Aiding the public is not “aiding the enemy” – a preview of Bradley Manning’s next motion hearing

In new defense motions to be argued at Bradley Manning’s motion hearing July 16-20, David Coombs argues the prosecution is treating Bradley more harshly than they would a terrorist. Read about the motions below, and learn more about attending the hearings at Ft. Meade!

By Nathan Fuller. July 12, 2012.

Bradley Manning escorted into the courtroom in Ft. Meade, MD.

PFC Bradley Manning’s next motion hearing at Ft. Meade, though brief, could significantly alter how the case unfolds from here on out. For one thing, we expect military judge Denise Lind to give a definitive new date for the court-martial itself to commence – after a delay was announced, the defense began pushing for a November start date, while the prosecution requests that the trial start in February 2013 or later. More significantly, though, is the defense’s motion asking Judge Lind to instruct the prosecution regarding the “aiding the enemy” charge.

The prosecution contends that Manning can be charged with “aiding the enemy” if he merely knew that a third party, and in this case America’s enemies, could access information he released online. But Coombs argues, as the ACLU has argued, that this is wildly overbroad, leaving any information a soldier posted online vulnerable to this type of prosecution.

As Coombs posted on his blog, the defense motion to be argued next week asks Lind to instruct the government on the Article 104 charge as follows:

“In order to find the accused guilty of giving intelligence to the enemy through indirect means, you must be convinced beyond a reasonable doubt that the accused had actual knowledge that he was giving intelligence to the enemy through the indirect means. An accused has actual knowledge that he is giving intelligence to the enemy through indirect means only when he knowingly and intentionally provides intelligence to the enemy through the indirect means. Providing intelligence to a third party with reason to believe that the enemy might receive it, could receive it, or even would likely receive it, is insufficient. Rather, you must be convinced beyond a reasonable doubt that the accused, using the third party as a mere conduit, knowingly and intentionally gave intelligence to the enemy. That is, the accused must have used the third party for the purpose of giving the intelligence to the enemy. If you find that the accused honestly believed that he was giving intelligence only to a third party and that he was not giving it to the enemy, you must find the accused not guilty of the offense of giving intelligence to the enemy through indirect means.”

Coombs reminds Lind that the court previously held that “an accused must have actual knowledge that he is giving intelligence to the enemy in order to be convicted of a violation of Article 104(2).”

Furthermore, Coombs points out that – in a trial more secretive than military tribunals at Guantanamo – the prosecution’s interpretation is broader than that used to currently prosecute suspected terrorists.

“If Article 104 does not require an accused to knowingly and intentionally give intelligence to the enemy, a very troublesome absurdity would exist. In a prosecution of a terrorist under Offense 26, the Government would be required to prove that the terrorist knowingly and intentionally aided the enemy. Yet in a prosecution of a Soldier under Article 104 for giving intelligence to the enemy, the Government would only be required to prove that the Soldier knowingly gave intelligence to the enemy. Thus, for the exact same conduct, a terrorist would benefit from a friendlier mens rea than a Soldier would. Congress could not have intended to give terrorists a more protective mens rea than it gave to Soldiers. It defies all logic to think that a terrorist would fare better in an American court for aiding the enemy than a U.S. soldier would. To make sense of this all, Article 104, like Offense 26, must require the Government to prove that the accused knowingly and intentionally gave intelligence to the enemy.”

Clearly, the prosecution is trying to set a broad precedent to make an example out of Bradley Manning, to restrict soldiers’ rights and intimidate would-be whistleblowers in the future.

In a second motion, Coombs renews the defense request to dismiss specifications for failure to state an offense. These specifications, known as the 1030 specifications, allege that PFC Manning “exceeded authorized access” in using his computer to release classified files. In a semantic but important debate at the June 6-10 hearing, Coombs contended that this phrasing mischaracterizes the alleged action so as to create a non-existent offense. He says Manning instead had proper authorization to use that computer, and that any violations he may have committed fall under that access. He argues the prosecution is piling on charges by alleging Manning “exceeded authorized access” on a computer that he was allowed to use. Therefore, he motioned to dismiss the specifications alleging Manning “exceeded” his access.

Coombs is now renewing that motion in light of the government’s most recent definition of “exceeds authorized access.” However, due to military redactions, we don’t know what that new definition is.  Coombs’ renewed motion says that the government provided its “definitive” theory on “exceeds authorized access” in a “moment of uncharacteristic clarity,” yet the theory itself is blacked out. However, Coombs does say, “At no point in its response did the Government contest that PFC Manning was authorized to access each and every piece of information he allegedly accessed.”

As Coombs notes, the court as already decided upon a narrow definition of “exceeds authorized access,”

“Specifically, this Court held that ‘the term ‘exceeds authorized access’ is limited to violations of restrictions on access to information, and not restrictions on is ‘use’.” … At oral argument, this Court explained the proper understanding of “exceeds authorized access” as follows: “the narrow definition would be ‘exceeds authorized access’ would apply to ‘inside hackers’, individuals whose initial access to a computer is authorized but who access unauthorized information or files.’”

However, unfortunately, Coombs says the prosecution’s “definitive” theory on the matter “did not stay definitive for long.” The government, he says, introduced a new theory “entirely absent” from its previous response. Under this new theory, the prosecution, will “attempt to show that PFC Manning exceeded his authorized access by using a particular unauthorized computer program – Wget – to download information that he was authorized to access onto his computer.”

Wget is a computer program that retrieves content from web servers that “was not apparently officially authorized for the individual user,” but “was authorized for use on the Army Server components of the system.” Coombs concludes his summary of the government’s newest theory regarding Wget:

Even while hinting at this new theory at the eleventh hour, the Government still did not dispute that PFC Manning was authorized to access all of the information he allegedly accessed.

The third defense motion is a “targeted brief on absence of harm,” regarding the prosecution’s motion to preclude the defense from discussing the alleged damage, or lack thereof, caused by WikiLeaks’ releases. The prosecution admitted on June 6 that it does not intend to produce any evidence of damage caused by WikiLeaks’ releases during the merits (innocence or guilt) portion of Manning’s trial. So instead it seeks to preclude the defense from arguing that no damage has been caused and to contend that alleged damage caused is irrelevant in determining Manning’s guilt.

This is likely because the government doesn’t have evidence proving WikiLeaks harmed national security. As Coombs observes, the prosecution has been dealing with the speculative idea that WikiLeaks could cause damage. Fed up, Coombs argues that we must deal with empirical proof:

Anything “could” happen – the world “could” end tomorrow; Kim Kardashian “could” be elected president of the United States of America; I “could” win the lottery. These are not the types of “could” that l8 U.S.C. Section 793 contemplates. Therefore, the Defense should be able to probe whether the witness’s testimony that the information could cause damage to the United States is remote, speculative, far-fetched and fanciful by examining such witnesses on the fact that two years after the alleged leaks, the conclusion is still merely that the information “could” cause damage – not that it “did” cause damage.

Last month, Judge Lind took the prosecution’s motion to preclude under advisement. In the defense’s response, Coombs asks Lind to deny the motion for four reasons:

l) the Government’s request is overbroad;

2)the information from the damage assessments is proper impeachment evidence;

3) the information from the damage assessments is relevant to the charged offenses; and

4) the information from the damage assessments provides a viable defense.

Coombs quotes the government frequently, and those arguments are again often redacted. We can see, though, that he refers to those who’ve spoken on WikiLeaks’ alleged damage such as Defense Secretary Robert Gates, who said the release’s consequences for foreign policy were “fairly modest.”

This motion hearing might only last for a few days, but Judge Lind’s rulings on these matters could portend significantly for the legal proceedings to come. If you’d like to attend Manning’s hearings at Ft. Meade, read about logistics here. Manning has previously thanked supporters for their steadfast solidarity and advocacy on his behalf.

4 thoughts on “Aiding the public is not “aiding the enemy” – a preview of Bradley Manning’s next motion hearing

  1. Hi There. I came across the web site your online. A great article. I will make sure you take a note of this as well as come back to get more info of one’s tips. Thanks for your post. I willdefinitely come back.

  2. Thanks again for providing additional detailed, factual explanations of the various motions and responses and their implications for the defense of PFC Manning.

    Mr. Coombs appears to have an eagle eye in his watchful monitoring of every word spoken or written pertaining to PFC Manning’s case. Mr. Coombs’ high intelligence, specialized knowledge, vigilance and perseverance are reassuring.

    It would be amazing if it turns out that the Government simply does not have a viable case against PFC Manning. Their circular arguments are like the fabulous Klang bird that flies in a spiral of decreasing radius until it ultimately disappears up its own rear end with a loud, resounding “Klang!”


  3. Unfortunately, I fear this is a show trial. It started with the torture of Bradley Manning. False statements that his information harmed the US. And, the lack of respect for democracy, as if we, the people, had no right the video of the massacre. Bradley Manning should be given the Congressional Medal of Honor.

  4. “The prosecution contends that Manning can be charged with “aiding the enemy” if he merely knew that a third party, and in this case America’s enemies,could access information he released online.”

    Who are our “enemies” today that might glean some nifty info from the release of this material? Who now defines “our enemies”–the president?

    There’s a long list of nations that were at one time our friends and another, our enemies. We overthrew our British rule and we now have tea with our best friends in our various “coalitions of the willing.”

    We surely hated Germany until they took down that dang wall, and now we can;t get enough of them. At the moment, we’d like them to save Europe from financial catastrophe. Thank you very much.

    We were great pals with Iran and Cuba until their dictators were overthrown.

    Those communists, those Russians — “frenemies” I guess with our longstanding collaboration interrupted by the long Cold War. Read the daily paper to know if we like or despise the Russians today, because it sometimes seems to change that fast.

    George Bush spelled out the bad guys with the phrase Axis of Evil (Iran, Iraq, and North Korea). I guess we’re working on an update now, because Iraq is our friend again, loving its new democracy, following our overthrow of its government and savage destruction of so much of the country and its citizenry.

    The Afghans? Well, we loved to see them fight off those durn Ruskies. As with all our friends, we armed them to the teeth, but as with so many of our friends turned enemies, they now use our arms against us.

    Al Quaeda doesn’t have a country, but we’ve spent billions upon billions of dollars and thousands and thousands of lives to defeat them. We now say we’ve won on that score, and Al Quaeda is all but destroyed, … except of course when it comes to Bradley Manning. In order to prosecute this heroic patriot, we temporarily redefine Al Quaeda as an ever-present threat that could come at us from all manner of countries. Those countries themselves are not our enemies, well, unless they harbor those doggone terrorists. The harboring’s a problem. Forget the daily paper, leave the TV news on all the time if you want to know our current stance on Pakistan.

    Where is the dirty rat who read something released on WikiLeaks and suddenly knew just how to bring the United States to its knees? Perhaps he’s a guy with a cabin in the woods with not much going for him. Perhaps he’s a teenager who mostly wants to get back at his “Fascist” parents. Maybe she’s a veteran of the wars in Afghanistan and/or Iraq who is now so disillusioned she talks with friends of getting back at the government that left her a broken woman.

    I don’t know. And neither do you. And neither does the president. And neither does Judge Lind.

    The prosecution of Bradley Manning for “aiding the enemy” is a cruel hoax. If the government succeeds in crucifying this young man to pay for the sins of bureaucrats Bush, Cheney, Rumsfeld, Obama, and a host of others, it will be one of the darkest days in our history, one for which we should all feel rightfully ashamed.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>