December 13, 2025 / by 

 

Report on Entrapment Describes Pattern of Informant-Created “Terrorism”

We’ve been writing a bit about Mohamed Osman Mohamud, the young Oregon man charged on WMD charges for allegedly trying to detonate an inert bomb the FBI helped him get. His attorneys are preparing an aggressive entrapment defense (those defenses almost never work, but there are some interesting factors in his case), arguing that Mohamud refused early entreaties to engage in violence yet the FBI kept pressing him to do so.

NYU’s Center for Human Rights and Global Justice has just released a report mapping out the pattern of such cases. The report focuses on three NY-area cases–the Newburgh Four, the Fort Dix Five, and Shahawar Matin Siraj cases–to contextualize what is going on. It focuses on the role that informants play in these cases.

In the cases this Report examines, the government’s informants held themselves out as Muslims and looked in particular to incite other Muslims to commit acts of violence. The government’s informants introduced and aggressively pushed ideas about violent jihad and, moreover, actually encouraged the defendants to believe it was their duty to take action against the United States. In two of the three cases, the government relied on the defendants’ vulnerabilities—poverty and youth, for example—in its inducement methods. In all three cases, the government selected or encouraged the proposed locations that the defendants would later be accused of targeting. In all three cases, the government also provided the defendants with, or encouraged the defendants to acquire, material evidence, such as weaponry or violent videos, which would later be used to convict them.

Most powerfully, the report explains how these cases have affected the mens’ families. For example, in the case of the Duka brothers, in which the informant testified on the stand that the Duka brothers had no knowledge of the alleged Fort Dix plot, their extended family has had their classic immigrant success story lives upended.

The same night that the FBI arrested his sons, Ferik Duka was arrested and held in immigration detention for a month.187

Amidst everything else, Dritan’s family was summarily evicted from the apartment they had rented. Zurata recalls,

“They [the landlord] said ‘get out of the apartment these are terrorists.’ They gave us three days’ time to get our clothes. We had to get clothes from the apartment and bring them to our house, which was surrounded by news people. I had the truck, but nobody to drive, nobody to help.”188

After the eviction, Dritan’s five children moved in with their grandparents and uncle Burim, where they’ve lived ever since. Without his brothers to run the roofing Burim dropped out of high school to support his remaining family members. Noting that his nieces and nephews are “like orphans now,” Burim said, “it’s me who supports them now… I basically support four families.”189 Shouldering a heavy burden for a 20-year old, Burim now runs one of the Dukas’ roofing companies; Ferik came out of retirement to run the other business.

At the time of the arrests, the Dukas’ roofing companies had over $400,000 in contracts. These dried up almost immediately after the brothers were arrested. People who had worked with Ferik for more than a decade took their business elsewhere. Their biggest customer, the local fire department, called to say they had been warned by the government not to do business with the Dukas. Internet sites labeled their businesses as being “run by terrorists,”190 and they received harassing phone calls at their businesses. While they once dreamt of building four neighboring houses, one for each brother, today they are barely able to make ends meet.

And perhaps the most stunning detail is this description of the incitement a cop, Osama Eldawoody, used to get Shahawar Matin Siraj to accept his invitation to violence: Abu Ghraib.

In April 2004, when the abuse of detainees by U.S. soldiers at Abu Ghraib216 first became public, Eldawoody seized on the opportunity to take things to the next level. Shahina explains that Eldawoody started showing Shahawar “awful, awful scary photos of Abu Ghraib and Guantanamo. If you show these pictures even to a non-Muslim, it’ll make them crazy. No one can bear these photos, Eldawoody showed Shahawar these photos and said, ‘it’s your duty as a Muslim to do jihad in response.’”217

After months of Eldawoody’s campaign, Shahawar finally crumbled when he was shown pictures of young Iraqi girls being threatened and raped; he told Eldawoody that they had to do something.218 Eldawoody then told him about a group called “The Brotherhood,” with operatives in upstate New York who could help them.219 Then, in May 2004, Eldawoody told his handlers, “I believe it’s time to record.”220

Oh, okay. Use evidence of American crimes as a way to induce others to commit fake crimes. Only unlike all but a “few bad apples” convicted in those real crimes, the government will actually indict and convict in the fake crimes.

Do they not see how this is perverting the entire concept of justice?


DHS’ Top Cybersecurity Officer Resigns

As Marc Ambinder reports, the top cybersecurity guy at DHS, Phil Reitinger, announced his resignation today. Which is pretty odd, given that Obama just rolled out his cybersecurity strategy a few days ago. Though that’s the excuse that Reitinger offered for the timing of his departure.

With significant progress having been made in activities across NPPD [National Protection and Programs Directorate], with growing recognition of DHS’s roles and authorities, and the cybersecurity legislative proposal now delivered to the Hill, it’s a logical point for me to leave the Department of Homeland Security and allow the team that we have developed together to carry our initiatives forward. [bracketed comment Ambinder’s]

Okaaayyyy then. You finally win the pissing contest between NSA and DHS over who will lead cybersecurity and then you … leave? Leaving no one to lead the program you’ve fought so hard to lead, not to mention leaving no one to lobby for the legislative proposal just sent to Congress?

Though Reitinger isn’t technically the CyberCzar, he makes at least the 10th top cybersecurity official to have left since 9/11.

Update: Here’s how his job was described when he was hired.

In addition to overseeing the department’s mandate to protect government networks, Reitinger also will be responsible for coordinating Uncle Sam’s outreach to private companies that own and operate the nation’s most vital information assets. These digital assets power everything from water and electricity distribution systems to telecommunications and transportation networks.

As I described here, one of the most sensitive aspects of the cybersecurity legislation the Administration proposed (and, I think, one of its weakest parts), is the means by which critical infrastructure entities prove to the government that they have adequate cybersecurity. It would seem really important to have continuity in this position to shepherd this part of the legislation through Congress.

Unless, of course, he’s planning on representing the industry as the bill wends its way through Congress. Or, set up one of the auditing companies that will get rich off the way the legislation was written.


Larry Thompson: From Rendering Maher Arar to Pushing Pop to Teaching Lawyers

Oh is Mary going to love this.

As she has tirelessly reminded us over the years, Larry Thompson, the former Deputy Attorney General who signed off on Maher Arar’s rendition to Syria to be tortured, has spent the last 7 years at PepsiCo serving as their General Counsel.

But he’s got a new job: as a law professor at University of Georgia.

Now, it appears he’ll just be teaching corporate law and white collar crime and not–like John Yoo at Berkeley–constitutional law.

But it’s yet another example of a top Bush lawyer who, after abusing the rule of law while in government, is being rewarded with a job teaching the next generation of lawyers.

Here’s what the Center for Constitutional Rights had to say about the move (remember they’ve represented Arar):

The Center for Constitutional Rights is profoundly concerned at the news that the University of Georgia School of Law has hired former Deputy Attorney General Larry Thompson as a permanent member of its law school faculty.  Mr. Thompson played a prominent role in the extraordinary rendition of our client, Maher Arar, to Syria where he was tortured and detained for a year.  Mr. Arar’s case caused international outrage that led the Canadian government to launch a public inquiry, exonerate him of any wrongdoing, acknowledge their role in his treatment, and compensate him.  It would be shocking if the Law School were aware of Mr. Thompson’s role in this case and hired him nonetheless.  The notion that Mr. Thompson should be held out as a model for future law students when in fact he should be, at a bare minimum, investigated for his role in Mr. Arar’s rendition to torture is astonishing.  We call on the Law School to investigate and reconsider its appointment of Mr. Thompson accordingly.  Anything short of a full investigation into this matter would bring into question the integrity of The University of Georgia School of Law.


FBI Takes 2 Years to Indict FBI Agent Facilitating Mortgage Fraud

Does it help to explain DOJ’s failure to crack down on mortgage fraud that one of the agents assigned to investigate it was instead sleeping with–and helping defend–one of those being investigated for fraud?

The FBI just indicted Special Agent Adrian Busby for allegedly lying about how he helped an informant fight indictment. According to the release, the timeline looks like this:

Later 2007: Busby investigating a mortgage fraud case

Early 2008: Busby starts an “intimate relationship” with source

January 10, 2008: Busby gets his girlfriend named as a confidential source claiming falsely she was not under investigation

February 5, 2008: NYPD arrests source for identity theft and other fraud-related crimes

September 18, 2008: Source’s confidential source status canceled

December 2009: Busby provides source’s defense attorney with law enforcement documents to help in her defense

December 15, 2009: Source convicted

Now, what’s weird about this is that the release lists Busby as “a Special Agent of the Federal Bureau of Investigation.” That is, he seems to be still employed by the FBI.

And don’t you think it strange that it took two years to prove that Busby was lying about helping his apparent girlfriend?

I mean, no wonder DOJ hasn’t gotten around to indicting Lloyd Blankfein for fraud that brought down the entire financial system! It apparently takes FBI two years to put together a simple case of false statements against one of their own agents who was facilitating–rather than investigating–mortgage fraud.


Please Help Support My Next 525 Posts on Torture

Become a Member of Firedoglake

GOAL: 1,000 New Members

by June 1st

Support our one-stop shop for in-depth news coverage and hard-hitting activism.

 

Just over two years ago, right around the time I reported that Khalid Sheikh Mohammed was waterboarded 183 times in a month, many of you chipped into the “Marcy Wheeler fund” to support my work; that generosity paid my way until a short time ago. Here’s what that support made possible.

Between May 1, 2009 and yesterday, by my rough count, I wrote 525 posts on torture. I unpacked the torture memos, the CIA IG Report, the OPR Report, and thousands of documents released through FOIA. I showed the bureaucratic games they used to set up our torture program, early efforts to place limits on things like mock execution, followed by more bureaucratic and legal means to get away with violating even those limits. I showed how they hid documents and altered tapes to hide evidence of their torture. I showed how, after CIA and parts of DOJ tried to put limits on torture in 2004, they again used bureaucratic tricks and ridiculous legal documents to reauthorize it. I’ve tracked DOJ’s kabuki claims to investigate torture (though bmaz gets credit for forcing DOJ to admit John Durham’s torture tape investigation had run out the clock on Statutes of Limitation). And I’ve tracked the Obama Administration’s successful efforts to suppress all evidence of torture. And all the while, I’ve relentlessly pushed back against the torture apologists’ lies.

Of course, while writing about torture is a major part mapping out the decline of the rule of law, it’s not the only part. Since May 2009, I’ve written almost 200 posts on wiretapping, almost as many on our Gitmo show trials, posts about state secrets, drones, fusion centers, the forever war metastisizing around the world. I’ve written about Wikileaks and Bradley Manning’s treatment and the banksters and the auto companies.

Cataloging the decline of the rule of law has been exhausting and infuriating. The work has been challenging.

But most of all, it has been humbling. That’s because you made this happen, as much as I did.

In addition to the absolutely brilliant observations you’ve made in comments, your support, two years ago, made this work possible. I’m profoundly grateful that many of you invested your faith and financial support in my work.

And now I’m asking for your faith and financial support again, to support the next 525 posts on torture. This time that support will come in the form of an ongoing Firedoglake membership. By becoming a member of Firedoglake, you will not only give my work some stability over the long term, but support the superb work of Jane and DDay and Jon Walker, and just as importantly, the work of the people backstage who make this all technically possible. And you will become a closer part of our efforts to push our country in the right direction, to return to the rule of law.

Please join Firedoglake today.

I hope some day soon we’ll begin to make headway against our expanding national security state. I hope some day, I won’t feel the need to write a post on torture five days a week. But until then, I feel compelled to write about what is happening to our country. And I can only continue to do that with your help.


The Issues Thomas Drake and Others Whistleblew On Remain Urgent

I’ve been looking at one of the Siobhan Gorman articles that accused whistleblower Thomas Drake served as a source for. I’ll have more later, but I wanted to point out one main thrust of the story: the NSA had no way of measuring efficacy and controlling costs.

At the NSA, and throughout the government, the Sept. 11 attacks created a crisis atmosphere. Congress responded by pouring money into anti-terrorism efforts, while intelligence agencies scrambled to put new programs in place – often without the planning and oversight needed to succeed, intelligence professionals said.

At an agency-wide meeting at the NSA not long after the Sept. 11 attacks, Michael V. Hayden, then the NSA director, announced a $1 billion budget increase.

But the top-secret agency, based at Fort Meade between Baltimore and Washington, has no mechanism to systematically assess whether it is spending its money effectively and getting what it has paid for, NSA veterans said. One former employee likened it to a neighborhood with no police to enforce the traffic laws.

While this is not necessarily the core of what–per Jane Mayer–the government is prosecuting Drake for, it’s important for this reason. The NSA has been claiming–falsely–to have fixed its clusterfuck accounting system.

In June 2009, the Director of NSA wrote to the Chairman and Vice Chairman, claiming that the NSA was now ―fully compliant with the laws, regulations, and manuals referenced in the U.S. Army Finance Command report and the Federal Financial Managers Integrity Act. The NSA Director‘s letter also stated that the NSA had been able to reconcile its fiscal year 2008 financial records. In July 2009, the Chairman and Vice Chairman wrote to the Secretary of Defense concerning the NSA Director‘s letter. They stated that in light of the NSA‘s past difficulties in producing auditable financial statements, the Committee believed the progress claimed by the NSA should be independently confirmed by the DoD Inspector General. Specifically, the letter requested that the DoD IG conduct a form and content review of the NSA‘s fiscal year 2009 financial statements to determine whether they were supported by reliable and accounting data and supporting information.

The Committee received the results of the DoD IG‘s review in November 2009, which was very critical of NSA‘s claims. Overall, the IG found that the NSA‘s financial statements were not adequately supported by reliable accounting data and supporting information. An even more disturbing finding was that the NSA‘s ―remediation plans do not fully address audit impediments. Specific findings included an inability to reconcile critical general ledger balances, failure to perform required accounting processes, and inconsistencies between the information contained in the notes to the financial statements and the information provided to the IG. The IG‘s findings raised serious questions about the assertions made by the NSA Director in his June 2009 letter and the support he is receiving from the administrative staff involved. [my emphasis]

This is just one reason why the government’s prosecution of Thomas Drake is so outrageous. While his charges pertain to the way in which contracts get picked (rather than to the accounting clusterfuck itself), the prosecution of him–effectively, if Mayer is right, because he refused to falsely claim close allies sourced the illegal wiretap story–serves primarily to intimidate whistleblowers.

It took intelligence oversight committees seven years to prove that NSA wasn’t fixing problems first exposed eight years ago. Yet people were trying–in 2006–to expose the ongoing problems.

And yet the most transparent President seems to be doing everything he can to make sure no one makes similar efforts in the future.


Is Mukasey Suggesting We Ignored Information Mohammed al-Qahtani Gave Us?

I’ve been having difficulty finding the time to get through the entire AEI torture extravaganza that took place yesterday (“Moderated” by John Yoo). But by the time I read this Greg Sargent piece, I had gotten through the point at about 3 minutes in where Michael Mukasey said,

Was there a memo in the file beforehand [before KSM uttered the name of courier Abu Ahmad al-Kuwaiti] that contained that name? Yes, but it was disregarded because it came from somebody insignificant and it was not regarded as significant.

Which in and of itself seems an admission (one reflected in the CIA IG Report) that CIA wasn’t accrediting intelligence from more minor figures adequately in their assessments of efficacy.

But there may be another problem with Mukasey’s statement. According to the NYT, KSM was reported to have been asked about al-Kuwaiti months after his waterboarding, in fall 2003.

And as you may have seen in reporting, al-Kuwaiti’s name comes up in a curious reference in Mohammed al-Qahtani’s Gitmo file. Note I’m showing the quotes themselves and the sources. And as you read this, remember that KU-10024 is KSM’s detainee number, so the email training described involves KSM, al-Kuwaiti, and al-Qahtani.

(S//NF) Detainee received computer training from al-Qaida member Abu Ahmad al-Kuwaiti in preparation for his mission to the US.

(S//NF) Detainee stated while at Abu Shem’s house in Karachi in July 2001, KU-10024 had al-Kuwaiti teach detainee to send email. KU-10024 informed detainee when someone went on a mission, he would need to know how to send messages and email was safer than talking on the phone. Al-Kuwaiti took detainee to a local internet cafe for his training.42

(S//NF) Abu Ahmad al-Kuwaiti was a senior al-Qaida facilitator and subordinate of KU-10024. Al-Kuwaiti worked in the al-Qaida media house operated by KU-10024 in Kandahar and served as a courier.43

(S//NF) Al-Qaida facilitator Hassan Ghul stated al-Kuwaiti, Hamza al-Ghamdi and Abd al-Rahman al-Maghrebi traveled with UBL.44 (Analyst Note: Al-Kuwaiti was seen in Tora Bora and it is possible al-Kuwaiti was one of the individuals detainee reported accompanying UBL in Tora Bora prior to UBL’s disappearance.)

(S//NF) Detainee stated he was not very skilled in the use of email and al-Kuwaiti told KU-10024 it would be difficult for the detainee to fully understand computers or how to use the internet for the purpose of emailing. (Analyst Note: Detainee attended a computer course in Saudi Arabia and received a certificate upon graduating. It is doubtful detainee would not be able to grasp the concept and procedures necessary for internet email, especially with Arabic websites that offered the service. Detainee stated KU-10024 provided him with a code to use when he reported success obtaining his visa.)45

42 IIR 6 034 1194 03

43 IIR 6 034 0226 05, TD-314/04398-05, TD-314/39130-02

44 TD-314/29012-04, TD-314/30205-04, Analyst Note: For additional information see TD-314/05730-05, IIR 6 034 0226 05, TD-314/45991-05, TD-314/63199-04, TD-314/04398-05, TD-314/56328-04, TD-314/55744-04, TD- 314/49162-04, TD-314/45296-04, TD-314/24351-04, TD-314/04950-04, TD-314/39130-02, IIR 6 034 0760 03

45 IIR 6 034 1194 03, 000063 SIR 30-MAY-2003, IIR 6 034 1205 03 [my emphasis]

First, note the argument they’re making here. To support the claim that Mohammed al-Qahtani must be an important al Qaeda figure, they use his own description of being trained on using email by Abu Ahmad al-Kuwaiti, and then link that up with all the information the folks at Gitmo knew about al-Kuwaiti in 2008, thereby showing associatively that al-Qahtani was being trained by people–KSM and al-Kuwaiti–who had close ties to OBL.

Some of this information to support this argument was obviously collected after al-Qahtani’s earlier interrogations (and notably, after the most intense part of his torture, which lasted from November 23, 2002 to January 15, 2003) and from other detainees. The information about al-Kuwait’s role as a facilitator and courier (see footnote 43) is sourced to two intelligence reports from 2005, and one from 2002. Given that there’s nothing that says al-Qahtani explained this detail himself, that 2002 report might be the report from the detainee held by another country.

Then there’s the intelligence given by Hassan Ghul, dated 2004 (see footnote 44), stating that al-Kuwaiti traveled with OBL. One of the two 2005 reports also cited is one of the same reports named in footnote 45.

It’s the information that came from al-Qahtani himself–which takes the form, “detainee stated”–that’s more interesting. The three pieces of intelligence that appear to come from al-Qahtani (see footnotes 42 and 45) are all dated 2003. More interesting, one of them is named 000063 SIR 30-MAY-2003. The appearance of al-Qahtani’s detainee number, 063, seems confirmation this intelligence came from him. And the report is dated May 30, 2003, at least three months before KSM is reported to have talked about al-Kuwaiti, but more than five months after his torture ended.

Now, it’s possible that al-Qahtani didn’t use al-Kuwaiti’s nickname. But it at least appears that al-Qahtani was using it several months before KSM was. Mind you, he didn’t say anything about al-Kuwaiti traveling with OBL (which came two years later from Hassan Ghul) or being a courier (which may have come from that detainee in another country). Just that some guy with ties to KSM tried to teach him to use email.

Of course, this doesn’t clear up the torture debate at all (aside from the fact that torture is illegal and immoral and, in the case of al-Qahtani, has made it impossible to try him for his presumed role in 9/11). After all, it appears that, like KSM, al-Qahtani started to talk about al-Kuwaiti five months after being tortured. And note, it appears, though is not certain, that al-Qahtani did not give this information to the FBI or DOD before he was tortured, when they didn’t know who he was.

But it does appear to be fatal for Mukasey’s story. It’s one thing to claim that a detainee in some other country is so minor no one paid attention to the intelligence he offered. But you can’t make the claim al-Qahtani–the assumed 20th hijacker–was insignificant.

Which leads to the bigger question: why did it take CIA at least three months after al-Qahtani talked about being trained for 9/11 by al-Kuwaiti before they asked KSM about him?


Hillary Picks Cheney Aide to Replace PJ Crowley

It’s bad enough that Obama didn’t clear out the Cheney folks burrowed into the permanent bureaucracy. Now the Obama Administration will appoint former Cheney aide Victoria Nuland to replace PJ Crowley as State Department spokesperson.

Victoria “Toria” Nuland, the current U.S. special envoy for conventional forces in Europe and a former U.S. ambassador to NATO, will be named the new spokesperson for the State Department this week, officials and foreign policy hands told the Envoy.The State Department did not provide comment in response to queries. Nuland did not respond to  a query.

The appointment is expected to be announced by Secretary of State Hillary Clinton as early as Monday, sources told the Envoy.

Nuland, a career foreign service officer, has previously served as U.S. Ambassador and deputy ambassador to NATO, former principal deputy national security adviser to then Vice President Dick Cheney, and as chief of staff to Clinton-era Deputy Secretary of State Strobe Talbott, now President of the Brookings Institution.

Well, I guess one way to make sure someone doesn’t go off the reservation like PJ Crowley did is to appoint a former Cheney aide.

Though I do hope Hillary recalls how Cheney sabotaged Colin Powell’s efforts at State Department with his agents there (people like John Bolton).


Apparently the Terrorists Can’t Learn How Much Radiation They’ll Get from Going through TSA Security

When I first read tweets pointing to this article, reporting that the Administration won’t let independent scientists evaluate the radiation exposure from RapeAScan machines, I joked that it was because we can’t let terrorists know how dangerous these machines are.

Unfortunately, that is precisely the reason the Administration gave a scientist who wrote an article poo-pooing the risk of the machines.

After her article was published, [UCSF radiologist Rebecca] Smith-Bindman was contacted by a TSA public affairs officer. During the conversation, she suggested that she or other outside scientists be allowed to test the machine. The official was shocked by the suggestion and said such access could tip off people who want to avoid detection, Smith-Bindman said.

“It was not appreciating that there’s legitimate scientific questions that have to be balanced against the security questions,” she said.

Science is one of those luxuries we’re going to have to do without now, I guess, in the interest of protecting ourselves from terrorists.

Which has the added advantage for the fearmongers, I guess, that we never have a means to rationally evaluate the efficacy of their policy choices.


Did the Administration’s Own Propensity for Leaks Crash the SEAL’s Blackhawk?

The AP has an astoundingly detailed description of the raid on Osama bin Laden’s compound. It describes the kinds of aircraft used, the minutes spent completing each part of the task, and even explained that the Geronimo name just served to indicate that the SEALs had reached stage “G” of the mission.

It also includes two details that, when considered together, suggests the troubling possibility that potential Administration leaks put the operation in danger.

First, the story explains that the mission was launched the night it was because too many people had been briefed on it and people were worried about leaks.

The decision to launch on that particular moonless night in May came largely because too many American officials had been briefed on the plan. U.S. officials feared if it leaked to the press, bin Laden would disappear for another decade.

That is, the Administration launched the mission on the night they did not because it presented optimal conditions, but because they (or CIA or DOD) worried that someone would actually leak advance details to the press of one of the most sensitive missions of the last decade. (I can’t remember who it was, but I have this vague memory of one reporter describing the raid after Obama’s announcement of it referencing a discussion of it that had taken place the previous morning, so before it happened. I thought at the time that it’d be weird for the Administration to do an advance briefing on this operation. If my memory is right on this count, it means advance news of the operation did leak to the press.)

Later in the article, the AP provides a description of why one of the two Black Hawks went down (and how that made them deviate from their planned stealth approach on the compound). The key factor, the AP notes, was the unexpectedly hot temperature, which thinned the air and made the chopper more difficult to maneuver.

The Black Hawks were specially engineered to muffle the tail rotor and engine sound, two officials said. The added weight of the stealth technology meant cargo was calculated to the ounce, with weather factored in. The night of the mission, it was hotter than expected.

[snip]

The plan unraveled as the first helicopter tried to hover over the compound. The Black Hawk skittered around uncontrollably in the heat-thinned air, forcing the pilot to land. As he did, the tail and rotor got caught on one of the compound’s 12-foot walls. The pilot quickly buried the aircraft’s nose in the dirt to keep it from tipping over, and the SEALs clambered out into an outer courtyard.

Now, it may be there’s no connection between the Administration’s worry about leaks and the decision to launch the mission even though temperatures put the helicopters at risk. It may be that SEALs measure cargo down to the ounce but don’t bother to schedule around volatile spring weather.

But these two details make one thing clear: the mission was launched on a less than optimal night. And it was launched when it was because the Administration worried about impending leaks.

And even if there’s not a connection between the too-hot night and the imperative to launch when they did to pre-empt any leaks, the implication remains. The Administration suspected someone within the too-large but presumably very limited circle of people briefed on this raid either had already leaked or would leak this information to the press. The Administration believed someone in that tight circle might compromise operational security of a tremendously sensitive and dangerous mission.

Why isn’t that person–rather than Thomas Drake–awaiting trial?

Copyright © 2025 emptywheel. All rights reserved.
Originally Posted @ http://www.emptywheel.net/author/emptywheel/page/831/