March 28, 2024 / by 

 

Please Help Support My Next 525 Posts on Torture

Become a Member of Firedoglake

GOAL: 1,000 New Members

by June 1st

Support our one-stop shop for in-depth news coverage and hard-hitting activism.

 

Just over two years ago, right around the time I reported that Khalid Sheikh Mohammed was waterboarded 183 times in a month, many of you chipped into the “Marcy Wheeler fund” to support my work; that generosity paid my way until a short time ago. Here’s what that support made possible.

Between May 1, 2009 and yesterday, by my rough count, I wrote 525 posts on torture. I unpacked the torture memos, the CIA IG Report, the OPR Report, and thousands of documents released through FOIA. I showed the bureaucratic games they used to set up our torture program, early efforts to place limits on things like mock execution, followed by more bureaucratic and legal means to get away with violating even those limits. I showed how they hid documents and altered tapes to hide evidence of their torture. I showed how, after CIA and parts of DOJ tried to put limits on torture in 2004, they again used bureaucratic tricks and ridiculous legal documents to reauthorize it. I’ve tracked DOJ’s kabuki claims to investigate torture (though bmaz gets credit for forcing DOJ to admit John Durham’s torture tape investigation had run out the clock on Statutes of Limitation). And I’ve tracked the Obama Administration’s successful efforts to suppress all evidence of torture. And all the while, I’ve relentlessly pushed back against the torture apologists’ lies.

Of course, while writing about torture is a major part mapping out the decline of the rule of law, it’s not the only part. Since May 2009, I’ve written almost 200 posts on wiretapping, almost as many on our Gitmo show trials, posts about state secrets, drones, fusion centers, the forever war metastisizing around the world. I’ve written about Wikileaks and Bradley Manning’s treatment and the banksters and the auto companies.

Cataloging the decline of the rule of law has been exhausting and infuriating. The work has been challenging.

But most of all, it has been humbling. That’s because you made this happen, as much as I did.

In addition to the absolutely brilliant observations you’ve made in comments, your support, two years ago, made this work possible. I’m profoundly grateful that many of you invested your faith and financial support in my work.

And now I’m asking for your faith and financial support again, to support the next 525 posts on torture. This time that support will come in the form of an ongoing Firedoglake membership. By becoming a member of Firedoglake, you will not only give my work some stability over the long term, but support the superb work of Jane and DDay and Jon Walker, and just as importantly, the work of the people backstage who make this all technically possible. And you will become a closer part of our efforts to push our country in the right direction, to return to the rule of law.

Please join Firedoglake today.

I hope some day soon we’ll begin to make headway against our expanding national security state. I hope some day, I won’t feel the need to write a post on torture five days a week. But until then, I feel compelled to write about what is happening to our country. And I can only continue to do that with your help.


Hillary Picks Cheney Aide to Replace PJ Crowley

It’s bad enough that Obama didn’t clear out the Cheney folks burrowed into the permanent bureaucracy. Now the Obama Administration will appoint former Cheney aide Victoria Nuland to replace PJ Crowley as State Department spokesperson.

Victoria “Toria” Nuland, the current U.S. special envoy for conventional forces in Europe and a former U.S. ambassador to NATO, will be named the new spokesperson for the State Department this week, officials and foreign policy hands told the Envoy.The State Department did not provide comment in response to queries. Nuland did not respond to  a query.

The appointment is expected to be announced by Secretary of State Hillary Clinton as early as Monday, sources told the Envoy.

Nuland, a career foreign service officer, has previously served as U.S. Ambassador and deputy ambassador to NATO, former principal deputy national security adviser to then Vice President Dick Cheney, and as chief of staff to Clinton-era Deputy Secretary of State Strobe Talbott, now President of the Brookings Institution.

Well, I guess one way to make sure someone doesn’t go off the reservation like PJ Crowley did is to appoint a former Cheney aide.

Though I do hope Hillary recalls how Cheney sabotaged Colin Powell’s efforts at State Department with his agents there (people like John Bolton).


Eric Holder Claims Rule of Law Exists in Cyberspace

Just days after asking Congress not to give the intelligence community a hard deadline to put a basic cybersecurity measure into place, the Obama Administration rolled out a cybersecurity strategy yesterday with great fanfare. The event itself seemed designed to bring as many Cabinet Secretaries into one place at one time–Hillary Clinton, Gary Locke, Janet Napolitano, and Eric Holder, along with DOD Deputy Secretary William Lynn and White House Cybersecurity Coordinator Howard Schmidt–to give the appearance of real cooperation on cyberspace issues.

The strategy itself is still mostly fluff, with paragraphs like this:

This future promises not just greater prosperity and more reliable networks, but enhanced international security and a more sustainable peace. In it, states act as responsible parties in cyberspace—whether configuring networks in ways that will spare others disruption, or inhibiting criminals from using the Internet to operate from safe havens. States know that networked infrastructure must be protected, and they take measures to secure it from disruption and sabotage. They continue to collaborate bilaterally, multilaterally, and internationally to bring more of the world into the information age and into the consensus of states that seek to preserve the Internet and its core characteristics.

And loaded paragraphs like this, in the section on military goals:

Recognize and adapt to the military’s increasing need for reliable and secure networks. We recognize that our armed forces increasingly depend on the networks that support them, and we will work to ensure that our military remains fully equipped to operate even in an environment where others might seek to disrupt its systems, or other infrastructure vital to national defense. Like all nations, the United States has a compelling interest in defending its vital national assets, as well as our core principles and values, and we are committed to defending against those who would attempt to impede our ability to do so.

Lucky for DOD, there was no discussion of deadlines anywhere in the document, so they didn’t have to admit their plan to “adapt to the military’s increasing need for reliable and secure networks” was a long term project.

And then the strategy had a lot of language about norms, which places our cybersecurity strategy in the paradigm and language of international regime development from foreign relations (interestingly, Hillary started off the parade of Secretaries, further emphasizing this diplomatic approach).

But what struck me most about this dog and pony show, delivered on the day SCOTUS endorsed the executive branch’s efforts to hide torture behind the invocation of state secrets, was Eric Holder’s discussion about rule of law in cyberspace.

In recent months, the Justice Department has announced takedowns of significant criminal groups operating from Romania, Egypt, and elsewhere that had been victimizing American businesses and citizens – including children.  We’ve also brought multiple criminal conspirators to justice for their roles in coordinated cybercrimes that, according to court documents, netted nearly 1.5 million dollars from U.S. victims.  And, just a few weeks ago, we announced an operation to disable an international criminal network that had infected more than two million computers worldwide with malicious software.  Until we stepped in – with the help of industry and security experts, as well as key international partners – this malware was allowing criminals to capture bank account numbers, user names, and other sensitive and financial information online.

While we can all be encouraged by these and other successes, we cannot become complacent.  As President Obama has repeatedly indicated – we must, and we will, take our global fight against cyber threats to the next level.  The strategy that we are announcing today is an affirmation of that promise.  It reinforces our nation’s support for the Budapest Convention –and for efforts to establish the rule of law in cyberspace.   It also reflects our ongoing commitment to prevent terrorists and other criminals from exploiting the Internet for operational planning or financing – or for the execution of attacks. [my emphasis]

We’re going to build rule of law in cyberspace apparently. Sort of like an extraterrestrial colony to preserve a way of life that used to exist on Earth (or at least in the US), but no longer does.

So rest assured, if this cyberstrategy is successful, we can expect rule of law in cyberspace as compensation for the fact that the government has destroyed rule of law in meatspace.

Oh, on that note, there was no discussion of any investigation into how it was that a media outlet, Wikileaks, was attacked with a sophisticated DDOS attack, ultimately damaging free speech.


Whitewash Investigation on Detainee Abuse Is Why We Need WikiLeaks

The Nation has a long study on the Army’s Detainee Abuse Task Force, which one of its members described as a “whitewash.”

Jon Renaud, a retired Army Warrant Officer who headed the task force as the Special Agent in Charge for the first half of 2005, now says of the DATF, “It didn’t accomplish anything—it was a whitewash.” Neither he nor his fellow agents could recall a single case they investigated that actually advanced to a court-martial hearing, known as an Article 32.

“These investigations needed to take place,” said Renaud, a Bronze Star recipient who retired in 2009 after twenty years in the military. “But they needed to be staffed and resourced with the same level of resources that they gave the Abu Ghraib case.” He noted that the Army assigned a general and staff to conduct a comprehensive investigation of Abu Ghraib. “That was a single case,” he said, “and we had hundreds of others for six people.”

In addition to the many details of abuses ultimately ignored in Iraq, the Nation’s story demonstrates why we need something like WikiLeaks. After all, not only should there be some kind of public accountability for abuses like this (that should be as accessible and widely reviewed as the Taguba Report), citizens ought to be able search for more information.

But DOD claims the DATF never existed.

Requests to the Army for information about the origins, mission and track record of the DATF were refused, and a FOIA request to CID was denied with this claim: “No documents of the kind you described could be located. No official ‘Detainee Abuse Task Force’ was ever established by the USACIDC.” After a lengthy appeals process, during which we provided several samples of DATF communications on DATF letterhead, this finding was reaffirmed: CID “never created an official ‘Detainee Abuse Task Force,’” the denial letter read. “Individual criminal investigation units may have set up informal, ad hoc task forces while deployed to emphasize detainee abuse investigations. In turn, they may have labeled certain investigations as being subject to a ‘Detainee Abuse Task Force.’” But “there was no official organization for such a task force.”

[snip]

Angela Birt, the Operations Officer who oversaw CID’s felony investigations across Iraq during 2005, including the DATF, expressed disbelief at the military’s response. According to Birt, the DATF did not receive an official unit designator; “there was no heraldry behind it,” she said. “But to say it didn’t exist in the terms that they said in the letter? Wow, that’s really embarrassing for them,” said Birt.

“To say, ‘You never existed,’” Renaud said, “It’s insulting. It’s insulting to the agents that worked on it.

“I have to assume they just don’t want to release the cases,” he went on, “because if anybody actually got ahold of all the cases [and] read over them, they would obviously see huge holes.”

In fact, one of the Nation’s sources noted that the military kept reopening the cases the ACLU was FOIAing.

Renaud explained that his superiors at Fort Belvoir sent him weekly e-mails containing an itemized list of cases they were ordering reopened. He also separately received a list of cases about which the ACLU had filed FOIA requests. And he began to notice a correlation.

“I challenged folks on this. I said, ‘Hey, are we reopening these cases because we’re going to work them? Or are we reopening them to play hide the ball because we don’t want to release them?’”

“We did discuss the potential that they were just sending these back because as long as they’re open, they’re not subject to FOIA,” said Birt. “The rule with [the] Crimes Records Center is: if a case is open, they will not honor a FOIA request because it might jeopardize open and valid investigative pursuits.”

So it’s not just DATF DOD was hiding from FOIA, it was the cases themselves (in a tactic the government appears to be repeating more generally).

The military, if asked, would probably deny that it issued orders not to investigate instances of Iraqi-on-Iraq torture. But, because of Wikileaks, we know they did issue that order.

This is the impact of Frago 242. A frago is a “fragmentary order” which summarises a complex requirement. This one, issued in June 2004, about a year after the invasion of Iraq, orders coalition troops not to investigate any breach of the laws of armed conflict, such as the abuse of detainees, unless it directly involves members of the coalition. Where the alleged abuse is committed by Iraqi on Iraqi, “only an initial report will be made … No further investigation will be required unless directed by HQ”.

Frago 242 appears to have been issued as part of the wider political effort to pass the management of security from the coalition to Iraqi hands. In effect, it means that the regime has been forced to change its political constitution but allowed to retain its use of torture.

The military, if asked, would probably deny knowing that the US turned detainees over to the Iraqi Wolf Brigade to be tortured. But, because of WikiLeaks, we know that did happen.

In Samarra, the series of log entries in 2004 and 2005 describe repeated raids by US infantry, who then handed their captives over to the Wolf Brigade for “further questioning”. Typical entries read: “All 5 detainees were turned over to Ministry of Interior for further questioning” (from 29 November 2004) and “The detainee was then turned over to the 2nd Ministry of Interior Commando Battalion for further questioning” (30 November 2004).

The field reports chime with allegations made by New York Times writer Peter Maass, who was in Samarra at the time. He told Guardian Films : “US soldiers, US advisers, were standing aside and doing nothing,” while members of the Wolf Brigade beat and tortured prisoners. The interior ministry commandos took over the public library in Samarra, and turned it into a detention centre, he said.

[snip]

The Wolf Brigade was created and supported by the US in an attempt to re-employ elements of Saddam Hussein’s Republican Guard, this time to terrorise insurgents. Members typically wore red berets, sunglasses and balaclavas, and drove out on raids in convoys of Toyota Landcruisers. They were accused by Iraqis of beating prisoners, torturing them with electric drills and sometimes executing suspects. The then interior minister in charge of them was alleged to have been a former member of the Shia Badr militia.

And if it weren’t for WikiLeaks, we would know little about the multiple times our government bullied other countries to drop investigations of rendition and torture (one I’m certain we’ll see repeated when the President visits Poland later this month).

Without such transparency, the Nation study makes clear, there will be no accountability for the systematic flouting of US and international law.

But note the irony. As the Nation describes, none of the hundreds of abuse cases–not the ones that involved electrocution, not the ones that involved rape, not the ones that involved mock execution–resulted in a court-martial. But not only has the military charged Bradley Manning, but they have alleged that his actions–and not the torture and not the cover-up of torture–bring discredit on the armed forces.


Like SSCI, HPSCI Requires DNI to Close Gaping Security Holes … by 2013

Steven Aftergood has the House intelligence report online and–as he points out–it contains a requirement that the intelligence community close one of the gaping holes in network security highlighted by the WikiLeaks case. The deadline? 2013.

SEC. 402. INSIDER THREAT DETECTION PROGRAM.

(a) Initial Operating Capability.–Not later than October 1, 2012, the Director of National Intelligence shall establish an initial operating capability for an effective automated insider threat detection program for the information resources in each element of the intelligence community in order to detect unauthorized access to, or use or transmission of, classified intelligence.

(b) Full Operating Capability.–Not later than October 1, 2013, the Director of National Intelligence shall ensure the program described in subsection (a) has reached full operating capability.

(c) Report.–Not later than December 1, 2011, the Director of National Intelligence shall submit to the congressional intelligence committees a report on the resources required to implement the insider threat detection program referred to in subsection (a) and any other issues related to such implementation the Director considers appropriate to include in the report.

(d) Information Resources Defined.–In this section, the term “information resources” means networks, systems, workstations, servers, routers, applications, databases, websites, online collaboration environments, and any other information resources in an element of the intelligence community designated by the Director of National Intelligence.

This is precisely what the Senate Intelligence Committee is also mandating. As I pointed out earlier, this seems to simply take DOD’s own lackadaisical deadline and make it a requirement.

In other words, if closing this security gap a year and a half after the leaks are alleged to have occurred is too tough, then they can go ahead and take another year or so to close the barn door.

Though to be fair, this deadline may come directly from the lackadaisical DOD, as the deadlines given here seem to match those DOD aspires to hit.

Now, maybe it’s considered unpatriotic to note that our intelligence community–and its congressional overseers–are tolerating pretty shoddy levels of security all while insisting that they takes leaks seriously.

But seriously: if our government is going to claim that leaks are as urgent as it does, if it’s going to continue to pretend that secrets are, you know, really secret, then it really ought to at least pretend to show urgency on responding to the gaping technical issues that will not only protect against leakers, but also provide better cybersecurity and protect against spies. Aspiring to fix those issues years after the fact really doesn’t cut it.

Ah well! Bin Laden is dead. Who else might want our secrets?


Bradley Manning Protest: White House Bans Journalist for Doing Journalism

To a degree, this reminds me of the Joshua Claus moment, when DOD banned reporters like Carol Rosenberg and Michelle Shephard because they uttered the name “Joshua Claus” in their coverage of his testimony in Omar Khadr’s trial. (Shephard had interviewed him previously, so they were basically asking her to forget information she had gathered independently to be able to cover Gitmo.)

White House officials have banished one of the best political reporters in the country from the approved pool of journalists covering presidential visits to the Bay Area for using now-standard multimedia tools to gather the news.

The Chronicle’s Carla Marinucci – who, like many contemporary reporters, has a phone with video capabilities on her at all times – pulled out a small video camera last week and shot some protesters interrupting an Obama fundraiser at the St. Regis Hotel.

She was part of a “print pool” – a limited number of journalists at an event who represent their bigger hoard colleagues – which White House press officials still refer to quaintly as “pen and pad” reporting.

As with coverage of Omar Khadr’s trial, the Obama Administration seems to be demanding that journalists abdicate their jobs and their instincts to play by the rules.

But the event reminds me of something else: how the White House asked (and persuaded) all the big US outlets to suppress the widely discussed news that Raymond Davis was a spy, even while publications overseas and dirty fucking hippie bloggers were reporting on it.

As the account of Marinucci’s treatment makes clear, the rules they want to enforce on pool reporting basically put her at a disadvantage to everyone else in the room who had and used a cell phone video.

Carla cannot do her job to the best of her ability if she can’t use all the tools available to her as a journalist. The public still sees the videos posted by protesters and other St. Regis attendees, because the technology is ubiquitous. But the Obama Administration apparently wants to give the distinct advantage to citizen witnesses at the expense of professionals.

While there’s a bit of professional snobbery here, it is entirely justified. The White House bizarrely imagines it can manage Obama’s image by imposing rules on journalists it can’t impose on others. Not only does that not do a damn thing to prevent videos like this from getting out. It profoundly corrupts the role of journalists, imposing requirements that ensure they offer only a highly scripted and obviously false view of an event.

It’s simply not fair to require that journalists not tell stories that are already out there in the public sphere. That turns them, once and for all, into stenographers. That’s not what our country needs from presidential press coverage.


Saifullah Paracha’s Gitmo File Contains Suspect Details, but His Defense Attorney Can’t Point Them Out

I’m going to be in transit for another half day yet, but I wanted to comment on this motion David Remes, Gitmo detainee Saifullah Paracha’s attorney, filed to request emergency access to the Detainee Assessment Brief on his client released by WikiLeaks on Monday. (h/t Benjamin Wittes)  Remes describes the implications of the protection order he works under, noting specifically the warning DOJ sent out the other day.

For example, because the government considers the documents classified, and counsel holds a “secret” security clearance, he is concerned that if he views the documents online, the government might revoke his clearance. Losing his clearance will disable him from continuing to represent his current or future detainee clients and jeopardize his ability to obtain further clearances. Counsel is concerned that the government may even prosecute him. To avoid any potential sanctions, undersigned counsel errs on the side of extreme caution and refrains from viewing the documents.

The only place undersigned counsel can view these documents and fear no potential sanctions is at a Secure Facility the Justice Department has provided in the Washington area for counsel with “secret” level clearances. To the best of counsel’s knowledge, the Secure Facility contains no secure computer onto which the Wikileaks documents can be downloaded. Moreover, counsel is confident that the Justice Department will not ferry the documents to the Secure Facility for viewing and use by counsel. Even if the leaked documents were made available for viewing and use by counsel at the Secure Facility, counsel located far from the Facility – some thousands of miles away – would have to journey to the Facility to view and use them. [my emphasis]

That is, Remes could view the documents in just one place without risking losing his clearance and his ability to defend his client, or even criminal sanctions–a DOJ Secure Facility. Yet DOJ is not going to make the documents accessible there. So he’s SOL; he can’t see them.

Remes goes on to describe how this prevents him from defending his client publicly, specifically because he can’t comment for a big article the NYT did which (IMO) offered a credulous reading of Paracha’s file. While that article contains a quote from ACLU National Security Project Director Hina Shamsi noting that the information in the files is uncorroborated, and while NYT admits much of the evidence derives from KSM whom they note was waterboarded, rather than point out obvious suspect details in Paracha’s file, it simply repeats those details uncritically.

Here’s just one reason why Remes needs to have access to the file to adequately represent his client and refute credulous readings of Paracha’s file:

(S//NF) The plan called for shipping explosives in containers that detainee used to ship women’s and children’s clothing to the US. Detainee agreed to this plan. KU-10024 [Khalid Sheikh Mohammed] claimed in early March 2003, PK-10020 and PK-10018 [Ammar al-Baluchi, KSM’s nephew] were arranging the details with detainee and his son Uzair. KU-10024 stated detainee knew all the details of the plan. Uzair understood PK-10018 and PK-10020 were al-Qaida, but KU-10024 was unsure how much Uzair [Paracha’s son] knew about the actual smuggling plan.8 [my emphasis]

There are, in general, just two kinds of evidence offered by KSM in March 2003: evidence the CIA itself claims was disinformation offered by KSM in his early days of captivity while he was still successfully resisting interrogation, and evidence offered up under torture, potentially one of the 183 waterboarding sessions KSM survived in March 2003.

It’s unclear which category this piece of intelligence falls into, but the use of the verb “claimed” suggests there’s something about the intelligence that may have led even the briefer on Paracha’s file to doubt it.

The intelligence report cited for this detail (and therefore collected in March 2003), TD-314/16519-03, is cited three more times in Paracha’s file, only one of which is corroborated by reports dated 2004 and 2005.

In other words, one of the claims against Paracha can be traced back to a March 2003 interrogation of KSM that no one should consider credible. The entire case against Paracha builds off this early interrogation.

There are a number of other reasons to doubt the “facts” laid out in Paracha’s file. Notably, references to Aafia Siddiqui make no mention of her earlier reported detention by the US in Afghanistan, and instead claims “Siddiqui was detained in Afghanistan in mid-July 2008,” thereby hiding a key detail as to the credibility of any intelligence Siddiqui may have offered (or, just as likely, making no mention of intelligence Siddiqui refuted during years of interrogation in US custody in Afghanistan).

Parts of Paracha’s file reveal real weaknesses in the government’s case against him. These are all very basic details Remes needs to point out, particularly if NYT reporters aren’t going to read the file critically themselves. But given the way the protection order works, he can’t do that.


The Cover Story that Serves as a Cover Story

Check out this sentence, which appears at the end of the Executive Summary of a document purporting to debunk the “cover stories” of detainees who claimed to have traveled to Afghanistan to teach the Koran.

Mujahideen that traveled to Afghanistan following the attacks of 11 September 2001 did so with the knowledge that Usama Bin Laden and Al-Qaida were the likely perpetrators of the attack.

Note the assumptions. First, that the detainees picked up in Afghanistan were, by definition, mujahadeen. The document doesn’t define the term. It does contextualize the term “mujahadeen” within the fight against the Russians, then calls recent “recruits” mujahadeen uncritically. And nowhere in the document does it explain how to assess a detainee’s claim that he was not an active fighter, a trainee at an al Qaeda camp, or even a trainee more generally.

Nowhere does the document address evidentiary problems assessing when a detainee left for Afghanistan and/or arrived there and whether the departure preceded 9/11 (though this is one of the least problematic parts of this statement).

As to the claim that detainees that traveled to Afghanistan after 9/11 did so “with the knowledge that Usama Bin Laden and Al-Qaida were the likely perpetrators of the attack”? Here’s the shoddy proof the document offers for the claim that these detainees assumed to be trained fighters knew of 9/11 and Osama bin Laden’s role in it.

There was already speculation on 11 September 2001 as to the origins of the perpetrators of the attacks, and the US Government publicly named Usama bin Laden and Al-Qaida no later than 12 September 2001. Even before this announcement, there were communications between extremists in Afghanistan and elsewhere identifying UBL as the sponsor of the attacks. Prior to the attacks, the recruits would have no way of knowing they would soon be engaged in a battle with a US-led coalition because of the deaths of thousands of innocent people. This does not decrease the recruits [sic] involvement with terrorist groups including Al-Qaida, however, as their travel to Afghanistan and their room and board in the months following their arrival were paid for by the Al-Qaida, the Taliban, and or other supporting extremist groups [sic] fund raising activities and the recruit elected to remain in Afghanistan. Some detainees state they attempted to leave but could not, this too is part of their cover story to show they were not in Afghanistan of their own free will. After 11 September 2001, the new recruits could no longer claim ignorance to the actions of Al-Qaida and the likelihood of hostilities resulting from the US desire to bring those responsible to justice. Therefore, especially following the attacks, Muahideen traveling to Afghanistan did so with the distinct desire to defend UBL and his organization.

Now, there are a lot of basic problems with the claim about speculation that al Qaeda executed the attacks just after 9/11, not least that key players within the Bush Administration were fighting the argument at the time that al Qaeda caused the attack. Ultimately, this amounts to an argument that because Richard Clarke was sure al Qaeda caused the attack, it meant the Americans generally were loudly backing that certainty rather than, for example, trying to turn this into a war against Iraq.

Then there’s the problem that intelligence in US possession by the time this was issued in August 2004 made clear that even Osama bin Laden himself did not expect the US to retaliate as they did. If he was expecting the US to respond with limited missile strikes, than how they hell are purported recruits (ignoring the problem of proving they were recruits) supposed to expect the full response the US made?

Then there’s the implicit problem–with the reference to Al-Qaida “and or other supporting extremist groups”–that many of these purported mujahadeen weren’t even purportedly training with al Qaeda. Even if they knew al Qaeda carried out the attack, where is the proof that because the US would, at some point in the future, assert that those “supporting extremist groups” were affiliated with the attack, recent recruits of those “supporting” groups had to have known that the US would ultimately deem those groups as supporting as well?

But the really big problem here is the failure to even attempt to establish what the media/communications consumption of someone purporting to be teaching the Koran in rural Afghanistan would have, and whether it might credibly include awareness of what Richard Clarke was arguing within the Situation Room of the White House in the days right after 9/11 (not least given the assertion that a number of these detainees had limited schooling). I mean, most Americans on September 12, 2001, watching footage of the attack over and over on CNN, probably didn’t know that al Qaeda caused the attack; many still doubt it did. But we’re insisting someone reading the Koran in Afghanistan would know?

It all feels very familiar. When confronted with refutations of their claims that Iraq had WMD before the war, the US repeatedly attributed those refutations–by people like Hans Blix and Mohammed el Baradei (not people who happened to leave for Afghanistan at an inauspicious time)–to Iraqi cover stories. Anything that didn’t confirm their assumptions was, by definition, a cover story. Only even with all the intelligence claims on Iraq that have been released, we never got to see how shoddy the logic those arguing it was all a cover story really was.

Seeing the logic, though, I’m not sure which is more appalling and embarrassing: that many people treated this as valid analysis? Or that someone had either such bad logical skills or such a desire to generate propaganda that he’d consider this report a coherent argument?


Tortured Confessions and the Gitmo Protection Orders

An unfortunate side effect of the NYT and NPR’s attempt to preempt WikiLeaks’ embargo on the Gitmo Files is that their coverage–rather than the coverage of those who had been working on the files for several weeks–got the most attention. Notably, McClatchy’s team of Tom Lasseter (who had done a series on Gitmo) and Carol Rosenberg (who knows more about it than anyone) had to scramble to get their first story out.

McClatchy’s [chief of correspondents Mark] Seibel said the WikiLeaks notified him at 5:30 p.m. EST that the embargo was lifted. So McClatchy — and the other news organizations working on the project — needed to scramble to finish their first stories as The Times and NPR put the finishing touches on theirs.

Carol Rosenberg, a reporter for McClatchy’s Miami Herald and one of the foremost authorities on Guantanamo Bay in the press corps, said she was caught off guard by the abrupt change of plans. “All I know is I spent nearly the last month digging through documents and was surprised tonight to learn that the embargo was about to be lifted on two hours notice,” Rosenberg said in an email.

Which is why the topic of their second story is so important. It shows that 8 unreliable detainees, several of whom are known to have been tortured, provided a great deal of the intelligence justifying the continuing detention of Gitmo detainees.

The allegations and observations of just eight detainees were used to help build cases against some 255 men at Guantanamo ­ roughly a third of all who passed through the prison. Yet the testimony of some of the eight was later questioned by Guantanamo analysts themselves, and the others were subjected to interrogation tactics that defense attorneys say amounted to torture and compromised the veracity of their information.

How different would the focus on the Gitmo Files be if the first story about it were about the unreliability of the intelligence in the Detainee Assessment Briefs, rather than how many people labeled “high risk” in those DABs went on to be transferred?

To see background on the people who incriminated many of the other Gitmo detainees, go read the whole article. Meanwhile, I just wanted to point out one point about the Gitmo protection order I described yesterday.

McClatchy notes that Mohammed al-Qahtani–whom Convening Authority Susan Crawford admitted was tortured at Gitmo–provided intelligence against 31 detainees.

Muhammad al Qahtani, a Saudi man whose interrogations reportedly included 20-hour sessions and being led around by a leash, appeared as a source in at least 31 cases. A Guantanamo analyst note about Qahtani acknowledged that “starting in winter 2002/2003, (Qahtani) began retracting statements,” though it argued that based on corroborating information “it is believed that (his) initial admissions were the truth.”At the Center for Constitutional Rights in New York, the firm that has championed Qahtani’s unlawful detention lawsuit, senior attorney Shane Kadidal said that “the information that was given in the first place (by Qahtani) was not reliable.” As a condition of his security clearance, Kadidal said, he couldn’t discuss the specifics of the WikiLeaks documents.

As they point out, Shane Kadidal and the Center for Constitutional Rights have handled his defense and presumably know a great deal about the intelligence tied to Qahtani. But because DOJ (and surely, DOD) have warned them that speaking about the Gitmo Files leaked by WikiLeaks would be a violation of their protection order, they can’t comment on them.

In effect, in the name of protecting secrets that are already in the public domain, DOJ has gagged the people best able to comment on these issues.

But then, that’s the way our government uses secrecy to stifle informed discussions in this country.


Illegal Wiretap Leak Probe Dropped

According to Josh Gerstein, DOJ decided not to charge anyone in the illegal wiretap leak probe.

The Justice Department has dropped its long-running criminal investigation of a lawyer who publicly admitted leaking information about President George W. Bush’s top-secret warrantless wiretapping program to The New York Times – disclosures that Bush vehemently denounced as a breach of national security.

[snip]

The Justice Department would not discuss the current status of the probe, which began in late 2005 after the Times story was published with a formal leak complaint from the National Security Agency. However, [Thomas] Tamm’s attorney, Paul Kemp, told POLITICO he and his client were informed “seven or eight months ago” that the investigation into Tamm was over.

The information was relayed during a meeting with the prosecutor handling the case, William Welch, Kemp said. The Justice Department recently issued Tamm a letter confirming that the probe had concluded, the defense attorney said.

Prosecutors also appear to have lost interest in a former National Security Agency official who also publicly acknowledged being a source for the Times on the warrantless wiretapping story, Russell Tice. An attorney for Tice, Joshua Dratel, said it has been several years since prosecutors contacted him about the investigation.

Gerstein discusses the possibility that the investigation was dropped because it was found to be illegal.

“What leaps out to me is the fact that the program was arguably illegal, so while that does not provide a legal defense or immunity to the leaker, from a practical jury-appeal standpoint, which a seasoned prosecutor should consider, how appealing is the case going to be if they’re prosecuting government attorneys for disclosing the program but … the people who were doing the wiretapping don’t get prosecuted?” asked [Peter] Zeidenberg, who was a prosecutor on the leak-related case against Bush White House aide Lewis Libby. “How would you like to be the prosecutor to get up there and make that argument?”

Note, Vaughn Walker’s decision against the government in the al-Haramain case was just over a year ago, so it may be that his decision provided a big disincentive to the government to pursue the case.

Of course, that raises the possibility that the same might be true for Bradley Manning. Granted, his case will not be judged by a jury of civilians; he will have a military jury. Still, as more and more documents he allegedly leak reveal our government’s knowing cover-up that it was detaining innocent people and abetting Iraqi torture, it may make it a lot less palatable to argue against Manning.

Copyright © 2024 emptywheel. All rights reserved.
Originally Posted @ https://www.emptywheel.net/wikileaks/page/33/