Tag Archives: Uniform Code of Military Justice

To Tell the Whole Truth…

“Do you (swear) (affirm) that the evidence you shall give in the case now in hearing shall be the truth, the whole truth, and nothing but the truth (,so help you God)? United States Manual for Courts-Martial II-82 (f)

I will be a character witness at a Courts-Martial this week. I will be traveling extensively out of country. The accused is an officer that I have served with. I cannot image that he has done what he is alleged to have done. I was asked and called to be a witness for the defense and this is a strange situation for me because prior to this I have in almost every case been somehow involved in the prosecution of crimes than as a character witness for the accused.

When I was a young Army Officer I served as a Company Commander and Adjutant for commands at the Battalion, Group and Brigade level. My best friends were the prosecutors and for the most part I held defense attorneys, military and civilian alike to be impediments to justice. That was 26 years ago and I have grown up.

My growth began when I was still a Company Commander and the Criminal Investigation division (CID) of our local Provost Martial office came to see me. I was even then known as a tough but fair commander. I took over a company that at the time had the highest drug positive rate in Europe. The previous company commander had let many legal issues languish including many at best were spurious.  When I took command I dealt with those that I felt could meet the muster of a General Court Martial and dismissed the rest.  I remembered well the words of my instructor in military justice that “if you don’t think you can make the charges stick in a General Court-Martial don’t even try to bluff your way through an Article 15 proceeding.”

Thus anytime that I had to deal with potential criminal offenses against the Uniform Code of Military Justice (UCMJ) I was careful to look at all the evidence before even filing charges.  That was my policy as a company commander and my advice to my commanding officers as an Adjutant.

When the CID investigators came to my office on that cold December day in 1986 they told me of their beliefs that there was cigarette smuggling ring being ran by certain soldiers of my unit and that to “investigate” that they wanted to place an agent undercover posing as a soldier in my unit.  I asked them if they had any evidence that led them to believe that there was even “probable cause” for their allegation and they said that there was none but that they wanted to “see what evidence that they could uncover.” I guess that they figured that a young First Lieutenant and company commander that had successfully prosecuted over 30 non-judicial punishment cases, put a good number of soldiers out of the Army and sent several soldiers to courts-martial would be eager to help them out.  However I felt that something was not quite right in this. The CID agents left my office and never came back.  I guess that they found someone else to do their bidding.  Regardless if they had any evidence I would have asked them for it and prosecuted the accused with gusto. However I have no tolerance for those that would try to use me for a fishing expedition and in turn destroy the moral of a unit that was recovering from a terrible time.

I asked them again what evidence they had for me to even think of letting them into my unit pretending to be soldiers.  I was not stupid. I knew that my Soldier-Medics would smell a rat three blocks away and that if I allowed these “investigators” into my unit without an absolutely concrete case that I would destroy the moral of my unit which had just recovered from the previous relief of command of my predecessor. They could produce nothing other than their “suspicions” and I told them to leave my unit and not come back unless they had real evidence.  I never heard from them again.

That was my revelation that sometimes law enforcement officials can be overzealous in their pursuit of justice.  I don’t believe in letting people get away with crimes. Likewise I won’t go to bat for someone that I believe is guilty of a crime, especially if I am under oath. All I know is that if I was the commander in this case that I would have had a hard time even to charge the officer much less take the case to courts-martial. Perhaps the prosecution has more evidence than I know about, but even so as I was told so long ago, “if you don’t think that it will hold up in a General Court Martial don’t even try to bluff your way through an Article 15 proceeding.”

This week I will testify about the character of a military officer who I believe to be above reproach. Based on my knowledge of the case cannot believe that he is guilty or even why charges have been made in this case.  In a couple of days I will be asked to testify under oath and I will do so with the utmost of integrity. Thus I can testify truthfully about the character and integrity of a comrade in arms. I do pray that this officer will be acquitted of all charges and that my testimony will help him.

Back before December 1986 I might have given a pass to the prosecutors and told the officer to find someone else to testify on his behalf. However after that and after a lot more of life where I have seen prosecutors run amok I will not stand by and silently let a comrade be convicted of something of that I do not believe him capable of doing. I am testifying regarding the character of a man and to that end I will testify what I know to be “the truth, the whole truth and nothing but the truth.”

This is a heavy burden but I must tell the truth regarding what I know. Please pray for me and those concerned, especially the accused as well as anyone that is an alleged victim in this case.

Peace

Padre Steve+

1 Comment

Filed under laws and legislation, Military

The First World Wide Cyber-Insurgency

In the past week we have entered the first true cyber-insurgency being waged by the Julian Assange’s WikiLeaks and its various supporters worldwide. Experts have been debating if the actions of WikiLeaks and their confederates constitute a cyber-war or simply a form of protest and demand for openness on the part of governments and corporations.

This is an entirely new twist on the traditional concept of insurgency as it is not limited to an attack on a single nation but numerous nations, businesses and financial institutions as well as individuals.  It is also being conducted by a loosely international organized alliance of individuals and groups with overlapping or identical political goals which have an almost cult like reverence for Julian Assange, who they defend as if he were the Prophet himself.

Those who say that this is not a war rely on a definition of war as something that is conducted between nation states which is now an antiquated concept and not reality based. What is called “conventional” warfare is a misnomer and conventional conflicts are the exception to the rule. Australian counter-insurgency expert David Kilcullen notes that according to the Correlates of War Project that of 464 wars fought in the Modern Era (1816-2000) that on 79 were conventional “interstate” conflicts “fought between the regular armed forces of nation states, while 385 (just under 83%) were civil wars or insurgencies.[i]

One such expert told CNN: “

“Calling the WikiLeaks back-and-forth a cyber war is “completely idiotic,” said Bruce Schneier, chief security technology officer of BT, a communications company.”War. W-A-R. It’s a big word,” Schneier said. “How could this be a cyber war? It’s certainly a cyber attack, right? It’s certainly politically motivated. But this stuff has been going on for a couple of decades now. Do you mean there have been thousands of wars that haven’t been noticed? It doesn’t make any sense at all. If there was a war, you’d know it, and it would probably involve tanks and artillery — as well as cyber weapons.” Only cyber attacks between two warring nation-states count as cyber war….” (author’s emphasis) ”[ii]

Unfortunately such “experts” know nothing of modern war, to paraphrase General George Patton’s speech: “The perfidious experts who wrote that stuff about what modern war is for Time Magazine don’t know anything more about modern war than they do about fornicating.” Quite bluntly Mr. Shneier is as ignorant as they come and while he may be a “cyber security expert” he has no clue about modern war. It is possible that nation states can wage cyber war as part of a broader war, undoubtedly, but to limit one’s definition of war to such encounters when only 17% of modern wars fit the definition is ignorant.

“Insurgency is defined as an insurgency is an organized, protracted politico-military struggle designed to weaken the control and legitimacy of an established government, occupying power, or other political authority while increasing insurgent control.”[iii] While the WikiLeaks is not using traditional arms their tactics which include participating in espionage which is defined in the U.S. Code as:

“The act of obtaining, delivering, transmitting, communicating, or receiving information about the national defense with an intent, or reason to believe, that the information may be used to the injury of the United States or to the advantage of any foreign nation. Espionage is a violation of 18 United States Code 792-798 and Article 106, Uniform Code of Military Justice. See also counterintelligence.”

In addition to this the WikiLeaks confederates in making cyber attacks against governments, corporations and individuals that take a stand against them are using methods which are best described as asymmetrical warfare which stand outside of convention and are designed to destabilize the existing order for the political intent of the actor conducting it.

In today’s world non-state actors to include traditional terrorist organizations as well as organizations such as WikiLeaks which are non-state networked actors.  Martin Van Creveld notes: “In today’s world, the main threat to many states, including specifically the U.S., no longer comes from other states. Instead, it comes from small groups and other organizations, which are not states.”[iv] Such actors in the technological world can develop networks to further their cause.

Major William J. Hartman notes in his article Globalization and Asymmetrical Warfare that:

“Technology and the internet have allowed them to become globally netted players.  The basic function of a network is relatively simple.  A chain network is used when goods or information move along a network or series of hubs until reaching a final destination.  This type of network is normally used by pirates and smugglers where there is no central figure controlling the overall operation.  The hub or star network is what we would normally recognize as a terrorist group, drug cartel or crime syndicate.  In this case nodes operate separately, but must coordinate activities through a central node or leader.  The all-channel network is a shared network of numerous groups loosely connected for a common cause.” [v]

While Assange’s WikiLeaks once was considered a legitimate media source in the “new media” it has crossed a line between internet freedom and freedom of speech to political espionage and it his supports from financial and information support to targeted cyber terrorism against political, governmental, business organizations as well as individuals.  WikiLeaks and Assange still claim the journalistic mantel and they are supported by many in that claim, but their recent actions serve to undermine their credibility and while they will have supporters any sense of journalistic ethics has been lost and probably cannot be recovered.  WikiLeaks began their irresponsible actions with the release of unredacted documents on the Afghanistan War and the released diplomatic cables do not seem to serve any purpose except to embarrass governments.  The threatened release of a massive amount of unredacted documents as an “insurance policy” against being shut down is simply extortion and can rightly be labeled an act of cyber terrorism.

As most people know information is power and those that can harness it for their purposes. The U.S. Army and Marine Corps Counterinsurgency manual states

“Interconnectedness and information technology are new aspects of this contemporary wave of insurgencies. Using the Internet, insurgents can now link virtually with allied groups throughout a state, a region, and even the entire world. Insurgents often join loose organizations with common objectives but different motivations and no central controlling body, which makes identifying leaders difficult.”[vi]

The way that WikiLeaks supporters are organized and the manner in which they have posted the information that they have illegally obtained provides an amazing information pipeline for other non-state actors, especially terrorists groups that will be able to use that information to conduct deadly attacks which will as they always do target directly or indirectly innocent civilians of many nations. The attacks that supporters mount on those that criticize Assange stand a good chance of causing even more financial hardship to the customers of those institutions.

This is an insurgency of a new type, one without borders which though it claims noble goals of justice, freedom and transparency willingly places information in the hands of terrorists who have stated that they will use it. This has and is occurring with the Taliban in Afghanistan and will happen elsewhere as terrorist organizations both national and international use the information to create chaos.

Welcome to warfare in the 21st Century. It’s not your grandfather’s war.

Peace

Padre Steve+


[i] Kilcullen, David. Counterinsurgency Oxford University Press, New York 2010 pp.ix-x

[ii] Sutter, John D. Is WikiLeaks waging a Cyber War?” retrieved from http://www.cnn.com/2010/TECH/innovation/12/09/wikileaks.cyber.attacks/index.html?hpt=T2 9 Dec 2010

[iii] Field Manual No. 3-24 Headquarters Department of the Army Washington, DC p.ix

[iv] Van Creveld, Martin, In Wake Of Terrorism, Modern Armies Prove To Be  Dinosaurs Of Defense, New Perspectives Quarterly, Vol. 13, NO 4, Fall 1996, 58

[v] Air Command and Staff College Air University Globalization and Asymmetrical Warfare by William J. Hartman, Major, US Army, Maxwell Air Force Base, Alabama April 2002 pp. 19-20

[vi] Ibid. FM 3-24. p. 1-4

 

2 Comments

Filed under Foreign Policy, national security