Nine Years of Nudity in American Detention

It’s just like old times!

… the CIA interrogators also announced they planned to become Zubaydah’s “God.” They reportedly took his clothing as punishment, and reduced his human interaction to a single daily visit in which they would say simply, “You know what I want,” and then leave.

Jane Mayer, The Dark Side

In addition to degradation of the detainee, stripping can be used to demonstrate the omnipotence of the captor or to debilitate the detainee.

JTF-Gitmo SERE SOP, December 10, 2002

Establishing the baseline state is important to demonstrate to the HVD that he has no control over basic human needs. The baseline state also creates in the detainee a mindset in which he learns to perceive and value his personal welfare, comfort, and immediate needs more than the information he is protecting. The use of conditioning techniques do not generally bring immediate results; rather, it is the cumulative effect of these techniques, used over time and in combination with other interrogation techniques and intelligence exploitation methods, which achieve interrogation objectives. These conditioning techniques require little to no physical interaction between the detainee and the interrogator. The specific interrogation techniques are:

a. Nudity. The HVD’s clothes are taken and he remains nude until the interrogators provide clothes to him.

CIA memo describing combined interrogation techniques, December 30, 2004

Nudity: This technique is used to cause psychological discomfort, particularly if a detainee, for cultural or other reasons, is especially modest. When the technique is employed, clothing can be rewarded as an instant reward for cooperation.

OLC “Techniques” memo, May 10, 2005, withdrawn by Barack Obama

Removal of clothing is different from naked.

Douglas Feith, Testimony before House Judiciary Committee, July 15, 2008

PFC Manning was inexplicably stripped of all clothing by the Quantico Brig. He remained in his cell, naked, for the next seven hours. At 5:00 a.m., the Brig sounded the wake-up call for the detainees. At this point, PFC Manning was forced to stand naked at the front of his cell.

Report from David Coombs on treatment of PFC Bradley Manning, March 3, 2011

We Have Met the Enemy and He Is Us

The stated intent of the Wikileaks.org Web site is to expose unethical practices, illegal behavior, and wrongdoing within corrupt corporations and oppressive regimes …

[snip]

The developers believe that the disclosure of sensitive or classified information involving a foreign government or corporation will eventually result in the increased accountability of a democratic, oppressive, or corrupt the [sic] government to its citizens.

Army Counterintelligence Report on WikiLeaks, allegedly leaked by Bradley Manning between February 15 and March 15, 2010

I quipped in my last post that the new charges filed against Bradley Manning teach us that we are the enemy–or at least are considered to be the enemy by the federal government. I was referring to the charge that Manning “knowingly gave intelligence to the enemy.” After all, we’re the ones Manning allegedly gave this information to.

Via Glenzilla, Kevin Jon Heller provides more detail about what this charge entails. He summarizes his understanding of how the military might be intending to prove their case against Manning this way:

[1] Manning is guilty of “giving intelligence to the enemy,” because he gave intelligence to WikiLeaks that he knew would be made available on the internet, and an enemy of the United States did, in fact, access that information.

[2] Manning is guilty of “commun[i]cating with the enemy” because he gave information to WikiLeaks intending that an enemy of the United States would receive it.  (The “intent required” view.)

[3] Manning is guilty of “communicating with the enemy” because he gave information to WikiLeaks knowing that it would be published on the internet, where any enemy could access it. (The intent not required view.)

Heller dislikes examples 1 and 3 because they threaten Manning with life imprisonment for something that newspapers do, but he doubts the government is relying on example 2 because, he argues, it would require making the argument that Manning intended al-Qaeda to get the information. Yet, as Glenn points out, we don’t have to guess at Manning’s intent (at least if we believe the chat logs are authentic); Manning described his own goal for leaking information this way:

Manning: well, it was forwarded to [WikiLeaks] – and god knows what happens now – hopefully worldwide discussion, debates, and reforms – if not, than [sic] we’re doomed – as a species – i will officially give up on the society we have if nothing happens – the reaction to the video gave me immense hope; CNN’s iReport was overwhelmed; Twitter exploded – people who saw, knew there was something wrong . . . Washington Post sat on the video… David Finkel acquired a copy while embedded out here. . . . – i want people to see the truth . . . regardless of who they are . . . because without information, you cannot make informed decisions as a public. [emphasis Glenn’s]

Glenn suggests another possible way the government might be thinking of “enemy” here–one Heller dismisses.

In light of the implicit allegation that Manning transmitted this material to WikiLeaks, it is quite possible that WikiLeaks is the “enemy” referenced by Article 104, i.e., that the U.S. military now openly decrees (as opposed to secretly declaring) that the whistle-blowing group is an “enemy” of the U.S.

I’d like to look at that possibility more directly, because I think it is one the government might actually have the proof for.

As I noted earlier, Charge II, Specification 15 alleges that Manning:

between on or about 15 February 2010 and on or about 15 March 2010, having unauthorized possession of information relating to the national defense, to wit: a classified record produced by a United States Army intelligence organization, dated 18 March 2008, with reason to believe such information could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicate, deliver, transmit … the said information, to a person not entitled to receive it …

This is one of the new charges from yesterday.

We know from the date and the description that this charge refers to the counterintelligence report the NGIC did on WikiLeaks. WikiLeaks published that report on March 15, 2010.

That’s significant because, in addition to treating WikiLeaks as a counterintelligence threat, the report reviews several leaks of DOD information previously released by WikiLeaks, then describes the threat presented by it this way.

(S//NF) It must be presumed that Wikileaks.org has or will receive sensitive or classified DoD documents in the future. This information will be published and analyzed over time by a variety of personnel and organizations with the goal of influencing US policy. In addition, it must also be presumed that foreign adversaries will review and assess any DoD sensitive or classified information posted to the Wikileaks.org Web site. Web sites similar to Wikileaks.org will continue to proliferate and will continue to represent a potential force protection, counterintelligence, OPSEC, and INFOSEC threat to the US Army for the foreseeable future. Sensitive or classified information posted to Wikileaks.org could potentially reveal the capabilities and vulnerabilities of US forces, whether stationed in CONUS or deployed overseas.

(S//NF) The proliferation of access to Internet, computer, and information technology technical skills, software, tools, and databases will allow the rapid development, merging, integration, and manipulation of diverse documents, spreadsheets, multiple databases, and other publicly available or leaked information. Possible enhancements could increase the risk to US forces and could potentially provide potential attackers with sufficient information to plan conventional or terrorist attacks in locations such as Iraq or Afghanistan.

In other words, the government is newly charging Manning with leaking a document that clearly identifies WikiLeaks as a threat to US forces. Read more

Bradley Manning’s New Charges: “Bringing Discredit upon the Armed Forces”

Aside from learning that we–the recipients of a bunch of information Bradley Manning is alleged to have leaked–are the enemy, what did we learn from the new charges the government filed against Bradley Manning yesterday? Most of the charges say the information Manning allegedly leaked were of a nature that they would bring discredit upon the armed forces. Heh.

Here’s a summary of the charges, with my comments (note, these are all allegations–I won’t repeat that remind with each charge, but please keep it in mind):

Charge I; Article 104: Between November 1, 2009 and May 27, 2010, giving intelligence to the enemy, through indirect means.

Note, here’s how that article defines “enemy:”

“Enemy” includes (not only) organized opposing forces in time of war, (but also any other hostile body that our forces may be opposing) (such as a rebellious mob or a band of renegades) (and includes civilians as well as members of military organizations). (“Enemy” is not restricted to the enemy government or its armed forces. All the citizens of one belligerent are enemies of the government and the citizens of the other.)

As I’ll discuss in a follow-up, I think they may be refusing to say who they consider the enemy in one more effort to tie Manning to Julian Assange. But since they don’t specify who the enemy is, we can just assume it is us.

Charge II, Article 134, Specification 1: “Wrongfully and wantonly” causing intelligence to be published in the internet.

This one, it seems to me, might be broad enough to trouble the newspapers that have published the cables.

Charge II, Specification 2: Between February 15 and April 5, 2010, transmitting the Collateral Murder video to someone not entitled to receive it.

The date on this is interesting: WikiLeaks was already boasting of having a video on January 8, and they announced decrypting it (which was a ruse–it was not encrypted) on February 20, which correlates with the timing Manning described in the chat logs. I wonder if the government hasn’t been able to pinpoint when this was transmitted?

Charge II, Specification 3: Between March 22 and 26, 2010, transmitting more than one classified memo to someone not entitled to receive it.

On March 23, the WL twitter feed announced, “We know our possession of the decrypted airstrike video is now being discussed at the highest levels of US command.” This was the time period when it appears Manning, according to the chat logs, was tracking the surveillance of Assange. I suspect this reference pertains to this information.

Charge II, Specification 4: Between December 31, 2009 and January 5, 2010, getting the “Combined Information Data Network Exchange Iraq database” of more than 380,000 records.

This suggests the government believed Manning had this by the first few days of 2010.

Read more

Time to Reevaluate the Importance of Bradley Manning’s Alleged Leak?

Back when WikiLeaks leaked the Collateral Murder video, I was agnostic about the value of the leak. Surely, exposing the cover-up of the killing of the Reuters journalists was important. But I thought the response focused too much on the soldiers who had been trained to respond the way they had, and too little on the architects of the policies that put them in that dehumanizing position.

I personally didn’t delve much into the Afghan cable dump, so I never really assessed its value. And with the sole exception of the Iran hiker cable–which the NYT left dangerously unredacted to make one of its pet points–I found the Iraq cables to be redacted beyond the point of usefulness.

And so it was that in the early days after the State cable release when Joe Lieberman was intervening to try to prevent publication of WikiLeaks, Joe Biden was calling Julian Assange a high tech terrorist, and Sarah Palin was advocating hunting down WikiLeaks like al Qaeda, I was somewhat agnostic on the value of the massive leaks WikiLeaks released. When Floyd Abrams was trying to distinguish “good” leaker Daniel Ellsberg from “bad” alleged leaker Bradley Manning, I knew there had been revelations important to my issues, but I wasn’t sure how Manning’s alleged leak would measure up across time.

That seems like a long, long time ago.

And while we don’t yet know how the State Department cable leaks will weather history, the importance of the leak now seems beyond question. Consider the way the NYT–the Administration’s mole in the press corps–continues to rely on the cable leaks even while it disdains Julian Assange as a bag lady. Indeed, on some stories the NYT is getting scooped on by their former reporters, they use cables as a crutch to catch up.

The NYT is not alone; it seems news outlets around the world have grown accustomed–and downright happy–that these sources are all out there to help them do their jobs.

And consider the range of stories we’ve seen. We’ve seen American pressure on allies to put counterterrorism policies–both data collection and torture–ahead of democracy. We’ve seen how our troops in Iraq knowingly turned over Iraqis to be tortured. We’ve seen our allies in the Middle East promising to cause democratic elections not to take place. And while I definitely don’t think WikiLeaks “caused” the Middle Eastern uprising, they did make it hard for Western elites to defend their former client dictators once the uprisings started.

Over time, I think one of the most damning lessons from the State cables will be evidence of the tolerance for bribery and looting that rots our foreign policy. Thus far, we’ve seen details of our allies’ oil bribery, our disinterest in doing anything about Hosni Mubarak’s or Muammar Qadaffi’s or the Saudis’ looting, We’ve also seen how our government apparently threw its investigation of rich tax cheats to get Switzerland to take three of our Gitmo detainees. Our government complains about the corruption of other countries. But as WikiLeaks makes clear, those complaints are mostly just for public show.

Our government may hate all these disclosures. But they are disclosures we, as citizens, need to demand our government deliver on its promise of democracy.

After all this time, it seems, El Pais editor Javier Moreno seems to have had the right read on these leaks.

A democracy comprises diverse elements: institutions and rules; free and fair elections; independent judges and a free press, among others. At the bottom of all this there are legal procedures. When these are flouted, all the rest is put at risk.

We have come to accept the difference between the government that we elect every five years, and the military, bureaucratic, and diplomatic apparatus that it is sustained by, but that all too often it fails to control. The WikiLeaks cables have confirmed this beyond any doubt.

Ellsberg’s leak of the Pentagon Papers proved our government systematically lied about the war in Vietnam. The WikiLeaks dumps have proved that our government systematically lies about democracy.

Progressives Demand House GOP Committee Chairs Investigate Hunton & Williams

When I first posted on Hank Johnson’s letter demanding an investigation into Hunton & Williams’ appropriation of counterterrorist techniques to attack citizen speech, I was a bit skeptical. Without a way to get some coverage of the demand, such a letter risks being yet one more angry letter into the void.

But I will say the letter is well-constructed.

That’s because it’s addressed to the Chairmen of the Oversight, Judiciary, Intelligence, and Armed Services Committees: Darrell Issa, Lamar Smith, Mike Rogers, and Buck McKeon. So in addition to someone, like Smith, who can address the legal issues involved–notably, why DOJ was recommending H&W to Bank of America–Johnson and others have included Rogers and McKeon, who presumably know a good deal about how DOD has funded campaigns like the one H&W was going to launch against citizens.

Which brings us to the DOD tie-in:

The techniques may have been developed at U.S. government expense to target terrorists and other security threats. The emails indicated that these defense contractors planned to mine social network sites for information on Chamber critics; planned to plant “false documents” and “fake insider personas” that would be used to discredit the groups; and discussed the use of malicious and intrusive software (“malware”) to steal private information from the groups and disrupt their internal electronic communications.

[snip]

It is deeply troubling to think that tactics developed for use against terrorists may have been unleashed against American citizens.

[snip]

Possible proof the defense and security contractors may have traded on their government work is inferred by a November 3, 2010, sales proposal from Team Themis to Hunton & Williams: “Who better to develop a corporate information reconnaissance capability than companies that have been market leaders within the [Defense Department] and Intelligence Community?

The focus, in other words, is not just on how such a campaign violates the law, but also how it represents the application of DOD-developed programs to private citizens exercising their First Amendment rights.

Sure, the GOP Chairs will ignore this.

But it’ll make them complicit in protecting the Chamber’s and H&W’s misappropriation of DOD technology.

If a TBTF Bank Lost Its Quant Code to Chinese Hackers and No One Knew, Would We Still Have a Functioning Market?

Bloomberg has an excellent catch from the HB Gary emails, revealing that Morgan Stanley was one of the 20-200 companies targeted by the Chinese-based Aurora hack in 2009.

Morgan Stanley experienced a “very sensitive” break-in to its network by the same China-based hackers who attacked Google Inc.’s computers more than a year ago, according to e-mails stolen from a cyber-security company working for the bank.

The e-mails from the Sacramento, California-based computer security firm HBGary Inc., which identify the first financial institution targeted in the series of attacks, said the bank considered details of the intrusion a closely guarded secret.

“They were hit hard by the real Aurora attacks (not the crap in the news),” wrote Phil Wallisch, a senior security engineer at HBGary, who said he read an internal Morgan Stanley report detailing the so-called Operation Aurora attacks.

As McAfee made clear when it first announced the hack, the hackers were after the targets’ intellectual property (though note the understanding of the timing of the hack has changed).

Similar to the ATM heist of 2009, Operation Aurora looks to be a coordinated attack on many high profile companies targeting their intellectual property. Like an army of mules withdrawing funds from an ATM, this malware enabled the attackers to quietly suck the crown jewels out of many companies while people were off enjoying their December holidays.

Now, Bloomberg–with backing from an FBI officer and a reminder that Morgan Stanley is the world’s larger mergers and acquisitions adviser–seems to be most concerned about what the hackers learned about impending M&A.

FBI Deputy Assistant Director Steven Chabinsky said that hackers have increasingly targeted information related to mergers and acquisitions, data that can give companies involved an advantage in negotiations.

But the description of the targeted information as IP immediately made me think about quant code, the algorithms that banks use to conduct high frequency trading. When Sergey Aleynikov attempted to sell Goldman Sachs’ high frequency trading code, the Goldman and the government treated it like a capital offense. For good reason, because if another firm got that code, it would be able to game out Goldman’s moves. So how do we know that these hackers didn’t steal MS’ quant code?

In any case, the hack seems to raise real questions about disclosure. Should Morgan Stanley have had to reveal this to its stockholders and potential M&A clients (remember that MS led GM’s IPO last year, though hopefully long enough after this hack for the merger not to be exposed by it). Should MS have had to reveal this–with the potential implications for markets–to Congress? Did it?

I just can’t help but think that the Aurora hackers may well have gotten the same kind of information that Congressional oversight committees have requested from the Fed, but were refused.

“Tactics Developed for Use against Terrorists May Have Been Unleashed against American Citizens”

Hmmm. “Tactics developed for use on terrorists may have been unleashed against citizens.” That sounds like something I would have written about the HB Gary scandal. Twice.

It’s nice to see some members of Congress understand what the entire problem with this scandal is about.

In a letter to be released Tuesday, Rep. Hank Johnson (D-Ga.) and more than a dozen other lawmakers wrote that the e-mails appear “to reveal a conspiracy to use subversive techniques to target Chamber critics,” including “possible illegal actions against citizens engaged in free speech.”

The lawmakers say it is “deeply troubling” that “tactics developed for use against terrorists may have been unleashed against American citizens.”

[snip]

The companies proposed forming a “corporate information reconnaissance cell” and discussed tactics such as creating online personas to infiltrate activist Web sites; planting false information to embarrass U.S. Chamber Watch and other groups; and trolling for personal information using powerful computer software.

You almost wonder whether this is why Aaron Barr resigned? To try to stave off attention to how common it is for corporations to treat citizen speech as terrorism?

HB Gary CEO Aaron Barr Resigns

He’ll probably just get picked up by TASC, which was about to buy out HB Gary Federal anyway. But I do take some pleasure at his recognition that his reputation is for shit.

Embattled CEO Aaron Barr says he is stepping down from his post at HBGary Federal to allow the company to move on after an embarassing data breach.

[snip]

In an interview with Threatpost, Barr said that he is stepping down to allow himself and the company he ran to move on in the wake of the high profile hack.

“I need to focus on taking care of my family and rebuilding my reputation,” Barr said in a phone interview. “It’s been a challenge to do that and run a company. And, given that I’ve been the focus of much of bad press, I hope that, by leaving, HBGary and HBGary Federal can get away from some of that. I’m confident they’ll be able to weather this storm.”

Good riddance, I say!

“Shut up and explain how we could assist the FPs in finding *MORE* detainees”

Atrios points out the hypocrisy of our foreign policy as displayed in his Twitter stream.

It reminded me of this:

(02:26:01 PM) Manning: i dont believe in good guys versus bad guys anymore… i only a plethora of states acting in self interest… with varying ethics and moral standards of course, but self-interest nonetheless

(02:26:18 PM) Manning: s/only/only see/

(02:26:47 PM) Lamo: the tm meant i was being facetious

(02:26:59 PM) Manning: gotchya

(02:27:47 PM) Manning: i mean, we’re better in some respects… we’re much more subtle… use a lot more words and legal techniques to legitimize everything

(02:28:00 PM) Manning: its better than disappearing in the middle of the night

(02:28:19 PM) Manning: but just because something is more subtle, doesn’t make it right

(02:29:04 PM) Manning: i guess im too idealistic

(02:31:02 PM) Manning: i think the thing that got me the most… that made me rethink the world more than anything

(02:35:46 PM) Manning: was watching 15 detainees taken by the Iraqi Federal Police… for printing “anti-Iraqi literature”… the iraqi federal police wouldn’t cooperate with US forces, so i was instructed to investigate the matter, find out who the “bad guys” were, and how significant this was for the FPs… it turned out, they had printed a scholarly critique against PM Maliki… i had an interpreter read it for me… and when i found out that it was a benign political critique titled “Where did the money go?” and following the corruption trail within the PM’s cabinet… i immediately took that information and *ran* to the officer to explain what was going on… he didn’t want to hear any of it… he told me to shut up and explain how we could assist the FPs in finding *MORE* detainees

(02:35:46 PM) Lamo : I’m not here right now

(02:36:27 PM) Manning: everything started slipping after that… i saw things differently

(02:37:37 PM) Manning: i had always questioned the things worked, and investigated to find the truth… but that was a point where i was a *part* of something… i was actively involved in something that i was completely against… [my emphasis]

All the pop psychology that has been offered to explain why Bradley Manning allegedly leaked to WikiLeaks serves to obscure his own very clear explanation: Manning first “saw things differently” when he was ordered to help our client thug in Iraq crack down on very tame domestic dissent.

While I think the Administration has been not-horrible in its response to the upheaval in the Middle East, it still is mostly just “words and legal techniques to legitimize” American self interest.

Spain Will Investigate Gitmo Torture

The High Court in Spain has decided that it can proceed with its investigation of the torture that Lahcen Ikassrien alleges he suffered at Gitmo.

A Spanish court Friday agreed to investigate a complaint by a Moroccan who said he was tortured while in the US detention camp in Guantanamo Bay, Cuba, judicial sources said.

The National Court said it was competent to take the case as the complainant, Lahcen Ikassrien, has been living in Spain for 13 years.

[snip]

The judges Friday rejected an appeal by prosecutors who sought to have the case thrown out on the grounds that Ikassrien did not have sufficient links with Spain.

Here’s what the Center for Constitutional Rights has to say about the news:

This is a monumental decision that will enable a Spanish judge to continue a case on the “authorized and systematic plan of torture and ill treatment” by U.S. officials at Guantanamo. Geoffrey Miller, the former commanding officer at Guantánamo, has already been implicated, and the case will surely move up the chain of command. Since the U.S. government has not only failed to investigate the illegal actions of its own officials and, according to diplomatic cables released by WikiLeaks,  also sought to interfere in the Spanish judicial process and stop the case from proceeding, this will be the first real investigation of the U.S. torture program. This is a victory for accountability and a blow against impunity. The Center for Constitutional Rights applauds the Spanish courts for not bowing to political pressure and for undertaking what may be the most important investigation in decades.

As always, it pays to be skeptical that the US won’t still find a way to quash this investigation. But given the exposure WikiLeaks gave DOJ’s prior interventions with Spanish officials, they may have overplayed their hand.Also note, this is not the case that implicates the 6 lawyers who approved torture. I suspect that the pending suits against John Yoo and others might give the DOJ the ability to claim that crime is still being investigated here in the states.

Update: CCR quote updated.

image_print