank of Iraq to honor J.P. Morgan. Also at the reception was Paul Brinkley, a deputy under secretary of defense charged with jump-starting Iraq’s stalled economy. A former tech company executive, Brinkley served as a matchmaker of sorts between Iraqi entrepreneurs and foreign businessmen. With the blessing of Defense Secretary Robert Gates, he operated outside normal bureaucratic channels, eschewing the bulletproof vests and helmets his civilian colleagues wore in combat zones. In three years he had secured some $8 billion in private investment contracts for Iraq, helping start textile mills, cement factories, and electronics companies. Hannam and Brinkley had heard about each other’s work. J.P. Morgan had been one of the first Western companies to plant the flag in Iraq, overseeing the country’s currency and setting up a big oil project in Iraqi Kurdistan. Hannam and Brinkley fell into conversation about Afghanistan, which was to be Brinkley’s next posting.

These men, of course, were prominently seen last June pushing James Risen to report a breathless story on Afghanistan’s $1 trillion mineral riches the night before Petraeus would testify to Congress.

[Risen] explained that he based his report on the work of a Pentagon team led by Paul Brinkley, a deputy undersecretary of defense charged with rebuilding the Afghan economy. Using geological data from the Soviet era and USGS surveys conducted in 2006, Brinkley dispatched teams to Afghanistan last year to search for minerals on the ground. The data they’ve come back with, combined with internal Pentagon assessments that value the deposits at more than $900 billion, constitute news, according to Risen. (Those surveys are still under way, according to a briefing Brinkley gave yesterday.)

[snip]

So was the story a Pentagon plant, designed to show the American public a shiny metallic light at the end of the long tunnel that is the Afghan war, as skeptics allege? Risen said he heard about the Pentagon’s efforts from Milt Bearden, a retired CIA officer who was active in Afghanistan in the 1980s. The men co-authored a book, “The Main Enemy,” in 2003, and Bearden is now a consultant working with Brinkley’s survey team.

“Several months ago, Milt started telling me about what they were finding,” Risen said. “At the beginning of the year, I said I wanted to do a story on it.” At first both Bearden and Brinkley resisted, Risen said, but he eventually wore them down. “Milt convinced Brinkley to talk to me,” he said, “and Brinkley convinced other Pentagon officials to go on the record. I think Milt realized that things were going so badly in Afghanistan that people would be willing to talk about this.” In other words, according to Risen, he wasn’t handed the story in a calculated leak. Calls and emails to Brinkley and to Eric Clark, a Pentagon public relations contractor who works with him, were not immediately returned.

All of which makes you wonder about the provenance of this story…

And of course, in addition to Hannam, Petraeus, and Brinkley, there is JP Morgan itself, which seems to be investing a lot of time in a project they don’t expect to be profitable and won’t put their own money into.

In late September, J.P. Morgan CEO Jamie Dimon, Brinkley, and Mining Minister Wahidullah Shahrani met at J.P. Morgan’s headquarters in Manhattan. Dimon pledged J.P. Morgan’s support. On the way down in the elevator, Dimon told Shahrani, “You’re in good hands with Ian. He’s eccentric, but he gets things done.”But soon Brinkley’s team was wondering. On the day the deal signing was to take place, Hannam’s team stopped acting like former warriors and began behaving like, well, nervous investment bankers. Hannam, after talking about how rich he was going to make his clients, suddenly began to complain that there was no way to make a profit. The 26% royalty rate for the mine, his team claimed, was way too high. Mining Minister Shahrani was bewildered — the rate had been agreed upon years before, when the Naderi family had first bid for the mine. Nothing had changed.

Brinkley’s Pentagon team was deeply frustrated. They felt the bankers had pulled a fast one. Had Hannam’s group not done its homework? Or were they just being bankers, trying to squeeze more money out of the deal with some 11th-hour brinkmanship?

Brinkley lit into the J.P. Morgan group: “When are you going to get this done? You’ve told people you’re going to do it!” The bankers, in turn, felt they were being unfairly pressured by the government, which seemed desperate to get the deal done even if it was uneconomical.

[snip]

J.P. Morgan says it isn’t putting any of its own money into the project. Hannam secured $40 million from investors in the U.S., Asia, and Europe. They included Enso Capital founder Joshua Fink, son of BlackRock’s Larry Fink; British mining titan Peter Hambro; and Thai businessman Pairoj Piempongsant. Hannam created an investment vehicle, Central Asian Resources, to enter into a joint venture with Naderi’s new mining company, Afghan Gold.

Which in turn makes you wonder about the off-and-on relationship between the President and Jamie Dimon, particularly in the months leading up to JP Morgan playing hardball on the gold mine in Afghanistan. Have there been other considerations involved in the government’s relationship with JP Morgan? When Dimon boasts about JP Morgan being a good bank–in spite of the fact that they practice some of the same reprehensible policies as their rivals–is he saying something more?

Mind you, it’s not that Petraeus is wrong: Afghanistan needs something besides poppies if it’s ever going to become a viable nation-state.

I’d just like a bit more transparency about the public-private endeavors our government builds to make that happen. And I’d like a lot more information about all the favors being exchanged to make that happen.


Two Themes from Obama’s Cybersecurity Proposal: Private Auditors and Immunity

Two and a half years after privatized auditors largely signed off on practices that contributed to the collapse of Wall Street, and a year after coziness between government inspectors and the oil industry they regulate allowed a massive oil spill in the gulf, the Obama Administration proposes relying on private auditors to ensure that private companies guard our nation’s cybersecurity.

That’s one of two troubling aspects of the fact sheet the Administration just released, summarizing proposed legislation on cybersecurity it just sent to Congress.

At issue is who investigates the adequacy of a private companies’ cybersecurity plan to both certify it is adequate and ensure compliance with it. The answer? Auditors paid by the private companies.

The Administration proposal requires DHS to work with industry to identify the core critical-infrastructure operators and to prioritize the most important cyber threats and vulnerabilities for those operators. Critical infrastructure operators would develop their own frameworks for addressing cyber threats. Then, each critical-infrastructure operator would have a third-party, commercial auditor assess its cybersecurity risk mitigation plans. Operators who are already required to report to the Security and Exchange Commission would also have to certify that their plans are sufficient. A summary of the plan would be accessible, in order to facilitate transparency and to ensure that the plan is adequate. In the event that the process fails to produce strong frameworks, DHS, working with the National Institute of Standards and Technology, could modify a framework. DHS can also work with firms to help them shore up plans that are deemed insufficient by commercial auditors.

While the promise to make these plans transparent is all well and good, the problem remains that private companies and the auditors they pay get to decide what is sufficient, not someone without a financial stake in the outcome. If government inspectors are important enough for safety issues, shouldn’t they be required for the cyberinfrastructure that is so critical to our safety?

In addition, a big part of this plan may give up one of the sticks the government has to ensure compliance.

One of the reasons why private companies don’t like to reveal when they’ve been hacked is liability issues: not only might their customers respond badly, but in some fields (like finance companies) the companies may face other liability issues.

But the fact sheet offers companies immunity, at the least, for any private data it shares with the government when it reveals it has been hacked.

Voluntary Information Sharing with Industry, States, and Local Government. Businesses, states, and local governments sometimes identify new types of computer viruses or other cyber threats or incidents, but they are uncertain about whether they can share this information with the Federal Government. The Administration proposal makes clear that these entities can share information about cyber threats or incidents with DHS. To fully address these entities’ concerns, it provides them with immunity when sharing cybersecurity information with DHS. At the same time, the proposal mandates robust privacy oversight to ensure that the voluntarily shared information does not impinge on individual privacy and civil liberties.

The fact sheet doesn’t describe the extent of the immunity, and the plan does, at least, make immunity contingent upon privacy protections.

  • When a private-sector business, state, or local government wants to share information with DHS, it must first make reasonable efforts to remove identifying information unrelated to cybersecurity threats.

[snip]

  • Immunity for the private-sector business, state, or local government is conditioned on its compliance with the requirements of the proposal.

But I wonder about the breadth of this immunity. Does it also offer companies immunity for negligence in the handling of consumer data?

One thing that Al Franken, among others, is pushing, is making it easier for consumers to expect a certain level of protection for their data. Thus, if Sony has two-year-old consumer data sitting around in an unsecure server, it would bear some liability if a hacker came and access that data. Such measures would effectively expose companies to lawsuit if they totally blew off their customers’ data security.

Now at least this proposal mandates that companies tell consumers when their data has been accessed (though I always worry when federal legislation claims to simplify state legislation–it’s often code for “water down”).

National Data Breach Reporting. State laws have helped consumers protect themselves against identity theft while also incentivizing businesses to have better cybersecurity, thus helping to stem the tide of identity theft. These laws require businesses that have suffered an intrusion to notify consumers if the intruder had access to the consumers’ personal information. The Administration proposal helps businesses by simplifying and standardizing the existing patchwork of 47 state laws that contain these requirements.

But it’s not clear whether companies would bear any liability for such breaches if and when they alert consumers. Moreover, this says nothing about other public disclosure on breaches, which consumers may have as big an interest in (for example, investors ought to be able to know if banks and other major investors routinely get hacked, and stock holders ought to be able to know if critical proprietary information has been stolen).

Call me crazy, but my hackles start to rise when the government starts granting immunity willy nilly, with almost nothing demanded in exchange.

Update: Kashmir Hill offers one example why a national “simplified” law might be a problem–because it’ll eliminate elements like mandatory identity theft protection and penalties from the most stringent law, in MA.

As for telling customers about their data being breached, the White House says it will “help businesses” by simplifying and standardizing the “existing patchwork of 47 state laws” that have various requirements about how soon to notify customers. In the fact sheet, at least, there’s no mention of penalties for businesses, nor mandatory provision of identity theft monitoring after a breach — two aspects of the harshest data breach law currently in the country, in Massachusetts.


Government Claims Classified Information Procedures Act Also Applies to Unclassified Information

The government’s making outrageous secrecy claims again, this time in the Thomas Drake NSA leak case.

As Steven Aftergood first reported, the government is trying to protect unclassified information using the CIPA process, basically making substitutions for information that its own expert says is not classified. They’re doing this by citing the National Security Agency Act, which protects National Security Agency information in civil cases; for precedent, they’re citing a bunch of civil cases, primarily FOIA. In other words, they’re trying to use civil standards to gain an advantage in a criminal case, using a tool the name of which–Classified Information Procedures Act–makes clear that it applies only to classified information.

Just as interesting as yet another example of the government abusing legal process to try to expand government secrecy is what appears to be their goal.

The defense explains that the government dumped this claim on the defense after the preliminary CIPA discussion happened, basically just informing the defense it would provide substitutions for unclassified information by actually proposing substitutions.

Of the government’s proposed substitutions, roughly a quarter of it substituted unclassified information.

Among the objections noted by the defense was the fact that the government had proposed a significant number of substitutions or redactions for unclassified information, a measure that CIPA does not permit or contemplate. This included information in the government’s own exhibit binder that its classification expert has deemed unclassified. The defense estimated that approximately 25% of the proposed substitutions were for unclassified information.

And it appears that the government is trying to obscure unclassified information in five documents that–the indictment alleges–Drake improperly retained.

The proposals included substitutions/redactions for unclassified information in the five allegedly classified documents charged in the willful retention counts.

The indictment describes those five documents this way:

  • A classified email entited “What a Success”
  • A two-page classified document deemed “the Regular Meetings” document
  • A four-page document “bearing the features of an email” titled “Volume is our Friend”
  • A three-page titled “Trial and Testing”
  • A five-page email titled “the Collections Sites”

Now, the fact that the government is trying to substitute information for unclassified information from these five documents is crucial to the way the other charges piggyback on the charges relating to each of these documents. In addition to four false statement charges and one obstruction charge that hinge on Drake’s claims about whether the information he took was classified, one of the false statement charges pertains to Drake’s claim that he only cut and paste unclassified information into a Word document.

As the defense notes (complaining that they had to reveal their defense strategy during the CIPA substitution hearings), they intend to cross-examine the government’s expert about whether this stuff is really classified.

During the four-day substitution  hearing, the defense continually noted its objection to the substitution of unclassified information considered “protected material” by the government. When asked by the Court to respond to the proposed substitutions, the defense was required to reveal its strategy, particularly as it relates to the cross-examination of the government’s expert, Ms. Murray. This, too, significantly prejudiced Mr. Drake and gave the government undeserved insight into defense strategy, which will not be reciprocated.

As it happens, when the defense first got the government’s binder full of evidence, it had Murray’s notes explaining the basis for her decisions on what was and was not classified.

On April 25, 2011, the government provided the defense with a binder of classified exhibits that it intends to introduce at trial. The exhibits in the binder contained both classified and unclassified information. Significantly, the government’s exhibits also contained numerous handwritten annotations by its classification expert, Ms. Catherine Murray, that reflect Ms. Murray’s opinion about which portions of the documents she deems classified and which portions of the documents she deems unclassified.

In other words, it seems the defense planned to (and did not object to the evidence in the binder based on that plan) to cross-examine Murray on the substance of her decisions about what was and was not classified in the documents Drake is alleged to have illegally retained and copied. It goes to the heart of the case against Drake. But the government wants to hinder the defense efforts by making sure that even things Murray decided were unclassified can’t be revealed in raw form to the jury.

It almost makes you wonder whether they hadn’t checked with their own experts before charging Drake, and belatedly discovered that much of it–according to their own expert–is not classified, and are now trying to endow that unclassified information with additional gravity by hiding it behind CIPA substitutions.


9/11 Commission Redux

Spencer had a superb idea:

I don’t pretend that anything will produce an end to this new debate over torture. The fact that we’re debating torture diminishes our standing as a civilization. But moving beyond it: perhaps, after the actionable intelligence is drained from the bin Laden documents, it would be useful to reconvene the 9/11 Commission and have them review the ten-year hunt for bin Laden. It’s not helpful for something that looked like a failure on May 1 to be retconned into an inevitable, inexorable success. The tale of the bin Laden hunt — and the lessons to learn from it — is the logical final chapter of the  2004 report. And the gravitas of the 9/11 Commission, delivered through a public report, would create the closest thing possible to a narrative that can stand proudly before history.

And it would work not just for torture (though, given that the 9/11 Commission had doubts about the KSM interrogations they were reading in real time in 2003, I suspect we know what they’d conclude).

In addition to assessing whether torture, skilled interrogation by al Qaeda experts, or something else worked, the Commission could also review whether dragnet illegal wiretapping or targeted, legal wiretapping worked better; whether human missions or drones did; whether ground wars or smaller responses worked better (particularly when the ground war had nothing to do with terrorism). The Commission could develop a sense of where our counterterrorist investments paid off, and what served primarily to enrich contractors. Whether it makes sense to feel up cancer survivors at TSA gates, or whether the human screening already in place works better.

And, because we’re about due, the Commission can repeat all the non-nonsense recommendations it made 7 years ago (like scans of shipping containers) that the government refuses to put in place.

I’ve said we need a pause to figure out what has worked and what hasn’t. A 9/11 Commission 2.0 would work well for this.


John McCain: KSM Lied Under Torture, Just Like I Did

John McCain has, on balance, a good op-ed in the WaPo refuting Michael Mukasey’s embrace of torture. McCain’s larger point is that our approach to the Arab Spring will have a key role in our ability to defeat terrorists, which is a point not being made vociferously enough. And while he places himself in the camp of people who believe the torturers and those who approved torture should not be prosecuted, he does have this to say of Mukasey’s claim that KSM’s torture produced intelligence that led to Osama bin Laden.

That is false.

[snip]

In fact, the use of “enhanced interrogation techniques” on Khalid Sheik Mohammed produced false and misleading information. He specifically told his interrogators that Abu Ahmed had moved to Peshawar, got married and ceased his role as an al-Qaeda facilitator — none of which was true.

While I’m glad McCain provided these additional details on the lies KSM told under torture, I’m a bit more interested in two other details McCain includes.

The first mention of Abu Ahmed al-Kuwaiti — the nickname of the al-Qaeda courier who ultimately led us to bin Laden — as well as a description of him as an important member of al-Qaeda, came from a detainee held in another country, who we believe was not tortured.

[snip]

According to the staff of the Senate intelligence committee, the best intelligence gained from a CIA detainee — information describing Abu Ahmed al-Kuwaiti’s real role in al-Qaeda and his true relationship to bin Laden — was obtained through standard, noncoercive means.

The first bit of intelligence–that Abu Ahmed al-Kuwaiti was first IDed in another country–presumably introduces an entirely new detainee into the picture. Though the description “we believe was not tortured” must be viewed skeptically, as most of the other countries that were holding detainees do torture. This presumably happened no later than 2002, though, as Mohammed al-Qahtani talked about Abu Ahmed as an associate of KSM in 2002 and 2003.

It’s the other detail I find even more interesting: that info on Abu Ahmed’s real role and his real relationship with OBL came using “standard, noncoercive means.” This break in intelligence has fairly consistently been attributed to Hassan Ghul in tick tocks of the hunt for OBL. And while McCain doesn’t confirm that Ghul provided the intelligence, if he did, then consider what it probably means.

I have noted that a detainee who appears to be Ghul was held for six months–from January to August 2004–before the CIA started getting approval for his CIA-led interrogation. If the detainee who provided the key information on Abu Ahmed was Ghul and did so through noncoercive means, it means that Ghul’s interrogation before CIA got him–presumably, Ghul’s interrogation by military interrogators not using torture–yielded the key piece of information that would eventually lead to OBL. And (such a scenario would further imply) CIA insisted on taking custody and torturing him, even after he yielded information that would lead to OBL. Which might explain the legal sensitivities around Ghul’s torture, because if they got key info without torture the claims they based torture on would all be demonstrably false.

It’s all wildarsed speculation at this point, but such a scenario might explain why the torture apologists have been so vehement. Because one of their narratives, after all, is that they needed torture to get the key information. They needed torture, the torture apologists explained, because the standard interrogations done by the FBI and military weren’t effective. But McCain’s narrative suggests the possibility, at least, that for one of the few detainees interrogated at length by real interrogators first yielded the key piece of intelligence leading to OBL, after which the CIA ignored that intelligence and instead set about torturing a detainee who had already yielded crucial intelligence.

Update: McCain gave a version of this on the Senate floor today. He added details about the first detainee who gave information.

The first mention of the name Abu Ahmed al-Kuwaiti, as well as a description of him as an important member of Al-Qaeda, came from a detainee held in another country. The United States did not conduct this detainee’s interrogation, nor did we render him to that country for the purpose of interrogation. We did not learn Abu Ahmed’s real name or alias as a result of waterboarding or any ‘enhanced interrogation technique’ used on a detainee in U.S. custody.

Note, it sounds like the US might have been involved in the interrogation, just not conducting it. Also interesting that we didn’t render that detainee to the other country. Pakistan? Jordan?

Also note this admission that Ibn Shiekh al-Libi was tortured (which of course we already knew).

It has also been reported, and the staff of the Senate Intelligence Committee confirms for me, that a man named Ibn al-Sheikh al-Libi, who had been captured by the United States and rendered to Egypt, where we believe he was tortured, provided false and misleading information about Saddam Hussein’s weapons of mass destruction programs. That false information was ultimately included in Secretary of State Colin Powell’s statement to the UN Security Council, and, I assume, helped to influence the Bush Administration’s decision to invade Iraq.


ComcastSucks Got Suckier So FCC Commish Could Get a Swank New Job

Our entire country’s mediascape will no doubt get suckier as Comcast returns to its typical bad behavior after having eaten NBC. We will become less well-informed. We will fall further behind the rest of the world for broadband access. And we will continue to wait for ComcastSucks repairmen.

And all so Meredith Attwell Baker could get a swank new job at ComcastSucksNBC.

Meredith Attwell Baker, one of the two Republican Commissioners at the Federal Communications Commission, plans to step down—and right into a top lobbying job at Comcast-NBC.

The news, reported this afternoon by the Wall Street Journal, The Hill, and Politico, comes after the hugely controversial merger of Comcast and NBC earlier this year. At the time, Baker objected to FCC attempts to impose conditions on the deal and argued that the “complex and significant transaction” could “bring exciting benefits to consumers that outweigh potential harms.”

Four months after approving the massive transaction, Attwell Baker will take a top DC lobbying job for the new Comcast-NBC entity, according to reports.

In ComcastSucksNBC’s announcement, Baker boasted about how excited she is to start her new job.

I’ve been privileged to serve in government for the past seven years under President Obama at the FCC and President Bush at NTIA, I’m excited to embark on a new phase of my career with Comcast and NBCUniversal,

Somehow, she forgot to mention how proud she is about personally contributing to the decline of her country to serve her own greed.


MI Dems to Benton Harbor: You’re on Your Own

Eclectablog, who has been doing solid reporting on the takeover of Benton Harbor by an Emergency Financial Manager, has been wondering why MI’s Democratic Party hasn’t been more vociferous in supporting Benton Harbor. Today, he reported that MI Dems Chair Mark Brewer told Berrien County’s Dems that the MDP would not help them.

The occasion was the monthly meeting of the South County Democratic Club in Berrien County. Commissioner Dennis Knowles was in attendance. According to Commissioner Knowles, with whom I have spoken, Chair Brewer informed him that the MDP “could not help Benton Harbor” though he encouraged their recall effort of Rep. Al Pscholka. The MDP, however, will not assist in any way. In other words, Benton Harbor is on their own.

Now, while I don’t always agree with Brewer’s tactics, I respect his pragmatism, so I suspect part of what’s going on is driven by funding and/or a sense of the viability of recall efforts (the Snyder recall, in particular, would be really difficult to pull off because of the way our recall law is written).

But I also suspect something else is going on. Remember, Democrats in MI have themselves supported the concept of Emergency Financial Managers. In fact Jennifer Granholm’s administration put Pontiac and Benton Harbor itself into EFM status. So while Dems might be happy to knock off some Republican State Reps, they apparently remain committed to a city-based approach to financial stability. And that, it seems, stems at least partly from the way race has played out in this state.

As I noted before, one of the key factors contributing to Benton Harbor’s awful state is racism. Ditto Detroit, the schools of which are widely assumed to be the next target for Snyder’s EFM law. In both cases, a long history of segregation has resulted in the loss of the tax base of the city as more affluent whites left. The proper financial solution to that problem should have been more regionalized funding, but that wasn’t politically viable. Remember–MI is the home of the Reagan Democrats, the working class whites whom Reagan persuaded to put social  issues ahead of their own class interest.

The thing is, it probably could be today. Or could have been just after the 2008 election. Here’s what Stan Greenberg said at that point when he claimed–prematurely, given the rise of the TeaPartiers–the Reagan Democrats were dead.

For more than 20 years, the non-college-educated white voters in Macomb County have been considered a “national political barometer,” as Ronald Brownstein of National Journal described them during the Democratic convention in August. After Ronald Reagan won the county by a 2-to-1 margin in 1984, Mr. Brownstein noted, I conducted focus groups that “found that these working-class whites interpreted Democratic calls for economic fairness as code for transfer payments to African-Americans.” So what do we think when Barack Obama, an African-American Democrat, wins Macomb County by eight points?

I conducted a survey of 750 Macomb County residents who voted Tuesday, and their responses put their votes in context. Before the Democratic convention, barely 40 percent of Macomb County voters were “comfortable” with the idea of Mr. Obama as president, far below the number who were comfortable with a nameless Democrat. But on Election Day, nearly 60 percent said they were “comfortable” with Mr. Obama. About the same number said Mr. Obama “shares your values” and “has what it takes to be president.”

Given Macomb’s history, this story helps illustrate America’s evolving relationship with race. These voters, like voters elsewhere, watched Mr. Obama intently and became confident he would work for all Americans and be the steady leader the times required.

For a brief period in 2008, MI (which is a pretty damned segregated state) put aside its legacy of racism in hopes a black President could bring benefits for all Americans. (Then Republicans used Obama’s imperfect effort to do that–in the form of health care–to stoke that racism again.)

It seems to me, Democrats need to finally, enthusiastically embrace a model that puts collective well-being at the center of a plan to respond to globalization, rather than letting black cities suffer the twin plights of racism and globalization. And that ought to include not only some political support for Benton Harbor’s fight for democracy, but also some creative solutions that don’t amount to starving cash strapped cities all in the name of short term–and short-sighted–fiscal responsibility.


Killing Democracy with Bad Intelligence

Some of us have been having fun on Twitter discussing the reported power struggle in al Qaeda to replace Osama bin Laden in terms we’d use to discuss an American election. Which made this report–which Frontline linked as part of their Kill/Capture program that aired last night–all the more chilling. The author, Kate Clark, consulted “survivors, witnesses, police, senior Afghan officials – and, crucially, senior officers in the Special Forces unit which carried out” a September 2, 2010 bombing strike. She concluded that rather than killing a senior Taliban official, as JSOC still maintains, the airstrike killed a group of men campaigning for parliament.

Clark examines in depth the intelligence chain that led JSOC to kill a local campaign party, believing they were instead targeting the Taliban commander. That chain started with intelligence from a detainee.

The intelligence operation which ultimately led to the 2 September 2010 attack, started, according to the Special Forces unit, with information came from a detainee in US custody. This allowed them ultimately to identify a relative of the detainee as the shadow deputy governor of Takhar, one Muhammad Amin, and to map a Taleban‐ and IMU‐related cluster through the monitoring of cell phones.

For some reason, the intelligence analysts tracking this cluster concluded that Amin had started using the SIM card of the guy they eventually targeted, Zabet Amanullah.

The intelligence analysts came to believe that the SIM card of one of the numbers that Muhammad Amin had been calling in Kabul was passed on to him. They believed that he started to use this phone and to ‘self‐identify’ as Zabet Amanullah.

And in spite of the fact that Amanullah and Amin spoke by phone two days before the attack, JSOC maintained they were the same person. Amin explained in an interview with another researcher,

About two days before his death Zabet Amanullah spoke to me on the phone and told me that he was determined to block Qazi Kabir from being elected to parliament. That is why he was supporting Abdul Wahid Khorasani, that and the fact that they are related… After the incident, I saw my name in the media and realised the attack was intended for me… I did not discuss this with anyone…

At no time did the analysts investigate the biography of Zabet Amanullah, which would have alerted them that he was a prominent local figure (and, as Clark lays out in a poignant biography she includes, a former human rights worker who had survived three rounds of imprisonment and torture). Instead, JSOC insisted that the technical data targeting a phone was enough to justify the attack.

The Special Forces unit denied that the identities of two different men, Muhammad Amin and Zabet Amanullah, could have been conflated; they insisted the technical evidence that they were one person is irrefutable.

[snip]

When pressed about the existence – and death – of an actual Zabet Amanullah, they argued that they were not tracking a name, but targeting the telephones.

The report discusses the legal implications of this mistaken killing in depth–the failure to cross-check intelligence and the failure to protect others in the convoy who gave no sign of belligerence.

But the metaphor of it all–of the US using faulty intelligence to bomb an Afghan trying to practice democracy–captures what we’re doing in Afghanistan so much more aptly.

Copyright © 2025 emptywheel. All rights reserved.
Originally Posted @ http://www.emptywheel.net/author/emptywheel/page/831/