Sam Adams Associates for Integrity in Intelligence

Chelsea Manning

Chelsea Manning (depiction accompanying name change at Huffington Post:

Know all ye by these presents that Chelsea Manning is hereby awarded the Corner-Brightener Candlestick, presented by Sam Adams Associates for Integrity in Intelligence.

The Sam Adams award is in the form of a candlestick holder, as it celebrates the shining of light into the murkiest areas of human activity. This Chelsea Manning did to tremendous effect. Never before had the potential of the information age to expose the evildoing of the powerful, been so fully exploited and revealedChelsea’s work opened up a new era in the relationship between governors and governed.

Chelsea, you acted from motives of compassion for the victims of war crime and concern that the policy of your country was creating rather than reducing violence and terrorism, while the true facts were consistently withheld from the public. The articulacy, good sense, and
genuine humanitarian concern which characterise your defence statement at your show trial, will eventually be recognised widely as a classic and lasting testimony of the very best of the human spirit.

It says everything you need to know about Barack Obama’s United States that one of its noblest citizens now languishes in one of its jails. Chelsea, you are more free than all those who spend their lives covering up for evil. We applaud your courage, dignity and integrity and we want you to know that, wherever you may be, we are always with you and supporting you. It is an enormous honour for me, Ambassador Craig Murray, to present you with this, the Sam Adams Award.

Presented this 19th day of February 2014 by admirers of the example set by the late CIA analyst, Sam Adams.

Related Articles

You Needed to Know America’s Ugly Truth

Chelsea Manning/The New York Times

You Needed to Know America's Ugly Truth

Chelsea Manning. (photo: Lars Hagberg/AFP/Getty Images) (Original Opinion | Chelsea Manning: ‘I’m Still Bound to Secrecy’ – The New York Times (nytimes.com)

It is not possible to work in intelligence and not imagine disclosing the many secrets you bear.

I can’t pinpoint exactly when the idea first crossed my mind. Maybe it was in 2008, when I was learning to be an intelligence analyst in the U.S. Army and was exposed to sensitive information for the first time. Or maybe the germ of the idea was planted when I was stationed at Fort Drum, in upstate New York. I was tasked with transporting a cache of classified hard drives in a large box in the summer heat, and I began to imagine what might happen if I screwed it up and left the box unattended. If someone managed to get ahold of a stray hard drive, what ripple effects might it cause?

I knew the official version of why these secrets had to be kept secret. We were protecting sources. We were protecting troop movements. We were protecting national security. Those things made sense. But it also seemed, to me, that we were protecting ourselves.

While I felt that my job was important, and I took my obligations seriously, a part of me always wondered: If we were acting ethically, why were we keeping so many secrets?

The months I spent in Iraq in 2009 changed the way I understood the world. Every night, I woke up in the desert at 9 p.m. and walked from my tiny trailer to the Saddam Hussein-era basketball court that the military had converted into an intelligence operations center.

I sat at a computer screen for hours at a stretch, going through reports from our troops in the field. Monitoring reporting was like drinking from a fire hose: The military used at least a dozen different intelligence, surveillance and reconnaissance assets. Each gave us a different view of the conflict and of the people and places we were watching. My job was to analyze, with emotional detachment, what impact military decisions were having on this giant, bloody “war on terror.”

The daily reality of my job was like life in a trauma ward. I’d spent hours learning every aspect of the lives of the Iraqis who were dying all around us: what time they got up in the morning, their relationship status, their appetites for food and alcohol and sex, whether they were engaged in political activities, and all the people they interacted with electronically. In some cases, I probably knew more about them than they knew about themselves.

I couldn’t talk about my work with anyone outside my unit, nor about this conflict that looked nothing like the one I’d read about back home or watched on the TV news before I enlisted.

We were seven years into the wars in Iraq and Afghanistan, and people in the United States had begun to pretend that all of the conflict — all the lost American lives and the still-uncounted lost lives of Iraqis and Afghans — had been worth it. Attention turned away. The establishment moved on. There was the recession to deal with. People at home were losing everything. The health care debate was on the news every night. Yet we were still there. Still dying.

I was constantly confronted with these two conflicting realities — the one I was looking at, and the one Americans at home believed. It was clear that so much of the information people received was distorted or incomplete. This dissonance became an all-consuming frustration for me.

The idea that the information I had access to held real power began to flash into my brain more often. I’d try to ignore it, and it would come back.

In the intelligence field, you are vigorously inculcated with the notion that you can’t tell anyone anything about what you do, ever. This secrecy comes to control how you think and how you operate in the world. But the power of prohibition is fragile, especially once the justifications start to seem arbitrary.

During my time in intelligence, I had noticed that there was inconsistent internal logic to classification decisions. And I came to see that the classification system exists wholly in the interest of the U.S. government — in other words, it seems to exist not to to keep secrets safe but to control the narrative.

In December 2009, I began the process of downloading reports of all our activities from Iraq and Afghanistan.

These were descriptions of enemy engagements with hostile forces or explosives that detonated. They contained body counts, coordinates and businesslike summaries of confusing, violent encounters. They contained, in their aggregate force, something much closer to the truth of what those two wars really looked like than what Americans were learning at home. They were a pointillist picture of wars that wouldn’t end.

I burned the files onto DVDs, labeled with titles like Taylor Swift, Katy Perry, Lady Gaga, Manning’s Mix. I later transferred the files to a memory card, then shattered the discs with my boots on the gravel outside the trailers. On my next leave, I brought the documents back to America in my camera, as files on an SD memory card. This was every single incident report the U.S. Army had ever filed about Iraq or Afghanistan, every instance where a soldier thought there was something important enough to log and report. Navy customs personnel didn’t blink an eye. No one cared enough to notice.

Uploading the files directly to the internet wasn’t my first choice. I tried to reach traditional publications, but it was a frustrating ordeal. I didn’t trust the telephone, nor did I want to email anything; I could be surveilled. Even pay phones weren’t safe.

I went into chain stores — Starbucks, mostly — and asked to borrow their landline because supposedly my cellphone was lost or my car had broken down. I called The Washington Post and The New York Times, but I didn’t get anywhere.

I recalled that in 2008, during intelligence training, our instructor — a Marine Corps veteran turned contractor — told us about WikiLeaks, a website devoted to radical transparency, while instructing us not to visit it. But while I shared WikiLeaks’ stated commitment to transparency, I thought that for my purposes, it was too limited a platform. Most people back then had never heard of it. I worried that information on the site wouldn’t be taken seriously.

The website was the publication of last resort, but as the weeks went by and I got no response from traditional newspapers, I grew increasingly desperate. So, on the very last day of my leave, I went to a Barnes … Noble with my laptop.

Sitting at a chair in the bookstore cafe, I drank a triple grande mocha and zoned out, listening to electronic music — Massive Attack, Prodigy — to wait out the uploads. There were seven chunks of data to get out, and each one took 30 minutes to an hour. The internet was slow, and the connection was bad. I began to worry that I wouldn’t be able to complete my work before the store closed. But the Wi-Fi finally did its job.

The fallout was instant and intense. The documents proved, unambiguously and unimpeachably, just how disastrous the war still was. Once revealed, the truth could not be denied or unseen: This horror, this constellation of petty vendettas with an undertow of corruption — this was the truth of the war.

The disclosures became a flash point for a larger argument about how the United States should engage internationally, and how much the public deserved to know about how their government was acting in their name. I had changed the terms of the debate and pulled back the curtain. But while all that was happening, I knew nothing about it. I was in a cage.

Everyone now knows — because of what happened to me — that the government will attempt to destroy you fully, charge you with everything under the sun, for bringing to light the ugly truth about its own actions. What I was trying to do had never been done before, and therefore the consequences were, at the time, unknowable.

Daniel Ellsberg, who had disclosed the Pentagon Papers during the Vietnam War, avoided prison because of illegal evidence-gathering by the Nixon White House (which had ordered a break-in of his psychiatrist’s office, in search of information that might discredit Mr. Ellsberg).

Nobody had gone to prison for this sort of thing; I hadn’t heard of Mr. Ellsberg at the time, but I was very aware of Thomas Drake, a National Security Agency whistle-blower who had been prosecuted under the Espionage Act. He’d faced charges that carried a 35-year prison sentence, but shortly before trial he’d cut a deal that left him with only probation and community service.

I certainly weighed the potential consequences. If I was caught, I would be detained, but I figured at most I was going to be discharged or lose my security clearance. I cared about my work, and it was frightening to imagine losing my job — I had been homeless before enlisting — but I thought that if I was court-martialed, it would damage only the government’s own credibility. I never really reckoned with the notion of a life spent in prison, or worse.

The details of what happened to me are, by now, well known. I was held for several months in a cage in Kuwait. I was sentenced to 35 years in a maximum-security prison, where I spent seven years, much of it in solitary confinement. During that time, I came out as transgender and transitioned. Denied gender-affirming health care, I went on a hunger strike. I attempted suicide twice.

But even in prison I remained active. I began writing a column for The Guardian. I drafted a bill, “Bill to Re-establish the National Integrity and to Protect Freedom of Speech, and the Freedom of the Press,” which I proposed on Twitter and sent to members of Congress. It was meant to outlaw some of the most egregious ways that the Espionage Act and Computer Fraud and Abuse Act had been used against me, so that others wouldn’t be put in such a bind for wanting to do the right thing. It also included fixes to the Freedom of Information Act and would give stronger federal protections to journalists. It was a pipe dream and was treated as such.

On Jan. 17, 2017, President Barack Obama commuted my sentence, and I was released. Everyone expected me to be in shock at being out, to kiss the ground or something. It did feel surreal to be free, but it also felt as if what I’d been dealing with for the previous seven years would never be over. It certainly isn’t over now. I can never leave it behind.

This was my first time as a free woman. I had spent several years transitioning, so I felt comfortable in the way my body moved and felt. Even in prison, with restrictions on hair length and clothing, people had begun to accept me as a woman. They treated me as a human being. But now I needed to navigate a larger world with this new identity.

I emerged from prison a celebrity. I had been made, without consultation, into a symbol and figurehead for all kinds of ideas. Some of that was fun — Annie Leibovitz photographed me for Vogue’s September issue. Some of it — the C.I.A. director pressuring Harvard to uninvite me from a visiting fellowship, Fox News seizing upon my very existence as a cheap way to rile up its viewers — was much less so.

The main upside to my notoriety has been that I can do important work. Activism quickly became almost a full-time job. I went to the Pride parade in New York City; I ran for Senate in Maryland; I protested the Trump administration’s policies on immigration and refugees, and President Donald Trump’s reinstatement of the ban on transgender personnel in the military. The political moment into which I emerged is one in which we are figuring out what got us here as a country.

What I did during my enlistment was part of a deep American tradition of rebellion, resistance and civil disobedience — a tradition we have long drawn upon to force progress and oppose tyranny. The documents I made public expose how little we knew about what was being done in our name for so many years.

Despite becoming notorious for my acts of divulgence, I am still, in many ways, bound to secrecy. There are things the media has made public about this story that I can’t comment on, confirm or deny. Certain details remain classified. I am limited to some degree in what I can put on the record.

Some people have characterized me as a traitor, which I continue to reject. I have faced serious consequences for sharing information that I believe to be in the public interest. But I believe that what I did was my democratic and ethical obligation.

VIPS: Extradition of Julian Assange Threatens Us All

Published on Consortiumnews.

Retaliation against Julian Assange over the past decade plus replicates a pattern of ruthless political retaliation against whistleblowers, in particular those who reveal truths hidden by illegal secrecy, VIPS says.

DATE: April 30, 2019

MEMORANDUM FOR: The governments and people of the United Kingdom and the United States

FROM: Veteran Intelligence Professionals for Sanity (VIPS)

SUBJECT: Extradition of Julian Assange Threatens Us All

On April 11, London police forcibly removed WikiLeaks co-founder Julian Assange from the embassy of Ecuador after that country’s president, Lenin Moreno, abruptly revoked his predecessor’s grant of asylum. The United States government immediately requested Assange’s extradition for prosecution under a charge of “conspiracy to commit computer intrusion” under the Computer Fraud and Abuse Act (CFAA).

Former U.S. Government officials promptly appeared in popular media offering soothing assurances that Assange’s arrest threatens neither constitutional rights nor the practice of journalism, and major newspapers like The New York Times and The Washington Post fell into line.

Not So Fast

Others found reason for concern in the details of the indictment. Carie DeCel, a staff attorney for the Knight First Amendment Institute, noted that the indictment goes beyond simply stating the computer intrusion charge and “includes many more allegations that reach more broadly into typical journalistic practices, including communication with a source, encouraging a source to share information, and protecting a source.”

In an analysis of the indictment’s implications, the Project on Government Oversight (POGO) observed that it includes an allegation that “Assange and Manning took measures to conceal Manning as the source of the disclosure…including by removing usernames from the disclosed information and deleting chat logs between Assange and Manning,” and that they “used a special folder on a cloud drop box of WikiLeaks to transmit classified records.”

“These are not only legitimate but professionally advised journalistic practices for source protection,” notes POGO. It is worth noting that Manning had Top Secret clearance and did not need Assange’s assistance to gain access to databases, but only to hide her identity.

The indictment’s implied threat thus reaches beyond Assange and even beyond journalists. The threat to journalists and others does not vanish if they subsequently avoid practices identified in the government’s indictment. The NSA’s big bag of past communications offers abundant material from which to spin an indictment years later, and even circumstantial evidence can produce a conviction. Moreover, the secret landscape—a recent and arbitrary development—continually expands, making ever more of government off limits to public view.

When politician and U.S. Secretary of State Mike Pompeo labeled WikiLeaks a “non-state hostile intelligence service,” he was describing the oft-stated duty of newspapers, “to comfort the afflicted, and to afflict the comfortable.”

The Devil in the Big Picture

One can look so closely at the indictment details that one misses the big picture and with it vital truths. Standing back for a broader view, a long-running campaign of harassment by U.S. authorities and former officials focused on WikiLeaks’ publication of embarrassing secrets becomes visible. The Project on Government Oversight observes:

“Even if the motives for Assange’s indictment are entirely legitimate, the litany of high-ranking government officials who called for Assange to be prosecuted for publishing classified documents have likely already irreparably harmed the freedom of the press. It will be virtually impossible to fully disentangle the government’s desire to prosecute Assange for his publishing activities from the government’s current prosecution of him, and as a result there will to some degree be an unavoidable chilling effect stemming from his prosecution.”

Standing back still further, a crowd of similar cases comes into view: other truth tellers subjected to similar persecution. These are not journalists but another species of truth teller — national security whistleblowers— who have warned for years that this day would come.

A Pattern of Reprisal

Opinions of Julian Assange’s character and methods vary wildly but what is relevant to First Amendment freedoms is how the U.S. government perceives him. The big picture reveals that Assange, a publisher of whistleblower disclosures, is viewed the same way as whistleblowers: unwelcome lights shining on official wrongdoing who must be dimmed, deflected and shut off. What government bodies are doing to Assange they routinely have done to whistleblowers— Thomas Drake, Jeffrey Sterling, John Kiriakou, Thomas Tamm, William Binney, Daniel Ellsberg, Chelsea Manning and others—who disclosed for public benefit information the government finds politically troublesome.

Once the government develops animus toward a truth teller, it fishes indefinitely until it finds some means to retaliate—some pretext to punish that individual. A pattern of retaliation against high-profile national security whistleblowers includes the following tactics:

  1. relentless campaigns of character assassination and misinformation about facts of the case;
  1. hostile, lengthy government investigations, often for minor, never proven or circumstantial offenses;
  1. terrorization of the whistleblower and associates with threats (see here and here), solitary confinement and armed home invasions for non-violent, alleged offenses;
  1. pre-trial declarations of guilt from influential officials, such as Barack Obama’s declaration (as the military’s Commander-in-Chief) that Army Private Bradley (now Chelsea) Manning “broke the law” — potentially influencing the Army court that heard her case.
  1. a Balkanized judicial process that restricts most such cases to onejudicial venue cherry-picked by prosecutors for speedy deference to government, a venue sealed off from public scrutiny and, some say, justice;
  1. prosecution under the Espionage Act, a “vague” and “draconian” law, similar in those respects to the CFAA;
    1. continuing persecution—isolation, marginalization, blacklisting, and more—after time has been served (see here and here) or after charges are dropped.

    Reportedly, British and U.S. intelligence are interrogating Assange, possibly employing torture tactics, without access to legal counsel at a prison reserved for terrorists. U.S. officials apparently charged Assange as “a terrorist” in order to dodge the problem of the statute of limitations for conspiracy or computer intrusion by extending (via the Patriot Act and/or other terrorism laws) the normal statute of limitations from 5 to 8 years.

    Not for Insiders

    Even if charges against a whistleblower are later dropped, governments still win because the tactics used damage the truth teller professionally, financially, socially and psychologically, and foreseeably chill other whistleblowers.

    Importantly, virtually all of the retaliatory actions described above are carried out or instigated by the elite political establishment—current and former political appointees and elected officials. Equally important is the fact that tactics used against whistleblowers are rarely if ever applied to political insiders who fail to protect classified information. Even actual spies who give or sell secrets directly to foreign governments have fared better than some well-meaning whistleblowers. In contrast to whistleblowers, political insiders who mistreat government secrets are publicly praised by the establishment, face lesser charges (if any), are treated with dignity by investigators, receive presidential pardons and move on to prestigious and lucrative positions.

    The Takeaway

    Retaliation against Julian Assange over the past decade plus replicates a pattern of ruthless political retaliationagainst whistleblowers, in particular those who reveal truths hidden by illegal secrecy. U.S. law prohibits classifying information “in order to conceal inefficiency, violations of law, or administrative error; to prevent embarrassmentto a person, organization, or agency.”

    Whether U.S. authorities successfully prosecute Assange, accept a desperate plea deal or keep him tied up with endless litigation, they will succeed in sending the same chilling message to all journalists that they send to potential whistleblowers: Do not embarrass us or we’ll punish you—somehow, someday, however long it takes. In that respect, one could say damage to journalism already has been done but the battle is not over.

    This extension of a whistleblower reprisal regime onto a publisher of disclosures poses an existential threat to all journalists and to the right of all people to speak and hear important truths. The U.S. indictment of Julian Assange tests our ability to perceive a direct threat to free speech, and tests our will to oppose that threat.Without freedom of press and the right and willingness to publish, whistleblowers even disclosing issues of grave, life and death public safety, will be like a tree falling in the forest with no one to hear.

    The great American writer Henry David Thoreau wrote, “It takes two to speak the truth–one to speak and one to hear.” Today, it takes three to speak the truth–one to speak, one to hear, and one to defend the first two in court. If the U.S. Government has its way, there will be no defense, no truth.

    For the Steering Groups of Veteran Intelligence Professionals for Sanity and Sam Adams Associates for Integrity in Intelligence:

    William Binney, former Technical Director, World Geopolitical & Military Analysis, NSA; co-founder, SIGINT Automation Research Center (ret.)

    Richard H. Black, Senator of Virginia, 13th District; Colonel US Army (ret.); Former Chief, Criminal Law Division, Office of the Judge Advocate General, the Pentagon (associate VIPS)

    Marshall Carter-Tripp, Foreign Service Officer & former Division Director in the State Department Bureau of Intelligence and Research (ret.)

    Thomas Drake, former Defense Intelligence Senior Executive Service and NSA whistleblower

    Bogdan Dzakovic, former Team Leader of Federal Air Marshals and Red Team, FAA Security (ret.) (associate VIPS)

    Philip Giraldi, CIA, Operations Officer (ret.)

    Mike Gravel, former Adjutant, top secret control officer, Communications Intelligence Service; special agent of the Counter Intelligence Corps and former United States Senator

    Katherine Gun, former linguist and Iraq War whistleblower in UK’s GCHQ (affiliate VIPS)

    Matthew Hoh, former Capt., USMC, Iraq; former Foreign Service Officer, Afghanistan (associate VIPS)

    James George Jatras, former U.S. diplomat and former foreign policy adviser to Senate leadership (Associate VIPS)

    Michael S. Kearns, Captain, USAF (ret.); ex-Master SERE Instructor for Strategic Reconnaissance Operations (NSA/DIA) and Special Mission Units (JSOC)

    John Kiriakou, former CIA Counterterrorism Officer and former Senior Investigator, Senate Foreign Relations Committee

    Karen Kwiatkowski, former Lt. Col., US Air Force (ret.), at Office of Secretary of Defense watching the manufacture of lies on Iraq, 2001-2003

    Clement J. Laniewski, LTC, U.S. Army (ret.) (associate VIPS)

    Linda Lewis, WMD preparedness policy analyst, USDA (ret.) (associate VIPS)

    Edward Loomis, NSA Cryptologic Computer Scientist (ret.)

    Annie Machon, former intelligence officer in the UK’s MI5 domestic security service (affiliate VIPS)

    Ray McGovern, former US Army infantry/intelligence officer & CIA presidential briefer (ret.)

    Craig Murray, former British diplomat and Ambassador to Uzbekistan, human rights activist and historian (affiliate VIPS)

    Elizabeth Murray, former Deputy National Intelligence Officer for the Near East & CIA political analyst (ret.)

    Todd E. Pierce, MAJ, US Army Judge Advocate (ret.)

    Coleen Rowley, FBI Special Agent and former Minneapolis Division Legal Counsel (ret.)

    Peter Van Buren, U.S. Department of State, Foreign Service Officer (ret.) (associate VIPS)

    J. Kirk Wiebe, former Senior Analyst, SIGINT Automation Research Center, NSA (ret.)

    Larry Wilkerson, Colonel, U.S. Army (ret.), former Chief of Staff for Secretary of State; Distinguished Visiting Professor, College of William and Mary

    Sarah Wilton, Commander, U.S. Naval Reserve (ret.) and Defense Intelligence Agency (ret.)

    Robert Wing, former U.S. Department of State Foreign Service Officer (Associate VIPS)

    Ann Wright, U.S. Army Reserve Colonel (ret) and former U.S. Diplomat who resigned in 2003 in opposition to the Iraq War

 

US Intel Vets Dispute Russia Hacking Claims

As the hysteria about Russia’s alleged interference in the U.S. election grows, a key mystery is why U.S. intelligence would rely on “circumstantial evidence” when it has the capability for hard evidence, say U.S. intelligence veterans. (Originally posted December 12, 2016 on Consortiumnews.com)

Veteran Intelligence Professionals for Sanity

MEMORANDUM

Allegations of Hacking Election Are Baseless

A New York Times report on Monday alluding to “overwhelming circumstantial evidence” leading the CIA to believe that Russian President Vladimir Putin “deployed computer hackers with the goal of tipping the election to Donald J. Trump” is, sadly, evidence-free. This is no surprise, because harder evidence of a technical nature points to an inside leak, not hacking – by Russians or anyone else.

Monday’s Washington Post reports that Sen. James Lankford, R-Oklahoma, a member of the Senate Intelligence Committee, has joined other senators in calling for a bipartisan investigation of suspected cyber-intrusion by Russia. Reading our short memo could save the Senate from endemic partisanship, expense and unnecessary delay.

In what follows, we draw on decades of senior-level experience – with emphasis on cyber-intelligence and security – to cut through uninformed, largely partisan fog. Far from hiding behind anonymity, we are proud to speak out with the hope of gaining an audience appropriate to what we merit – given our long labors in government and other areas of technology. And corny though it may sound these days, our ethos as intelligence professionals remains, simply, to tell it like it is – without fear or favor.

We have gone through the various claims about hacking. For us, it is child’s play to dismiss them. The email disclosures in question are the result of a leak, not a hack. Here’s the difference between leaking and hacking:

Leak: When someone physically takes data out of an organization and gives it to some other person or organization, as Edward Snowden and Chelsea Manning did.

Hack: When someone in a remote location electronically penetrates operating systems, firewalls or any other cyber-protection system and then extracts data.

All signs point to leaking, not hacking. If hacking were involved, the National Security Agency would know it – and know both sender and recipient.

In short, since leaking requires physically removing data – on a thumb drive, for example – the only way such data can be copied and removed, with no electronic trace of what has left the server, is via a physical storage device.

Awesome Technical Capabilities

Again, NSA is able to identify both the sender and recipient when hacking is involved. Thanks largely to the material released by Edward Snowden, we can provide a full picture of NSA’s extensive domestic data-collection network including Upstream programs like Fairview, Stormbrew and Blarney. These include at least 30 companies in the U.S. operating the fiber networks that carry the Public Switched Telephone Network as well as the World Wide Web. This gives NSA unparalleled access to data flowing within the U.S. and data going out to the rest of the world, as well as data transiting the U.S.

In other words, any data that is passed from the servers of the Democratic National Committee (DNC) or of Hillary Rodham Clinton (HRC) – or any other server in the U.S. – is collected by the NSA. These data transfers carry destination addresses in what are called packets, which enable the transfer to be traced and followed through the network.

Packets: Emails being passed across the World Wide Web are broken down into smaller segments called packets. These packets are passed into the network to be delivered to a recipient. This means the packets need to be reassembled at the receiving end.

To accomplish this, all the packets that form a message are assigned an identifying number that enables the receiving end to collect them for reassembly. Moreover, each packet carries the originator and ultimate receiver Internet protocol number (either IPV4 or IPV6) that enables the network to route data.

When email packets leave the U.S., the other “Five Eyes” countries (the U.K., Canada, Australia, and New Zealand) and the seven or eight additional countries participating with the U.S. in bulk-collection of everything on the planet would also have a record of where those email packets went after leaving the U.S.

These collection resources are extensive [see attached NSA slides 1, 2, 3, 4, 5]; they include hundreds of trace route programs that trace the path of packets going across the network and tens of thousands of hardware and software implants in switches and servers that manage the network. Any emails being extracted from one server going to another would be, at least in part, recognizable and traceable by all these resources.

The bottom line is that the NSA would know where and how any “hacked” emails from the DNC, HRC or any other servers were routed through the network. This process can sometimes require a closer look into the routing to sort out intermediate clients, but in the end sender and recipient can be traced across the network.

The various ways in which usually anonymous spokespeople for U.S. intelligence agencies are equivocating – saying things like “our best guess” or “our opinion” or “our estimate” etc. – shows that the emails alleged to have been “hacked” cannot be traced across the network. Given NSA’s extensive trace capability, we conclude that DNC and HRC servers alleged to have been hacked were, in fact, not hacked.

The evidence that should be there is absent; otherwise, it would surely be brought forward, since this could be done without any danger to sources and methods. Thus, we conclude that the emails were leaked by an insider – as was the case with Edward Snowden and Chelsea Manning. Such an insider could be anyone in a government department or agency with access to NSA databases, or perhaps someone within the DNC.

As for the comments to the media as to what the CIA believes, the reality is that CIA is almost totally dependent on NSA for ground truth in the communications arena. Thus, it remains something of a mystery why the media is being fed strange stories about hacking that have no basis in fact. In sum, given what we know of NSA’s existing capabilities, it beggars belief that NSA would be unable to identify anyone – Russian or not – attempting to interfere in a U.S. election by hacking.

For the Steering Group, Veteran Intelligence Professionals for Sanity (VIPS)

William Binney, former Technical Director, World Geopolitical & Military Analysis, NSA; co-founder, SIGINT Automation Research Center (ret.)

Mike Gravel, former Adjutant, top secret control officer, Communications Intelligence Service; special agent of the Counter Intelligence Corps and former United States Senator

Larry Johnson, former CIA Intelligence Officer & former State Department Counter-Terrorism Official

Ray McGovern, former US Army infantry/intelligence officer & CIA analyst (ret.)

Elizabeth Murray, Deputy National Intelligence Officer for Middle East, CIA (ret.)

Kirk Wiebe, former Senior Analyst, SIGINT Automation Research Center, NSA (ret.)

Chelsea Manning is Courage’s newest beneficiary

Six years ago today, WikiLeaks whistleblower Chelsea Manning was arrested in Iraq and shipped to Kuwait, where she endured brutal treatment in a metal cage, while awaiting transfer to a military prison. With preparations now underway for her appeal to the US Army Court of Criminal Appeals next year, the Courage Foundation is naming Chelsea Manning as the organisation’s newest beneficiary.

The Courage Foundation will focus on European fundraising and campaign support for the former Army intelligence analyst, who is serving a 35 year sentence for passing hundreds of thousands of classified documents exposing rampant human rights violations and the true nature of the United States’ wars in Iraq and Afghanistan to WikiLeaks.

EU donations to Chelsea Manning’s defence fund can be made tax-free via the Wau Holland Foundation.

NSA whistleblower Edward Snowden said:

Chelsea Manning is the first American to be sentenced to decades of prison for revealing truthful information to the press. Her conviction — under a law even the ACLU says violates the constitution — is not just an injustice, it’s a threat to journalism.

Please fight for the First Amendment. Fight for Chelsea Manning.

Julian Assange, editor of WikiLeaks and Courage Trustee, said:

Manning has already won the moral battle: every year, new whistleblowers step forward to follow her example. Now it is time for Manning to win her legal battle. The only just outcome in Chelsea Manning’s case is her unconditional release, compensation for the unlawful treatment she has undergone, and a serious commitment to investigating the wrongdoing her alleged disclosures have brought to light.

Sarah Harrison, Acting Director of the Courage Foundation, said:

Chelsea Manning is one of the most important figures of the digital age and a hero to many of us. Her 35 year sentence is a travesty and her incarceration will be a lasting stain on America’s reputation. Now that Chelsea’s appeal process is finally underway, it is critical that her legal team is properly resourced.

Chelsea’s case is very important to us at Courage; we know how much she matters. I am personally honoured to announce Chelsea Manning as a Courage beneficiary and look forward to working with all the other groups and organisations who have been fundraising and campaigning steadfastly for her freedom for the past six years.

Nancy Hollander, Chelsea Manning’s attorney heading up the appeal, said:

We have spent the last three years preparing to appeal one of the most unjust convictions and sentences in military history, in one of the biggest and most complex cases we’ve ever worked on. Now that we have filed the appeal, we must wait for the government’s response. Then we will file our reply and prepare to argue Chelsea’s case before the appellate court. So this next year will be an important time for her case. Since her conviction, support for Chelsea has only grown around the world, as the world recognizes her commitments to justice, equality and a more accountable government. I’m delighted to see the Courage Foundation lend its support in this crucial time.

Pentagon Papers whistleblower Daniel Ellsberg said:

I waited forty years for Chelsea Manning. I don’t want to wait another thirty to thank her in freedom. Please fund her appeal to free her!

Courage is managing the European side of Manning’s fundraising and public support efforts, while Courage to Resist and the Chelsea Manning Support Network continue their work in the United States. European donations to Chelsea Manning’s defence fund can be made tax-free via Wau Holland, here. See our new page for Chelsea Manning here.

Burr’s CIA torture cover-up makes America less safe, less respected

The Charlotte Observer, March 3, 2016

Highlights:

He tried to bury reports on CIA torture, won’t hold hearings

It hurts America’s security and reputation

From Larry Wilkerson, a retired U.S. Army colonel and former chief of staff to Secretary of State Colin Powell. He is the Distinguished Adjunct Professor of Government and Public Policy at the College of William & Mary in Virginia. He is a Republican.

As he runs for re-election, U.S. Sen. Richard Burr is airing $300,000 in television ads that tout his record as chair of the Senate Intelligence Committee. The truth, however, is that Burr’s handling of this key job has done our nation and North Carolinians a huge disservice.

The biggest challenge that confronted Burr as he took the helm of Intelligence in January 2015 was to come to grips with President George W. Bush’s torture program.

The committee’s six-year investigation had just revealed grim details of lawlessness and barbarism in the Central Intelligence Agency’s enhanced interrogation program. In every way, Burr has shown himself to be the ultimate protector of the criminals at the CIA, not their overseer.

His first act as chairman was an attempt to recall the committee’s 6,900-page “torture report” from the White House and executive agencies. He also tried to bury the Panetta Review, a still-secret internal CIA assessment of the torture program that, according to Intelligence members who have read it, is a “smoking gun” bolstering the negative conclusions of the committee’s own report.

And Burr refuses even to hold hearings on CIA misconduct like “rectal feeding,” sexual abuse and the torturing to death of detainees in its custody.

As a result, some presidential candidates now vie over who will order the harshest techniques. One promises more waterboarding, while another says he would go even further.

Read more here: http://www.charlotteobserver.com/opinion/op-ed/article63773397.html#storylink=cpy