Title: Volume FOIA 057

Release Date: 2014-03-20

Text: 18030

Volume 57 of 111
SJAR ROT
FOIA Version

VERBAT IM 1

RECORD OF TRIAL2

(and accompanying papers)

of
(Name: Last, First, Middie initiai) (Sociai Security Number) (Rank)
Headquarters and
Headquarters Company,
United States Army Garrison U-S- Army FCDIJC Ml/er: VA 22211
(Unit/Command Name) (Branch of Service) (Station or Snip)
By
GENERAL COURT-MARTIAL
Convened by Commander

(Titie of Con vening Authority)

UNITED STATES ARMY MILITARY DISTRICT OF WASHINGTON
(Unit/Command of Con vening Authority)

Tried at

Fort. Meade, MD on see below

(Piace or Piaces of Triai) (Date or Dates of Triai-9

Date or Dates of Trial:

23 February 2012, 15-16 March 2012, 24-26 April 2012, 6-8 June 2012, 25 June 2012,

16-19 July 2012, 28-30 August 2012, 2 October 2012, 12 October 2012, 17-18 October 2012,
7-8 November 2012, 27 November - 2 December 2012, 5-7 December 2012, 10-11 December 2012,
8-9 January 2013, 16 January 2013, 26 February - 1 March 2013, 8 March 2013,

10 April 2013, 7-8 May 2013, 21 May 2013, 3-5 June 2013, 10-12 June 2013, 17-18 June 2013,
25-28 June 2013, 1-2 July 2013, 8-10 July 2013, 15 July 2013, 18-19 July 2013,

25-26 July 2013, 28 July - 2 August 2013, 5-9 August 2013, 12-14 August 2013,

16 August 2013, and 19-21 August 2013.

1 insert ?verbatirri or ?surrimarizeo? as appropriate. This form be used by the Army and Navy for verbatim records of triai

2 See inside back co ver for instructions as to preparation and arrangement.

DD FORM 490, MAY 2000 PREWOUS OBSOLETE Front Cover

18031

(b) (1) (B)

UNITED STATES OF AMERICA
STIPULATION OF
EXPECTED TESTIMONY

v.
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211

AMB Marie Y ovanovitch

J7 June2013

(U) It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that if
Ambassador (AMB) Marie Yovanovitch were present to testify during the merits and presentencing phases of this court-martial, she would testify substantially as follows.

I. (U) The United States Department of State (DoS) is led by the Secretary of State. There are
six Under Secretary Offices that work for the Secretary of State. One of those Under Secretaries
is for Political Affairs. The Under Secretary of Political Affairs serves as the day-to-day
manager of overall regional and bilateral policy issues. The Under Secretary of Political Affairs
oversees seven bureaus which are headed by Assistant Secretaries. Those bureaus are African
Affairs, European and Eurasian Affairs, East Asian and Pacific Affairs, Near Eastern Affairs,
South and Central Asian Affairs, Western Hemisphere Affairs, and International Organizations.
The Assistant Secretaries of the geographic bureaus and offices advise the Under Secretary and
guide the operation of the U.S. diplomatic missions within their regional jurisdiction. They also
determine and implement policy. Each bureau has a Principal Deputy Assistant Secretary
(PDAS) and several Deputy Assistant Secretaries (DAS). The PDAS is the lead DAS, all of
whom assist theA/Sin the development and management of U.S. policy concerning the Bureau.
The DAS's review all paperwork, background information, disciplinary issues, and policy
directives.
2. (U) I am the Acting Assistant Secretary (AA/S) and the PDAS of the Bureau of European and
Eurasian Affairs. I have been the AA/S for European and Eurasian Affairs since March 2013. I
have been the PDAS for European and Eurasian Affairs since September 2012. Before that, I
served as the Bureau's DAS responsible for issues related to the Nordic, Baltic, and Central
European countries from June 2011 to September 2012. From 2008 to 2011, I was the
Ambassador to the Republic of Armenia. An Ambassador is the President's representative that
manages employees and relations with that country. From 2005 to 2008, I was the U.S.
Ambassador to Kyrgyzstan. Before that, I was the Executive Assistant for U.S. Political Affairs
from 2004 to 2005. From 2001 to 2004, I was the Deputy ChiefofMission (DCM) of the U.S.
Embassy in Kyiv, Ukraine. In 2000, I attended the Navy War College (NWC). From 1998 to
2000, I was Deputy Director of the Russia desk. From 1996 to 1998, I worked in Ottawa at the
U.S. Embassy. From 1993 to 1996, I worked at U.S. Embassy Moscow. From 1992 to I993, I
studied Russian at the Foreign Service Institute (FSI). From 1991 to 1992, I worked at the
Office of European Security Affairs. From 1990 to 199I, I worked in the Operations Center,
which is the nerve center ofDoS. From 1988 to 1990, I worked at the U.S. Embassy in London.
From 1986 to 1988, I worked at U.S. Embassy Mogadishu. I have been with DoS since 1986. I
have a Master's of Science from the NWC. 1 am also a graduate of Princeton University where I
earned a Bachelor's of Arts in History and Russian studies. I have briefed Congress on
(b) (1) (B)

PROSECUTION EX!!lrliT ll"'for identification
PAGE OFFERr\D:
FiiCil~Ai)l'vllTTED:

PAGE_ _OF_____i•;\(3ES

~·'"~

18032

(b) (1) (B)

European and Eurasian Affairs because of my expe1tise on European and Eurasian Affairs. I also
speak Russian.
3. (U) The Bureau of European and Eurasian Affairs develops and implements U.S. foreign
policy in Europe and Eurasia. The Bureau promotes U.S. interests in the region on issues such as
international security, NATO, coordination with the European Union and other regional
organizations, support for democracy, human rights, civil society, economic prosperity,
counterterrorism, and nonproliferation. The countries are our oldest allies and they are platforms
for handling issues all over the world.
4. (U) The embassies communicate what is occurring in the host nations through many different
means. Issuing a cable is an official communication by the Embassy or organization. Typically,
the Ambassador or Deputy Chief of Mission (DCM) sign off as the originator on the cables
because they are in charge of the embassy or organization. Generally, cables are issued to
summarize meetings and note significant events in the host country, and often contain the
analysis and comment of the author. The cables are issued with distribution captions that, to
varying degrees, limit who can see them. One of those captions was SJPDIS. The SIPDIS
caption indicated that a cable was approved for SIPRNET distribution for access by
appropriately cleared individuals U.S. Originators can limit distribution through other captions
such as STADIS, which would limit distribution to DoS personnel only, or limit distribution to
the addressee of the document with a NO DIS caption.
5. (SBU) The first cable is 10 Reykjavik 13.

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

2

18033

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

9. (SBU) The next cable is 06 Belgrade 1681.

(b) (1) (B)

(b) (1) (B)

3
(b) (1)
(B)

18034

(b) (1)
(B)
(b) (1) (B)

(b) (1) (B)

13. (SBU) The next cable is 06 Madrid 2955.

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

18035

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

17. (SBU) The next cable is 06 Madl'id 2956.

(b) (1) (B)

5
(b) (1) (B)

18036

(b) (1)
(B)

(b) (1) (B)

(b) (1) (B)

21. (SBU) The next cable is 06 Pristina 947.

(b) (1) (B)

6

(b) (1) (B)

18037

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

25. (SBU) The next cable is 06 Pristina 948.

(b) (1) (B)

(b) (1) (B)

18038

(b) (1)
(B)
(b) (1)
(B)

(b) (1) (B)

(b) (1) (B)

29. (SBU) The next cable is 07 Ankara 23.
(b) (1) (B)

8
(b) (1) (B)

18039

(b) (1) (B)
(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

33. (SBU) The next cable is 07 Ankara 2468.

(b) (1) (B)

9
(b) (1) (B)

18040

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

37. (SBU) The next cable is 07 Bratislava 665.

(b) (1) (B)

(b) (1)
(B)

(b) (1) (B)

18041

(b) (1) (B)
(b) (1) (B)

(b) (1) (B)

41. (SBU) The next cable is 07 Minsk 1024.

(b) (1) (B)

(b)
(1)
(B)

(b) (1) (B)

18042

(b) (1) (B)

(b) (1) (B)

45. (SBU) The next cable is 07 Moscow 5824.

(b) (1) (B)

(b) (1) (B)

12
(b) (1) (B)

18043

(b) (1)
(B)
(b) (1) (B)

(b) (1) (B)

49. (SBU) The next cable is 07 Moscow 5825.
(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b)
(1)
(B)

18044

(b) (1) (B)

(b) (1) (B)

53. (SBU) The next cable is 07 Paris 4722.

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

14
(b) (1)
(B)

18045

(b) (1) (B)

57. (SBU) The next cable is 07 Paris 4723.

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

61. (SBU) The next cable is 07 Reykjavik 203.

15
(b) (1) (B)

18046

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

65. (SBU) The next cable is 07 Vilnius 13.

(b) (1) (B)

(b) (1) (B)

18047

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

69. (SBU) The next cable is 09 Paris 217.

(b) (1) (B)

(b) (1) (B)

18048

(b) (1) (B)
(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

73. (SBU) The next cable is 09 Prague 88.
(b) (1)
(B)

(b) (1) (B)

18049

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

77. (SBU) The next cable is 09 Pristina 58.
(b) (1)
(B)

19
(b) (1) (B)

18050

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

81. (SBU) The next cable is 09 State 92632.

(b) (1) (B)

20

(b) (1) (B)

18051

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

85. (SBU) The next cable is 09 State 92657.

(b) (1) (B)

21
(b) (1) (B)

18052

(b) (1) (B)

(b) (2)

(b) (1) (B)

89. (SBU) The next cable is 10 Brussels 382

(b) (1) (B)

(b) (1) (B)

22
(b) (1)
(B)

18053

(b) (1) (B)

(b) (1) (B)

93. (SBU) The next cable is 10 Geneva 347.

(b) (1) (B)

(b) (1) (B)

23
(b) (1) (B)

18054

(b) (1) (B)
(b) (1) (B)

(b) (1) (B)

//ORIGINAL SIGNED//
ANGEL M. OVERGAARD
CPT, JA
Assistant Trial Counsel

//ORIGINAL SIGNED//
THOMAS F. HURLEY
MAJ, JA
Military Defense Counsel

24

(b) (1) (B)

//ORIGINAL SIGNED//
BRADLEY E. MANNING
PFC,USA
Accused

18055

Prosecution Exhibitl^6b
2^pages
classified
"SECRET"
ordered sealed fDrReason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial

18056

Prosecution Exhibitl^6c
pages
classified
"SECRET"
ordered sealed fDrReason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial

UNITED STATES OF AMERICA
STIPULATION OF
V. EXPECTED TESTIMONY
Manning, Bradley E. Joseph Yun

PFC, US. Army,

U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211



June 2013

(U) It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that if
Acting Assistant Secretary Joseph Yun were present to testify during the merits and pre-
scntencing phases of tl1is court-martial, he would testify substantially as follows:

I. (U) 'l?he United States Department of State (DOS) is led by the Secretary ofstatc. There are
six Under Secretary Ofiices that work for the Secretary of State. One ofthose Under Secretaries
is for Political At?fairs. The Under Secretary of Political Af?tirs serves as the day-to-day
manager of overall regional and bilateral policy issues. The Under Secretary ot'Po|itical Afiairs
oversees seven bureaus which are headed by Assistant Secretaries. Those bureaus are African
Affairs, European and Eurasian Affairs, East Asian and Pacific Affairs, Near Eastern Affairs,
South and Central Asian Affairs, Western Hemisphere Affairs, and International Organizations.
The Assistant Secretaries of the geographic bureaus and oflices advise the Under Secretary and
guide the operation of the US diplomatic missions within their regional jurisdiction. Each
bureau has a Principal Deputy Assistant Secretary (PDAS) and several Deputy Assistant
Secretaries. The Principal Deputy Assistant Secretary is the lead Deputy Assistant Secretary, all
of which assist in the development and management of US policy concerning the Bureau.

2. (U) I am the ANS and the PDAS ofthe Bureau 0fEast Asian and Pacilic Affairs. The
Bureau deals with US foreign policy and US relations with the countries in the Asia-Pacific
region. My previous assignment was as Deputy Assistant Secretary of the same Bureau. i am a
career member of the Senior Foreign Service, class ol?Minister Counselor. My overseas
assignments have been in South Korea, Thailand, France, Indonesia and l-long Kong. Before
joining the US Foreign Service in I985, 1 was senior economist for Data Resources, Inc.

3. (U) The Bureau of East Asian and Paci?c Affairs covers approximately 40 posts in 26
countries, including Korea, Thailand, ?l?aiwan, Hong Kong, Philippines, Australia, and Japan.
The United States? interests in the East Asia-Pacific region include promoting regional stability,
fostering democracy and human rights, encouraging economic prosperity, furthering cooperation
on fighting transnational issues and international crime, and preventing the proliferation of
weapons of mass destruction.




ti rr
i -:


or

18057

identification

18058

5. (U) The embassies communicate what is occurring in the host nations through many different
means. issuing a cable is an official eommunieat ion by the Embassy or organization. Typically,
the Ambassador or Deputy Chief l?Mission (DCM) sign of? as the originator on the cables
because they contain the ofiicial position ofthe embassy or organization. Generally, cables are
issued to summarize meetings and note signi?cant events in the host country, and olten contain
the analysis and comment of the author. The cables are issued via the distribution captions, one
ofwhich is SIPDIS. 'I?he SIPDIS caption indicates that a cable is approved for SIPRNET
distribution For access by appropriately cleared individuals across numerous US government
agencies and departments. Classi?ed cables containing the SIPDIS caption are available to all
users of SIPRNET and JWICS to share information with interested agencies and departments in
the United States government. Originators could limit distribution to personnel only
(STADIS) or even limit distribution to the addressee of tlie document (NODIS18059

10. (SBU) The next cable is 06 Taipei 3830.

3
1.
1] cl



18060

14. (SBU) The next cable is 07 KualaLumpur 40.

4
5. 6. 7.

18061

18. (SBU) The next cable is 07 Rangoon 22.

5
I 2 2



18062

22. (SBU) The next cable is 07 Vientiane 12.

4. 5.
2 2

18063



26. The next cable is 06 Seoul 3882.



18064

30. (SBU) The next cable is 06 Seoul 3885.



18065

34. (SBU) The next cable is 06 SUVA 489.

3 3




18066



3

38. (SBU) The next cable is 07 Suva 18.

0
9. 0.
3 .4

18067



42. (SBU) The next cable is 10 TOKYO 627.

1 du ,1



18068

A. 4 4



46. (SBU) The next cabie is 07 BEIJING 152.


ANGEL M. OVERGAARD
CPT, JA

Assistant Trial Counsel


THOMAS F. HURLEY
MAJ, JA

Military Counsel

I3


BRADLEY E. MANNING
PFC, USA

Accused

18069

18070

Prosecution Exhibitl^^b
13 pages
classified
"SECRET"
ordered sealed fDrReason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial

18071

Prosecution Exhibitl^^c
^8 pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial

18072

UNITEDSTATESOF AMEIHCA
STIPULATION OF
EXPECTEDTESTIMONY
Manning, Bradley E.
PFCUSArmy,
HHC,USArmyGarrison,
JointBaseMyerHendersonHall
FortMyer,Virginia 22211

Mr.NieholasM. Murphy
^June2013
^

It is hereby agreed by the Accused, Defense Counsel, andTrial Counsel, that ifSenior
Advisor fbr the Office ofinformation Programs and Services Mr.NieholasM. Murphy were
present to testify during the merits and pre-sentencing phases ofthis court-martial, he would
testify substantially as follows.
1. lam currentlyaSenior Advisor with the Office ofinformation Programs and Services
(IPS), Bureau of Administration, Department ofState (DoS).In this capacity,Iadviseor^
infornnation access with focused on the classification and declassification o f i n f o
Since 1996,Ihavo served as the DoS Liaison to the Interagency Security Classification
Appeals Panel (ISCAP) and, since 2005,lhave served as the altemate Department ofState
Representative to the ISCAP. The ISCAP is the panel established by Executive Order 12958 to,
among other fimctions, adjudicate the denial ofaccess to classified information requested under
the mandatory review provisions ofthe E.O. Prior to this,IservedasaForei^n Service
Officer with service inTurkey,Lebanon, Saudi Arabia, France, and Senegal, as wallas
multiple postings inWashin^ton,D.C lhave been an employee oflPS or its predecessor
organizations fbr twenty-four years, and have over forty-five years of experience in management
of access to national security information, security,and intelligence, including serving as the
State Department representative on the drafting committees forthe Executive Orders (E.O.)on
classified national security information (E.O.12958 and E.O.13526), and their implementing
directives. lhave been involved in the implementation ofthe Freedom ofinformation Act
policies in the Department and have been working with classification and declassification issues
since 1990.
2. lam also an Original Classification Authority(OCA) and have been an OCA fbr
approximately twenty-three years. My responsibilities in that position include the review of
Department State information fbr classification purposes pursuant to E.O.13526. Per E.O.
13526, Section1.3, the authority to classify information originally may be exercised only by an
OCA, and must be delegated by the President, theVice President, or an agency head or
designated official.
3. Information which requires protection in the interest ofthe national security ofthe United
States is designated classified national security information per E.O.13526, Classified National
Security Information, signed by President Obama on 29 December 2009,and fbr infi^rmafion
classified prior to June 27,2010, according to E.O.12958 signed by President Clinton onApril
17,1995,as amended by President GeorgeW.Bush on March 25,2003. Information is
classified in levels commensurate with the assessment that unauthorised disclosure could cause
the following expected damage to national security: fbr exceptionally grave damage to national

^

^

PROSECUTIONEXHIBIT^7^foridon^catiott
PAGEOFFERED:
PAGEADMITTED:
^AGE
OF
PAGl^

18073

security^Top Secret: fbr serious damage to national security
nationalsecurity Confidential.

Secret; andfi^rdamage to

4. Within the Department ofState, classified information is handled and protected in accordance
with:
a. E.O.I3526(and predecessor orders)on Classified National Security information;
b. Information Security Oversight Office (ISOO)Implementing Directive, Classified
National Security Infi^rmation, 32 CFRParts 2001 and2003;and
c. The 12th volumeofthe Foreign Affairs Manual (FAM), section 500, titled Information
Security.
5. In total, five categories ofclassified information, as identified in E.O. 13526 and its
predecessor E.O.^s,were included in the documentslreviewed. Because the mission ofthe
Department ofState encompasses the conduct offbreign relations ofthe United States, the
Department relies primarily upon two classification categories when protecting national security
infbrmation,which are identified in Section1.4ofE.O. 13526 as1.4(b)(fbreign govemment
information) and 1.4(d)(fbreign relations or foreign activities ofthe United States, including
confidential sources). AdditionaI1y,asmall number of specific documents described below also
require protection under classification categories1.4(a)(mi1itary plans, weapons systems or
operations), 1.4(e)(scientific, technological or economic mafters)and 1.4(g), (vulnerabilities and
capabilities ofsystems and installations). These classification categories apply to the documents
in cases where the subject of the diplomatic discourse or communication also includeda
discussion ofinformation related to these categories. The reason fbr classification of each cable
is identified below.
6. Classified information should be handled and examined only under such conditions as are
adequate to prevent unauthorized persons fiom gaining access. Classified material may not be
removedfi^omdesignated work areas or moved fiom information systems, e.g., classified
databases, computer networks, servers, or computers, except in the performance of official duties
and tmder special conditions which provide protection forthe classified material.
7. Ireviewed the117charged Department ofState cables, or telegrams, related to this case.
Specifically,lreviewed all of the cables contained in Appellate Exhihit 501 and with the
BATES numbers: 00376954 00376959,00376964 00377030,00377033 00377044,
00377049 00377098,00377104 00377136,00377141 00377185,00377188 00377365,
00377370 00377391,00377395 00377424, 00377499 00377572, 00377638 00377653,and
00377660 0037767L
ProseeutionExhihit(PE)^^^^^^^7^^^7/^^^7^^,^7^^ /7^c^^^^^^^^7^^
for Identification contains all ofthese documents. In consultation with the subject mafter
experts in each ofthe relevant geographic and functional bureaus, as an OCA,ldetermine the
following for each charged cable:

18074

a. The10REYKJAVIK13 telegram is an official telegram from Embassy Reykjavik, dated
January 13,2010to the Department ofState.This telegram is three pages. The telegram was
properly classified CONFIDENTIAL underEO 13526 underSections14(b)and(d) atthe
time it was generated and remained classified in the first half of2010.
b. The 99ISLAMABAD495 telegram is an official telegram from Embassy Islamabad, dated
January 25,1999 to the Department ofState. This telegram is six pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated and portions
of the telegram remained classified CONFIDENTIAL under E.O.13526 under Section 1.4(d) in
thefirstha1fof2010.
c. The 05ALGIERS1836 telegram is an official telegram ftom Embassy Algiers, dated
August 29,2005 to the Department ofState. This telegram is six pages. The telegram was
properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated and portions
c^fth^telegramremainedclassifiedCONFIDENTIALunderE.O. 13526 under Sections 1.4(b)
and(d) inthe firstha1fof2010
d. The 06ALGIERS1961 telegram is an official telegram ftom Embassy Algiers, dated
November 12, 2006 to the Department ofState. This telegram is six pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions of the telegram remained classified CONFIDENTIAL under E.O.13526 under Section
14(d) in the firstha1fof2010.
e. The 06 BAGHDAD2646 telegram is an official telegram ftom Embassy Baghdad, dated
July 24, 2006 to the Department ofState. This telegram is three pages. The telegram was
properly classified SECRETunder E.O.12958 at the time it was generated. The telegram
remained classifted SECRET underEO 13526 under Section14(d) in the firsthalfof2010
f The 06BAGITDAD4205 telegram is an official telegram ftom Embassy Baghdad,
dated NovemberlO, 2006 to the Department ofState. This telegram is four pages. The
telegram was properly classified CONFIDENITIAL under E.O.12958 at the time it was
generated. The telegram remained classified CONFIDENTIAL under E.O.13526 under
Section14(d)inthefirsthalfof20I0.
g. The 06BEIR^UT3603 telegram is an official telegram ftom Embassy Beirut, dated
c^^^^^^^^
^ovemberll,2006 to the Department ofState.^His telegram is six pages. The telegram was ^ ^
properly classified SECRETunder E.O.12958 at the time it was generated. The telegram
remained classified SECRETunder E.O.13526 under Sections 1.4(b)and(d) in the first
halfof2010
h. The 06BEIRUT3604 telegram is an official telegram ftom Embassy Beirut, dated
November 12, 2006 to the Department ofState. This telegram is four pages. The telegram was
properly classified SECRETunder E.O. 12958 at the time it was generated. The telegram
remainedSECRETunderEO 13526underSection14(d)inthefirsthalfof2010.
i. The 06BEIRUT3703 telegram is an official telegram ftom Embassy Beimt, dated
November 27,2006 to the Department ofState. This telegram is fburpages. Portions ofthe

18075

telegram were properly classified SECRETunder E.O.12958 at the time it was generated and
portions ofthe telegram remained classified SECRETunder E.O.13526 under Section1.4(d) in
thefirsthalfof2010
j . The 06BELGRADE1681 telegram is an official telegram ftom Embassy Belgrade, dated
Octoberl7,2006 to the Department ofState. This telegram is five pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d)
inthe firstha1fof2010
k. The 06COLOMB01889 telegram is an official telegram ftom Embassy Colombo, dated
NovemberlO, 2006 to the Department ofState. Thistelegram is fburpages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated and portions
ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 1.4(b)
and(d) inthe firstha1fof2010
1. The 06KABUL5420 telegram is an official telegram ftom Embassy Kabul, dated
NovemberlO, 2006 to the Department ofState, This telegram is three pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections
14(b)and(d) inthe firstha1fof2010
m. The 06KABUL5421 telegram is an official telegram fiom Embassy Kabul, dated
November 10, 2006 to the Department ofState, This telegram is seven pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions of the telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
14(b)and(d)inthefirstha1fof2010
n. The 06KABUL5435 telegram is an official telegram ftom Embassy Kabul, dated
November 12, 2006 to the Department ofState. This telegram is six pages. The telegram was
properly classifted CONFIDENTIAL under E.O.12958 at the time it was generated and portions
ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)
and(d) inthe firstha1fof2010.
^

o. The 06KATHMANDU3023 telegram is an official telegram ftom Embassy Kathmandu,
dated November 10, 2006 to the Department ofState. This telegram is five pages. The telegram
was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated
and portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under
Sections14(b)and(d)inthefirstha1fof2010.
p. The 06KATHMANDU3024 telegram is an official telegram ftom Embassy Kathmandu,
dated NovemberlO, 2006 to the Department ofState. This telegram is seven pages. The
telegram was properly classified CONFIDENTIAL tmder E.O.12958 at the time it was
generated and portions of the telegram remained classified CONFIDENTIAL under E.O.13526
under Sections 1.4(b)and(d) in the first half of2010.

18076

q. The 06KUWAIT4430 telegram is an official telegram ftom Embassy Kuwait, dated
NovemberlO, 2006 to the Department ofState. This telegram is five pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions of the telegram remained classified CONFIDENTIAL under E.O.13526 under Sections
14(b)and(d)inthefirstha1fof2010.
r. The 06KUWAIT4438 telegram is an official telegram ftom Embassy Kuwait, dated
November 12, 2006 to the Department ofState. This telegram is five pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Section
I4(d)inthefirstha1fof2010
s. The 06MADRJD2955 telegram is an official telegram ftom Embassy Madrid, dated
November 27,2006 to the Department ofState. This telegram is three pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections1.4(b)and
(d) inthe firstha1fof2010
L The 06MADRID2956 telegram is an official telegram ftom Embassy Madrid, dated
November 27,2006 to the Department ofState. This telegram is three pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d)
inthefirsthalfof2010
u. The 06PRISTfi^A947 telegram is an official telegram ftom US Office Pristina, dated
Novemberll,2006 to the Department ofState. This telegram is six pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
I4(b)and(d)inthefirsthalfof2010.
V. The 06PRISTfNA948 telegram is an official telegram ftom US Office Pristina, dated
Novemberll,2006 to the Department ofState. This telegram is ftve pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated and portions
ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 1.4(b)
and(d) inthe firsthalfof2010
w. The 06RlYADHI8811teIegram is an official telegram ftom Embassy Riyadh, dated
NIovemberll,2006 to the Department ofState. This telegram is six pages. The telegram was
properly classified SECRETunder E.O. 12958 at the time it was generated.The telegram
remained classifted SECRETunder E.O. 13526 under Sections1.4(a),(b)and(d) in the first
ha1fof2010
x. The 06SEOUL38S2tele^am is an official telegram ftom Embassy Seoul, dated
I^ovember 10, 2006 tothe Department ofState. This telegram is three pages. The telegram
was properly classified SECRETunder E.O.12958 at the time it was generated and portions
of the telegram remained classified SECRETunder E.O. 13526 under Sections1.4(b)and(d)
inthe firsthalfof2010

18077

y. The 06SEOUL3885 telegram is an official telegram ftom Embassy Seoul, dated November
12, 2006 to the Department ofState. This telegram is five pages. The telegram was properly
classified CONFIDENTIAL under E.O. 12958 at the time it was generated and portions ofthe
telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections (b)and(d) in
thefirstha1fof2010
^. The 06SUVA489 telegram is an official telegram ftom Embassy Suva, dated November
12, 2006 to the Department ofState. This telegram is six pages. The telegram was properly
classified CONFIDENTIAL in part under E.O. 12958 atthe time it was generated and portions
e^ftfi^ telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)
and(d)inthefirstha1fof20I0
aa. The 06TAIPEI3830 telegram isatelegram ftom the American Institute Taiwan(AIT),
Taipei, dated November 12, 2006 to the Department ofState. This telegram is two pages. The
telegram was properly classified SECRET under E.O. 12958 at the time it was generated and
portions of the telegram remained classified SECRETunder E.O. 13526 under Sections 1.4(b)
and(d)inthefirstha1fof2010
bb. The 06TRIPOLI645 telegram is an official telegram ftom EmbassyTripoli, dated
November 10, 2006 to the Department ofState. This telegram is three pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
14(b)and(d)inthefirsthalfof2010.
cc. The 06TRIPOLI648 telegram is an official telegram fiom EmbassyTripoli, dated
NovemberlO, 2006 to the Department ofState. This telegram is fburpages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Section
14(d)inthefirstha1fof2010.
dd. The 07ADDISABABA2197 telegram is an official telegram ftom Embassy Addis Ababa,
datedJuIy 13,2007 to the Department ofState. This telegram is seven pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions remained classified CONFIDENTIAL under E.O. 13526 under Section 1.4(d) in the
firstha1fof2010
ee. The 07ANKARA23 telegram is an official telegram ftom Embassy Ankara, dated January
8,2007 to the Department ofState. This telegram is three pages. The telegram was classified
CONFIDENTIAL under E.O. 12958 at the time it was generated andaportion ofthe telegram
remained CONFIDENTIAL under E.0 13526underSection14(d) in the firsthalfof2010in
thefirsthalfof2010
ff. The 07ANKARA2468 telegram is an official telegram ftom Embassy Ankara, dated
October 4,2007 to the Department ofState. This telegram is five pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and

18078

portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections
14(b)and(d)inthefirstha1fof2010
gg. The 07ASHGABAT1359 telegram is an official telegram ftom Embassy Ashgabat, dated
December 14,2007 to the Department ofState. This telegram is five pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated and ortions
of the fele^am remained classified CONFIDENTIAL under E.O. 13526 under Sections1.4(b)
and(d) inthe firstha1fof2010
hh. The 07BAGHDAD35 telegram is an official telegram fiom Embassy Baghdad, dated
January 5,2007 to the Department ofState. This telegram is four pages. The telegram was
properly classified SECRETunder E.O.12958 at the time it was generated. The telegram
remained classified SECRET under E.O. 13526 under Section 1.4(d) in the firsthalfof20I0.
ii. The 07BAGHDAD36 telegram is an official telegram ftom Embassy Baghdad, dated
January 5,2007 to the Department ofState. This telegram is four pages. The telegram was
properly classifted SECRETunder E.O. 12958 at the time it was generated. The telegram
remained classified SECRETunder E.O. 13526 under Sections 1.4(b)and(d) in the first half of
2010
j j . The 07BAGHDAD37 telegram is an official telegram ftom Embassy Baghdad, dated
January 5,2007 to the Department ofState. This telegram is seven pages. The telegram was
properly classified SECRETunder E.O. 12958 at the time it was generated. The telegram
remained classified SECRETunder E.O.13526 under Sections 1.4(b)and(d) in the first half of
2010
kk. The 07BAGHDAD42 telegram is an official telegram ftom Embassy Baghdad, dated
January7,2007 to the Department ofState. This telegram is four pages. The telegram was
properly classifted SECRETunder E.O. 12958 at the time it was generated. The telegram
remained classified SECRETunder E.O.13526 under Sections 1.4(b)and(d) in the first half of
2010
11. The 07BAGHDAD53 telegraph is an official telegram ftom Embassy Baghdad, dated
January7,2007 to the Department ofState. This telegram is three pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d)
inthe firstha1fof2010.
mm. The 07BAGHDAD56 telegraph is an official telegram ftom Embassy Baghdad, dated
January7,2007 to the Department ofState. This telegram is four pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O.13526 under SectionI.4(d) in the
firsthalfof2010.
nn. The 07BAGHDAD63 telegram is an official telegram ftom Embassy Baghdad, dated
January7,2007 to the Department ofState. This telegram is six pages. The telegram was
properly classified SECRETunder E.O.12958 at the time it was generated. The telegram

18079

remained classified SECRETunder E.O.13526 under Sections1.4(b)and(d) in the first half of
2010
oo. The 07BAGHDAD64 telegram is an official telegram ftom Embassy Baghdad, dated
January7,2007 to the Department ofState. This telegram is five pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated and
remained classified in the first half of2010.
pp. 07BAGHDAD70 is an official telegram ftom Embassy Baghdad, dated January 8, 2007
to the Department ofState. This telegram is four pages. The telegram was properly classified
CONFIDENTIAL under E.O.12958 at the time it was generated. The telegram remained
classified CONFIDENTIAL underE0 13526underSections14(b)and(d) in the firsthalf of
2010
qq. The 07BANGKOK111te1egraph is an official telegram ftom the Embassy in Bangkok,
dated January 8,2007 to the Department ofState. This telegram is three pages. The telegram
was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 1.4(b)and(d)
inthe firsthalf of2010
rr. The 07BASRAH3 telegram is an official telegram ftom Embassy Office Basrah, dated
January 5,2007 to the Department ofState. This telegram is three pages. The telegram was
properly classified SECRET in part under E.O. 12958 at the time it was generated and portions
remained classified SECRETunder E.O. 13526 under Sections 1.4(b)and(d) in the first half of
2010
SS. The 07BE1J1NG152 telegram is an official telegram ftom Embassy Beijing, dated January
8, 2007 to the Department ofState. This telegram is five pages. The telegram was properly
classified CONFIDENTIAL under E.O.12958 at the time it was generated. The telegram
remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d) in the
firsthalf of2010.
tt.07BEIRUT1958 is an official telegramftomEmbassyBeirut, datedDecember 14, 2007 to
the Department ofState. This telegram is six pages. The telegram was properly classified
CONFIDENTIAL under E.O.12958 at the time it was generated. The telegram remained
classified CONFIDENTIAL underEO. 13526 underSection14(d) in the firsthalf of2010.
UU. The 07BOGOTA101 telegram is an official telegram ftom Embassy Bogota, dated
January 5,2007 to the Department ofState. This telegram is seven pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Section
14(d) in the firsthalf of2010
w . The 07BOGOTA5118telegram is an official telegram ftom Embassy Bogota, dated July
13,2007 tothe Department ofState. This telegram is four pages. The telegram was properly
classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions of

18080

the telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and
(d)in the firsthalf of2010
WW. The 07BRATISLAVA665 telegram is an official telegram ftom Embassy Bratislava,
datedDecember 14,2007 to the Department ofState. This telegram is three pages. The telegram
was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL in part under E.O.13526 under
Sections14(b)and(d) in the first half of2010
XX. The 07BRIDGETOWN23 telegram is an official telegram ftom Embassy Bridgetown,
dated January5,2007 to the Department ofState. This telegram isftvepages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions of the telegram remained classified CONFIDENTIAL under E.O.13526 under Sections
1.4(b)and(d) inthe firsthalf of20I0
yy. The 07BUENOSAIRES1341telegram is an official telegram ftom Embassy Buenos
Aires, dated July 13,2007 to the Department ofState. This telegram isft^urpages. The telegram
was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 1.4(b)and(d)
inthe firsthalf of2010
z::^. The 07CARACAS2346 telegram is an official telegram ftom Embassy Caracas, dated
December 14, 2007 to the Department ofState. This telegram is four pages. The telegram was
properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O.13526 under Section1.4(d) in the
firsthalf of2010
aaa. The 07CARACAS35 telegram is an official telegram ftom Embassy Caracas, dated
January5,2007 to the Department ofState. This telegram is six pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Section
14(d) inthe firsthalf of2010
bbb. The 07DHAKA24teIegram is an official telegram ftom Embassy Dhaka, datedJanuary
7,2007 to the Department ofState. This telegram is four pages. The telegram was properly
classified CONFIDENTIAL under E.O. 12958 at the time it was generated and portions ofthe
telegram remained classified CONFIDENTIAL under E.O.13526 under Sections1.4(b)and(d)
inthe firsthalf of2010
ccc. The 07KABUL68 telegram is an official telegram ftom Embassy Kabul, dated January
7,2007. This telegram is four pages. The telegram was properly classified SECRETunder
E.O. 12958 at the time it was generated. The telegram remained classified SECRETunder E.O.
13526 underSections14(b)and(d) in the firsthalf of2010
ddd. The 07KINGSTON25 telegram is an official telegram ftom Embassy Kingston, dated
January5,2007 to the Department c^fSta^te.This telegram is four pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and

18081

portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections
14(b)and(d) in the firsthalf of2010
eee. The 07KUALALUMPUR40 telegram is an official telegram ftom Embassy Kuala
Lumpur, dated January 8,2007 to the Department ofState. This telegram is two pages. The
telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was
generated. The telegram remained classified CONFIDENTIAL under E.O.13526 under
Sections1.4(b)and(d) in the first half of2010
fff. The 07LAGOS719te1egram is an official telegram ftom Embassy Lagos, dated
November 1,2007 to the Department ofState. This telegram is four pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions ofit remained classified CONFIDENTIAL under E.O.13526 under Section1.4(d) in
the firsthalf of2010
ggg. The 07LAPA^1949te1egram is an official telegram ftom Embassy La Pa^, dated July
13,2007to the Department ofState. This telegram is three pages. The telegram was properly
classified CONFIDENTIAL under E.O. 12958 at the time it was generated and portions ofthe
telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d)
inthe firsthalf of2010.
hhh. The 07LIMA2400 telegram is an official telegram ftom Embassy Lima, dated July 13,
2007 to the National Security Council and to the Department ofState. This telegram is four
pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the
time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under
E 0 13526underSection14(d) in the firsthalf of2010
iii. The 07M1NSK1024 telegraph is an official telegram ftom Embassy Minsk, dated
December 14,2007 to the Department ofState. This telegram is three pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions of the telegram remained classified CONFIDENTIAL under E.O.13526 under Section
1.4(d) inthe firsthalf of2010
jjj. The 07MOSCOW5824 telegram is an official telegram ftom Embassy Moscow, dated
December 14,2007 to the Department ofState. This telegram is four pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d)
inthe firsthalf of2010
kkk. The 07MOSCOW5825 telegram is an official telegram ftom Embassy Moscow,dated
December 14,2007 to the Department ofState. This telegram is five pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O.13526 under Section1.4(d) in the
firsthalf of210
III. The 07NEWDELHI80 telegram is an official telegram ftom Embassy New Delhi, dated
January 8,2007 to the Department ofState. This telegram is three pages. The telegram was

1^

18082

properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Section
14(d) in the firsthalf of2010
nnnm. The 07PANAMA1197 telegram is an official telegram ftom Embassy Panama, dated
July 13,2007 to the Department ofState. This telegram is seven pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
1.4(b)and(d) in the firsthalf of2010.
rmn. The 07PANAMA1198 telegram is an official telegram ftom Embassy Panama, dated
July 13,2007 to the Department ofState. This telegram is two pages. The telegram was properly
classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The telegram
remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d) in the
firsthalf of2010
000. The 07PARIS4722 telegram is an official telegram ftom Embassy Paris, dated
December 14, 2007 to the Department ofState. This telegram is fburpages. The telegram was
properly classified SECRET under E.O. 12958 at the time it was generated. The telegram
remained classified SECRET under E.O. 13526 under Sections1.4(b)and(d) in the first half
of2010
ppp. The 07PAR1S4723 telegram is an official telegram ftom Embassy Paris, dated
December 14,2007 to the Department ofState. This telegram is four pages. The telegram was
properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and
(d)(e)in the firsthalf of2010
qqq. The 07RANGOON22 is an official telegram ftom Embassy Rangoon, dated
January 8,2007 to the Department ofState. This telegram is three pages. The telegram was
properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The
telegramremainedclassifiedCONFlDENTlALunderE.O. 13526 under Sections 1.4(b)
and(d) inthe fiirstha1fof20I0.
rrr. The 07REYKJAVIK203 telegram is an official telegram ftom Embassy Reykjavik, dated
July 13,2007 to the Department ofState. This telegram is fburpages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions of the telegram remain CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and
(d) inthe firsthalf of2010.
SSS. The 07RIYADH21 telegram is an official telegram ftom Embassy Riyadh, dated January
8,2007 to the Department ofState. This telegram is two pages. The telegram was properly
classified SECRETunder E.O.12958 at the time it was generated. The telegram remained
classifiedSECRET underEO. 13526 underSections14(b)and(d) in the firsthalf of2010.
ttt. The 07R1YADH22 is an official telegram ftom Embassy Riyadh, dated January 8, 2007
to the Department ofState. This telegram is two pages. The telegram was properly classified

11

18083

CONFIDENTIAL under E.O. 12958 at the time it was generated. The telegram remained
classified CONFIDENTIAL underEO 13526 under Sections14(b)and(d) in the firsthalf of
2010
uuu. The 07RIYADH23 telegram is an official telegram ftom Embassy Riyadh, dated
January 8,2007 to the Department ofState. This telegram is two pages. The telegram was
properly classified SECRETunder E.O.12958 at the time it was generated. The telegram
remained classified SECRETunder E.O. 13526 under Sections1.4(b)and(d) in the first half of
2010
v w . The 07SANSALVADOR1375 telegram is an official telegram ftom Embassy San
Salvador, datedJuIy 13,2007 to the Department ofState. This telegram is three pages. The
telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was
generated and portionsofthe telegram remained classified CONFIDENTIAL under E.O. 13526
underSections14(a)(d)(g) in the firsthalf of2010.
v^^v^. The 07SANTODOMFNG028 telegram is an official telegram ftom Embassy Santo
Domingo, dated January 8, 2007 to the Department ofState. This telegram is nine pages. The
telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was
generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526
under Section1.4(d) in the first half of2010.
xxx. The 07SUVA18te1egram is an official telegram ftom Embassy Suva, dated January7,
2007 to the Department ofState. This telegram is seven pages. The telegram was properly
classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions of
the telegram remained classified CONFIDENTIAL under E.O.13526 under Sections1.4(b)and
(d) inthe firsthalf of2010
yyy. The 07TUNIS47 telegram is an official telegram ftom EmbassyTunis, dated January5,
2007 to the Department ofState, This telegram is five pages. The telegram was properly
classified SECRET in part under E.O.12958 at the time it was generated and portions remained
classified SECRET underE0 13526 under Sections1.4(b)and(d) in the first half of2010
^^zThe07USUNNEWYORK573 te1egramisan official telegramfrom the UnitedStates
UN Mission, dated Ju1y 13,2007 to the Department ofState. This telegram is four pages. The
telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was
generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526
under Sections 1.4(b)and(d) in the firsthalf of2010.
aaaa. The 07USUNNEWYORK575 telegram is an official telegram ftom the US Mission to
the United Nations, dated July 13,2007 to the Department ofState. This telegram is five pages.
The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was
generated and portions of the telegram remained classified CONFIDENTIAL under E.O.13526
under Sections 1.4(b)and(d) in the firsthalf of2010.
bbbbThe07USUNNEWYORK578te1egramisan official telegramftom the US Mission
to the United Nations, dated July 13,2007 to the Department ofState. This telegram is four

12

18084

pages. The telegram was properly classifted CONFIDENTIAL in part under E.O. 12958 at the
time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under
E 0 13526underSections14(b)and(d) in the firsthalf of2010
cccc. The 07VIENTIANE12 is an official telegram ftom the American Embassy Vientiane,
dated January 8, 2007 to the Department ofState. This telegram is nine pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions of the telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
14(b)and(d)inthe firsthalf of2010
dddd. The 07VILNIUS13 telegram is an official telegram ftom Embassy Vilnius, dated
January 8,2007 to the Department ofState. This telegram is four pages. The telegram was
properly classifted CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
14(b)and(d) in the firsthalf of2010
eeee. The 08AMMAN535 telegram is an official telegram ftom Embassy Amman, dated
February 20, 2008 to the Department ofState. This telegram is ten pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions of the telegram remained classified CONFIDENTIAL under E.O.13526 under Sections
14(b)and(d) in the firsthalf of2010
ffff. The 08CA1RO569 telegram is an official telegram ftom Embassy Cairo, dated March
23,2008 to the Department ofState. This telegram is three pages. The telegram was properly
classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions of
the telegram remained classified CONFIDENTIAL under E.O. 13526 under Section 1.4(d) in
the firsthalf of2010
gggg. The 08DARESSALAAM206 telegram is an official telegram ftom Embassy E^^r^s
Salaam, dated April 1,2008 to the Department ofState. This telegram is six pages. The
telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was
generated and portions remained classified CONFIDENTIAL under E.O.13526 under Sections
14(b)and(d) in the firsthalf of2010.
hhhh. The 08KHARTOUM246 telegram is an official telegram ftom Embassy Khartoum,
datedFebruary20, 2008 to the Department ofState. This telegram is four pages. The telegram
was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated and
portions ofit remained CONFIDENTIAL under E.O.13526 under Sections 1.4(b)and(d) in the
firsthalf of2010
iiii. The 08KHARTOUM428 telegram is an official telegram ftom Embassy Khartoum,
dated March 23,2008 to the Department ofState. This telegram is nine pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 tmder Sections
1.4(b)and(d) inthe firsthalf of2010

13

18085

jjjj. The 09ADDISABABA1063 telegram is an official telegram ftom Embassy Addis
Ababa, dated May7,2009 to the Department ofState. This telegram is fburpages. The telegram
was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated and
portions ofit remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and
(d)inthe firsthalf of2010
kkkk. The 09BAGHDAD2390 telegram is an official telegram ftom Embassy Baghdad,
dated September5,2009 to the Department ofState. This telegram is three pages. The telegram
was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 1.4(b)and(d)
inthe firsthalf of2010
1111. The 09BAMAl^O85 telegram is an official telegram ftom Embassy Bamako, dated
February 12,2009 to the Department ofState. This telegram is seven pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
14(b)and(d) in the firsthalf of2010
mmmm. The 09BOGOTA2873 telegram is an official telegram ftom Embassy Bogota, dated
September 4, 2009 to the Department ofState. This telegram is four pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
14(b)and(d) in the firsthalf of2010
rmnn. The 09BRASILIA1112 telegram is an official telegram ftom Embassy Brasilia, dated
September4,2009 to the Department ofState. This telegram is fburpages. The telegram was
properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The
telegram remamed classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d)
inthe firsthalf of2010
OOOO. The 09BRASILIA1I13 telegram is an official telegram ftom Embassy Brasilia, dated
September4,2009 to the Department ofState. This telegram is eight pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 tmder Sections
14(bXd) in the firsthalf of2010
pppp. The 09CARACAS1168 telegram is an official telegram ftom Embassy Caracas, dated
September4,2009 to the Department ofState. This telegram is six pages. The telegram was
properly classified CONFIDENTIAL in part under E.0 12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Section
14(d)inthe firsthalf of2010
qqqq. The 09LIMA1309 telegram is an official telegram ftom Embassy Lima, dated
September 4,2009 to the Department ofState. This telegram is fburpages. The telegram was
properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O.13526 tmder Sections1.4(b)and(d)
in the firsthalf of2010.

14

18086

rrrr. The 09MEX1CO2658 telegram is an official telegram ftom Embassy Mexico City,
dated September4,2009 to the Department ofState. This telegram is two pages. The telegram
was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated and
portions of the telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
1.4(b)and(d) in the firsthalf of2010
ssss. The 09NEWDELH1267 telegram is an official telegram ftom Embassy New Delhi,
datedFebruary 12, 2009 to the Department ofState. This telegram is six pages. The telegram
was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated
and portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under
Sections14(b)and(d) in the firsthalf of2010
tttt. The 09PARIS217te1egram is an official telegram ftom Embassy Paris, dated February
12, 2009 to the Department ofState. This telegram is two pages. The telegram was properly
classified CONFIDENTIA^L under E.O.12958 at the time it was generated and portions of the
telegram remained classified CONFIDENTIAL under E.O.13526 under Sections1.4(b)and(d)
inthe firsthalf of2010.
uuuu. The 09PRAGUE88 telegram is an official telegram ftom Embassy Prague, dated
February 12,2009 to the Department ofState. This telegram is three pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d)
in the firsthalf of2010
WW. The 09PRISTINA58 telegram is an official telegram ftom Embassy Pristina dated
February 12,2009 to the Department ofState. This telegram is five pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections
14(b)and(d) in the firsthalf of2010
wwww. The 09RIYADH1156 is an official telegram ftom Embassy Riyadh, dated September
5,2009 to the Department ofState. This telegram is three pages. The telegram was properly
classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The telegram
remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d) in the
firsthalf of2010
xxxx. The 09SANTIAGO831te1egram is an official telegram ftom Embassy Santiago,
dated September4,2009 to the Department ofState. This telegram is three pages. The telegram
was properly classified CONFIDENTIAL E.O.12958 at the time it was generated. The telegram
remained classified CONFIDENTIAL under E.O.13526 under Sections 1.4(b)and(d) in the
firsthalf of2010
yyyy. The 09SANTIAGO833 telegram is an official telegram ftom Embassy Santiago,
dated September 4, 2009 to the Department ofState. This telegram is seven pages. The telegram
was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated

15

18087

and portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under
Sections14(b)and(d) in the firsthalf of2010
z^^zz. The 09SANT1AGO835 telegram is an official telegram ftom Embassy Santiago,
dated September4,2009 to the Department ofState. This telegram is five pages. The telegram
was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated
and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under
Section14(b)in the firsthalf of2010.
aaaaa. The 09SANTODOMINGO1017teIegram is an official telegram ftom Embassy
Santo Domingo, dated September 4,2009 to the Department ofState. This telegram is four
pages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it
was generated. The telegram remained classified CONFIDENTIAL under E.O. 13526 under
Sections14(b)and(d) in the firsthalf of2010
bbbbb. The 09STATE92632 telegram is an official telegram ftom the Department, dated
September 4, 2009 to the Embassy in Moscow. This telegram is four pages. The telegram was
properly classified SECRET in part under E.O. 12958 at the time it was generated and portions of
the telegram remained classified SECRETunder E.O.13526 under Section1.4(d) in the first
halfof2010
ccccc. The 09STATE9264I telegram is an official telegram ftom the Department, dated
September 4, 2009 to Embassy Colombo andanumber of other posts. This telegram is six pages.
The telegram was properly classifted CONFIDENTIAL in part under E.O. 12958 at the time it
was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O.
13526 underSection1.4(d) in the firsthalf of2010
ddddd. The 09STATE92655 is an official telegram ftom the Department ofState, dated
September4,2009 to EmbassyTegucigalpa This telegram is five pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions c^fthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
14(b)and(d) in the firsthalf of2010
eeeee. The 09STATE92657 telegram is an official telegram ftom the Department ofState,
dated September4,2009 to the Embassies in Moscow,Kyiv,andAstana. This telegram is four
pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the
time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under
E.O. 13526 underSections14(a)(b)and(d)(e)in the firsthalf of2010
fffff. The 09TEGUCIGALPA891 telegram is an official telegram ftom Embassy
Tegucigalpa, dated September 4, 2009 to the Department ofState. This telegram isftvepages.
The telegram was properly classified CONFIDENTIAL in part tmder E.O.12958 at the time it
was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O.
13526 underSectionsI4(b)and(d) in the firsthalf of2010.
ggggg. The 09TEGUCIGALPA892 telegram is an official telegram ftom Embassy
Tegucigalpa, dated September4,2009 to the Department ofState. This telegram is two pages.

16

18088

The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it
was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O.
13526 underSection1.4(d) in the firsthalf of2010.
hhhhh. The10BRUSSELS382 telegram is an official telegram ftom the US Mission to the
European Union in Bmssels, dated March 30,2010to the Department ofState. This telegram is
fburpages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at
the time it was generated and portions c^fthe telegram remained classified CONFIDENTIAL
under E.O. 13526 underSections14(b)and(d) in the firsthalf of20I0.
iiiii. The10GENEVA347 telegram is an official telegram ftom the US Mission in Geneva,
dated March 30, 2010to the Defense Intelligence Agency (DIA) and other addressees. This
telegram is thirteen pages. The telegram was properly classified SECRET in part under E.O.
12958 at the time it was generated and portions c^fthe telegram remained classified SECRET
underE0 13526underSections14(b)and(d) in the firsthalf of2010
jjjjj. The10LIMA333 telegram is an official telegram ftom Embassy Lima, dated March 29,
2010to the Department ofState. This telegram is six pages. The telegram was properly
classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions of
the telegram remained classified CONFIDENTIAL under E.O.13526 under Section1.4(d) in
the first year of2010.
kkkkk. The 10PRETORIA636 telegram is an official telegram ftom Embassy Pretoria, dated
March 30, 2010to the Department ofState. This telegram is five pages. The telegram was
properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O.13526 under Section 1.4(d) in the
firsthalf of2010
mil. The10RABAT294 telegram is an official telegram ftom Embassy Rabat, dated March
30,2010to the Department ofState. This telegram is twelve pages. The telegram was properly
classified SECRET in part under E.O.12958 at the time it was generated and portions ^ f t f i e
telegram remained classified SECRETunder E.O.13526 under Section 1.4(d) in the first half
of2010.
rmnmmm. The10TOKYO627 telegram is an official telegram ftom EmbassyTokyo, dated
March 29,2010to the Department ofState. This telegram is four pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
14(b)and(d) in the firsthalf of2010
8. For each ofthose 96 cables listed above and classified as CONFIDENTIAL the following
is true:
a. First, all 96 cables were properly marked at the CONFIDEN^TIAL classification leveL
b. Second, disclosure ofthe information identified in the 96 cables reasonably could be
expected to cause damage to the national security ofthe United States. In making this

18089

statement regarding the classification ofinformation in this case,lrely upon my personal
knowledge and experience, the information made available to me in my official capacity,and
the advice and recommendations received ftom experts within the geographic and functional
bureaus.
c. Third, the 96 cables and the information contained in them were classified at the
CONFIDENTIAL level at the time oftheir creation, and remained classified at the
CONFIDENTL^L levelin the firsthalf of2010andatthetimeoftheir disclosure These
cables were classified pursuant to Section 1.4ofE.O. 13526,or its predecessor E.O.s,
because they contained information that, ifreleased, could cause damage to national security.
9. For each of those21cables listed above and classified as SECRET the following is true:
a. First, all21cables were properly marked at the SECRETcIassification leveL
b. Second, disclosure ofthe information identified in the21cab1es reasonably could be
expected to cause serious damage to the national security ofthe United States. In making
this statement regarding the classification ofinformation in this case,lrelied upon my
personal knowledge and experience, the information made available to me in my official
capacity,and the advice and recommendations received ftom experts within the geographic
and fimctional bureaus.
c. Third, the21cab1es and the information contained in them were classified at the
SECRET level at the time oftheir creation, and remained classified at the SECRET level in
the first half of2010and at the time of their disclosure. These cables were classified
pursuant to Section 1.4ofE.O.13526, or its predecessor E.O.s, because they contained
information that, ifreleased, could cause serious damage to national security.
10. Of the cableslreviewed in the Net Centric Diplomacy database,aportionofthem were
found to be technically deficient in terms of marking. That is, they contained no
declassification date,were missing authority,or improperly cited the E.O.s. However, the
presence oftechnical marking deficiencies does not mean that the cables were not classified.
Moreover,Ifbund that portions of some of the cableslreviewed were no longer sensitive.

ANGELMOV^GAARD
CPT,JA
Assistant Trial Counsel

^^^^^t^^^^^^^^
THOMASFHURLEY
MAJ,JA
Military Defense Cotmsel

18

B^^^^^^^^^^^^^^^^
BRAD^^EM^^^^G
PFC, USA
Accused

18090

Prosecution Exhibitl^^
ICJ^
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplementto the original
Record ofTrial

18091

Prosecution Exhibitl^Oa
6pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial

. 18092



UNITED STATES OF AMERICA
STIPULATION OF
v. EXPECTED TESTIMONY

Bram.
PFC, Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall June 2013
Fort Myer, Virginia 22211




PROSECUTION mar Waior ation
PAGE
PAGE

18097


ANGEL OVERGAARD THOMAS F. HURLEY BRADLEY E. MANNING
CPT. JA MAJ. JA PFC. USA

Assistant Trial olulsel Militaly Defense Counsel Accused



18098

Prosecution Exhibitl81a
^pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial

18099

(b)(1)(B)

UNITED STATESOF AMERICA
STIPULATION OF
EXPECTEDTESTIMONY
(b)(1)(B)

Manning, Bradley E.
PFCU.S.Army,
HHCU.S.ArmyCarrison,
JointBaseMyerHendersonHall
FortMyer,Virginia 2221I

^^June2013

(b)(1)(B)

(b)(1)(B)

(b)(1)(B)

(b)(1)(B)

(U) Classification
4. (U) SectionI.1(a)ofE013526 lists three classification levels fbr national security
information. Information shall be classified TOP SECRET ifits unauthorized disclosure
reasonably could be expected to result in exceptionally grave damage to the national security:
SECRET ifits unauthorized disclosure reasonably could be expected to result in serious damage
to the national security: and CONFIDENTIAL ifits unauthorized disclosure reasonably could be
expected to result in damage to the national security.
5. (U) Section 6.l(i)oftheEO defines "classified national security information" or "classified
information" as "information that has been determined pursuant to this order or any predecessor
order to require protection against unauthorized disclosure and is marked to indicate its classified
status when in documentary form." Section 6.1(cc)oftheEO defines ^^nationalsecurity" as the
"national defense or ftireign relations ofthe United States."

(b)(1)(B)

^

^ s ^ ^

^^OSEC^lONEXHlBIT^I^ori^^tification
^^G^OFFERED:
PAGEADMITTED:
^^0^
^^^OES

18100

(b)(1)(B)

6. (U)Section1.4ofE013526 lists the substantive categories of national security information
that are eligible fbr classification. These categories include information pertaining to
intelligence activities and intelligence sources and methods, as well as information pertaining to
the fbreign relations or fbreign activities ofthe United States.
7. (U) The authority to classify inft^rmation is derivedftomasuccessionofEOs,the current one
being E013562. Section I.3(a)ofEO 13526 provides that the authority to classify information
originally may be exercised only by the President, the Vice President, agency heads and officials
designated by the President, and United States Govemment officials delegated authority pursuant
tosection1.3(c), SectionI,3(c)(3)provides that TOP SECREToriginal classification authority
may be delegated only by the President, the Vice President, or any agency head or official
designated pursuant to sectionI,3(a)(2).
8

(b)(1)(B)

9. (U) SectionI.1(a)oftheEO provides that information may be originally classified under the
terms ofthis Order only ifall ofthe following conditions are met: (l)an original classification
authority is classifying the information; (2) the information is owned by,produced by or fbr, or is
under the control ofthe United States Government; (3) the information falls within one or more
ofthe categories ofinformation listed in section 1.4of the Order; and (4) the original
classification authority determines that the unauthorized disclosure ofthe information reasonably
could be expected to resuh in some level ofdamage to the national security and the original
classification authority is able to identify or describe the damage.
10

(b)(1)(B)

11. (U) SectionI,1(a)(4)ofE0 13526 provides that information may only be classified if
unauthorized disclosureofthe information reasonably could be expected to cause damage to the
national security(which includes defense against transnational terrorism)and the original
classification authority is able to identify or describe the damage. As described above, EO
13526 states that information shall be classified at one ofthree levels: TOPSECRET,SECRET,
or CONFIDENTIAL depending on the damage to the national security that reasonably could be
expected to result from unauthorized disclosure.
(b)(1)(B)

12

(b)(1)(B)

(b)(1)(B)

18101

1 1 1 .

18102

4
6. 7..

18103

18104

6
1 1
2 2 2

18105

(b)(1)(B)
(b)(1)(B)

24 (b)(1)(B)

//ORIGINALSIGNED//
ANGELOVERGAARD
CPT,JA
AssistantTrial Counsel

//ORIGINALSIGNED//
THOMASFHURLEY
MAJ,JA
Military Defense Counsel

//ORIGINALSIGNED//
BRADLEYEMANNING
PFC, USA
Accused

18106

UNITED STATESOF AMERICA
STIPULATION OFFACT
Manning, Bradley E.
PFCU.S.Army,
HHC, U.S. Army Garrison,
JointBaseMyerHendersonHall
FortMyer,Virginia 22211

AdamGadahn
^^June2013

The United States and the Defense,with the express consent of the accused,stipulate that
the following facts are true, susceptible ofproof, and admissible in evidence. These facts may be
considered by thefinderoffact to establish the elements ofall charges and their specifications.
They may be considered by the sentencing authority and on appeal in determining an appropriate
sentence, even ifthe evidence ofsuch facts is deemed otherwise inadmissible. The accused
expressly waives any objections he may have to the admission ofthis evidence at trial under the
Military Rules ofEvidence, the Rules for Courts-Martial,theU,S,Constitution, or applicable
case law,
1. Adam Gadahnisasenior leader of alQaeda (hereinafter ^^A(^"), the terrorist organization
responsible for the attacks against the United States at theWorldTrade Center and Pentagon on
11September2001, AdamGadahn has beenamemberofAQsince 2004,
2, AsSahabisamedia organization operated byAQ. Onorabout3June2011,As-Sahab
media releasedavideotitled,^^Thou Art Held Responsible Only fbrThyself (hereinafter
^^Gadahn video"). The Gadahn video was released simultaneously in two separate parts
(referenced herein as ^^Part I " and ^^Part II" respectively). The Gadahn video features Adam
Gadahn and other AQleaders as speakers. The Gadahn video serves asapropaganda and
recruitment tool for AQ.
3, As-Sahab and Adam Gadahn obtained materialftomWikiLeaksand used the material ftom
WikiLeaks in the Gadahn video. The Gadahn video contained excerpts ftom the WikiLeaks'
editedversionofthevideofilenamed^^12JUL07CZENGAGEMENTZ^ONE30GC
Anyone.avi" (hereinafter"Apache video") contained in Prosecution Exhibit ( P E ) ^ f o r
Identification. P E ^ f o r ID is theWikiLeaks edited version of the Apache video that appears
on the WikiLeaks web site. The Gadahn video shows the WikiLeaks web site. Between the time
stamps 03:23 and 04:40 in PartLfl^^ Gadahn video shows the Apache video (PE^^^forlD)on
the WikiLeaks web site,
4. PEl^^or ID is the Department ofState information in the Gadahn video obtained from
WikiLeaks, In Partlof the Gadahn video ftom time stamps 43:28 until 44:38,Adam Gadahn,
speaking in English, recommends using the Intemet to make ^^use of all means possible to do
damage to the enemy," Referencing the Department'sinfbrmation during the same time stamps
in Part I, Adam Gadahn states,^^But, by the grace of God, the enemy'sinterests are today spread
all over the place and easily accessibly as the leak of America'sState Department cable on
critical fbreign dependency makes so clear."Adam Gadahn also states during the same time
stamps in PartL^^Andladvise every brother who wants to work fbr this religion not to

==r-^oMifc
PAGE
PAGE

OF

PAGES

18107

undertake any action before taking advantage ofthe wide range ofresources available today on
the Intemet, particularly the various manuals, encyclopedias,and courses,which deal with the
mujahideen^s operational and electronic security, and security in general."
5. In Part II from the time stamps 05:35 until 06:37, the narrator, citing Department material
obtained ftomWikiLeaks, reports Arab leaders'^^collaboration" with ^^their ruler, America,"
giving President Obama an ^^open door" to ^^wage war on the mujahidin." The narrator in Part II
of the Gadahn video ftom time stamps 06:38 until 09:01,also referencing the contentsofthe
Department'smaterial obtained ftomWikiLeaks, cites reports of the ^^lewd parties put on by the
American consulates in Islamic countries that aim to cormpt the minds, morals, and religion of
the youth." The narrator continues,^^These documents revealed that most of the richesofthe
Islamic world are spent on cortuption and waging war on Islam, while millions ofMuslims live
in abject poverty."
6. Inspire Magazine isamagazine published on the Intemet by alQaeda in the Arabian
Peninsula (hereinafter^AQAP"). AQAPisabranchofAQ. Inspire Magazine serves asa
propaganda and recmitment tool for AQAPandAQ. On or aboutlbJanuary 2011,Inspire
Magazine published issue number4(hereinafter^^Winter2010Inspire Issue") on the Internet,
On pages 44-45of the Winter 2010Inspire Issue, the magazine lists activities one can do to
^^help the mujahidin in within the conftnes ofthe media sector," The Winter 2010Inspire issue
lists that archiving large amountsofinformation is helpful to AQAPandAQ. The Winter 2010
Inspire Issue further lists ^^i^a^nythingusefiil ftomWikiLeaks" is useful for archiving.

^^^^^^^^^^^^^^^^^^^^^^^

ASHDENFEIN
MAJ,JA
Trial Counsel

THOMASFHURLEY
MAJ,JA
Military Defense Counsel

^

BRADI^
PFC, USA
Accused

18108

UNITEDSTATESOF AMERICA

Manning, Bradley E.
PFCU.S.Army,
HHC, U.S. Army Garrison,
JointBaseMyerHendersonHall
FortMyer, Virginia 22211

STIPULATION OF
EXPECTEDTESTIMONY
CDRYoussefAhoul-Enein
June2013

It is hereby agreed by the Accused, Defense Counsel,andTrial Counsel,that if CDR
YoussefAboul Enein were present to testify during the merits phase of this court-martial, he
would testify substantially as follows:
1. lamaCommander in the United States Navy and an officer in the Medical Service Corps.
Additionally,IamaMiddle East Foreign Area Officer. Since 2006,lhave served asaSenior
CounterTerrorismAdvisor,Waming Officer, and Instructor on Militant Islamist Ideology at the
Joint IntelligenceTaskForce for CombatingTerrorism(JITF-CT)inWashington DC. ladvise
the House Homeland Security Committee onViolent Islamist radicalization. lam also Military
AdjunctFaculty for Middle East CounterTerrorism Analysis at the National Intelligence
University. lam currently assigned to the Defense Intelligence Agency (DIA)at Boiling Air
Force Base, Previously,Iserved as Country Director fbr North Aftica and Egypt, Assistant
Country Director fbr the Arabian Gulf, and Special Advisor on Islamist Militancy at the Office
ofthe Secretary ofDefense for Intemational SecurityAffairs from 2002 2006. While at the
Office ofthe Secretary ofDefense,Ihelped prepare Department ofDefense officials to engage in
ministerial level talks with their counterparts ftom Morocco to the Persian Gulf
2. My education consists ofaB.B.A ftom the University ofMississippi,an M,B,A and Masters
in Health Services Administration ftom the University ofArkansas, an M.S. in Strategic
Intelligence from the National Defense Intelligence College, as well as an M.S. in National
Resource Strategy ftom the Industrial College of the Armed Forces(Classof2009 2010). lam
the author of^^/^^7^^e^^^^,^/e^^^.^^^c^^c^^c^^.L^i^c^^^,^^^^
7^^^^C^^'^B^^'.^^£^^^£^^/.^^^.^^^£^^^'l^^.^C^^^ BI^^^

published by Naval Institute Press. lalso contributed to the counterterrorism portion ofthe May
2012editionof"PerspectivesonTerrorism." lam rated proficient in the Egyptian, Peninsular,
Levantine, Modem Standard (Upper Level) and Iraqi dialects ofArabic by the Defense
Language Institute. My operational tours include Liberia, Bosnia, and the Persian Gulf My
personal awards include the Army Commendation Medal presented by GeneralTommy Franks,
the Joint Service Achievement Medal presented by the Commandant ofthe Joint Forces Staff
College, and the Defense Meritorious Service Medal (DMSM) awarded by the Secretary of
Defense,asecondDMSM awarded by the DIA Directorfor Analysis,
3. lhave spent years studying Al-Qaeda(AQ). From its inception through 2011,AQwasa
militant Islamist organization founded and led by Usama bin Laden (UBL). AQ'sphilosophy
was ofglobal Jihad and strict interpretation ofSharia Law. Jihad isaKoranic principle, but
AQ'sdefinition translated into ^^religious war against the infidels." AQ'sdefinitionof^jihad'
opposed any nation or organization that did not strictly adhere to Sharia Law as ^^infidels." Thus,
PROSECUTION EXHIBIT^^loi^ide^cation
PAGEOFFERED:
PAGEADMI^ED:
PAG^
OF
PAGES

18109

ftom its inception through today,AQseeks to attack countries constituting the ^^West,"to include
the United States andWestem Europe. AQalso seeks to attack Arab regimes thatAQconsiders
to be allied with the United States. For the purpose of my testimony,AQwas composed ofits
senior leadership and spokesmen as well as the senior leadership and spokesmen ofits declared
ftanchises, like AlQaeda in the Arabian Peninsula,
4, From its inception,AQwasaterrorist organization that has been attacking the United States
since the original attack on theWorldTrade Center in 1993,which killed six and wounded over
one thousand. AQclaimed responsibility for the following attacks: (1)the 1998 bombing ofUS
embassies in Kenya andTanzania,which killed over 200 people and injured more than 5000
others, (2) the 2000 bombing of the USS Cole,which killed17sailors and injured more than 39
others,and (3)the11September2001 attacks,which killed more than 3000 civilians and injured
more than 5000 others. AQcontinued to claim responsibility for intemational bombings
throughout the 2000s. AQ, or organizations loosely affiliated with it, have claimed responsibility
fbr attacking US forces and their coalition partners working in Iraq and Afghanistan witha
variety of direct action engagements(e.g.direct fire engagements, indirect fire engagements, and
improvised explosive device attacks). AQsees itself as an enemy of the US; the 2001
Authorization for Use ofMilitary Force is read to provide the authorization for US military
actions againstAQand its affiliates.
5, From its inception,AQclaimed that it would attack(and claimed responsibility for attacking)
civilian or military targets with different means and degrees of complexity. The United States
has defended againstAQsincethe 1990s. In 1998,UBL was indicted in federal court fbr
conspiracy to murder, bomb, and maim United States citizens. The United States has employed
forces againstAQworldwide, to include Aftica and the Middle East. AQ, like common
criminals, required secrecy to carry out their direct action missions. As the US developed
methods to respond to the stealthy tactics ofAQ, their tactics evolved in order to continue their
operations. This evolution^orcreativity^compelled the same ftom the West to develop
countermeasures. This cycle occurred ftom the inception ofthe defense againstAQthrough
2010
6, AQ has also become more decentralized in response to the actions ofthe United States. AQ
adoptedaphilosophy of creatinga^^leaderless environment" because it makesAQterrorist cells
harder to detect. This leaderless environment was bom ofnecessity considering the West's
success in capturing and killingAQleadership, From the perspective ofAQ,selfradicalization
aided the development ofa^^leaderless environment." AQsought to create hostility and tum the
population of any given country against its secular leadership to createaleaderless environmenL
Toencourageselfradica1ization,AQimp1ored all Islamists, specifically the younger
generations, to take it upon themselves to fight their enemies, AQdidnothaveacentralized
organizational structure,which helped in facilitating the leaderless environment in which they
operate. Those individuals that responded to the calls for self radicalization would be considered
^^AQ inspired." ^^AQ inspired" are indirectly connected to AQ.
7, AlQaeda in the Arabian Pemnsula(AQAP)isaterrorist organization that formed asamerger
betweenAQcells in Saudi Arabia andYemen in 2003. From its inception through the end of
2010,AQAP claimed responsibility for:(1)an attack onWestem expatriates residing on Saudi
soil and (2) launching attacks against oil refineries. AQAP also claimed responsibility for the

18110

failed ^^underwear bomber" attack of2009.AQAP was the most creative ^^ftanchise"ftomits
inception through the charged time period.
8, From its inception,AQused the media to achieve its goals, gain notoriety,and inspire
individuals tojoin in terrorist activities, AQused the media for fimdraising as well. This money
would then be used to fund training, missions, bribes, media creation for propaganda and
recruiting, and traveling. AQused its notoriety to seek facilitators who would launder money,
obtain items not easily located inAQ'sarea of operation, move members ofAQto new
destinations, and smuggle recruits,
9, From its inception, media perception was important to AQ, Any event that placedAQina
positive light or depicts forces adversarial to AQinanegative light would have been seen as
beneficial byAQ. Acknowledgement of successful attacks against enemy forces would have
likely boosted morale and may have led toacorresponding increase in attacks. Events that
undermined cooperation with foreign leaders would have, ftom the perspective ofAQ, increased
antagonism toward those leaders and created an environment in which terrorist ideology excels.
10. Throughout the 1990s and early2000s,AQused media outlets to deliver its recorded
messages toabroader audience. In time,AQdecided to release its messages directly to the
Intemet through its media arm, As-Sahab. AsSahab has been designed to operate likeamedia
outleL The golden As-Sahab logo in Arabic calligraphy was pattemed offthe golden logo of Aljazeera, which also features Arabic calligraphy. From its inception through 2010, As Sahab
made videos to recmit and spreadAQpropaganda. Propaganda was thought byAQto be
essential for these missions because it establishedAQ'scredibility as an effective terrorist
organisation.
11. AQhas used the Intemet since the 1990s. AQused the Intemet as means of communication
for its leaders and members. As the Intemet grew to host more information, communication
through cyberspace,such as the Intemet,was the preferred method of communication because
AQdidnothaveacentralized organizational stmcture andAQmembers were constantly moving
in order to avoid being captured or killed by anti-AQforces. AQused the Intemet for research
for potential targets, recruits, and facilitators. AQused the Intemet for research since at least the
early2000s. AsAQdeveloped its ov^ resources such as As-Sahab,AQshiftedmoreofits
attention onto the Intemet, AQused websites with users who were sympathetic to its goals, AQ
also used all publicly available websites. AQused websites that described United States
govemment resources,websites that contained United States govemment information, and
websites that researched United States govemment information to gather intelligence that may
be useful in planning attacks against the United States. AQalso searched fbr information related
to the United States govemment that would have been used fbr propaganda to undermine the
United States or its allies, especially diplomatic information.

\^Y^ih
ALEXANDER voN ELTEN
CPT, JA
Assistant Trial Counsel

18111

«^4
'^iL&y^

THOMAS F. HURI
JREEYL/
MAJ, JA
Military Defense Counsel

BRADLEY E. MANNI
PFC, USA
Accused

18112

Prosecution Exhibitl8^
3pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial

18113

Prosecution Exhibitl85
5pages
classified
"CO^EJE^E^Tl^E"
ordered sealedfDrReason3
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial

18114

Prosecution Exhibitl86
has been entered into
the record asahardbacl^bool^
and will be maintained
with the original
Record ofTrial

18115

7\

H

o
•jn
i—
m
Z
>
^

00
CO

m

Z

no
O

>

LO
nq

O

h-^N

o

TD

<

O

CD
O

LO

S3 g
^ 5
50

O

=:

^

m

3
$

m
D"

3

^

o

QJ_

3 "O

CO

QJ

m

^

<
fD

3

fD

QJ

O

o-

IR
(TO rD
fD
QJ

CO
^ .

CO

^

3
3
Q_ OQ
r+

O

fD

-I

CO

fD
Q.

O

m

o
-n

QJ

>

FD"

QJ

,
QJ
—% r-h
O

t/1

fD

L/

-o
O

PROSECUTION E X U n ; ^ fg?fb!/^c,%ncRiion
PAGE OFFERED:
* 4 j E AD^^rrrED:
PAGE
OF
PAGES

18116

o

m
H

-o
O
LO

m
<

m
30

m

|

|

cr r+
V) 5"
fD O
-I

Q_

m

o

c

QJ

CO

3

n
n

fD

OQ g

^
3*
OQ OQ
fD
CO

O
w

3
0)

>
^

m
'TJ

O
Y

Tl

18117

OQ
fD

CO

QJ
3
o
^'
^
3"
fD
—^
fD

QJ
<

fD

5"

CO

r+
3"
fD
^
(D"

3
QJ

3
fD

<
I-+

r+
O

sav

QJ

ha

r+
O

fD

"O

O

n
o
3
"D
O
3

m
^r+-

m
O
—h

QJ

fD
:r*
O

o
3
3
QJj.

CU

18118

c

m

{/I

X

"

3

fD OJ

•D_
fD
O
fD

n

O

3
3
QJ
3
QT5
—%

O

3

T3
r+
QJ

m

CO

fD
fD
3

cr

fD

y -v "a

>

18119

>

GOO

•o

tn rn CO

ii
O m H

" S Xi
>!

I-"

03
Ln
O
y^
VI

5, ^

o

ii

p O

•o
i?

t

m ;"7 S
w5H

f

w

:s#

%n

O

M

g
era
eo

O

e^ $
l/l

l/l

CD
X

ns

m
21

cn

-I>

3"

e^$

if

en
o
p
•b

O
O

m
c?
n

o

cn

"f

3
o
o

s5J

N

C,'

o'

r*

-i _

N>

ro g\
% §

o
cn

O

O

>

en

>

m

73

TJ

T3

>

o
w
>
•o

>
•a

o

o
w

OJ

>

o
Ul
>
•o

>

TS

"O

>

>

•D

-o

^ q -o

" 2 (g

ZI

u
2, 9O CJ

o

o

n
C

o
C

S 2

o
o
n
C

m
Z
H

l/l

o
o
o

C3 O O
O O O
O

O

D
O

o n

C

c

c C C

m
Z
H

m

m m
z Z

z

H
l/l

tn

$
1
o e3

$1

>

o

on

m
Z

H
Ul

Ln

tn

' >

d CJ

>• o

o

ii

U3
O
O

3
_^

Z

82

§51

cn
X



if

^ if

cn

cn

5 5

5 5

>
z

cn

cn

18120

\

wget-help
GNU Wget 1.11.4, a non-interactive network retriever.
Usage: wget [OPTION]... [URL]...
Mandatory arguments to long options are mandatory for short options too.
Startup:
-V, --version
-h, — h e l p
-b, —background
-e, --execute=COMMAND

display the version of Wget and exit,
print this help,
go to background after startup,
execute a .wgetrc'-style command.

Logging and input f i l e :
-o, --output-fi1e=FlLE
-a, --append-output=FILE
-d,
-q,
-V,
-nv,
-i,

—debug
--quiet
--verbose
--no-verbose
—input-file=FlLE

-F, --force-html
-B, --base=URL

log messages to FILE.
append messages to FILE.
print lots of debugging information.
quiet (no output).
be verbose (this i s the default).
turn off verboseness, without being quiet.
download URLs found i n FILE.
treat input f i l e as HTML.
prepends URL to relative links i n -F - i f i l e .

Download:
- t , --tries=NUMBER
--retry-connrefused
-0, --output-document=FiLE
-nc, --no-clobber

s e t number o f r e t r i e s t o NUMBER (0 u n l i m i t s ) .
r e t r y even i f c o n n e c t i o n i s r e f u s e d .
w r i t e documents t o F I L E .
s k i p downloads t h a t would download t o
existing f i l e s .
resume g e t t i n g a p a r t i a l l y - d o w n l o a d e d f i l e ,
s e l e c t progress gauge t y p e ,
d o n ' t r e - r e t r i e v e f i l e s unless newer than
local.

-c,

--continue
--progress=TYPE
-N, --timestamping

-S, --server-response
--spi der
-T, --timeout=SECONDS
--dns-timeout=SECS
--connect-timeout=SECS
--read-timeout=SECS
-w, --wait=SECONDS
—wai tretry=SECONDS
— random-wait
--no-proxy
-Q, --quota=NUMBER
--bind-address=ADDRESS

print server response.
don't download anything.
set a l l timeout values to SECONDS.
set the DNS lookup timeout to SECS.
set the connect timeout to SECS.
set the read timeout to SECS.
wait SECONDS between retrievals.
wait 1..SECONDS between retries of a retrieval.
wait from 0...2*WAIT sees between retrievals.
e x p l i c i t l y turn o f f proxy.
set retrieval quota to NUMBER.
bind to ADDRESS (hostname or IP) on local host,
--1i mi t-rate=RATE
l i m i t download rate to RATE.
--no-dns-cache
disable caching DNS lookups.
- - r e s t r i ct-fi1e-names=OS r e s t r i c t chars i n f i l e names to ones OS allows,
--ignore-case
ignore case when matching files/directories.
—user=usER
set both f t p and http user to USER.
--password=PASS
set both f t p and http password to PASS.

Di r e c t o r i e s :
-nd, - - n o - d i r e c t o r i e s
-X,
--force-directories
-nH, - - n o - h o s t - d i r e c t o r i e s
--protocol-di rectories
-P,
--directory-prefix=PREFlx
- - c u t - d i rs=NUMBER

HTTP options:
--http-user=USER
--http-password=PASS
--no-cache

don't create d i r e c t o r i e s .
force creation of d i r e c t o r i e s .
d o n ' t c r e a t e host d i r e c t o r i e s .
use p r o t o c o l name i n d i r e c t o r i e s ,
save f i l e s t o P R E F I X / . . .

ignore NUMBER remote directory

components.

set http user to USER,
set http password to PASS,
disallow server-cached data.
Page 1
^

PROSECUTION EXHIBIT i M for id^ntification\&
PAGEOFFERED:_ PAGE ADIVHTTED:
X /
PAGE
OF
PAGES

18121

^

E,

-html-extension
--ignore-length
--header^STRlNC
--max-redirect
- proxy user^USER
—proxy-password^PASS
—referer^URL
save headers
-U, —user-agent^ACENT
--no http keep alive
no cookies
load cookies^FlLE
save cookies^FiLE
keep session cookies
post data^STRiNG
--post-file^FiLE
content disposition
auth-no-challenge

HTTPS (SSLBTLS) o p t i o n s :
secure protocol^PR

wget-help
save HTML documents with .html' extension,
ignore Content Length' header f i e l d ,
insert STRINC^ among the headers,
maximum redirections allowed per page,
set USER as proxy username.
set PASS as proxy password.
include Referer: URL' header i n HTTP request,
save the HTTP headers to f i l e ,
identify as AGENT instead of wgetB^ERSiON.
disable HTTP keep alive (persistent connections)
don't use cookies.
load cookies from FILE before session,
save cookies to FILE after session,
load and save session (non permanent) cookies,
use the POST method: ^^^d STRING as the data,
use the POST method: send contents of FILE,
honor the Content Disposition header when
choosing local f i l e names (EXPERIMENTAL).
Send Basic HTTP authentication information
without f i r s t waiting for the server's
challenge.
choose secure protocol, one of auto, SSLv2,
SSLv3, and TLSvl.

--no-check c e r t i f i c a t e
- certificate^FlLE
— c e r t i f i c a t e type^TyPE
— p r i v a t e key^FiLE
p r i v a t e key type^TyPE
ca c e r t i f i c a t e ^ F i L E
ca d i r e c t o r y ^ D l R
--random f i l e ^ F l L E
egd f i l e ^ F i L E

don't validate the server's c e r t i f i c a t e .
client certificate f i l e .
c l i e n t c e r t i f i c a t e t y p e , PEM o r DER.
p r i v a t e key f i l e .
p r i v a t e key t y p e , PEM o r DER.
f i l e w i t h t h e bundle o f C A ' s .
d i r e c t o r v where hash l i s t o f CA's i s s t o r e d .
f i l e w i t h random data f o r seeding t h e SSL PRNG.
f i l e naming t h e EGD socket w i t h random d a t a .

FTP options:
f t p user^uSER
s e t f t p user t o USER.
--ftp-password^PASS
s e t f t p password t o PASS.
--no-remove l i s t i n g
d o n ' t remove . l i s t i n g ' f i l e s .
no glob
t u r n o f f FTP f i l e name g l o b b i n g .
no passive f t p
d i s a b l e t h e " p a s s i v e " t r a n s f e r mode.
--retr-symlinks
when r e c u r s i n g , g e t l i n k e d t o f i l e s ( n o t d i r ) .
preserve permissions preserve remote f i l e p e r m i s s i o n s .
Recursive download:
-r,
- recursive
-1,
level^NUMBER
delete a f t e r
k,
—convert l i n k s
1^,
backup c o n v e r t e d
-m,
- mirror
p,
page r e q u i s i t e s
--strict-comments

specify recursive download.
maximum recursion depth ( i n f or 0 for i n f i n i t e ) ,
delete f i l e s locally after downloading them,
make links i n downloaded HTML point to local f i l e s ,
before converting f i l e X, back up as X.orig.
shortcut for -N - r -1 i n f no remove-listing,
get a l l images, etc. needed to display HTML page,
turn on s t r i c t (SGML) handling of HTML comments.

Recursive acceptBreject:
accept^LiST
^/^^
reject^LiST
1^^
domains^LlST
0,
exclude domains^LiST
follow-ftp
follow-tags^LlST
ignore tags^LlST
span hosts

comma separated l i st of accepted extensions,
comma-separated l i st of rejected extensions,
comma-separated l i st of accepted domains,
comma separated l i st of rejected domains,
follow FTP links f rom HTML documents,
comma separated l i st of followed HTML tags,
comma separated l i st of ignored HTML tags,
go to foreign host s when recursive.
Page 2

^

18122

L,
I,
X,
np,

relative
include directories^LlST
exclude d i r e c t o r i e s ^ L l S T
no p a r e n t

wget-help
follow relative links only.
l i s t of allowed d i r e c t o r i e s .
l i s t o f excluded d i r e c t o r i e s .
d o n ' t ascend t o t h e p a r e n t d i r e c t o r y .

Mail bug r e p o r t s and suggestions t o ^bug w g e t ^ g n u . o r g ^ .

Page 3

18123

>
^
e^

1^

1^

^

^

^

^
^

^

^

^

1^

1^

^

1^

1^ c^ e^ e^ ^

^
^

^

^

11^ ^

^
^

11^ 11^ il^ ^

e^ ^

^

^

^

^ ^ ^
^

^

^

^

e^ ^

ii^

^

^

^
^

1^

^

^

e^ ^

^

^

^

^

^

^

^

^

^

^
^

1^

^

^^^^^^^^^^^
^

^

11^ ^

^

^

^

^

^

^

^

11^ 11^ 1^

^

^

ic^ e^ ^

I

o

I

O

I

hO

H
O
c-l

H
O
f

tr*

O

w

>j

I

O

I

O

H
O

I

^

^
o

H H
O O
01 o
H VI
M Ej O tr>
ta" S C O
t-« H
O
^ o CO
00 CO
^CO W
Cn N
CD m
y
• CO y ct

a
K M
o 5°*
M H
CO
t n (0
N
y O

^

1^

m

w w

^

^

^

^

^

^

^

I

I

I-+

QJ
^

^

o

o

O

H

H
O

H
O

o
o

Ui
t-l

t^ <
H

o

Ul

M

o o H
o H
,^
€J t^
O 4^
N

H

U)
H

Cn
H

y

g
g Cf* t f
1 - h - ct Ct
e
B HB
H B
y
y
B
H y
y H
ct rt
ft
y
ct ct ct tr y
ct
y < ct
g y ct y
H ct B ct H

c

^

ct

o
3

3*
OQ
O
CO

fD
n
O
3

n

••'-•.•••••••••
••'••
ct y ct y ct •d TS ct ct
•d ct ct ct ts • I
ct ct
ct TS ct
^ ^ •d •cs
1 1

1 1

^^ u ^•« •c ^ ^ts ts
X
n n

V

V

p
^ ^ ts
^ v..
n ^ P
n p. p. ts ts
n n
e. 0 n 0 p.
n
n
w Vl
ct ct p. p.
m p. p. p. M
(D
ct
m Ul Ct Ct
m Ul Ul
VI

ct
P
ct ct ct
v> ct V>
ct
ct Ct ID ID ID ID
m Vf ct P ID
• ct Ct
ct ID ct • M Ul ID ID
m ID • ID VI >Q *Q '
Ul
•a
• •a O o Ul Ul
w ^ M o < <
o CQ
o o
< O o O < •
H «Q < <
<
< • < •a o o • '
H
o
o o o
< •Q o
O

O

<
p
B < <
ID ID ^
B <
< B
ID ^
ID
Vl
Ul
&
& g
W
ID g M Vl Ul ID ID
W
ID
V\
Ul
Ul
V\ e
ID
ID
m W
V> >Q >Q Ul Ul
m
v> w
m V> M P
>a
a> to >^ P ID ^ ^ ^
M M ID ID
^ H ID «Q
ID n ID ID
n ID
^h | ^M
M
ID
Mi
Mi
m ^
Mi
M ID M M i ID ID ID ID
m
m M i ID ID h | H M i M i
H M l ID M i M ID ID ID ID
(D m h! ID ID ts ts M h|
n ID ID
P hi ID M
ts nID ID
n m 0 ID n
ts ts
ID
V
^ n n
m ts ID
n JS
H
ID ID
n
^H nID
ID 1 - o o
"V
O ^
o o 1o
t-" H O H Ul U i Ul o o
t-" tr> t^ <
> do t-" o M
O o O o H
K
w
a
01
o
a Ho it^ oUl HW
E j t-"
Sd te
w
M ^ k
CO O o H
<
n CO
CO !ri
00
M
mM
Cn H H o N
CO M
kD Cn
>
H
CO 00 Cn
N
O

CTl
CO

QJ
r+
fD
3
QJ
r+
fD
Q_
O

O

3
3

QJ
3
Qco

O
3

Q_

O

r+

ro

NJ

?
c

c

3
QJ_

o"
n

QJ

ft-

fD

Q.
CO

"O
QJ
n
fD

w
PROSECUTION EXHIPIT Mo_for W^tificatic
PAGEOFFERED:
rAGEADf/1t.ED:__
PAGE
OF
^PAGES

18124

^

^

^

ft^

rs

ft)

v>
r-f

^

,o

c/3 CO
N I N

,o ,o
1

1

CO

00

N

N

P
1

o
O

fD

1

C

(/)
05

• n

o

fD

fD

ti
B

»
}

M

P

^• Cig
S
c/>
^ 5s

PCO

CO

fD

fD

i-t

5"
OP
Cf>

5'

CJQ
cn_

o
(TQ.
^
^

B

(fQ

2

o
o
g

C

fD

(3
cr

3

fD

fD

S

o
i/S

s

B

C/)

(/)

(/)

3
3
S
(/)

05

05

05

03

05

5

CS
CL
00

CS
CL
CO

o
o

3

fD

B

rjs

P

3

o
o

fD

O

CA
JO

i

CS

c/1

fD

fD

fD

r-y

B.
B

r-f

(—f

I-+

I-t
I-t

3'

5' cs

B'

(;p

C/)„

Lfl

OP

3'

(;p

3'

(JP

6-

^

05

05

03

fT

B:
fT

&

&

3
05

3
05

^

t—' •

3.

o
CIP

ts
ap

••^i
O

^

o
o
g

1
0

C/).

g
O

o
o

s3
fD

t5
cn

3'

(JQ
c^.

(K)

<

•!

(/)_

fT

S
3.

o
ffp^
^
^

O

o
o

g
3
rp

5

cr

fT

^

3

Bl
fT

%

5
05

3
05

1-^ •

§

C3
(TP^

cs'

ap^

St ^S
O
o
o
o
o

^
fD

(/),

o

C/)_

3

&

fD

v:

3

1
3"

OP

cr
I-t

05

&
fT
^
03

^
^

O
o
o
g

S
3
fD

fD

CS

Ci

C/5

C/} .

3

^
c^
^
^
^
^

o

o

o

O

^_

hj-J

o

^

00

o

o
o
o

6\
o
o
o

o
o
p

cr

cr

ga

05

05

'VI

o

cr

'o
o
o
cr

05

05

o
o
o

o

•§

o
^

o
o
o
o

o
o

cr

cr

03

03

g
CL
CO
fD

OP
C/5_^

O'

3
a.
I—'

fD

^

i

C3
OP,

ftp

a
a
o
o
o

o

fD

p
fD

C/)_,

cr
^
c^
^

«-t

CO

CL
CO
fD

t—>

o
^

§'
o
<
fD

cr
05

1^
c/3

N

o

g
§
o
I-t

fD

^
^
O*
^

3

I
cr
05

^
05

f
SO
-i
ft
^

n

3
W)

: O

o
cr
e
&
;
o

fD

5

D

O

fD

6

o

CO

o-

t—' •

O

O

fD

&

2

N

CO

a.
2

CO

fD

05

3
05

O

O
rj

e
CL

a-

05

B

O

c/3
N

CL
C/)

05

%

O

c/3
N

o
o

a

B

O"

rT
%

CO

N

6 6 6 6 6 b
o

B

cr
fT

o

1

CO

o
O

o
O
g

,o
,o ,o
1
1

N

e : oe o6

O

S

^

O

P

^.^^^^
GOO
tntn^

^

n

O

^ ^ c ^ ^

^

c/3
O

O

18125

M
O

eo

zr

a

•a
Q.



a.
l/l'
zr

g
g
g
b
(O

4

(-)
o

o
yr
(O
n
O

s
g
g

CO
T3

2

Q.
X
7\

eo
3

g
5^

eu

•5'

zs'
cm

fO
Q.
eu'

in
3^

a^

li

CO
n
CO n3 a.
O

3

as
era
CO
II

as
3<

3
CD

1^=

%

it

eu
c

•o

o
era
as_

CD
eu

TS
Q.

n
I

,
,

CD

eu
3
era
CD

3
n
O
3
CO
3

T5

i;

ZT
o

n
O

s

c5 V.

3 3

b

ciq

ZT

o a

cr "o

<

o
3
T3
O

NJ
-<

3"
o
io

3
OJ

5'

$20
n

3
Ol

IT



zr
eo

3
CD
ea.
II
c
l/l
20
eu

o_
CD
NJ
O

3
^

lO

>
73
NJ
o
M
o
o
Ul
h-*
eo
o
Ln
cu
OJ

c/i
eu

.a
CL
Tl
Q.

eo
eo
Q.
O

O
C/l

as

^



era'
3"

eu

NJ
O

cr
II
S3

O
O
CJl
NJ

flj_

^-»


n
TT

eo
CT
T3
eu
era
eo
ei
O
3
l/l
b.
cr

CX)

^

3
n
II
CL

CJO

<

en

i-»

CJJ

IO

eo

lO

Ln

LU

PROSECUTION EXHIBIT MZ-ibr idenAfil ition
PAGE OFFERED:
PAGE ADMITTED:
PAGE
OF
PAGES

18126

?or)deT,
PROSECUTION EXHIBIT !4 jjbi\k(entific@c|n
^MfFT
PAGE OFFERED:
PAGE AqMnTEB
PAGE
OF PAGES

18127

i
10

0

'==,

4=

tu

k

0

4

2 .52

ea

-a ^

III,
m^,
u.

c

k

a o

^'^QSlKyilP^^ EXHIBIT /^i|>fPAGE OFFERE
PAGES
PAGE
OF

18128



I





i

ism .

Eo3m_mmn_ =mEm

do??vao umun?oua was mD
as gown: buao?ao mm

gv

mama 9: 33% 2 :52



m_Em:



m_m2m.c_ 5.5. :25. Em >32
Eat moauuna >5 mm_E rcoa



F.
aims man

23.. one wEo>m.._ C. Em?mm aamm (V




E?noaa??ui?zizauu?iaH5515 I

at

i

I .I



PAGES

18129

»
•»•
g;

jp.

g
m.

xn
00

in
H
irt.

I

w

:

w
3

tr
u
OJ

I

•i
JJ

II

t)

5
r-i
M

s
i

m
E

3
W

I

A

O

H

Ol

ID

li
Si
38
Q CM

ts
(o
eo
!

W

1
O

u
JJ
-w
3
JJ

A
o
u

•(U0

g%

to

I!

JJ

a,

.

J V

PROSECUTION Exn:^
:!T ri^f
roi MentincatiS:
ADMITTED:
PAGEOFFERED:
PAGE
PAGE
OF
PAGES

18130

1) Personal_Mac\0043-28May10\1 Customer\Una11ocated Clusters
File Offset
25864790818
http://twitter.com/wikileaks/status/9412020034

PROSuCUTlONEYni^^Tj^^^'• '
.ACE^v-.'.
^ OFFERED:
A_Ljc
OF
DA.^-,

18131

1) Personal_Mac\0043-28May10\1 Customer\Unallocated Clusters
File Offset
25864788892
http://twitter.com/wikileaks/status/10961072669

^

PRORFCUTION EXHIB'T Iff^for id^tific^on
FERED:
rAGE ADMifrEDM J ^
PA
PAGh
OF
^PAGES

18132

Prosecution Exhibit 196
1 page
classified
"SECRET"
ordered sealed for Reason 2
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial

18133

Elizabeth L. Dibble
Principal Deputy Assistant Secretary for Near Eastern Affairs
Elizabeth Dibble is Principal Deputy Assistant Secretary in the Bureau ofNear Eastem Affairs.
From 2010 - 2011 she was Deputy Assistant Secretary in the Bureau of European and Eurasian
Affairs, where her portfolio included managing U.S. relations with the European Union and
Westem Europe.
As Deputy Chief ofMission and Charge' d'Affaires at the U.S. Embassy in Rome from 2008 to
2010 Ms. Dibble was the chief operating officer for the 800-person U.S. Mission to Italy. She
was Principal Deputy Assistant Secretary in the Bureau of Economic, Energy and Business
Affairsfrom2006 to 2008, with responsibility for day-to-day management of the bureau while
also covering intemationalfinance,development and investment. Prior to that, she was Deputy
Assistant Secretary in the Bureau ofNear Eastem Affairs, with responsibility for U.S. relations
with Israel, the Palestinian Authority, Egypt, Jordan, Lebanon and Syria. She was a member of
the State Department's Senior Seminarfrom2003 to 2004.
Ms. Dibble's other overseas assignments include Damascus, Islamabad, Tunis and London. In
Washington, she served as Director of the Office of Peace Process and Regional Affairs in the
Bureau ofNear Eastem Affairs and as Deputy Director of the Office of Development Finance in
the Economic Bureau. She also worked at the Office of the United States Trade Representative
as Assistant Chief Textile Negotiator from 1986 to 1988.
A New Jersey native, Ms. Dibble is a graduate of Georgetown University.

PROSECUTION EX:-'('"'T
fcf ld'?/mficalion
PAGE OFFERED: _ . AiZ .ADMr
PAGE
Of
PAGES

18134

John D. Feeley
Principal Deputy Assistant Secretary
Western Hemisphere Affairs - State Department
John Feeley is a Senior Foreign Service officer who has focused much ofhis
diplomatic career working on Westem Hemisphere issues both in Washington and
in the region. He assumed his current position as Principal Deputy Assistant
Secretary for Westem Hemisphere Affairs in May 2012, with responsibility for the
daily management of regional policy implementation and the supervision of 50
diplomatic posts in the Americas. Previously he served as the Summit of the
Americas Coordinator, overseeing the substantive preparation for Secretary
Clinton's engagement in the Cartagena Summit. He was DCM in Mexico from
July 2009 to March 2012, managing a 37-agency country team that implemented
the $1.6 billion Merida Initiative. He has also been the Department's Director for
Central American Affairs and Deputy Director for Caribbean Affairs. From 2004
to 2006 John served as a Deputy Executive Secretary in the Office of the Secretary
of State, where he was responsible for managing information flow to Secretaries
Powell and Rice, as well as coordinating their overseas travel.
A 2004 Distinguished Graduate of the National War College, Mr, Feeley's
overseas assignments include Mexico City, Santo Domingo, and Bogota,
Prior to joining the State Department in 1990, Mr. Feeley served on active military
duty as a helicopter pilot in the United States Marine Corps. He is a graduate of
Georgetown University's School of Foreign Service and is married to a fellow
career diplomat, Cherie Feeley. The couple has two sons.

^ ^.y,
prO(^^r;'-AlM EX^4m?7iiiJbr/&nni;cat]on
PAGE OFFERED:_ _ r / _ Z A D ^ n 1 cO:
PAGE
OF
^PAGi 3

18135

U.S. DEPARTMENT OF STATE
iini^y^

DIPLOMACY

IN

ACTfON

Home » Under Secretary for Public Diplomacy and Public Affairs » Bureau of Public Affairs » Bureau of Public Affairs:
Electronic Information and Publications » Biographies » Biographies Listed Alphabetically by Last Name » Swart, Susan

Biography
Susan Swart

Qiihe/>rihta

I IrtHatoe

Chief Information Officer
INFORMATION RESOURCE MANAGEMENT
Term of Appointment: 02/07/2008 to present
Susan H. Swart, a member ofthe Senior Foreign Service with the rank of Minister Counselor,
was appointed as the Chief Information Officer for the Department of State in February 2008.
As CIO, she is responsible for the Department's information resources and technology
initiatives and provides core information, knowledge management, and technology (IT)
services to the Department of State and its 260 overseas missions. She is directly responsible
for the Information Resource Management (IRM) Bureau's budget of $310 million, and oversees State's total IT/
knowledge management budget of approximately one billion dollars.
Preceding her assignment as CIO, Ms. Swart was the Deputy Chief Information Officer (DCIO) for Business, Planning and
Customer Service and the Chief Knowledge Officer. She has served in a number of prominent positions in the Department,
including the Dean of the School of Applied Information Technology al the Foreign Service Institute. Prior to her SAIT
assignment she served as Information Management Officer in Cairo, Egypt, Office Director for Customer Service in the
Bureau of IRM, Deputy Executive Director in the Bureau of East Asia and Pacific Affairs (EAP), and Special Assistant in
the Bureau of Administration (A). Her overseas assignments include Cairo, Egypt; Caracas. Venezuela and Lima, Pern.
Ms. Swart joined the Foreign Service in 1989. She holds a Masters degree in National Security Studies from the National
War College, and earned her undergraduate degree from Virginia Commonwealth University.

The Office of Electronic Information, Bureau of Public Affairs, manages this site as a portal for information from the U.S. State Departmertt.
External links to other Internet sites should not be construed as an endorsement of the views or privacy policies contained therein.

PROSECUTION EXHIBITZW^fbr/lentificallon
PAGE OFFERED:
P AGE ADlVlITTED:
PAGE
OF
PAG
una

18136

U.S. DEPARTMENT OF STATE
DIPLOMACY

IN

ACTION

^4

Michael G. Kozak
Acting Principal Deputy Assistant Secretary
BUREAU OF DEMOCRACY, HUMAN RIGHTS, AND LABOR
Term of Appointment 10/12/2012 to present

Ambassador Kozak is a charter member of the career Senior Executive Service of the United States Govemment. As such, he has
served in a number of senior positions in the U.S. Executive Branch:
^^m^^^^^^K

Sen/or Director on the Natiorial Security Council staff (2005-2009) with responsibility for Democracy, Human Rights, Intemational
Organizations, Religious Freedom, Migration and Detainee issues. In this capacity, he chaired interagency policy coordinating

committees and proposed and coordinated the implementation of events for the President of the United States. He conceived and implemented a system for
achieving interagency agreement on democracy promotion strategies and prioritizing resource allocation to implement them. He authored the first National
Security Presidential Directive on Democracy and Human Rights since the Carter administration.
Principal Deputy Assistant Secretary of State level positions in three bureaus of the Department of State. (Democracy, Human Rights and Labor 2003-2005;
Inter-American Affairs 1988-1991; Legal Adviser 1982-88).
Acting Assistant Secretary of State lor extended periods. (Democracy, Human Rights and Labor 2004-5; Inter-American Affairs January 1989-July 1989.) As
Acting Assistant Secretary for Democracy, Human Rights and Labor, he organized passage of a resolution on human rights in Cuba in the UN Commission on
Human Rights by the largest margin in over a decade. As Acting Assistant Secretary for Inter-American Affairs, he assisted Secretary Baker in negotiating and
implementing the Bipartisan Accord on Central America which was decisive in bringing a democratic end to the conflict in Nicaragua.
/Embassador in Minsk, Belarus (2000-2003) and ChiefofMission in Havana, Cuba (1996-1999).
Other U.S, Government Activities:


U.S, negotiator with Cuba to secure the return of criminals sent to the United States during the Mariel boat crisis. Signed the first migration accord with Cuba
on behalf of the United States and led implementation talks thereafter.



Special Presidential envoy to negotiate the departure of General Noriega (1988). Ambassador Kozak accompanied our forces in Panama to help the new
government establish the core institutions of democracy (1989),

• Assistant negotiator for the Panama Canal treaties (1971-1977). Was responsible for negotiating treaty text with the Panamanian negotiators and later for
working with members of Congress for approval ofthe treaties and of implementing legislation (1977-81).


Staff of the Middle East peace negofta/or (1982-83). Helped implement the Camp David accords and negotiate the withdrawal of the PLO from Lebanon.



State Department Superior Honor Award

• Younger Federal Lawyer Award


Presidential Ranks of Distinguished and Meritorious Executive

• Order of Balboa (presented by the president of Panama)
Education:
* Juris Doctor, University of California at Berkeley, 1971 (Assistant Managing Editor, Law Review)
• A.B , Political Science, University of California at Berkeley. 1968

For more information, visit the Bureau of Democracy, Human Rights, and Labor.

•i)^

PROSECUTION EXHIBIT 2o| for idenfification
PAGA O/FCRED:
PAGE ADMIJ/ED:_
PAGE
OF
PAGES

18137

Prosecution Exhibit 203
20 pages
classified
"SECRET"
ordered sealed for Reason 2
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial

18138

Prosecution Exhibit 20^
2pages
ordered sealed for Reasons
Military Judge's Seal Order
dated20August2013
stored in the original Record
GfTrial



From:

Subject: Happy Thanksgiving [Belated]

Date: Saturday, November 28, 2009 1:22:37 PM

Hey Babe,

I'm sorry I couldn't get in touch with you on Thanksgiving. I was very busy indeed, but I still had the
chance to have dinner among good friends who I'm out to (I didn't even have to come out to them,
they just called me out on it.)

Wish I had more time to talk, but the work I do is very sensitive and incredibly taxing.

I love you,

Brad



18140

2.. 35
ma o:.SEm
3? o.o~3S Oo>>
In co?
3.. Em o.o~3S av??
24.. 33


5.. 2833
1.. Ga tn?
2.. 9% o:Ea2.. can o8QaS was
2.. 13? So?ocu 93$

3:3? 3:0: u5o$v33 ?no.3? ab. UK 0552.!
3:3. ..o:oc 3:3. Eu. as 955.32

-0933! :5

26 6.6

Stat .25.. 23032.3 oo?oum PO. ax
aotoau 330$ as



vcosovxu U..s~9.n3a



2.. mam 33 2. an 28.n> was .35

Z. 3.. o.oQQ. 2: 1.. 33 :5 .22.
14 ~33 o8~.aS .5. ~94. 3oQ~2.. sen o:.Qc~ 2.. 86 3.53 3.2: 3..

3.. .3 o3~E~ 1.. Re

2.. 2.2 o8~.mS 2.. RN. cg. ?304
2.. ?3 2.. cg. ..coo xx. 2 6.33 22. . 82.2.. 3:505 .213.
2.. Eu. o:Em~> 25 oSQm~: Eco . 35.95 S: 2 0.33 sec . 5. S.
2.. SA. o8~.mQ_ 3.. SR. cg. 2.8 Sc no.8055. 2: 3. S6. 8855. 2: E3.
5. 85 8235. 2: 1.. $6 Su?. 2: ..6:oa ucato .. :accuse. S.
2.. 35. 3. 1.. 98. 8.552 3. 35.! 3:
SE Source. :3 1.. SN. E80. :3 :5 2.2.2: .9. on .2:
2.. Sn. 883?. .5. 2.. 33 8.52.3 :3 us.=EoE ..
2.. ~92 Socmuo. can 2.. S?go. :3
2. as. 88.3 2? <2 8953 8885 .3 and .8351.3.


uni
0:353? 92?
B695



osccai 9.3

0:255 03..
uiccoi 095
32$: 35
oc.55.. :29

93.222 can
can
9-5
05:52 0.5

age}
o.=cc.3?

for



as E.



.4-



noln. ml.? .1





C?oi

C52:



955.3,. Even




PAGES






OF

PAGE








From: on behalf of l2ani21_CIaLIs.
To: i

Subject: Airtran stuff to print for Danny

Date: Tuesday, September 08, 2009 8:18:44 PM

Attachments: ?man_-dancnandf

i -


Daniel JB Clark Admin, Free Software Foundation

I

18141



0 0 18142

From: mm on behaif of
To: EcasiJsy_I!iann1n?
Subject: Arrangements

Date: Tuesday, September 08, 2009 8:17:27 PM
Attachments:


I have 2 $500 money orders and this doc (which I'll have a printed
copy of soon).

So either we can meet sometime before you head back, or give me an
address to send everything to and I will do so, and then you can mail
be back the promissory note.

As an aiternative we can go shopping at microcenter (just down the
road from pika) before you go back and I can just make out one of the
money orders back to myself.

Cheers,

Daniel JB Clark Admin, Free Software Foundation
I

From: on behalf of
To: ELa:l.Manolns1

Subject: Re: Arrangements

Date: Wednesday, September 09, 2009 1:49:05 PM


Me to Bradley Manning (240) 784-0431 - mobile
9/8/09 10:08 PM 3 hours ago

Me: awake? 10:08 PM

Me: Can get used Panasonic CF-18 ToughBook (2006) for 53-600 from
ebay. Can get nice new netbook I may be able to ?nd cheap OLPC X0
for ?eld use for $3-400. 10:15 PM

Me: I have random stuff lying around that might be good for backup
devices. 10:17 PM

Me: most useful - has hard

drives I think will work with it. Also - computers

are the new god 1:35 AM

On Tue, Sep 8, 2009 at 10:17 PM, Brad
wrote:
-


Daniel JB Clark Admin, Free Software Foundation
I

18143



From: on behalf of
To: ?caimanniun

Subject: Re: Arrangements

Date: Wednesday, September 09, 2009 1:49:05 PM


Me to Bradley Manning (240) 784-0431 mobile
9/8/09 10:08 PM 3 hours ago

Me: awake? 10:08 PM

Me: Can get used Panasonic CF- 18 ToughBook (2006) for $3-600 from
ebay. Can get nice new netbook I may be able to ?nd cheap OLPC X0
for ?eld use for $3-400. 10:15 PM

Me: I have random stuff lying around that might be good for backup
devices. 10:17 PM

Me: most useful - has hard

drives I think will work with it. Also - computers

are the new god 1:35 AM

On Tue, Sep 8, 2009 at 10:17 PM, Brad
wrote:



Daniel JB Clark Admin, Free Software Foundation
I

18144

From: Etadleuilanninsz

To: mmim

Subject: Checking

Date: Sunday, October 25, 2009 12:02:06 PM

Attachments: n&mJm

Danny

Attached a funny photo of myself right after some training exercises, hope you like it.

Keep in touch,
Brad

18145



From: on behalf of Qa_m_e1_c|_adg
To: ELad_ManLu'ns1

Subject: frightening look into my psyce

Date: Sunday, October 25, 2009 12:04:48 PM
Attachments: 5 - - - i

But mostly an excuse to send you something get you into my address book.



-Danny

18146

From:

To:

Subject:
Date:
Attachments:

Hanging out with friends at darkBOT radio, an ex BF's gift



on behalf of D_anjg|_Cladg



Enaimanning.
Fwd: I do not condone this behaviour
Sunday, October 25, 2009 12:10:25 PM



BTW if you like weird:



(you can download 4 hours of mp3s - also I can get stuff on the air if

there is anything you want broadcast

18147



From: on behalf of
T0:

Subject: The Mythos

Date: Tuesday, October 27, 2009 10:43:39 PM
Attachments:



"esp weird" he

Daniel JB Clark Admin, Free Software Foundation
I



From: on behalf of
To:

Subject: Re: something to do

Date: Sunday, November 15, 2009 2:26:33 PM

i had something to do with this:



reading your article now. mine maybe (Battle Field), but not
in the way you'd think

BTW do you get IMs from danny@opensysadmin.com on gtalk? That's
probably better than AIM since it allows of?ine queued replies

Hoping to get a package together today,

Daniel JB Clark Admin, Free Software Foundation
I

18149



From: Qanj_el_C_|adg

T0:

Subject: Bad Ideas if you are getting
Date: Thursday, December 17, 2009 9:58:06 AM

"Obviously this isn't normal". lol.

Daniel JB Clark Admin, Free Software Foundation

I



From: l2ani.el_C1ads

T0:

Subject: Flessenlikker story!

Date: Thursday, December 17, 2009 10:04:42 AM

I recently realized I've neglected to tell you why I sent you the
black-handled red-tipped device.

It's an entertaining example of the wrong approach to an engineering
problem.

See:



(last version that was fun)

I like my friend Mako's original version (last paragraph for the
impatient) the best:

The bottle scraper (known as both a and ?essenlikker in
Dutch) is a Dutch kitchen tool similar to small spatula. It is

speci?cally designed to scrape the contents of long bottles that would

be otherwise impossible to reach with other kitchen tools. It is a
common tool in kitchens in the Netherlands and available in most kitchen
stores and even supermarkets but it almost wholly unused and unknown
outside of the country.

Historically, via (a popular custard like Dutch pudding) was sold in

long glass bottles. This container made extracting the complete amount
of pudding extremely dif?cult with either spoons or with other kitchen
tools or spatulas. The Dutch answer was the bottle scraper which was
speci?cally designed to answer this problem. Vla is now often sold in
cartons which makes the need for a bottle scraper less pressing.

However, the scraper has come to occupy an important role in Dutch
kitchens being used for scraping the contents of many other bottles and
jars peanut butter, Nutella, etc). Much of the Dutch population

is familiar with the bottle scraper and skilled in it's use.

There is an element of the technical and engineering community that sees
the bottle scraper as a monument to a wrong type of technical solution.
This group argues that the best solution to the problem of remaining vla
in bottles was to put vla is different containers preventing the problem
from every occurring rather than inventing another tool and then
education an a population in its use.

Cheers,

Daniel JB Clark I Admin, Free Software Foundation
I



18151

. . 18152

From: llaniemlazk

To: ?r.as1.l:1annins1

Subject: Flessenlikker story!

Date: Thursday, December 17, 2009 10:04:42 AM

I recently realized I've neglected to tell you why I sent you the
black-handled red-tipped device.

It's an entertaining example of the wrong approach to an engineering
problem.

See:



(last version that was fun)

I like my friend Mako's original version (last paragraph for the
impatient) the best:

The bottle scraper (known as both a and ?essenlikker in
Dutch) is a Dutch kitchen tool similar to small spatula. It is

speci?cally designed to scrape the contents of long bottles that would

be othewvise impossible to reach with other kitchen tools. It is a
common tool in kitchens in the Netherlands and available in most kitchen
stores and even supermarkets but it almost wholly unused and unknown
outside of the country.

Historically, vla (a popular custard like Dutch pudding) was sold in

long glass bottles. This container made extracting the complete amount
of pudding extremely difficult with either spoons or with other kitchen
tools or spatulas. The Dutch answer was the bottle scraper which was
speci?cally designed to answer this problem. Vla is now often sold in
cartons which makes the need for a bottle scraper less pressing.

However, the scraper has come to occupy an important role in Dutch
kitchens being used for scraping the contents of many other bottles and
jars peanut butter, Nutella, etc). Much of the Dutch population

is familiar with the bottle scraper and skilled in it's use.

There is an element of the technical and engineering community that sees
the bottle scraper as a monument to a wrong type of technical solution.
This group argues that the best solution to the problem of remaining vla
in bottles was to put vla is different containers preventing the problem
from every occurring rather than inventing another tool and then
education an a population in its use.

Cheers,

Daniel JB Clark Admin, Free Software Foundation
I

From:

To:

Subject:
Date:
Attachments:





Test message - note subject is not (I don"t
Friday, January 29, 2010 12:05:32 PM



18153

0 0 18154

From:

To:

Subject: Re: Test message - note subject is not (I don"t
Date: Friday, January 29, 2010 12:12:01 PM

PGP
Charset:
Version: v1.4.10 (Darwin)

Comment: Using with Mozilla -






TM












ankaoh

pkceA4qXo8e3YiQA7FF3obFc+YH
VtQa

=ecVF

PGP

18155

From:

To:

Subject: Re: Test message - note subject is not (I don"t
Date: Friday, January 29, 2010 12:15:13 PM

PGP
Charset: ISO-8859-1
Version: v1.4.10 (Darwin)

Comment: Using with Mozilla -


Pwk20mC8Q/Us/ 1


vOoHomQx8K24fZJd
Q02 D36x0 Ricows
LKV+/5YzpI7m57duvjrmaZSq5LIJ uGAh0Y2sOb|Lh Lx5CneMPK2yRzc3TmAhIa8a
1tl/








Zoq Eosgnxi


F|YuuUnh7d
ea5e
7n kr8E42gc5M hvamn/VoKMniMLFn2zka

Dp7euWDt71E


mBr3 RQH 1ikk0y8ioqwGK


1 P8c3

Iza

PGP

From

To:

Subject:
Date:
Attachments:





Adium

Friday, January 29, 2010 12:19:48 PM
ESE . il n!.E .


18156

From:

To:

Sub?xt
Date:
Attachments:

Eradlex

mmt?act

Photos

Friday, February 05, 2010 2:21:01 PM
?mg i .I .


18157

0 18158

From: I2anjs:J_Qa:ls

To:

Subject: Re: Photos

Date: Friday, February 05, 2010 3:06:58 PM

Attachments:


0 18159



From:

T0:

Subject: Cutest puppies ever!

Date: Friday, February 12, 2010 11:42:09 AM

Attachments:


0 0 18160

From:

T0:

Subject: Banks are purdy

Date: Thursday, April 08, 2010 5:04:18 PM

Attachments:
ensmniemass





From: on behalf of
To: ELadlev_l:1annim

Subject: Gates Trolling Letter

Date: Wednesday, April 21, 2010 3:13:22 PM

Attachments:

For your education and

Daniel JB Clark Activist; Owner


FREEDOM INCLUDED


Free Software respecting hardware Lemote Yeeloong reseller

18161

From:

T0:


Subject: Re: Metropolitan Storage Warehouse horror stories
Date: Wednesday, May 19, 2010 4:44:21 PM

Go on eBay and get an 8088 for $9 and be done with it:


The lock is designed for precisely this kind of very
dif?cult to defeat surreptitiously, not really resistant to forced entry.

I'd be curious to hear that story about theft from a safe inside a
locked

On 5/19/10 3:29 PM, Danny Clark wrote:

Short version:

Can anyone recommend a
padlock? Does not need to be resistant to more forceful (drilling etc)
techniques. it is accepted that it will not actually stop a

determined attacker, but it should be obvious if it has been

defeated).



If you have strong negative experience with Metropolitan, it would
help a lot of peo le to post a review, for instance at:



Ill All ill I ll? ..L.


Long version:



So I off-handedly brought up Metropolitan Storage Warehouse in SIPB
office yesterday, and it seems that this is not true:

- e-9- it is not
Ire Proof



In quick secession from about a quarter of the small number of people_
present I got horror stories regarding water damage, theft, theft from
safes *inside* locked units, and a general critique of their overall

security.



However I was unable to ?nd anything remotely like that from the

interwebs, speci?cally only these 2 sites seem to have reviews(very positive



the place that are nonobvious).



So if you have had a suck experience it would be good to post there]
report it (or just reply and I'll post a summary to Yelpl). Feel free

to forward this to the original source of the stories, as a lot of

what I got was 2nd or 3rd hand I think.



Thanks,

18162





Daniel JB Clark Activist; Owner

FREEDOM INCLUDED
Free Software respecting hardware



0 0 18164

From:

To: Qaoov?atls

Cc: i 3 L2axid.l:loiis:
Subject: Re: Metropolitan Storage Warehouse horror stories

Date: Wednesday, May 19, 2010 5:24:13 PM

Unfortunately, those seals won't protect you because an adversary could
easily just BUY the same seal for replacement, after tampering with the
lock. Good seals should be metal, and have distinct serial numbers.

On 5/20/10 12:16 AM, Danny Clark wrote:








Sweet; actually that alone may be enough for this use case.



I have a motion-sensing LED ?oodlight inside, so I'm thinking a sign

along these lines will also provide some extra security (and possible

DNA evidence) at little expense:



"Smi|e, you are on candid camera! This unit is equipped with a very tiny
camera and wireless internet device which is capturing video to an

off?site server in real time. If you masturbate to orgasm and then

leave, we may not prosecute you. Have a happy and ful?lling day!


Or I might actually set up such a system and have a less

"colorful" sign





Daniel JB Clark Activist; Owner

FREEDOM INCLUDED
Free Software respecting hardware

v/r

Manning, Bradley E.



0 18165





From: on behalf of
To: ?i3.diey_t1an.rJing

Subject: Re: IM

Date: Wednesday, May 19, 2010 5:40:31 PM

Sorry, forgot (for like the ?rst time ever) my laptop today. will ping you tonight.

Daniel JB Clark I Activist; Owner

FREEDOM INCLUDED ;mm
Free Software respecting hardware

From:

To: Qanisi?ads

Subject: Eric Messages

Date: Wednesday, May 19, 2010 5:52:41 PM

Any way you can help co-ordinate so I can get in contact with Eric via


v/

Manning, Bradley E.

18166

18167

From:

T0:

Cc: Qaxii?ouse;
Subject: Re: Metropolitan Storage Warehouse horror stories

Date: Thursday, May 20, 2010 6:22:02 PM

i use the metropolitan storage warehouse and from my limited experience with them thus far i've been
happy with them. a colleague of mine stored a somewhat substantial collection of ?ne art and had no
problems whatsoever.

as for me, i just needed a convenient and cheap place to store my vinyl record collection - nothing
terribly valuable but quite heavy and fragile and climate-sensitive nonetheless. based on the size, price
and overall experience with their management i would heartily recommend them over the nearby
alternative -- UHAUL - which, if anything, is gangster central -- overpriced, unprofessional, and really
crummy wooden-walled holes. the only things i have heard from others who use it were positive i've
heard no horror stories ever.

with respect to security what i did notice is that the warehouse sometimes keeps its loading bay doors
open during operating hours -- and the building is SO INCREDIBLY huge that it would be possible for
someone to sneak in and hide out inside. the building is so old that afaict they did not have extensive
surveillance on the inside - which is one thing that would make them substantially better.

my 2_ pence,
max In london

On May 20, 2010, at 7:14 PM, Danny Clark wrote:

Yes, but there is no power, and no wi?, so it would be a bit tricky.



Would probably want to renew my amateur radio license



Also FYI I got police reports for the last 2 years for the site, only one might be due to Metropolitan
negligence - so either this isn't really a problem in practice, people are too lazy to ?le police reports
when their stuff gets stolen, or the person doing the records check made a mistake (eg perhaps the
reports were ?led under the person's residence address instead of the warehouse



Fon/varded message --

From: DiNatale, Francine

Date: Thu, May 20, 2010 at 12:10 PM

Subject: RE: Getting all theft reports for a certain address?

To: Daniel Clark





Hi Daniel,





There were only 2 larceny reports from Metro. Moving Stor. -one of the thefts was an actual
aquaintence that the owner left in the unit while she went and rented a truck (that was in 2009). The
other larceny that took place in March of this year is still under investigation.









Francine DiNatale



Administrative Assistant - Records Unit





617-349-3354



Fax: 349-3234







Daniel JB Clark Activist; Owner

FREEDOM INCLUDED mm

Free Software respecting hardware





On Wed, May 19, 2010 at 6:15 PM, seph wrote:
Can you stick a video camera into your space?



seph



Eric Schmiedl writes:



Two options:



0) Use the 8088 in parallel to the existing padlock and don't tell
management.





0) Get one of theselock that nobody will pick any time soonlock that will put up a bit of a ?ght against forced entry.





On 5/19/10 4:51 PM, Christian J. Ternus wrote:

Unfortunately, Danny misheard me. I owned the "safe" in question --
it was one of these: The thief
simply took it.



I asked the warehouse management to let us use our own locks;

apparently their policy forbids this. Let us know if you have better
luck.



-Ternus



--

Christian J. Ternus MIT MEng '11 I AC3T cternus.net 617-710-8955








On Wed, May 19, 2010 at 4:43 PM, Eric Schmiedl wrote:
Go on eBay and get an 8088 for $9 and be done with it:





The lock is designed for precisely this kind of very

dif?cult to defeat surreptitiously, not really resistant to forced entry.

18169

DDDD
DDDD I'd be curious to hear that story about theft from a safe Inside a
DDDD locked unit...
DDDD
DDDD
DDDD
DDDD On 5/19/10 3:29 PM, Danny Clark wrote:
DDDDD Short version:
DDDDD (a) Can anyone recommend a hard-to-pick-but-not-insanely-expensive
DDDDD padlock? Does not need to be resistant to more forceful (drilling etc)
DDDDD techniques. (e,g, it is accepted that it will not actually stop a
DDDDD determined attacker, but it should be obvious if it has been
DDDDD defeated).
DDDDD
DDDDD (b) Ifyou have strong negative experience with Metropolitan, it would
DDDDD help a lot of people to post a review, for instance at:
DDDDD http://www,Yelp.com/biz/metropolitan-moving-and-storage-corp-cambridge-2
DDDDD

DDDDD Long version:
DDDDD
DDDDD So I off-handedly brought up Metropolitan Storage Warehouse in SIPB
DDDDD office yesterday, and it seems that this is not true:
DDDDD http://imQ227,exs,cx/imQ227/4259/ragewarehouse5ka,jpg - e.g, it is not
DDDDD Ire Proof:-/
DDDDD
DDDDD In quick secession from about a quarter of the small number of people
DDDDD present I got horror stories regarding water damage, theft, theft from
DDDDD safes *inside* locked units, and a general critique of their overall
DDDDD security.
DDDDD
DDDDD However I was unable to find anything remotely like that from the
DDDDD interwebs, specifically only these 2 sites seem to have reviews:
DDDDD
DDDDD http://www.bbb.org/boston/business-reviews/storage-units-household-andcommercial/metropolltan-movina-storaae-corporation-in-cambridae-ma-3494/
DDDDD (very positive)
DDDDD
DDDDD http://www.yelp.com/biz/metropolitan-moving-and-storage-corp-cambridge-2
DDDDD (mixes, but the negative review has nothing to do with things atxiut
DDDDD the place that are nonobvious).
DDDDD
DDDDD So if you have had a suck experience it would be good to post there /
DDDDD report it (or just reply and I'll post a summary to Yelp!). Feel free
DDDDD to forward this to the original source of the stories, as a lot of
DDDDD what I got was 2nd or 3rd hand I think,
DDDDD
DDDDD Thanks,
DDDDD —
\|/
Daniel JB Clark j Activist; Owner
DDDDD
DDDDD FREEDOM -+-D INCLUDED ~ http: //freedomi nd uded .com
DDDDD
/|\
Free Software respecting hardware
DDDD
D

18170

From:

electronic ma^

To:
^

Danny Claris
^^^rit2i^lin^iedl^Cl^ri^tian^^Terni^^^^ii:i|^^l^te^Dayidl^^^^^^

Subject:
Date:

Re:^OT^ Metropolitan Storage Warehouse horror stories
Thursday, May 20, 2010 5:22:02 PM

iusethe metropolitan Storage warehouse and from my limited experience With them thus far i've been
happy with them, acolleague of mine storedasomewhat substantial collection of fine art and had no
problems whatsoever,
as for me,ijustneededaconvenient and cheap place to store my vinyl record collection nothing
terribly valuable but quite heavy and fragile and climate sensitive nonetheless, based on the size, price
and overall experience with their managementiwould heartily recommend them over the nearby
alternative UHAUL which, if anything, is gangster central overpriced, unprofessional, and really
crummy woodenwalled holes, the only thingsihave heard from others who use it were positive i've
heard no horror stories ever,
with respect to security whatidid notice is that the warehouse sometimes keeps its loading bay doors
open during operating hours and the building is SO INCREDIBLYhuge that it would be possible for
someone to sneak in and hide out inside, the building is so old that afaict they did not have extensive
surveillance on the inside which is one thing that would make them substantially better,
my2pence,
maxinlondon
On May 20, 2010, at 7:14PM, Danny Clark wrote:
DYes, but there is no power,and no wifi, so it would beabit tricky,
D

DWould probably want to renew my amateur radio license:-)
D

DAlsoFYIIgot police reports forthe last2years for the Site, only one might be due to Metropolitan
negligence so either this isn't reallyaproblem in practice, people are too lazy to file police reports
when their stuft gets stolen, or the person doing the records check made amistake(eg perhaps the
reports were filed under the person's residence address instead of the warehouse address),,.
D

D
Forwarded message
DFrom:DiNatale,Francine^fdinatale^cambridgepolice.orgD
DDate: Thu, May 20, 2010 at 12:10 PM
DSubject:RE: Getting all theft reports foracertain address?
DTo: Daniel Clark^dclark^pobox.comD
D
D
DHi Daniel,
D
D

DThere were only21arceny reports from Metro. Moving^Stor, one of the thefts was an actual
aquaintence that the owner left in the unit while she went and rentedatruck (that was in 2009), The
other larceny that took place in March of this year is still under investigation,
D
D
D
D

DFrancineDiNatale
D

DAdministrative Assistant Records Unit
D

18171

D 617 349 3354
D

DFax: 349 3234
D
D
D

D
^1/
Daniel JBClarklActivist; Owner
DFREEDOM^DlNCLUDED~http://freedomincluded.com
D
/l'^
Free Software respecting hardware
D
D

DOn Wed, May 19, 2010 at 6:15 PM, seph ^seph^miLeduD wrote:
DCan you stickavideo camera into your space?
D

Dseph
D

DEric Schmiedl ^unlocked^MIT.EDUD writes:
D

DDTwo options:
DD

DDo) Use the 8088 in parallel to theexistingpadlockanddon'ttell
DDmanagement,
DD
DD
DDo) Get one of these:
DDhttps://securitysnobs,com/AbloyProtecPL321Padlock,html
D D $ 2 5 f o r a l o c k that nobody will pick any time soon,
DDhttps://securitysnobs,com/AbloyProtec PL 330 Padlock.html
D D $ 7 0 f o r a l o c k that will put u p a b i t o f a f i g h t against forced entry,
DD

DDThen put one of these on your unit to keep out insiders:
DDhttps://securitysnobscom/StantonConceptsPrivaSealTamperIndicativeSeals20Pack.html
DD
DD
DD
DD
DD

DDOn 5/19/104:51 PM, Christian J,Ternus wrote:
DDDUnfortunately,Danny misheard me. lowned the "safe" in question
DDDit was one of these: http://wwwamazoncom/dp/B000I^OX94/ The thief
DDDsimplytookit,
DDD
DDDlasked the warehouse management to let US use our own locks;
DDDapparently their policy forbids this. Let us know if you have better
DDDluck,
DDD
DDD Ternus
DDD
DDD

D D D C h r i s t i a n J , T e r n u s l M T r M E n g ' l l | A C 3 T | c t e r n u s , n e t l 6 1 7 710 8955
DDD
DDD
DDD
DDD

DDDOn Wed, May 19, 2010 at 4:43 PM,Eric Schmiedl ^unlocked^miLeduD wrote:
DDDDGo on eBay and get an S^G 8088 for $9 and be done with it:
DDDDhttp://shop,ebay,com/i,html?nkw^saroent^oreenleaf^8088
DDDD
DDDDThe lock is designed for precisely this kind of situation,,,very
DDDDdifficult to defeat surreptitiously,not really resistant to forced entry.

18172

DDDD
DDDDi'd be curious to hear that Story about theftfromasafeinsidea
DDDDlockedunit...
DDDD
DDDD
DDDD
DDDDOn 5/19/10 3:29 PM, Danny Clark wrote:
DDDDDShort version:
DDDDD(a)Can anyone recommendahardtopickbutnotinsanelyexpensive
DDDDDpadlock? Does not need to be resistant to more forceful (drilling etc)
DDDDDtechniques. (e.g.it is accepted that it will not actually stopa
DDDDDdeterminedattacker,but it should be obvious if it has been
DDDDDdefeated),
DDDDD
DDDDD(b) Ifyou have strong negatlveexperiencewith Metropolitan, itwould
DDDDDhelpalot of people to postareview, for instance at:
DDDDDhttp://wwwyelpcom/biz/metropolitanmovingandstoragecorpcambridge2
DDDDD
DDDDDLong version:
DDDDD
DDDDDSoIoffhandedly brought up Metropolitan Storage Warehouse in SIPB
DDDDDofficeyesterday,and it seems that this is not true:
e.g.itisnot
DDDDDhttp://img227.exs.cx/img227/4259/ragewarehouse5ka.jpg
DDDDDire P r o o f : /
DDDDD
DDDDDin quick secession from aboutaquarter of the small number of people
DDDDDpresentlgothorror stories regardingwater damage, theft, theftfrom
DDDDDsafes^inside^ locked units, andageneral critique of their overall
DDDDDsecurity,
DDDDD
DDDDDHoweverlwas unable to find anything remotely like that from the
DDDDDinterwebs, specifically only these2sites seem to have reviews:
DDDDD
DDDDDhttp://www.bbb,org/boston/businessreviews/storageunitshouseholdand
commercial/metropolitanmovinostoraoecorporationincambridoema 3494/
DDDDD(very positive)
DDDDD
DDDDDhttp://www.yelp,com/biz/metropolitanmovinoandstoraoecorpcambridoe2
DDDDD(mixes, but the negative review has nothing to do with things about
DDDDDthe place that are nonobvious).
DDDDD
DDDDDSo if you have hadasuck experience it would be good to post there/
DDDDDreportit(or just reply and I'll postasummarytoYelpl),Feel free
DDDDDto forward this to the original source of the stories, a s a l o t of
DDDDDwhatIgotwas2ndor3rdhandIthink,
DDDDD
DDDDDThanks,
DDDDD
^ 1 / Daniel JBClarklActivist; Owner
DDDDD
DDDDDFREEDOM^DlNCLUDED~http://freedomincludedcom
DDDDD
/^^
Free Software respecting hardware
DDDD
D

18173

17/
"2 L0 for ide i
ED:

?mammsmew zonm 0? Hmcaemxm
. . nu ma Uwvcm mean ma 0
muomucou coaummuono mnakonm coa . .an an.
. . . .umu:m~wcoo mac I on madman
. . ADV

a
ma no uwuup
. uunn..3ao3.:oo8annuua

a
HB?wu mm 8.08.
.

u3?na 3 undue. vo?auup

So?uv?nu?sugoumuuo wuuHuo3un3Hn
muvmwmumuunanuu ?z . on anon







.246 uunnun
1 H3. 8.: .

uoHmauu> Ho>muu? 22225 .
A as as

an wuum
EH2 3&9 as
ocmss .2580 cam



.
asmmog?omb?cation



OF PAGES

PROSECUTION
PAGE OFFERED:
PAGE



1) 0043-28May10\1 Customer\Unal|ocated Clusters
File Offset 25663107146




i have a few possibly interested customers




Not taking orders in a nice way yet. After the conference I'll have more time to work on the web site. But if anyone
really, really wants one (shipping early next week) I can do credit cards by phone or the website (in an ugly way) pretty
quick. But prob better to wait till next working on the software install at the moment.

">

How are things for you - is your C0 dept becoming all tense?



not really tense

alias-"Bradley font?family: Helvetica;
ont-size: 12pt:">

im relaxed a lot more



but i dont know

font-family: Helvetica; font-size: 12pt;">

still got about 3-4 months to go at least



sounds like dialing back to zero made a lot of sense

Helvetlca: font?size: 12pt:">

sorry wit: last I saw was "



well I guess itaapos,-s lucky the army has done such a fabulous job teaching you to lie by omission from day 1!

style-?background-color: font-family: Helvetica; font-size:




?cation
I=.xHumT 2930'
Eig? ADM 130;.?
PAGE or PAGES



18175

UNITED STATES OF AMERICA
V.

STIPULATION OF
EXPECTED TESTIMONY

Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211

SA David Shaver
16 August 2013

It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that if SA David
Shaver were present to testify during the presentencing phase of this court-martial, he would
testify substantially as follows:
1. Prosecution Exhibit (PE) 205 is an email that I pulled from the allocated space in the
accused's personal Macintosh computer. The personal Macintosh was previously admitted as PE
11. The email was located in the sent folder of the Thunderbird email client. Thunderbird email
client is the program which hosts emails from the accused's gmail and earthlink email accounts.
The email is entitled "Happy Thanksgiving [Belated]," and the accused sent the email to Mr.
Tyler Watkins on 28 November 2009.
2. PE 206 is a summary I created of numerous emails that I found in the allocated space ofthe
accused's personal Macintosh computer. To locate the emails, I searched for "Daimy Clark" or
"Daniel Clark" in the accused's Thunderbird email client, both in the sent folder and the inbox
folder. The filtered results showed all the emails between the accused and Mr. Clark and showed
information inthe following fields: "To," "From," "Cc," "Subject," "Sent," and "Received." I
then took a screenshot of the search results, which is what you see in PE 206. I discovered that
there were twenty-seven messages in the 23 August 2009 to 20 May 2010 timeframe. In the
"From" and "To" lines, the email recipients are typically listed by name only. The names
"Danny Clark" and "Daniel Clark" correspond to the email addresses "dclark(gmit.edu,"
dclark(^pobox.com," and "danny@opensysadmin.com." Bradley.manning(^earthlink.net,
Bradley Maiming, Brad Manning, and Bradley, are all emails or names that correspond to emails
of the accused.
3. PE 207 is a screenshot of a configuration file showing encryption contacts located in the
allocated space of the personal Macintosh computer. Specifically, the file was located at the
following path: "\Macintosh HD\Users\bmanning\Library\Application SupportVAdium
2.0\Default\otr.fingerprints." Adium is the chat client that the accused used on his personal
Macintosh computer. Off the Record (OTR) is an add-on to that chat client, which is used to
encrypt chat communications while they are in transit. OTR requires both contacts or parties to
share their encryption keys to enable chat communications. To complete this process, one party
requests the initiation of encrypted conversation and the receiving party accepts the invitation.
The parties then exchange unique encryption keys which serve as decoders to enable each
computer receiving a message to translate the encrypted message into readable text. The
screenshot reveals the individuals with whom the accused has shared encryption keys, which
includes "danny(gopensysadmin.com." As previously stated, the email address
"danny(^opensysadmin.com" corresponds to Mr. Danny Clark
1

PROSECUTION EXHIBIT ^ f b p A n t i f i c s t i o n
FAGE OFFERED:
FACE ADMITTED:
PAGE
OF
PAGES

18176

^. PE 208 isaportionofachatthatllocated and carved out of the unallocated space on the
accused's personal Macintosh computer. Isearched the unallocated space for deleted chats
between Mr. Clark's email address "danny(@opensysadmin.com" and the accused. Ithen
formatted the results, so the inf:^rmation was easierto read. The portion of the chat thatllocated
occurred onI8March2010and was between "bradley.e.manning@gmail.com" ("alias^Bradley
Manning") and"danny(^opensysadmin.com"("alias^Danny Clark").

ANGEFOVERGAARD
CPT,^A
Assistant Trial Counsel

.lOSHUAFTOOMAN
CPT,^A
Military Defense Counsel

BRA
PFC, USA
Accused

18177

DEFENSE
EXHIBITS ADMITTED

18178

IN THE UNITED STATES ARMY
FIRST JUDICIAL CIRCUIT

UNITED STATES

STIPULATION OF EXPECTED
v. TESTIMONY


MANNING, Bradley E., PFC FORT LEAVENWORTH WITNESS
U.S. Army,
Headquarters and Hea quarters Company, U.S.
Army Garrison, Joint Base Myer-Henderson Hall, DATED: 5 Ebruaw 2013
Fort Myer, VA 22211

It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that if Fort
Leavenworth witness were present to testify during the merits and the pre-sentencing phase of
this court-mania], he would testify substantially as follows.

1. I am a Security Specialist at the Center for Army Lessons Learned (CALL), U.S. Army
Combined Arms Center, Fort Leavenworth, Kansas. I have worked for CALL for the past 9
years and 11 months. Recently, I was moved to the CALL Intelligence War?ghting Team. My
job title and duties have not yet been ?nalized for my new position.

2. CALL is an agent for change focused on the collection, analysis, dissemination, integration,
and archiving of new concepts; tactics, techniques, and procedures and solutions
throughout the Army from the tactical through theater/sn-ategic levels of war. CALL is forward
deployed around the globe and provides joint, interagency, intergovernmental, and multinational
(JIIM) forces with historic and emerging observations, insights, and lessons (OIL). The support
provides valuable TTP to deployed and follow-on forces and helps improve the war?ghting
capabilities of the Army. CALL is a multi-media based operation that disseminates these lessons
and other related materials through a variety of print and electronic media, including our website.

3. As a former Security Specialist for CALL, one of my responsibilities was to assist CALL as a
member of a team to put out rapid adaption information to the ?eld. Rapid adaption is a process
whereby information is analyzed and disseminated in a timely manner relative to the criticality of
actions required for soldiers and leaders to adapt that information to current operations and
doctrine, organization, training, material, leadership education, personnel, and facilities
development. The rapid adaption process is designed to save soldier?s lives and
improve the e?ectiveness and e?iciency of Army operations.

4. On 9 May 2011, CPT Joshua Tooman sent a Request for Information (RFI) to CALL. CALL
operations department subsequently sent the RF I to me. I looked to see if CALL had produced
anything in response to the disclosures to WikiLeaks. I replied to the RFI and supplied three
documents from a shared folder that I had created out of professional interest and for educating
the workforce on the CALL Shared drive which referenced the Wilcileaks incident:

.. .. .
DEF ENSI: EXHIBIT for Ide I?catron
PAGE OFFERED: PAGE DMI
PAGE of PAGES

gum





18179

a. CAC Media Review 28 Apr 11.doc;
b. and
c. 246_20l0_App1ication of INFOSEC_Bolger.docx.

I supplied the above three documents to CPT Tooman as part of my response to his RFI.

5. On 10 October 2012, CPT Tooman sent me another email asking if CALL had produced
anything in response to the disclosures by WikiLeaks since we had last spoke. I responded to
him that I had no further knowledge of any WikiLeaks studies, analysis, or research in CALL at
that time. I told CPT Tooman that if he wanted to query CALL about WikiLeaks, he may
request that effort by contacting LTC Doug Willis, the CALL OPS and Plans Chief.

6. The following day, 11 October 2012, LTC Willis sent an email to me, CPT Tooman, and the
other CALL team leaders. According to the email, LTC Willis con?rmed with the other teams
that CALL had not done anything related to WikiLeaks.

7. As of today, I am unaware of any order, request, or suggestion directly to me to study and
recommend changes to training and doctrine regarding the handling of classi?ed military?
information, the supervision of Soldiers handling classi?ed military information, or any of the
critical Army or vulnerabilities based upon the disclosure of information to WikiLeaks.

8. Although CALL is the center for the Anny's lessons learned, each unit or major command has"
the ability to capture its own lessons learned without sharing that information with CALL. "To
my knowledge, CALL was not asked to perfonn a rapid adaption process in this case. If CALL
was not asked to perform a rapid adaption process in this case, it may have been because either
the information leaked did not warrant a rapid adaption response or the Army eliminated the
need for a rapid adaption process by taking immediate steps to address any issues presented by
the leaks. If a rapid adaption was not requested, CALL could have also completed a detailed
case study. To my knowledge, CALL was not asked to complete a detailed case study on the
leaks in this case either. .



ANGEL DAVID E. COOMBS EY E. MANNING
Civilian Defense Counsel PFC, USA
Assistant Trial Counsel Accused

18180

Defense Exhibit C
1 page
classified
"SECRET"
ordered sealed for Reason 2
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial

18181

Defense ExhihitD
^pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial

18182

Defense ExhihitE
3pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial

T

18183
Page
I of 9

,Diaft:The Most Wanted Leaks of 2009 - WikiLeaks

DraftiThe Most Wanted Leaks of 2009
Frum WikiLeaks
Jump Ur. iiiivitLiHioii, sciirvh
2009'.police, or human rights investigators.

Help us cliirily and background the nominuiions so v e can discover which are significant
and which arc nol. You may secuicly and anonymously add infomiation to this page fbr
each entry (click "«dil" next tu each coiiiitiy).
WikiLenks will prioritize the list based on the available infomiation and seek to obtain
the leading candidates directly, through the legal system, or indirectly through ours
network ut'jiHirnalisfs, inielligence souix;es, volunlccts and fenders. I t you email us (wicditon@ljsf.org ) we will alert you when the record has been obtained.

Contents
IhM
I Internal onaI ori;jnimtions
- •\ll-.UIll

i A11 -.imliii

The current order reflects the order of submission and is unlikely tu be related to the
final oi-der.
W iiiners for each country will receive a cash prize uplo 1000 EUR, depending on how
many countries submit.
Documents or other material s added nominated must:
• Be likely to have political, diplomatic, ethical or historical impact on release
• Be known to exist or have existed.
• Be plausibly ubtiiiiiable to a well motivated insider or outsider. For nstJincc :hc
entire collection of documents held bythe Chinese Ministry of Public Security ( ' I '
AlAiJvfnlll^i-'Ctnfi) is not plausibly obtainable, but a specific document or
group of documents may be,
• Be well defined, and if possible, specific. Three examples of wvU (.kfiiiedmt\
sped fir.
• Inquiry into the Treatment of Detainees in l.'S Custudv. 20 Nov . 'WH.
• [ K l Tiimn rmiAm*)W.9imi»iwl'w, intcllltynct; inlfrt-t-pl m.i;i !(XW.
• C'lmip Ucltn Standard Operating Proixduie (20C4),
An acceptable example, which is known ir> e.ti.rl and well ckfwed, but not specific:
• The eun oni list of websites or URLS filtered by the Chinese Public Security
Bureau's "Great Firewall of China" censorship system.
• Be described in enough detail so that a court, dissident insider or visiting outsider
not already familiar with the material or its suhjecl iiiiitler may be able to quickly
locate il, and will be motivated tu do so.
• Shoulc, where possible, list all organizations, locations and-'or \v«bsites suspected
of holding the material or having infwmation iihoiii how to access it.

4 Wiihrittn
5 Canada
6 China
7 Colombia
iiigiBS
9 Finland
10 Fiance
ILCermain:
12 Git eve
\ } Ci jaicraala
14 Italy
I", K'jnva
lo l.|bv;i

IMilJiiiiMKmr
IX Miili

2',) New /ciihiiid
21 NiKW
22 NoTMrav
23 Puerto Rico
24 RonmriL
RvNariJii
2b Russia
2 7 Slovenia
25 Smith A'tri^;^
29 Sudan
Ml Syria
% i Svvilzcrliilld
.^2 Swa?tblld
.^3Tnni«b.JantlTobaho

1'gimdf
He atleiitivE to the content ol your nomination Do not worry about making fomiatling
mistakes. All copies ofthis page are kept and reviewed.
Ill the rare cases were a document might be destroyed ur vaulted if it appeared on this
list, .send your nomination privately lo wl-cdilor;
.IS I'liitcd Kitmdiiiii
.Vl 1. riilfd St.iles
• "MI.I Bi.lkdalub.i>e--.
«
I'edcral ;xi'iiics
• .V'.' HmikiiiK
• .Wi.4 h i IVII Ul line 11

International organizations


Media
• 3f».(> Kehmion
J7 Vatican

BildeibBi^" Crniup meeting minute.\ papers aid annual reports ofsince I") 54
WikiLeaks has so'TO,gaj?>a'rg»dY. Bilderberg is an annual off-the record
conference of transatlantic political econoini: and ideological agenda setters. As
ail historically impuilani confidential dociincnl collection it is probably only equaled by Cabinet minutes and high level intelligence and
diplomatic assessments. Leads: There are some older, previously unnoticed records in boxes at Uni of Illinois
ll*t|\''l''3'%ji|?i'ar.)%jll!iMm.e.dU'4ivluvcs u isW ISS(i51.niir(19Sf>-19701 Ihe Geiage Bush library,

l^^^|.^v^lglc^^^,^^i^rafFThc_Most_WaiUixl_Lcuks_i)r_2009

Saturday, June 01, 2013 15:37:47 PM

,Draft:The Most Wanted Leaks of 2009 - WikiLeaks

18184
Page

2 of 9

h;tp:.,'bush!ibraiv.tamu.i;du,'i'esgarch''fiiKl:ni; aids'ndfs.tlK-ttAV'f-t-.pdf, the Eisenhower Library in Kansas
h:in;.,'www.ciseiihnwer.ule\ns edij/Rcsearch,'Kindinf Aid»rDf !i.'Jackswi CD Recotds.ixlf andal the International Institute of Social History
in Amsterdam (1953-1989) hitn:.vwww.usa,iii'aiv:hives-en.'filcK.'wai)X()7tlK?tull.nliP
• Requests to the Security Council in 2003 that the Security Council look at what was happening in Darfur, and any notes ofdiscussions leading
to the decision not to look at the situation
• Documents regarding the founding and operation of Alluince Base, cover name for a secret Western Counterlerrorisi Intelligence Center in
Paris.

.Austria
• K-M»il traffic between minister offinancePixiell and Christian Konrad, who is advocate general of Raiffeisen bank.
• E Mail I rattle of Fl'O delegate Anton Mahdalik with Viennese mayor Michasl Ihtupl and/or deputy mayor Michael Ludwig containing threats
when renting municipal ground to the Viennese trailor park ("Wagenplatz Wien").
• Source-code as we l as cerlificatuins for the Austrian e-Voling system used in students elections,

Australia





Federal cabinet minutes fiom the special session held on 18 March 2003 QjJiiSiSi
rhc report ofthe national broadband network expert working group.
Versions of the ACMA URL blacklist newer than 19 March 2009.
Full details of filtering hardwaic'softwaic vendors paiticipatmg m government-sponsored ISP-level censorship technology trials, including
(but not limited to):
" Any and all communications between filter vendors and government departments prior to, during, and afier the trials
" Any and all transactions, contracts, and other financial arrangements involving filler vendors
• URL blacklist(s) used during above trials. Alleged (by government) to be ACMA URL blacklist,
• Full statistical breakdown of results of above Iriafs, since Enex Testl.ab will not make them publicly available, and the public report will be
compiled by the same government department wh;ch is spearheading the censorship proposal (see licit, and h£r£• URL blacklist as used by Watchdog NZ curing iwivale censorship technology trial by ISP Kxelel in May 2009, Alleged (by Watchdog) to have
been IWF list (-lee United Kingdom),
> Written exam NSW police officers must take annually before they can be issued with Tasers.
• Volume 1 of the New South Wales-Commonwealth .loint Task Force Report on Drug Trafficking, It was suppressed at time of publication and
lias no I yet been released. Possibly contains information on Kugan Hand Dank, CIA and drug trafficking ami/or conneclioirs of Peter Alleles
and Dela Csidei to drugs. But we wuni know until il is no longer suppressed.
• Speed Camera jonlracloii; - in parliciilar • Revenue derived from contractors privately operating speed cameras
• The amount and value of incentive/bonus payments or kickbacks paid to these contractors for every ticket issued
• Details ofthe shady (often verbal] fmc "quotas" issued lo the staff operating the cameras
• Details of training, guides and or manuals given to camera operators and Iheir mnnagemcni
" Any documentary evidence explaining why operators persist in operat.ng cameras in violation of police camera policy (ie. less than 200
metres from a speed zone change, using forged calibration certificates (for instance the elusive Mr Burden who works in the non existent
department of communications at RMIT, and seems unable tci sign his own signature (he same way twice), using illegally modified or
concealed speed cameras, operating near known sources of reflection or interference which will have the etTcct of incicasiiig the
incidence of "over reading" resulting ir. morefinesheing generiited)
• Any memos or documenlui^ evidence of compliance between court officers and speed camera prosecutors explaining why courts keep
niling in favour of often cut and dry cases that should have been otherwise dismis.ied
• Details, memos and reasons why lax payer (liiuled prosccutore are supplied free of charge to often known shady camera contracting
companies
» Details, memos or other documentary evidence that explains why costs are always offered or awarded lo the prosecutor, ami contrary to
law denied fo the defendant even when they win a case.
• Details of any links between camera contractors banned from operatin^^ cameras due to fraud, and puppet coinpiitncs who pick up their
entire flcsl and work force overnight and continue lo illegally operate them. (lor example whul is the Tcnix and Scrco relationship)
• What the revenue raised by these cameras is actually spent on; and what percentage is actually used in any sort of road safety initiatives.
« Details of speed related accidents and deaths that occurred on speed camera siles
° Details ofthe number offinesissued tn deceased people who would have otherwise been alive had the site been operated by a |X)lice
officer who pulled them over instead of covertly taking a photo of thctn
• Any proof that speed contractor witnesses are otkn i legal unultribulcd "proxies" specially coached for giving testimony and committing
fraud
• Details of anti-spam systems that are abused lo automatically block or disconnect users and companies inteiiiet/websiles (ie Denial of service.
coiporate.'Tinansial sabotage.) when they have not actually been spamming. (eg, deliberately add a companies email to hundreds of spam lists,
until they start generating bounce messages, then report them for spamming to take them offthe inleriicl possibly even putting I hem out af
business as a result)

Bahrain
• Documents disclosing Ihe number of citizenships that have been granted in the last few years, in an effort to change the country's demography.
See Political naturalisationUJ-

1^hi|t^|:jjiv^c^g^^l^^ran:Thc>losl_Wu]iled LL^^

Saturday, June 01, 2013 1 5:37:47 PM

18185

,Diaft:The Most Wanted Leaks of 2009 - WikiLeaks

Page 3 of 9

Canada
• Documents disclosing the number of.4uthorizaf ion to Carry permits the provinces have issued for the purposes of presei-vation of life
Provincial Chief Firearms Officers have lofused toreleasethis information citing that il could potentially compromise the identities ofthose
that hold licenses.

China
• A list of URLs and keywords censoredfilteredby the Great Firewall of Chii ai. WikiLeaks ha.s previously released related iiiforinaiioii, for
example, watch lists, policies and several thousand URLs for CCTV and Baidu, but nor for general http filtering.
• Policy options on Darfur formulated in response to the so-called Genocide Olympics campaign led by American actress, Mia Farrow, and
notes of meetings in 2007 between Stephen Spielberg and Chinese Foreign Ministry officials prior to .Spielberg's resignation as Artistic
Director ofthe 200S Beijing Olympics.

Colombia
• The DAS (Depuitamenlo Adniinistintivo de Seguridad) isrepottedto have surveilled a wide array of public officials, private citizens, and
organizations. Documents wanted: contracts to supply software for internet surveillance to Colombian pol.cy agencies and details ofthe
software supplied,

Egypt
• The complete list of current polilieal prisoners and the charges against them.

Finland
• riie so called Tiitisen Lista, the list of 18 persons claimed to have been in active contact with East German security ser\'ic«s (Stasi). The list
was received from the West German intelligence serv ices (BND) in 1990 and since classified by the order of President Koivisto as adviced by
the head of the Finnish Security Police (Suojelupoliisi), Seppo Tiitinen. It is rumoured that several cumenl or fonner ley Finnish politicians
appear on the list
• The Bilderberg 2009 raport, Finnish President Taija Halonen secured the papers. The request comes Finnish ex-President Martti Ahtisaar., a
former Bilderberg participant.

France
• The list of people with an office at the Elys^e and Iheir function (lo expose resident lobbyists, etc.)
• Document regarding Ihe founding mnA operation of Alliance Base, cover name for a secret Western Counterterrorist Intelligence Center in
Paris.
• The Monthly Health Report of President Nicolas Sarkozy, as promised by himself during the last presidential elections.

Germany
• The SiaSlfilesofFederal Chancellor Angela Dorothea Merkel (maiden name Kasner) and other leading poliHciaiis, which are known fo exist,
but withheld from public,
• The StHsi liles relating to operation Gladio / stay behind organisations in relation to riyhi-mim icrrori.sni m Gcmiarv. as per a parliamentary
request by the Green party.
• The complete Toll-CloUect contracts.
• Cross-Border Leasing contracts of the Berlin Transport Corporation (BVG),
• The so called ".4tlas der Wut", a document about die risk ofriotsin different german regions. The list is said to be updated regulary and was
first v/riltcn in 2005.
• The list of NPD party members,
• The censorship filter list for llie proposed national, mandatory censorship system. The list will be compiled by Gennan federal criminal police
BKA and distributed to intemet service providers.
• The contents of the contract between the BKA and some ISPs lhal has already been signed, but is kept secret due to "public safety" and
copyright concerns (see hltp:c'bloK Iefe.de/.'ts h4iaKaffi).
• The List of Media Harmful to Young People (the censorship system already in place). The "virtual medio" part ofthis list is distributed to
search engine providei-s and is illegal to publish. It probably could be reverse engineered using ihe differences between googlecom and
google,de search results. Also, ifyou want to know ifa specific medium is on the list, you can send an enquiry to lisiciifibuixicspructsk'l e dc
("Bundespnlfstelle'" is the agency responsible for keeping lho list).





Ursula von der Leycn's driver's logs (Fahitenbuechcr) that she rcfu&es lo make public.
Specifics of the "Stcuer-ldciitifikaiionsnummer'"8 structure (see de,wikipedia,org.'wiki/Steuer-lD)
Complete/partial database of "Stcuei-ldentifikationsnumnier's
A list of vaxincs ordered (and its order cMifinnations) by the german government

1^
l^^|l^j^^^lL-^^^,i|i^l^rafl:Thc Most Wanted_Lcaks_of_20()9

Saturday, June 01, 2013 15:37:47 PM

18186

Di afLThc Most Wanted Leaks of 2009 - WikiLeaks

Page 4 of 9

Greece
• Documents related to Ihe Athens affair that have yet to be released (including those from countries other than Greece,)

Guatemala
• All documents on Plan Victoria 82. Plan Sofia and Plan Finneza 83.
• Final report ofUnited Nations' Historical Clarification Commission (CEH) inio the killing of 200.000 Mayan people and the involvement of
Ihe US government and American corporations. The report official sources (militar interviews, campaign plans, etc) are kepi secret by the UN
in NYC,
• Documents on Canadian corporation named Goldcorp with a mining operation in Guatemala, especially infornialion nn where the Cio,d they
exhract is processed and who is buying the gold (we think it might be a Swiss ctimpany).
Detail:

PLAN VICTORIA AND PLAN SOFIA*
in Ihe process of trying to bring military personal involved in human rights violations and massacres lhal happen during the civil war in Guatemala to
justice, the military have been required lo declassify many war documents. In a case, that wcni all the way to Ihe Supreme Court of Guatemala, the
Court dictateti a sentence that con firmed the obligation of the Ministry of Defense of Guatemala to hand over the official documentation of four
specific military operations: Campana Sofia 82, Victoria 82, Firmeza 83 and Operacion Ixil. The Supreme Court sentence indicated that this
achieves had to be declassified and made public yesterday.
These military operations were carried out in the SOs, According to the CEH, Historical Clarification Commission of Guatemala final neport
contained in "Guatemala: Memory ofSilence", these militai-y operations resulted in massacres and severe human rights violations.
The .Minister of Defense .Abraham Valen/.uela only delivered ptininl information about plans Victoria 82 and Firmeza 83. two ofthe four requested
plans. He indicated that he had no knowledge of ihe other two plans before he became Minister of Defense and that he ignores where Ihe
documentation could be. He stated thai lie could not deliver Ihe coinplele plans "Victoria 82" y "Firmeza 83" because certain information was
consitlcred state secret and a concern of national security,
• "Plan Sofia" a derivative of "Plan Victoria 82", was of special concern to
human rights activists; this plan was conceived in July 1982, four months afier General Ffrain Rios Monti came into power, '•
• SO WE WILL RbALLY LIKE TO OBTAIN THE COMPLETE DOCUMENTS OF PLAN VICTORIA
82, PLAN SOFIAAND PLAN FIRMEZA 83*
• CEII ARCHIVES*
The United Nations' Historical Clarification Commission (CLH) lor Guatemala issued a report where the US government and several American
corporations were accused of complicity in Ihe genocide of nearly 200,000 Mayan people during Guateinala?s bloody 36-year civil war. The final
3,600-page CEH report clearly places the blame for mast of the 200,000 deaths on the ".'racist? policy of the Guatemalan government and holds ihc
counfryYs military and paramililai^ foives responsible for the actual killings, tortures and disappearances.
However, it accuses the US of directly and indirectly supporting a ^fratricidal confrontation? by providing sustained training, inns and financial
aidThe report is based on the testimony uf 9,200 people from all sides ofthe conflict and other documents*, classified and Secret, protected in the
UN headquarters in NYC* The CEH investigated 42,000 human rights violations, 29,000 ofwhich resulted in deaf lis or disappearances and
therefore, the documents under UN custody arc fundamental for the prosecution ofthose responsible of the crimes,
• GUATEMALA. SWITZERLAND AND CANADA*
A Ciiiiadlan coiporation named Goldcorp has a mining operation in Guatemala with poor cr.virormiental conditions and harming health of many
workers and a community as a whole. We will like to know.
- Where the Gold they extract is processed,
- Who is buying the gold (we think it might be a Swiss company)

Italy
• /(// documents pertaining to Nazi Germany and the Vatican, as well as those relating to the post war rat line to Argentina, Refer lo
liH|),,','i;cwx,hiH, CO Ilk. 2 lii. aii'upe,'J(i I 1X4',' >l:n

• The/nil Italian censorship, of which Wikileaks currently only has a sub.^ei.

I^^^ll^(^^^^^^^

rafl:Thc Most Wanted Leaks of_2009

Saturday, June 01, 2013 15:37:47 PM

18187

Drafi:The Most Wanted Leaks of 2009 - WikiLeaks

Page 5 of 9

Kenya
• Ttie international investigative finn Kroll associates produced at least fom reports on high level Kenyan corruption af)er first term ofthe
Kibaki government, A draft version of one of the reports llie Itmlini.'. nf Keiiyii, was previously published by WikiLeaks. Ihe reports were
given lo selected members ofPresident Kibaki's cabinet at the time and are likely still held by h tip:' • www .kroll com, uk/. notably lead
investigator Andrew Marshall.

Libya
• Documents iiulicaling arrangements with the Sudanese govemment to grant land in Darfur to Arab settlers fVom Libya (Civilians and
administrators on the ground in Darftir indicate this has been taking place).

Madagascar
Both sides of the political conflict in Madiigiiscar are crying fouls about the deals made by their counterparts with foreign entities. The release ofthe
official documents with respect to contract negotiations about:






Oil exploitation in the reginii of Bemolnnga ( South uf Madagascar] by Total & otheiu
an obvious one but the proposed final contract before rejection of Ihe land deal with Daewoo Logistics.
The recent agreement with Saudi investment group or. staple products and proposed %2 billion USD investment.
The revised mining exploitation agreement wilh Sheritt in .Ambatovy and Rio Tinto in Fort-Dauphin.
Least but not lest, the complete list ofcurrent political prisoners and Ihe charges against them.

Mali
• Documents indicating aiTangenients with Ihe Sudanese govemment to grant land in Darfiir to Arab settlers from Mali (Civilians and
adminisrators on the ground in Darfxir indicate this has been taking place)

Mexico
• Zapotec indigenous people demand transparency from U.S Scholar and full disclosure ofall the agreements between U.S. Government and
their agencies and U.S. geography scholar Peter 1 lerlihy, especially confidential agreements with Foreign Militaiy Studies Office. Prof
Herlihy failed to mention that he received funding from the Foreign Military Studies OHlce ofthe U.S. Armed Forces on the research of
"Mexico Indigena" project. Mexico Indigena Project forms part of the Bowman Expeditions, a more extensive geographic research project
backed andfinancedby the FMSO, among other institutions. The FMSO inputs information into a global database that forms an in leg ml part
of the Human Terrain System (HTS). a United Stales Army counterinsurgency strategy designed by Foreign Militaiy Studies Office and
applied within indigenous communities, among others,
• Documents to unveil Ihe real purpose of "Ruta Maya 2002 Isuzu Challenge" The convoy was commanded by Ben Nun Avihu, Israeli militar
and Moshe Savir, geography expert and around 50 tourists in 40 Isuzu Jeep, Some communities linked the incursion with biopiracy. The
teirain they explored is controled by the R/l.N.
• Documents related with Ihc fraud and corruption around FOBAPROA (Fondo Bancario de Protecci6n al Ahorro),
• Documents offinancialoperations just before thefinancialcrisis of 1994 (some say the government knew before that the crisis was coining
and took advantage ofthe infonnation protecting I heir interests).
• Documents related with the World Bank credit and application of the budget fo combat swirte flu,
• Documents related with the technology currently used in cellphones in Mexico to implement the RF.NAUT nro jram Information about (he
security technology used to protect data collected from users.
• Documents related to Ihe transparency of Plan Men da

New Zealand
• The New Zeal and internet censorship list

Niger
• Documents indicating arrangements with the Sudanese governirent to grant land in Darfur to Arab settlers from Niger (Civilians and
adminisrators on llie gruond in Dai fui indicate this has been taking place).

Norway
• The secret verdict in the court case between Ihe ISP Lyse Tele and the law finn Simonsen, decided the 5th of May 2009, whwc Simonsen
demanded Lyse Tele disclose the identity infonnaiion ofa file sharer suspected of uploading a copy ofthe movie Max Manus to the filesharing communiry,

1 ^
l^|p^j/^^lgle^g^^^ipraft:Thc Mosl Wanted Leak

Saturday, June 01, 20! 3 15:37:47 PM

18188
Page

DraftiThe Most Wanted Leaks of 2009 - WikiLeaks

6 of 9

Puerto Rico
• The FBI has not yetfinisheddeclassilying all the secret files related to surveillance of Puerto Rican individuals and organizations from tire
1930-70's littn ''www p: sccrvl 11 Ic s. •ici; uuk-s, htm i (not lo mention, large sections ofthe files are blacked out by the FBI), In addition, there are
thousands of secretfilesproduced by Puerto Rican police that were only briefly made aval lable to individua Is them.selvcs, and have now been
closed off to the public, fhcse documents provide evidence of quite a significant spying and intimidation operation by the United States and
local police against leftists and independence movcmenl leaders.

Romania
Documents disclosing what really happened regarding Hie kidnapping of three lomaninn journalists in Irak in 2005 , Omar Htiyssiim was accused ol
orchestrating the kidnapping, but aftetwaiti he mysteriously disappeared from Romania

Rwanda
• Documentation of financial assistance given by Ihe Rwandan government to General Laurant Nkunda for iipenitions in the DRC.

Russia
• Internal Kremlin. FSB and SVRR documents and emails into the series of Moscow apparement building bombings shortly before Putin's
Presidential election
• Complete technical documentation of the "Perimetr" system (a,k.a. 'Dead Hand"), along history of deployment and removal from deployment
(if done). Political documentsrelatingto the deployment of "Perimetr".
• Maps, flour plans, and blueprints of Mount Yamantaw and Kosvinsky Mountain, and any other facilities similarto the conjectured fac il hies
there, including names and locations.
• Documents related lo the VRYAN crisis, especially political documenis, analyses of intelligence, and specific steps taken. Information or. the
.* intelligence services, and what exactly they feared, and how credible they believed their fear to be.
mindset of Ihe Politburo, as well a*
• Soviet psychological profiles and political analyses of American poliliciaiis.
' A list and description uf the various a gems prepared by the various Soviet and Russian bioweapons programs. Indications of whether they
developedrecombinantDNA based agents, and what those are specifically. Weaponization of agents, including re-entry vehicle mounting.
Doctrine for use, including deniable use. Vaccines and treatments for affected personnel.
• Technical plans, manuals, and blueprints for the SS-27 Sickle B (Topol-M), along wilh the Bulava.
• Documents relating to nuclear warplans ofthe Soviet Union and Russia.
• Documents relating to orbital weapons systems, and vvhethsr the Soviets ever deployed them (or still deploy them) such as orbital HANE
devices.

Slovenia
• Taped convei-salions between Slovenian opposition leader Janez JanSa and Croatian prime minister Ivo Sanader in the summer of 2004, held by
Slovenian intelligence service SOVA,Tlie tapes supposedly show the two were arrangeing incidents on the couiiy border that could help
Slovenian opp(Viition win the parfinmentaTy elections in the fall.

South Africa










Prosecution evidence for Jacob Zuma trial
Eskoili board minules 2007-2009
Minutes of South African inter-bank security meetings and agreements
Arguments presented to Parliament by Vodaconi, M TN & Cell-C against reduction in mobile termination rates
S.\ Competilion ( ommission internal informatiDetails of agreement not to prosecute Mark Thatcher
Minutes of the Judicial Service Commission (JSC) fo exonerate Cape Judge President John Hlophe
possible deaths in world cup
Eskoni electricity rates to BHP Billiton. Arcclor-Mittel and others

Sudan
• Documents detailing discussions during 2005 meeting between Salah Gosh and the CIA (for which the CIA flew Gosh on private jet from
Khaileum lo CL\ HQ). See: htlpi/'wAvw Mid.mtribung cciiiv-iidit;lc4).ip.''.''id uiticle H.'2fl5

Syria
All flic documents related to the assasination, in 1965, ofMehdi Ben Barka still held in France, USA, Israel and Morocco, In 1976. lhanks to
the Freedom of information Act, the US governeinent recognized itiat the IT A had aboul 1800 classified docuinenis iibuul his assassination.
Theses documents are still classified.

raft:The_Mo.st_Wantcd_Lcaks_of_2009

^^^^t^^^^^^^^^^^^^

Saturday, June 01, 2013 15:37:47 PM

18189

Dran:Thc Most Wanted Leaks of 2009 - WikiLeaks

Page 7 of 9

Switzerland
• The full Comu Report, See httn:"'en wikiDcdia.ortz'wiki.T'ioieki ZfifThc Cornu Report

Swaziland
• Expense accounts of King Mswati, the Queen Mother and the King's wives,
• Inielligence memos from the Ministry of Defence or Police about the pro-democracy organization. PUDEMO,

Trinidad and Tobago
• Hie Report on Ihe Commission ofEnquiry into the construction of Ihe new Piarco Aiiport. This identified coiTupl practices in the spending uf
public funds, Tlie Commission's repori was delivered in August 2(Hi3. Neariy 6 years Inter, its findings have not been made public.
• The Report nn the Caroni Bridge Collapse. A man was killed when a bridge collapsed a few years ago: again tlic public has not been made
aware ofthe report's findings.
• Documents in relation to payments of atkuneys by slate Numbers ofthese payments are being kept secret from the pubhc.
• A copy ofthe contract for the billion-dollar Waterfront Development Project,
• List ofrecipients and amounts of scholai-ships sponsored by Ministi-y ofCulture for smdy abroad.
• Report of the findings ofthe cunent Ccmimission of Entjiilry Into the local conntrticiion sector
Detail:
As far aa Trinidad and Tobago goes, our government tends to pay lip service lo Ihe principles of transparency and accountability. For instance, there
is a Freedom of Information Act which, by law, allows the public to seek infonnation from government departments. But quite often, when such
attempts are made by the citizenry, the government bars full disclosure. Depending on how important a piece of information is to Joe Public, he may
actually have to tum to the courts to "force" the government tu reveal facts that should be disclosed voluntarily. Following are a few examples of
documents that should be made public, but have not been:
• The Report on the Commission of Enquiry into the construction ofthe new Piarco Airport This identified coirapt piacticcs in Ihc spending uf
public funds. The Coininiss.oil's leiwrt was delivered in August 2003. Nearly 6 years later, itsfindingshave nol been made public.
• The Report on the Caroni Bridge Collapse. A mon was killed when a bridge collapsed a few years ago; again Ihe public has not been made
aware ofthe report's findings,
• The Opposition recently brought up in Parliament the issue of taxpayers' money being used to pay attomeys by slate. .Although the public has
11 right to know how much ofits funds were used in paying said attoniey.s, the Atloiney General refused to disclose the sums, saying it would
be an invasion of Ihe lawyeiV privacy
• T he same goes for a recent request in Parliament, whereby *the Minister of Planning and Development was asked to pioduce a copy of the
contract for the billion-dollar Waterfront Development Project", fhe Minister's response was that she could not produce said contract for
public discussion because there was a confidentiality clause contained thei-ein (for a project being buih with public funds).
• The Ministry of Culture recently awarded scholarships for students to study abroad - when asked in Pnrlianieni to disclose the list of recipients
and the dollar value ofthe scholarships, the response was that this was private information.
As such, many citizens are concerned that thefindingsof the current * Commission ofEnquiry into Ihe local constniction sector*, like many
Commisions before it, will never see the light of day.

Uganda
Hie goveiiimenf of Uganda has recently signed a number of profit-sharing agreements with several oil companies that are conducting explorations in
southwestern Uganda, My friend was in Kampala in January and spoke with a number of journalists who believe that releasing these documents
would be a major step in increased transparency wilh respect to the country's emerging oil industry.
• Ugandan profit-sharing agreements with oil companies in south-western Uganda

United Kingdom









List of current and expired D-Notices [2^
The letter - KU and its DA Notice
The secret viibnici miiiiitcs and legal ;idviwc pertaining to the ongoing occupation ot Iraq.
Documentsrevealingwhy the trial of Wang Yam, who was convicted ofkilling Allan Chappelow, was held in camera, the fust UK murder
trial ever heord behind closed doors without access by press or public.
UK Government documentation info Ihe investigation ot Roger Hollis, head of MI5 between 1956 and 1965, including the report by Loi-d
Trend, into Ihe serious but apparently unproven allegations ofbeing a Russian Spy.
Copies of government minutes of meetings betv»een Guidon Brow n und'or Alistair Darting and represcsifatives of Lloyds Bankrelatinglo Ihe
proposed takeover of IIBOS,
A copy of the police intelligence handed to E ON about climate change protestors. Lii
Documents detailing the information stored and collected by tlie Wythenshawe intelligence centre. [4]

raft:The__Most^Wantcd_Leaks_of_2009

iviK%M68'!g%%'

Saturday, June 01, 2013 15:37:47 PM

18190
Pa^e^of9

^Or^ft:The Most Wanted Le8k^of2009-WikiLe^tks

^ Censoi^hip list for the tJniled Kingdom's''vohinfary"filfersystem.Kno^vn to be held by The Internet'^'a^^^
subsidiaries whichare currently beingsnpplied with the IWF list,Most ISP's in theLKhaveacopy of the IP's on delist.
^ The piioper reasons for iiafionalisalionofNorfhern Rock and Bradford^Bingley,and the subsequent sale of the latter's savings btrisiness
Santander
^ litformation regarding the valuation process todetertuine compensation for firmer shareholdersofNorthem Rock and Biadfoid^Bingl^^^
that is, the infoiniafion the independent vainer uses to determine the fmal value ofthe comapanies.
^ Recordsofeveiilsduiini^ the twelve months leading up fo die nationalisation ofBradford^Bingley,
^ Di^uments from Solicitors Regulation Authority's investigatioii info DavenportLyons threatening letteisrelafe^l to filesharing,
^ The frill iiniedaciedct^py of receipts and documentation relating to MP's expensesas was partly released by the Daily Telegraphs in addition,
any private communications regarding the leak ofthese expenses, especially ifsaidcoiiiinunicatioiis are politically
^ Climate Change orGlobal warming research, and thepoliticalaiidlinancial influence,

l^^nited Stated
^ttl^^lttt^t^tt^e^
^Amirtoroffhecompletelntcllipediositeai^ofll^l^200^,includingaiticleh^^^^
^ Amirr^iroftlieCommonLoiedataha^easoffLIB2008
^ The complete CIA Open SourceCenteranalyticaldatabase. The database is extensive, unclassified, nonpablic,but relatively accessible fo
ceriain outsiders al)er jumping throui^h hoops l^ttps: w,vw^^^
^ The coinplerePAtllliR database.ThePACER database contains nr^^^
bcbindapaywall and unsearchable,Were the document,^ to be public the behavior of many coi'poiationsvvould come to light
lillti^iil,^ic^lini,.ii,Coil|,tecliiiolicv'iiew
l^^tJ^r^l^^llt^^^
^ The missing five million Wliite House emails -possibly no longer in existence.
^ Cheney and Rumsfeld Archives
^ The Whifellousevisifor's list
^ Minutes or notes for VP Cheney's I2ncrgy Conference.
^Thcll41pagesofACTAbackgrounddocumeiltsiiotieleasedtotheEFFbytheIlSTradeRepresentalive(seeti:^)
^ Alist of all Whifelioiisc and senior federal govemment employees holdingdual citizenship and the countries they represent.
t^^ttkitt^

^ The complete list of identifies ofthe 52,000 wealthy Americanclients suspected ofhiding^l5billion at UBS to avoid taxes, including the
nonaes ofany elected or appointed government or former government officials.
^ fhe complete details ofGoldman,Siichs^Co,'s counterparty exposure to AIG priorto the Federal bailout of AIG in Sepicmber.2008,
ti^tl^lt^t^ttritt^ttt

^ Monsanto's interiral evaluations ofGMO products includingsafety and pollen drif^.
l^^l^
^ The Editorial Guidelines foi Fox News
^ Emails relating 10 suppressed GQMaga:iiine article on Putin'siLse by Scott Anderson mentioned at L^
l^^lt^iott
^ Mormons Church records
^Withrec^enflciikofl999^'20(^ChurchIlandbookofInstructions,pertinentdocumentsandcoveitlyphofographeda
Church Office building orsubsidy in Salt Lake Gify,fllah which expose and negate Mormon Chui^h'sclaim of divinity aii^l its
monopoly on''truth,"le,the conceide^l remnants of diures and letters written by former etirlyMortrion apostle Wi
McLellin diary and documents was the ii^in point of interest for convicted double muidereribomberMai'kllofniann^
attempt to deceive Mormon leaders to obtain in fraud by deception monetary reward to suppress truth ofearly Moririon history
unfavoiablelo current Mormon religion. For more info.
^ Documents ofMormon Churclisbillion-dollar investment in CityCreek Mall and Condominium in SLC, which may put Mormon
Church's IRS tax-exempt status in jeopardy if tfiere is verification of Ihe allegation the Church used tithe and offeriirg monetary
contributionsbythemembeisfofundfhepiojectunderfheumbrellaofta^exemptedreligiousTreedoin
^ Mortiion Church leadership's iiivolvenrenf in politics, such as corie,s^^ndericeloecclesi,^stical subordinates (hishoi^i^^^^^
altitude tovvaidss^inicsex civil rights 1^ other sensifiveissues relevant arid conceriiing to the leaders. As well as recorded
con^spondences between Mormon membeisofUfah legislation and Church leadeim on sensitive political issues for legislation puiposes
which may contravene the separation ofchurch and state,
^ Uncovered film or audio recording featuring the play with the actoi portrayingPr^itestant minister encouraged by SafarBLucifer
(portrayed by actor) to spread false doctrines fo attack all religioiis outside ofMoiinonrehgi^^n as'aboiniiiiible''^^^^^
qualified 'templerecommend"uudienee^inall of the existing temples prior toremovalinl990(almost like leaked Scientology
orientation vidco)T^^I
^

^^0^113^^^^^^^^^^^^^^^^^^^^^

^a(uTday,Jui^e01,2013 15:37:47 PM

18191
Page 9

Pran:The Most Wanted Leaks of 2009 - WikiLeaks

of 9

' Unearthed secret audio or video recording inside Mormon temple with the temple members swearing "blood oatli" before removal in
1990. UiU
" Documented Church leaders' and lay clergy's cover-up of physicaL'scxunl abuse and rape of minors by missionaries and members
without reporting to law enforcement in some cases j j j j .
' Older editiors of Church Handbooks of Instructions from the first edition up 112] for comparison to recent leaked 1968 (truncated).
1999 and 2006 editions.

Vatican
• The Index ofthe Vatican Secret .Archive. At preseni pre sci^ened scholars arc allowed to see t but not copy it (under scholar rule * I 6
hllp:.'''asv.Vatican va. civ lbiul iimm lilm)
Retrieved from "http:.'/ww\v.wikilcaks.oru. wiki.Dralt fhc Most Wauled Leaks of 2(109"
Categories: .Analyses United States | Buluiiri.i | O e d i Republic | Denmark | lisiiiiisii | I'm nee | fJcrnniny | Icelimd | luily | L at via j I iilwania |
Ncihcrland_s | Noiva\' I Poland | Romania | Slov.-iiia | Sua in | Turkey | Unrcd Kiiiadoir | Snil/crlaiid | Sweden j Malta | Portugal | Lu.veiubourii |
Figtljind I Helm uni | Cyprus | Canada | Sloviiki.i
Vlcrts
• Pauc

• discuss
• View Mniice
PtriMiniil lout*

' i^&.m
• Main Payc

• ("ouiUiv index
' Follow us
[ t3o 1 I Search
Whai links here
Related cliiiiiues
Special paces
Priiilahic version
Pfiiiiatieiil link
Flallr profile
follow us on Twit'
•teikjaixJkM!

PiKU (hi: paw
[Wjller this

7^
l^hitp^.j/\vilglci^.g^^^/^^^^

Saturday, June 01, 2013 15:37:47 PM

18192

Defense Exhibit G
7 pages
classified
"SECRET"
ordered sealed for Reason 2
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial

18193

Defense ExhihitJ
LOpages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial

18194

.^I^.^^DDDO^

^^^^^^^^l^^^^ttt^tf^^^

OOOf^

D^^^^^^^.EX^^^^'^^^^i

^B^^

^^^^v:^^

B^^^^D:
.^^A^^'^

18195

THE GOOD SOLDIERS. Copyright © 2009 by David Finkel. All rights reserved. Printed in
the United States of America. For information, address Picador, 175 Fifth Avenue, New
York, N.Y. 10010.
www.picadorusa.com
Picador'* is a U.S. registered trademark and is used by Farrar, Straus and Giroux under
license from Pan Books Limited.
For information on Picador Reading Group Guides, please contact Picador.
E-mail: readinggroupguides@picadorusa.com
Portions of this book originally appeared, in different form, in Tlie Wasliington Post.
Top photograph on page 118 courtesy of the U.S. Army. All other photographs courtesy
of the author.
Designed bj Ahby Kagan
The Library of Congress has cataloged the Farrar, Straus and Giroux edition as follows:

«
Finkel, David, 1955The good soldiers / by David Finkel.
ISBN 978-0-374-16573-4 (hardcover)
1. Iraq War, 2003- —Campaigns—Iraq—Baghdad.
History—21st century,

2. Battles—Baghdad-

3. Soldiers—United States—Biography.

Army—Military life—History—21st century.
Baghdad—History—21st century.

4. United States.

5. Counterinsurgency—Iraq—

1. Title.

DS79.764.U6 FS6 2009
956.7044'3420973—dc22
2009019391
Picador ISBN 978-0-312-43002-3
First published in the United States by Sarah Crichton Books, an imprint of Farrar, Straus
and Giroux

10

9

8

7

6

5

4

3

2

18196

JULY 12, 2007
. which was eerily
along a small girl,
1 burst into tears as

I told the officer in
id then laughed and
e mosque. Without
ir. went past a wideclimbed the steps to
thev heard gunfire,
Iv lower roof of the
ninutes later with a
7. ammunition, and,
bled lED.
been brought down
ng his own order to
lisgusted.
he needed to undersanction it, because
desk, which was getmust understand the
iiings. So did good
e of those, too. "For
jsj." he had read the
not ignore the cries

105

Iraqi religious leader, which said, in part: "Yes, O Bush, we are
the ones who kidnap your soldiers and kill them and burn them.
We will continue, God willing, so long as you only know the language of blood and the scattering of remains. Our soldiers love
the blood of your soldiers. They compete to chop off their heads.
They like the game of burning down their vehicles."
What a freak show this place was. And maybe that was the
explanation for the pile of weapons Kauzlarich was looking at,
that it deserved no understanding whatsoever.
Weapons in a mosque, including an lED to burn vehicles and
kill soldiers.
Unbelievable.
Shadi ghahees. Cooloh kbara. Allah je sheelack.
"S/iuiran," Kauzlarich said out loud to the general, keeping his
other thoughts to himself. He made his way to his Humvee to
figure out where to go next and was just settling into his seat
when he was startled by a loud burst of gunfire.
"Machine gun fire," he said, wondering who was shooting.
But it wasn't machine gun fire. It was bigger. More thundering. It was coming from above, just to the east, where the*AH-64
Apache helicopters were circling, and it was so loud the entire
sky seemed to jerk.
Now came a second burst.
"Yeah! We killed more motherfuckers," Kauzlarich said.
Now came more bursts.
"Holy shit," Kauzlarich said.
It was the morning's third version of war.

? thev helpless? Yes.
le explanation some-

One minute and fifty-five seconds before the first burst, the two

•w davs before by an

men on a street on Al-Amin's eastern edge.

crew members in one of the circling Apaches had noticed some

3//"/

18197

10^

Tli^COOO^OLOl5R5

"See all those people standing down there?"one asked.
"Confirmed," said the other crew member. "That open
courtyard?"
"P,oger,"said the first.
Everything the crew members in both Apaches were saying
wasbeing recorded. Soweretheircommunications w i t h t h e
2-16.Toavoid confusion,anyone talking identified himself with
acode word.The crew members in the lead apache,lor example,were Crazy H o r s e I ^ . T h e 2 1 6 p e r s o n they were commu
nicating with most frequently was Hotel2 6.
There wasavisual recording of what they were seeing as well,
and what they were seeing now—one minute and forty seconds
belore they fired their first burst—were some men walking along
the middle ofastreet,several of whom appeared to be carrying
weapons.
Allmorninglong, this part of A l A m i n had beenthe most
hostile. WhileTyler Andersen hadbeenunderashadetreein
west Al Amin, and Kauzlarich had dealt with occasional gunfire
in the center part, east Al Amin had been filled with gunfire and
some explosions. There had been reports of sniper fire, rodftop
chases, and rocket propelled grenades being fired at Bravo Com
pany, and as the fighting continued, it attracted the attention of
NamirNoorEldeen,atwentytwoyear old photographer tor the
P^euters news agency who lived in Baghdad, and SaeedChmagh,
Iorty,his driver and assistant.
Some journalists covering the war did so by embedding with
theU.S. military. Othersworked independently. Noor Eldeen
and Chmagh were among those who worked independently,
which meant that the military didn'tknow they were in A I A m i n .
The2 16didn'tknow,and neither did the crews of the Apaches,
which were flying high above A l Amin in a slow, counter
clockwise circle. Prom that height, the crews could see all of east
A l A m i n , but theopticsinthelead Apache werenowlocused

tightly o
shoulder
thirty-m
"Oh
looked a
"Hot,
crew m(
weapons
They
walked a
leading h
On the It
guided h
tioned fo
with a lo
one of w
appearec
crosshair
of those
"Yup.
six, Cra;
AK-47S.
It w a
burst.
"Rog(
of our pc
"All r
Thev
cling hac
structed
" I can
Sever
curve an

18198

^LILY12,2007

^'one asked,
^^ber. "That open

laches were saying
^ications w i t h t h e
tified himself with
B^pache,Iorexamhevwerecommu^ ere seeing as well,
and lorty seconds
men walking along
,red to be carrying
^adbeenthemost
ler ashadetreein
occasional gunfire
d w i t h gunfire and
niper fire, rooftop
ired at Bravo Com
ed the attention of
^otographerlbrthe
ndSaeed Chmagh,
wembeddingwith
^ntlv. ^oor Eldeen
ed independently,
^wereinAl-Amin.
w^of the Apaches,
I a ^low, countercould see all of east
werenowlocused

107

tightlyonNoor-Eldeen,who hadacamera strung over his right
shoulder and was centered in the crosshairs o f t h e Apache's
thirty millimeter automatic cannon.
"Oh yeah,"one of the crew members said to the other as he
looked at the hanging camera."That'saweapon."
"Hotel T w o s i x , t h i s is Crazy Horse One-eight,"the other
crewmember radioed in to the ^16. "Have individuals with
weapons."
They continued to keep the crosshairs on Noor Eldeen as he
walked along the street next to another man, who seemed to be
leading him. On the right side of the street were some trash piles.
On the left side were buildings. Now the man with Noor PIdeen
guided him by the elbow toward one of the buildings and motioned tor him to get down.Chmagh Ibllowed,carryingacamera
withalong telephotolens.Behind Chmagh were lour other men,
one of whom appeared to be holding an AK 47 and one of whom
appeared to be holdingarocket-propelled grenade launcher.The
crosshairs swung now away from Noor Eldeen and toward one
ofthose men.
"Yup,he'sgot one,too,"the crew member said."HotelTwo
six. Crazy Horse One eight. Have five to six individuals with
AK-4-7s.l^equest permission to engage."
It was now one minute and four seconds belore the first
burst.
"Pogerthat,"HoteI^6repIied."We have no personnel east
of our position, so you are free to engage. Over."
"All right,we'll be engaging,"the other crew member said.
Theycouldn'tengageyet, however, because the Apache'scir
cling had brought it t o a p o i n t where some buildings nowobstructed the view ofthe men.
"Ican'tget them now,"acrew member said.
Several seconds passed as the lead Apache continued its slow
curve around. Now it was almost directly behindthebuilding

18199

10^

TIi^COC^0 5 0 L O I ^ R 5

that Noor-Eldeen had been guided toward, and the crew members could see someonepeering around the corner,looking in
their direction andliftingsomethinglonganddark. This was
NoorEldeen,raisingacamerawithatelephoto lens to his eyes.
"He'sgotanl^PC."
"Okay,IgotaguywithanI^PC"
"I'mgonnafire."
But the building was still in the way.
"Coddamnit."
The Apache needed to circle all the way around, back to an
unobstructed view of the street, before the gunner would havea
clean shot.
Ten seconds passed as the helicopter continued to curve.
"Once you get on it, just open—"
Almost around now, the crew could see three ofthe men.lust
alittlemoretogo.
Now they could see five of them.
"You're clear."
Not quite. One last tree was in the way.
"Allright"
There.Now all ofthe men could be seen.There were nine of
them, including Noor Eldeen. He was in the middle, and the others were clustered around him,except lor Chmagh,who was on
his cell phonealew steps away.
"Eight'emallup"
One second before the first burst, Noor-Eldeen glanced up at
the Apache.
"Come on—fire."
The others followed his gaze and looked up, too.
The gunner fired.
It wasatwentyround burst that lasted for two seconds.
"Machinegun fire,"Kauzlarichsaidquizzically, a h a l f m i l e
away,as the sky seemed to jerk, and meanwhile,here in east

AlAmin,
street blew
dead or ne
Noor-Elde
The gu
and fired ;
haps tw el\
"Keep ;
There \
The trash .
A cloud ot
"Keep 5
There i
burst. In t l
and then h<
All o f t i
been fired.
lot was silt
down on w
ibie as somt
who was ta
It was C
He stoo
now he din
and minglec
tinued circl
"All righ
"All righ
"We hav
"All righ
"Yeah, w
"Yeah, Ic
"Good sl

18200

j L I L Y l 2,2007

^d the crew memcorner,lookingin
^ddark. This was
nolens to his eyes.

A l A m i n , n i n e men were suddenly grabbing their bodiesa
street blewuparound them,seven were now fallingto the ground
dead or nearly dead, and two were running away—Chmagh and
Noor Eldeen.
The gunner saw Noor Eldeen, tracked him in the crosshairs,
and firedasecondtwentyround burst, and after running per
hapstwelvesteps,Noor Eldeen dove intoapile of trash.
"Keep shooting,"the other crew member said.

ground, back to an
mner would havea
nued to curve.
ee ofthe men.^ust

There were nine of
:^iddle,andtheothimagh,whowason

Ideen glanced up at

There wasatwosecond pause, and then came the third burst.
The trash all around where Noor-Eldeen lay facedown erupted.
Acloud of dirt and dust rose into the air.
"Keep shooting."
There wasaonesecondpause, a n d t h e n c a m e t h e l b u r t h
burst. In the cloud, Noor Eldeen could be seen trying to stand,
and then he simply seemed to explode.
All of this took twelve seconds. Atotal of eighty rounds had
beenfired. The thirty millimeter cannon was now silent. The pi
lot was silent. The gunner was silent. The scene they looked
down on was one of swirling and rising dirt,and now,barely vis
ible as some of the swirling dirt began to thin,they sawaperson
who was taking cover by crouching againstawall.
It was Chmagh.
He stood and began to r u n . " I got him,"someone said,and
now he disappeared insideafresh explosion of dirt,which rose
and mingled with what was already in the air as the Apaches continued circling and the crew members continued to talk.
"Allright,you're clear,"one said.

p.too.
twoseconds.
^callv, a h a l f m i l e
^^hile, here in east

" A l l r i g h t , f m j u s t trying to find targets again,"another said.
"We haveabunchofbodies laying there."
"All right, we got about eight individuals."
"Yeah, we definitely got some."
"Yeah, look at those dead bastards."
"Good shooting."

18201

IIO

TIi^COOO^OLOI^R^

"Thank you."
The smoke was gone now and they could see everything
clearly: the main pile ofbodies,some prone,one on haunches,one
folded intoimpossible angles^ NoorEIdeenontopofthetrash^
Chmagh lying motionless on his left side.
"BushmasterSeven,Crazy Horse One-eight,"they radioed to
Bravo Company, whose soldiers were on their way to the site.
"Eocation ofbodies Mike Bravo Pive-fbur-fiveeighteightsixone
seven.They're onastreet in front of an open courtyard w i t h a
bunch ofbluetrucks,abunch of vehicles inacourtyard."
"There's oneguy movingdownthere, but he's wounded,"
someone now said, looking down, scanning the bodies, focusing
on Chmagh.
"This is Oneeight,"the crew member continued on the ra
dio."We also have one individualwho appears to bewounded.
Trying to crawl away."
"P^oger. We'regonnamovedownthere,"Bravo Company
replied.
"Poger. We'll cease fire," the Apache crew responded and
continuedtowatchChmagh,still alive somehow, w h o i n slow
motion seemed to be trying to push himselfup. He got partway
and collapsed. He tried again, raising himself slightly, but again
he went down. He rolled onto his stomach and tried to get up
on his knees, but his left leg stayed extended behind him, and
when he tried t o l i f t his head,he could get it o n l y a f e w inches
offthe ground.
"Do you seeashot?"one of the crew members said.
"Does he haveaweapon in his hands?" the other said,aware
ofthe rules governing an engagement.
"No,lhaven'tseenoneyet."
They continued to watch and to circle as Chmagh sank back
to the ground.
"Come on,buddy,"one of them urged.

"All you gotta
Now, as had
behind some bui
and when they w
glimpsed runninj
ond man was run
approaching.
"Bushmaster,
have individuals g
up bodies and w e,
The van stopp
around to the pas;
"Crazy Horse (
Ready to fire,
Bravo Companv as
who was facedow 1
the legs. The seco
back. Were thev i

help?
"Come orj! Let
Now the seconi
"Bushmaster, C
But there was ;
seat and the two m
front of the van to\
"They're taking
"Bushmaster, Cra.
They had Chma
"This is Bushmi
They were pulli
"Roger, we hav,
Request permissior
They were push

18202

JULY 12, 2007

everything
lunches, one
)t the trash;
•\ radioed to
to the site,
ight-six-onetvard with a

• ard."
5 wounded,"
lies, focusing
?d on the rase wounded.
vo Company
•sponded and
w ho in slow
? got partway
t h , but again
ied to get up
ind him, and
a few inches
said.
rr said, aware

11 1

"All you gotta do is pick up a weapon," another said.
Now, as had happened earlier, their circling brought them
behind some buildings that obstructed their view of the street,
and when they were next able to see Chmagh, someone they had
glimpsed running up the street was crouching over him, a second man was running toward them, and a Kia passenger van was
approaching.
"Bushmaster, Crazy Horse," they radioed in urgently. "We
have individuals going to the scene. Looks like possibly picking
up bodies and weapons. Break—"
The van stopped next to Chmagh. The driver got out, ran
around to the passenger side, and slid open the cargo door.
"Crazy Horse One-eight. Request permission to engage."
Ready to fire, they waited for the required response from
Bravo Company as two of the passersby tried to pick up Chmagh,
who was facedown on the sidewalk. One man had Chmagh by
the legs. The second man was trying to turn him over onto his
back. Were they insurgents? Were they people only trying to

help?
"Come on! Let us shoot."
Now the second man had hold of Chmagh under his arms.
"Bushmaster, Crazy Horse One-eight," the Apache said again.
But there was still no response as the driver got back in his
seat and the two men lifted Chmagh and carried him around the
front of the van toward the open door.
"They're taking him."
"Bushmaster, Crazy Horse One-eight."
They had Chmagh at the door now.
"This is Bushmaster Seven. Go ahead."

igh sank back

They were pulling Chmagh to his feet.
"Roger, we have a black bongo truck picking up the bodies.
Request permission to engage."
They were pushing Chmagh into the van.

18203

112

Tlr^COOO^OLOILI^5

"This is Bushmaster Seven. Roger. Engage."
He was in the van now,the two men were closing the door,
and the van was beginning to move forward.
"One eight, clear."
"Come on!"
Afirst burst.
"Clear"
Asecond burst.
"Clear"
A t h i r d burst.
"Clear"
Ten seconds. Sixty rounds. The two men outside of the van
ran, dove, androlledagainstawallassomeoftheroundsex
ploded around them. The van continued forward a f e w yards,
abruptly jerked backward, crashed into the wall near the men, and
was now enveloped in smoke.
" I t h i n k the van'sdisabled,"acrewmember said,but to be
sure,now c a m e a f o u r t h b u r ^ t , a f i f t h , a n d a s i x t h — t e n more
seconds, sixty morerounds—andthat, at last, was t h e e n d o f
the shooting.
Now it wasamatter of waiting for Bravo Company'ssoldiers
to arrive onthe scene,and here they came,in Humvees and on
loot, swarming acrossathoroughly ruined landscape.The battlefield was theirs now, f r o m t h e main pile of bodies,to the trash
pile with Noor-Eldeen, to the shot up houses and buildings, to
thevan—inside of which,among the bodies, they discovered
someone alive.
"Bushmaster Six, Bravo Seven," a Bravo Company soldier
called over the radio."l've got eleven Iraqi KlAs, one small child
wounded.Over."
The Apache crews were listening.
"Ah,damn,"oneofthemsaid.
"We need to evac this child,"Bravo Seven continued."She's

gotawoundtotheb
togetevac'd.OverB
^Well,it'stheirl
crew member said
"That'sright,"the
continued to circle ar
They saw more 1^
onto the trash pile, ri
ofNoorEldeensbod
"That guy just dro
"Didhe?"
"Yeah"
^^^ell,they'redea^
They watchedasi:
wounded girl and run
that was going to evaci
They watched ano
minutes later cradling
boy who had been di^4
father's, which was dr,
because that was how a
And then they flew
andmore Bravo Compa
^arch, the soldier w hc
hadclimbedaguardtc
^aid quietly and nervou
anIEDinallthisshitB
Since then, Marchh
ciallyon^une^^,wher
^r.Craig'smemorialserv
later, as March saw all
open,insides exposed,^
he would later explain-

18204

jULYl2,2007

Idling the door,

113

gotawoundtothebelly. Doc can'tdo anything here.She needs
togetevac'd.Over."
"Well, it'stheir fault for bringing their k i d s t o a b a t t l e , " a
crew member said.
"That'sright,"the other said, and forafew more minutes they
continued to circle and watch.
They sawmore Humvees arriving, one of whichdrove up
onto the trash pile, right over the part containing what was left
ofNoor Eldeen'sbody.
"That guy just drove overabody."
"Didhe?"

t^ideofthevan
theroundsexrd a few yards,
^ar the men, and

"Yeah"
"Well,they'redead,so—"
They watched asoldier emerge from the vancradlingthe
wounded girl and r u n w i t h her in his arms to the army vehicle
that was going to evacuate her toahospital.

^^aid.buttobe
ixfh—ten more
w a^ the end of

They watched another soldier emerge from the van a few
minutes later cradlingasecond wounded child,this onealittle
boy who had been discovered underabody presumed to be his
father's, whichwasdrapedovertheboy,eitherprotectivelyor^
because that was howadead man happened to falL

mpanv'ssoldiers
f^umveesandon
cape. The battlehe^.to the trash
^ d buildings, to
thevdiscovered
company soldier
^. one small child

continued."She's

A n d t h e n t h e y f l e w o n t o a n o t h e r p a r t o f A l A m i n as more
and more Bravo Company soldiers arrived, one of whom was ^ay
March,the soldier who on the battalion'svery first day in Iraq
hadclimbedaguardtower, p e e k e d o u t a t a l l o f t h e t r a s h , a n d
said quietly and nervously,"Weain'tever gonna be able to find
an IED in all this shit."
Since then, March had learned how prophetic he was, espe
cially o n j u n e ^5, when an EPP killed his friend Andre Craig,
^r.Craig'smemorial service had been on july7,andnow,five days
later, asMarchsawallofthebodiesscatteredaround, blown
open, insides exposed, so gruesome, so grotesque, he felt—as
he would later explain—"happy. It was weird. Iwas just really

18205

^
^
114

Tlr^COO0^OL0ILR5

very happy. Iremember feelingsohappy. W h e n l h e a r d t h e y
wereengaging,whenlheard there'sthirteen K I A , I w a s just ^0
happy,because Craig had just died,and it felt like,you know,we
got'em."
As the Apaches peeled off,he and another soldier went through
agate in the wall that the van had crashed into and against which
Chmagh had tried to take cover.
There,in the courtyard ofahouse,hidden from street view,
they found two more injured Iraqis,one on top ofthe other. As
March lookedclo^er at t h e t w o , w h o m i g h t h a v e b e e n t h e t w o
who had been lifting Chmagh into the van, who as far as March
knew had spent the morning trying to kill American soldiers, he
realizedthat the one onthebottom was dead. But the one on
top was still alive, and as March locked eyes with him, the man
raised his hands and rubbed his two forefingers together,which
March had learned was what Iraqis did when they wanted to
signal the word^f^r^^^.
So March looked at the man and rubbed his two forefingers
together, too.
And then dropped his left hand and extended the middle fin^
ger ofhis right hand.
And then said to the other soldier,"Craig'sprobably just sit
ting up there drinking beer, going, ^HahlThat'salllneeded.'"
And that was the day'sthird version of war.

As for the fourth version, it occurred late in the day, back on the
EOB, after Kauzlarich and the soldiers had finished their work in
AlAmin.
They knew by now about Chmagh and Noor Eldeen.
They had brought back Noor-Eldeen'scameras and examined
the images to see i f h e wasajournalist or an insurgent.

They had g
Apaches and ha
They had lo^
AK47sandari
Iraqis.
They had r
prefaced the ki
dierswerebeir
there,that thej
ons, that the .^^
when it fired at
the van with th
onehadacteda
Hadthejou
That would
Asfbrthe r
insurgents or ju
They would
Whatthevi
soldiers, and th
"Crow.Pavr
walk to the Dl
^Those guys die!
Inside t h e f
ference, which
before.
"Ourtoppr
tion,"Bushwa^
aroundBaghda^
Iraqi forces toe
takerootincc
country.

18206

jULYl2,2007

^ n 1 heard they
^lA. Iwas just ^o
:e.vouknow,we
ierwent through
nd against which
rom street view,
ofthe other. As
vebeenthetwo
:^a^ far as March
^can soldiers, he
But the one on
d^ him, the man
together,which
thev wantedto
twoforefingers
Ithe middle fin
probably just sitalllneeded.'"

115

They hadgotten the videoand audio recordings f r o m t h e
Apaches and had reviewed them several times.
They had looked at photographs taken by soldiers that showed
AK47sandarocketpropelled grenade launcher next to the dead
Iraqis.
They hadreviewed everything they could about what had
prefaced the killings in east Al Amin, in other words—that soldiers were being shot at,that they didn'tknow journalists were
there,that the journalists were inagroup of men carrying weap
ons, that the Apache crew had followed the rules of engagement
when it fired at the men with weapons, at the journalists, and at
the van with the children inside—and had concluded that every
one had acted appropriately.
Had the journalists?
That would be for others to decide.
A s f o r t h e m e n w h o h a d t r i e d t o h e l p Chmagh, werethey
insurgents or just people trying to helpawounded man?
They would probably never know.
What theydid know: thegood soldiers were stillthegood
soldiers, and the time had come for dinner.
^
"Crow.Payne.Craig.Gajdos.Cajimat,"Kauzlarichsaidonthe
w a l k t o the DEAC. "Rightnow? Our guys? They're thinking,
^Those guys didn'tdie in vain.Not after what we did today."
Inside the DEAC,theTVs were tuned to Bush'spress conference, which had begunin Washington just a fewminutes
before.

dav, back on the
edtheirworkin
Eldeen.
^and examined
.urgent.

"Our top priority is to help the Iraqis protect their population,"Bushwas saying,"sowe'velaunchedanoffensivein and
aroundBaghdadtogo after extremists, tobuy m o r e t i m e f b r
Iraqi forces to develop, and to help normal life and civil society
takerootincommunitiesandneighborhoodsthroughoutthe
country.

18207

11^

Tlr^COOO^^LOI^R^

"We're helping enhance the size, capabilities, and eflectiveness of the Iraqi security forces so the Iraqis can take over the
defense oftheir own country,"he continued."We're helping the
Iraqis take back their neighborhoods from the extremists. . ."
This was the fourth version of war.
Kauzlarich watched as he ate. " I like this president,"he said.

leven
tackle
^
Eo
sitting i n a d
located ona
butheshool^
himanddov
hisback.Thi
soldiershad
d r i n k o f chc
called Boom
quickly over^
toon,Iiftedh
for the slaps
and yelled ar
Open-hande,
until he was
entire midse
they stop an^

18208

7/7/2013

li^lnU Wl N w r EkjiTii, s%li(j hjsliuuMcr and WOK i-cnlcrftl in lho crtisshair.s of tlu- .\|iJch« V
lliirtv-niillimvlcr autonulic canixm.
"Oh vojh," oni- o l thf t r c w mi'mhoni said ti> l k ^ithiT In-,
okcit at Ih.- hanging *-jincr.a. "That s .1 «..ip"1 lot* I Tv.o six, this is Cra/v Hursc One i-ij^ht." d i r nlfnT
i n 11 mrmhr-r radio, d In to t l i , ? Ift "Havi- indi\irlo,ils widt
f l 11, n m i iiiu, ll 1(1 let |> l l h i-ri»cih.itr^ nii Ni^ir-Hlilivn as iuu'jilUil a)nn^ OH- *lri'i l
\ l I " JIIMIIKT man. who t miMl m Kk'jdiiigliiiii O n lliv r;v;lit siik mir.i- irj^Ji pi ' i ,

"Oil vcah," ism- lA l\ic LTCLX menibors K.ii(1 t i , 1 lit otVic r ;t.-. iio
li>i>k«t .It tho li.rnglng t Jincr.v "Th.il s ,i nv.ijnm."
' 1 lord Two six, thi.t Is iii- i i ^ L c t i n nilu r
< ri'irv iiu-iiihnr r.-itM\Vf.1j10l1S "
ll

iKiw oiir in ill 111 r and Inur Mioml^ 1^ lore ihc hrst

'It,.git (h.«."HoUl 2-6 r< t>)iL-d. "Wl- Ito^c no piTMiniivl i-.ist
..four iHj.silio... sn you .iru iWv to
Ovx-r.'"
"All riglil. wv'H IK- LU^^gn,^." Uii oth.r cri-tv iix-rtiUr scid.
J I K V tuuklii'l MigJiK- \ v i , ln>"r\cr, tivau-c tin- .A[).ii.hi-'s ttri Jiiig Iwd bruughl it i n n yoim " IKTC soint- liuililini;s now t>h"ilrwUvd tho vii;iv o f t h e nii-n.
"1 iMn't gvl llii-ni inHv," il cri-w mcn hcr Siid.
Si-vcni) Mt^jniN p^Mcd a: the lead .Apache continued its slow
t ill VI- ^roun.1. Nnw it w.k aliiK-.M iliroaiy hclun,! the l.udding

DEFENSE EXHiBIT^[^Ibi idAntitic&tion
PAGE OFFERED:
PAGBVIDMITTED:
fAGE
of
PAGES

18209

7/7/2013

"Yup, hc'.i, j2nt oiic, t." thi-1 n w nu t>ilisix, C.TX/.\ Hor.sc- On, right

Have inx- to $ix iinli\ i(ludl> wii!i

.'\ K 47s, Request pcrmissitin to fugjge."
It

now OIK- miiuito and four seionds bil'ore ihu first

burs!.
"Rtjger thai," Hotel 2 6 replieof our position, sn you are free to cngjge. Over."
"Ail right, we'll Iw eiiL'dg'iig,*" tlie other erew member sjid.
a p p e a r e d I n he h o l i h i i ^ j n u k e i p r t i p , l k *l ^ n n.ule I . I U I K I I I I
iTosrihairs K w u n g now

I In

awav f r n i n N i K i r 1 h h i n a n d t o w a i d o i x

^ ( i l Ihosi- m i n.
"Yup. he'-

m i f . t(H>," t h e i r i - « n i t n i l i e r w i d , " H ^ r t i t T w o '

Hix, C r a / v l l t j r M - O n *

, ighi

Hatt- l i i t - t o *ix i i u l i * i d u a l *

with

,-\K 47)1, K n | u c \ f p i T m i i t i i o n t n < i i g a ^ e . "
ll

was iKiu

nm- minute and four

" R t i ^ r t ) u ( , ~ H o t e l ? 6 n-plii-fl

s t K i n t U txli»M- i h i '

hrol

" W * liave I K I | * r ^ m n e l c a i t

l i t ' o u r [ M i x i l i i N i . Wl v o u a r e f r e e l o e n i j a g i - . O i r r . "
" A l l r i g h t , w e ' l l he e n g a g i n g . " t h e o t h e r e r e w m i - n t t x r M K I .
I V > l u u k l n l e , i g . p - v e t . h i - w e x c r , I^-eaUM- t k - A [ » a e U - V e t r L l i n p h a d I * r o u g h t it t n a p o i n t w h o r e « i m c b u i l d i n g , n o w
i l r m te*! the % iew o f t h e m e n .
" I eati'l p t tlveiii m m . " a i r t - « n w i i i b c r said,
St-vera! seco m l : p a x w d a» t h e load .A pat he c o n t i n u e d I t ; Klow
.sir»e arourvl. N . m

:i.«

it w a s a l m o s t d i r e c t l v f x l u m t t h e

budding

It:,. i ; i ) O T ) v l t l t ) I E H <

t h a t N o o r l-hleen had heen g u i d e d t o w a r d , a m i the i r e w i n e m
b e r s l o u k l M-« w m i e o n e j X T r i n g a r o u n d lht h e i r d i r e c t i o n a n d l i l l i n i ^ iw m i r t h i n g l u n g a n d d ^ r k

Thi*

S « x * F.ldt i n , r a i s i i l j i a i . i i n e r a w i t h a t r k ^ i l l o t n lens t n h i \ eve*
^He\g,manK|X;
- O k a > . I g i 4 a g u y w i t h a^TIS^U T m ^Hinna l i r r . "
B u t t h e b u i l d i n g » as s t i l l i n t h e
"Goddamnil."
T h o . \ p a t ho n o o d o d ii> t i r i le all l h o w a v arouru
u n o b m r m tod view ol the s t r e e t , holore the g u n n e r v
t loan * h o l .
T o n set o t i t i s [uvM-d as t h e ht-lk t ^ t e r i u n t i n i n ' i t t o l u r v v .
" O n o e v o u g e l o n i t . ju?-t o p e n

"He's g i i l j n R P G . "
" O k a y , 1 got a guy w i t h an K P G . "
" I ' m gonna lire."
Bul the building w as still i n lho wav.
"Goddamnil."
"Come on

hre.

T h e o t h e r s f o l l o w e d his

liT.t: ami looked un,

The gunner bred.
I l w a s a i w e n t v r o u m l b u r s t t h a t lasletl t o r t w o soconds.
" . M a e h i n e g u n h r e , " K a u / l a r k - h said q u i y / i t a l h , a h a l f m i l e
a w a i , as t h e skv s o r m o d t o j e r k , a m i m e a n w h i l e , h o r o i n oast

18210

7/7/2013

"()tir«' yoii get .Mniost around now, the crew cinM >A little more to go,
Now thev eowlrl see five o f t h e i n .
"You're clcir."
N
in llie way.

"^llriglil."

'
setiHitIs
"Onto
.\lmo*t
a littk

|)asM'c! as the

liolitoptei

vou get arourxl

now, th,

'

crew

'
rould

,
M O thtt

t- ol the moii

just

mi ltr to ff l

N o w l h e \ K H i I t t si-e lise o l i h o i i i
" Y o u ' r e clear,"
NiK- I asi ( r o e was i n the w a \

"\llrigln.~
Ihcre

N o w all o l I I K - n K i i o x i k l U- s « - n . T h e r e wen,* n i n i -
I h e m . t i K l u d i n g ' \ l i x * r H i k - e n . H e w a - i n the m u k l k , a n d l h o o l h
o n w o r e i l u s i o r o d arouiwl i i i t n , o x i o p i l o r O i n i a g h , w h o was o n
his f o U p h o n o a l o w steps awav.
" I i g h l e m all u p . "
O n e set o n d l>elore the h r v I n i r s t , N o o r - f l t l o o n glaneoH u p a l
l h o .Apache-.
"Com*- on

hre."

T h e 44 hers l o t t o w e d his g a / e a m i I r x i k o d u p , t r m .
T h e g u n n e r It r o d .
l l svas a t w c n t v r o u t u ! b u r s t t h a t lasted l o r t w o i c e o n c k .
" M a t h i n r g u n H r e , " K a u / l a r i t h said q u i z / l t a l h . a h a l f m i k
a w a v . as i h c skv s e e m e d t o ( c r k , a n d m e a n w h i l e , h e r o m cast

TK.- i ; i n m < i i i D i E K S

IIS

that N'oor-I:lileen had h o r n g u i d e d t i r w a r d , and the i r e w

rrHin

b r r s c o u l d set s o m , i w i r p t n T i n g a r o u n d t h o l o r n r r , l o o k i n g i n
their d i r e c t i o n and l i t l i t i i ; s o m e t h i n g long and dark

fins

w,is

"Come on- hre."
The others Ibllowetl his gizc and looked up, too.
The gunner hred.
It was I twi-ntv-round burst tiijt lisu-d lor two seconds.
ti as t h e h o U o p i

T e n se,
"OrKt

VIlU gel (til i t . just o | x n

.Almost a r o u n d n o w . t h e < r e w i m i k l ssi- t h i t

o f ihe iiHti

I

a l i t t l e Miore t o go
N o w t h e \ i i H i l t l st-
ol'them

"You're clear"
N o l q u i t e . O n e last t r e e w a * i n d i e *
" M l right."
l i i e r o , Ntiss all them, imludin^ Noor thk-en

H e was i n the m u k U i ^ n d t h e o t h -

e r * w o r e c l u s t e r e d a m u m i h i m . e x i ^ i > l tor C l ( m a i ; h . w h o was o n
his t r i l phom- a lew- s t e p s ,
" I i^hl

e m all up."

O n e S O I O I K I Ix-li*re l h o t i r s ^ f A s i , \ o o r 1 ' k l o r n g l a n c e d u p at

C o n u - iT>

hre."

T h o The gunner hred.
l l w a s a t w e n t y r o u n d b u r s t t h a t lasted f o r t w o s o c o n d * .
"Maehine gun

fire."

K a u z l a r i c h said q u i w k a l h , a h a l f m i k

a w a v . as t h e skv s e e m e d t o | e r k . a n d m e a n w h i l e , h e r e i n cast

18211

7/7/2013

.41 .4min, nine nn n w, re suildenlv grabbing tii. it U-tn . ,
slreetWew upartiuml them, seven w^Tt now tailing lotht gr ,un.
dead or iiearls ikml. and two wen running au as C'hina^h and
N.Kir Hileni
i'W- gunner saw Nonr-I:kleen. Iiaeki^l him in the crosshair-,
anil l i n i l a stvond twonts rouiul liursi, and alter running perhaps twohr steps, N"Keep shooting," ihe othtf < rew meml>c-r sau
r rh* rt w asa two M cond }Mkis^ . ami then came i h ^ h i r d buisl
The Trash all ariHtixl where Noor Fidet-n la\ tat oilosti^w-iipi, il
A clouil ot dirt .ind dusi rose into the air.
"keep sIxKrtilig."
1 hi ft was a one seniml pause, ami then t aim llie loiirtli
hurst. In the dooil. Nimr [kleon could ht seon t n ing li> sl ami,
ami then IM- sinijih seemed to expl>Hli,MI ol this t'Hik twohr xexonds, A total ol e i c s rotimls had
)lot was sikiil, I he gunner was *ih nl The sct-m' thev liKiktij
tlitwn on was one ol sw irling and rising d i n . and i>ow, ban-lv vis
iTiie nl the- swirling tlirt hegan In thin, ihov sjw a tx-Aoii

"Keep .*i^htincf, ihi nllirr * row inimlHT saul.
Thvvv Wis A iwtj M rntui ptxu>t^. JIKI then lamc the thini hui si.
The trish all anmnti uhrn- Nr-Fldfrn
facoclcmn *TU]>t< ti
A cloud of dirt and dust rose in(o the air.
*KK rp •ihiuiTiii^."
"Yeah. l,Mik at thu\e ih ad bastanis."

"All right, vou'n^ rli-ar,""oin- saki.
"All right, ['m just trvinjj tn iiiui urguts agam/ another said.
"Wc have a Kunrh o( h laving there.**
"All right, \\"Yeah, we "Yeah, look at chosv dt arl bastards.**
"Ckifiul slnHffii)^ "
\ i l ol lti,st,,,,K iwebe -et'.nd' \ t.-lai ol eiijhu roiimls l i * l
btentirril I IH- thirls millim.irr lann.xi wa\ o,,w sjl, „l. I h pi
|i« was siknt. The gunner was nk nl The sctm- I Ins VKJcetl
tVmn on was ont ol sw irling and rising dirt, ami noss. Iiarelv v(s
ible as some ot the swirling dirt began In thin, ttn-s saw a [x-Aon
sslio svas taking tos'cr In t nmihing againsi a wall
It was Chmagh.
He sUxxl ami began In run. " I got him," s'lmeonwAd. ami
now he ilisappeared insiile a fresh and mmgloil w ith w hat w a* alreads in llie a i ^ ^ h e Apac ho
aiiKtl tire ling and tht t ri-w memliers^mtmueil lo talk
"•Ml right, nm n cleai." oni saiti
"All right, I'm just i r u n g tohml targets agam." another said.
"We hase a bunch i*l hotlie, U\ ing there.'
"Mi right, we got aliout eiglil imlivtiluals.''
"Yeah, we ik-tmitoU got sunn "
"Yeah, look at ihos"Good shtMJting,"

18212

7/7/2013

1 III

I h r ( i O d U S O I n i l HS

"Thank s"ou."
The smoke was gone now ami ihty ..HiUl
tseryihing
ckarlv the main pik nl boilii-s, some prone, on* on haiirx bt s, one
lokkd into impossihk angk s; NiKir Klcken nn ti>|> of I I K trash;
I h m a ^ K ing imiTlonk ss mi his k it s("Kdslimastft Vseti. C'ra/v Horss t )nt eight," IIK-\ radHHtl In
l^sti (. nmpaiii. wlwise- sotiIters ssore on their was lo IIK- site.
*Location of hmtirs Mike- Kra* i Use four liso oighl eight tXKrhov'ro on a street in front of an o|x n counvard wilh a
bunch ol Uuo trucks, a hunch ol vehicles in a courtsard."
- There s one guv moving tlown there, hut he's wounded."
snmeiMie nciw saul, h^Jcmg .k.wn. scannmg the btxlies, locusmg
on Chmagh.
"This is One-eight," the crew member toniinut-t) on tho radio. "We also have tme indiviilual who a{>|X'ars to be wnundtxl.
Trving lo "Ktiger Wore gonna ii.ov. tlown tht ie," Bravo Companv
n-plit-d.

"Hu'sltin,)\lt*r Sc'u-n. (_ uwv Ht>r>t O I K figKt," IIK'\ r*iftl tn
Br4\o Companv. whosu wUficrs wcrt- on i h f i r wav to the site.
*'L»M.alifin tjf IKXIKX Mike Hraui Fivf liwr five fighl-cighl six-one
seven. iTicy're 4»n a street in front of j n t>|H'n tourtvanl » i t h a
bunch of blue truck:^. d bunch ol vehicley m a courlvard."
-T heru's one guy moving down ihere, ijut he's wsomeone now saki, looking tlown, scanning the bodies, tocusing
on t'hmagh.
. b,i,lil\.",.oeol lh,it

(Kii> SOI i m Hs

"1 hi.* is One-right.' thi- i rrw ininibrr tiinlinurd on thr radio. "Wc also have one individual who appears to IM- woundcd.
Trving to crawl away."
"kogcr. WV"r Companv
ri-plii-d.
r

Wc II i'f.is< lilt , rhf

\pai hi- i icu r< sp
"This is One-eight," the , rew member tonlinued on the ra
dio "Wo alsti have one indivitiual who appears to U ' wtiuiKlrd.
I rv ing to crav%I awav,"
"Knger We're gonna move down ihi-ie." Hravo Ciini|>any
rqtliecl.
"Rogf-r We'll it-aso hr,-," the Apache crew rotfMNitkcl ami
Iimiinuetl lo wauh ( limagli, still alive somehow, wlm in slow
million stimeti in K trving to push himselfup Ht goi jurtwav
ami eollapstil H . i r k i l again, raising himself slight Is. Intt again
IH' wen) tkiwii Me 114k11 onto his stomach am) Hied In get up
on his knees, hut his lefl log slavrti exleiitlod tvhiiwl him. atitl
when in- tried lo lift his hea>l. ht- eon Id gi-t it onU a less inches
off tin- ground
"Dit vim si-o a siiotr"tme ol the crow nienil>ers said.
" I )in-s he hau I vie.i|Min in hii. hands?" ths- otJier said, aware
iA the rules governing an engaiymotit.
"No, I haven't seen one vet "
I hov iontimiiil lo waldi aoti lo > irt k- as C hmagh sank liac k
lo ihc- ground
"ItMHO no. liuiklv." iwie of thoni urged

18213

7/7/2013

IIU

t h r ( i O C I t ) M > l l m RS

TW
t Icjrlv

-mikv

pmc

n..»

m l

ll«v

..iiil

„ ,

.-i.rvlhin^

t h , ' n u m pile n l Ixxlw^s, w m , p n i n r , , t n i i,n hanra ht-,, nut-

I n l i k ' d i n t o i m p i s ^ l h l , ,int^li'.; N i ^ i r f-.ltlri'n n n t n ) , , i l i l k

Ir.iUiL

I h i i i j ^ h l\ .iiji i n n r i o i i l , 1 , 1 1 h i . I, l l si,I,

"Du vou sft' "Does he han' a wea|>on in his hands?" the other said, aware
of ihe rules governing an engage ment,
"No, I hav en't seen one vet ."
Thev koiilinui d to vvateh and to lirtle as Chmagh sank l>aek
to the gKniml
"Cmiif I in, budilv." one ol I hem urged
l i as, l i r e ,

"""S"onlinuetl to v

the

A p a i N - > n w U S[MIOIW'
h ( h m a g l i . si i l l alive sonit h o w . w l m in slow

m i l l i o n s, o m o i l t o ho t r v i n g t o p u s h h i m s e l f u p
and t o l U p s e d . I h
IH- w e n t t k i w n

Ht- got p a r t wav

t r i e d a g a i n , r a i s i n g h i m s e l f s l i g h l l y . I m l again

Me m l k i l o n t o his s t t m i a c h a n i l t r i e d t o got u p

o n h i * I noes, l i u l his loft l o g stavetl e x t e i K l o d b e h i t x l h i m . a m i
II he t r i e d l o l i f t h i s h o - h i , h e c o u k I get it I H I K a It w i n c h y *
I lie g r o u n d
D o v o u see a s h o t ? " t m e o f i h e c row m e m l v r s s a i t l . *
" D i M s ho have a w e a p t w i i n his harwls?" t h o o t h e r s a i t l . a w a r e
o f the r u l e s g o v e m i n g a n engage-mont.
" N o . I haven't soon o n e v o l . "
I hov t o i i l i n t i , l l l o w . i t t h a m i t o t Ire k as C h m a g h s^nk

kuk

l o the g n n i m l
"(_''imo n n , U i d t K , " oiH- o f t h o i n u i g e i l

l u n i ; , ion/
• ^ A l l v o u g o t t a d o is p i c k u p a w e a p o n , " a n o t h e r s a i d .
N o w . as h a d h a p p e n e d e a r l i e r , t h e i r c i r c l i n g h n * u g h l 1
I v h i l w l s o m e h u i k l i n g s t h a t o b s l r i K l e i l i h c i r v iovs t*f t l x •
a t u i w h e n thev w e r e n e x t able t o see C h m a g h , s o m e o n e t h t v h a t l A
glimpsed running up iht

.strort w a s c r o u c h i n g o v e r h i m . a set

o n t l m a n w a s r u n n i n g t o w a r d t h r m . a n d a K i a )>as«.-iigtT v a n w a s
api^rtiaching.
"Du-shmasier. Crazv

H o r s e . " I hoy r a d i r x d i n u r g e n t l y .

havp i n d i v i t l u a U g o i n g t o t h o s < r n o . I o o k s l i k e possiWs

"WV

pickmg

up bodies and weapons. Break
T h r van stopped n o x l t o C h m a g h .

f h e d r i v e r got o u t .

ran

a n t i n t I I n lh« passenger s i i l e , a n d sliti o p e n t h e t a r g o t l i w i r

''.All vou gotta d o is pick up a weapon," another said.
N o w , as had happened earlier, l l i i ' i r c i r t l i n j ^ hxDUght t h e m
l>ehinatKl when they were next able t o sec Chrnagh, someone they hal?limpM.'d r u n n i n g up the street was c r o u c h i n g over h i m , a sec
ond m a n was r u n n i n g t o w a r d t h e m , and a K i a passenger van was
approaching.
T h e v h a i l C h m a i i h .it t h e t k m r n o w
" T h i s is B u s h m a s t e r St-von. ( i n a h e a d . "
T h o v w e r e p u l l i n g C h m a g h t o his loot.
" R o g e r , w e have a M a t k k f i g t , t r u c k p i c k i n g u p t h e h o t l i o : ,
Rocfuest p e r m IS) Kin t o e n g a g e , "
Tl«--^.rt,p„li,n).ehnuel,im,..l..v4n

18214

7/7/2013

l U l l I ! . }t>0'i

II I

"All vou gotta do IS pick up a weapon." annther said.
Ntiw. as had happened earlier, tlwir eire ting brought them
iK-hiiitl some l>uiktinjis lhal obstrucU-il ihetr view of tlit street,
and wlion thev were m-xt able to see Chmagh. some,me they had
glimpsed running up lho street was crouching over h i m , a w onti man vvas running toward them, and a K u passvngor van was
apprtiaching.
•"Bushmaster, Cra/v Horse." thev radioed in urgently "Wo
t a v r iiKlividuals going to llie

, no. 1 ooks like posidbly picking

up bodies and weapons. Break
Th, van stopped next to Chmagh, The driver got out. ran
ariHim) lo th« j>assonger side, ami sUl open tho c argo th>t>r.
"Cra/v Morce One-eight. ReRoads to Jire, thov waited tor tiK rccjuircd ivs(>nn.so Irom
Bravo Companv as two of tho paswrsliv Irietl to pit k up Chmagh,
who was laceilow n the- legs rho st-Kiml man was trving to turn him over iMito his
back. Were ihev insurgents.' Wore ihev |xi*pk onlv trving to

"lJu.shmaster, Craz\ Horse." thev radioed in urgently. "We
have individuals going to the scene. Looks like possibly picking
up bodies and weapons. Break
The van stopped next to Chmagh. The driver got out, ran
anuind to the passenger side, and slid open the cargo door.
"Cra/v Horse One-eight. Request permission to engage."
Thov were pusliiiig Chmagh into tho van.

"All vou gotta do IS pak up a weajxin." annthrr said.
Now. as had happened earlier, tlwir circling brnught ihrm

"Come Now the second man had hold ol Chmagh under his arms.
"Bushmaster, Cra/v Horse Orc-cight,"* the .Apache said again.
But there was still no ivs|>*mse ai the driver got hack in his
seat and the two men lifted Chmagh and earned him around the
front of the \an toward the open door.
"Thev're taking him "
the logs. Tho set ond man was trving to turn liini nvei onto his
hack. Wore thov insurgents/ Were thev pocyk i>nl\.

Jtelpr
^'Cotne on' Let us tim}!.''
Nim- lho SS i-nnil man had hold ot Chmagh muter his arms.
"BushmaslcT, Cra/v MiWTo One eight," the \|MCIK- said again
But there vs js still no ri'S|>on!ie a.v tho clnver got Iwck in his
scat and the two tm-n lilti-d Chmagh and earned him around tho
front of the van low art! the ••»pen dot>r.
"Tlvov're taking him "
"JJuJimd-iicr. Od/i fA'rw

tiffin "

Thov had Chmagh at the tkxir nov*.
"This is Bushmaster St vtn, l i o ahead."
Thov wore pulling Chnv.»gh lo his k f t .
"Rtigor, we have a Wa* k bongo truck pkking up tho U d l k i .
Retjuest permission Ui engage,"
Thov were puslnng Chmagh inio the- van

18215

7/7/2013

" M l vou gotta do IS pick up a weaptm," anothpr u k l .
Now. as hati happened earlier, tlioir circling hrougbl them
Ix-hiitd scnm- buildings lhal tibstriKted iheir view ol tin siroot,
and VVIKII thev were next able lo see Chmagh, stimcoiie th, v had
glimpsoil running up tlx street was crouching over him. a soc

•MMMHMIIIM

-p*

'Bu.thma.tter, Cru/j- fhric i h r ny'.'i '
They had Chmagh at the door now.
"This Is Bushmaster Seven. Un ahead."
They were pulling Cliliiagh to his lect.
"Roger, wc have a Ula< k bongo truck picking up the lioslies.
Request permission to eng.lgr,"
Thev were pushing Chmagh into the van.

"fi

Now the second man had hold nl Chmagh uniler his arms

"Bushmaster. Cra/v Horse One eight." the .Apaclio said again
Bul there vs as still no response as the driver got Iwck in I
seat and the two men l i f u ^ l Chmagh and earned him a
front of the van inward lho ojien door.
"Thev re taking him "
^'Bifv/ujkitffr, C>ii7i H.mr fW eiffhi '
Thc\ had Chmagh at the door now.
"This is Bushmaster Seven t i n ahead."
Thov wore pulling Chmagh to his k-oi.
"Roger, we have a hiatk bongo truck pkking up the IUKIM-S.
Rixfiiost perm ISS Kin to eiigagi."
Thov were puvlnng Chmagh inln the van

11,. i . - . t M .

sotDMKs

Thi^ is Hushnuslor Seven. Roger. Lngage."y

Hi was in the van now, the two men were t ^ ^ n g the ilorir,

/ a n d tin van was beginning to move lorvvanl.
/
/
y
/
y
/
^

/
/

^k

"One eight, i k a r "
"Cmie on!"
A lirst Imrst
"Clear."

^k
^ k
^k

A secximi liurst.
-Clear."
A thirtl burst.

"Ckar."

^k
^ k
^k

\

1,1, M'tomU Sixty roun,ls l l i , Iwo nu n iHit.nl,- nl ilu- u n

-This is Bushmaster Seven. Roger, tngage."
He ».js in ihe Mn now, the i w o men were elosing the door.
and the van was h, ginning u» move lorvvard.
"()rie eight, i k . i r , "
"Coine on!"
.\ lirst 1 Ml rsi
-Clear."
A second hurst.
-Clear."
A ihii d hursi.
••Cle.ll."

"We need to ovac this < lii)d," Rravo Seven conimut il 'Shi *

18216

7/7/2013

" I his is Bushmaster Seven Roger, tnyage-."

"Bushmaster Six, Brjvcalled over the radio. "I've got eleven Iraqi Kl,\s. one small i hild
wounded. Over."
The .\j)ache crews w ere listening,
".\h, damn," one "We need to evac this cliiiil,' linivo Sevin fontinued. "She's

ahr j p i h jo t keil Ivii kw ard. cTashc-sl into the > II nojr the tiKii..
ivt lo|M'tl in smoke.
I ihiiiL the

n's disabk-d," a trevv mom hor saitl. IMII lo Ix
hmrih hurst, a Kllh, ami a sixth

sec I wills, sixlv

ton mure*

re rmiiHh - and that, at last, vvas the end ol

tlx shotiting.
mall01 ol waiting for Bravo Companv s soldiers
ami lit re thev came, in llumvee-s and on
to arrivx on tin- siene.
s,e
liKit. swarming dtn , a tlxiioiighlv ruim-tt lamlscapt- The- lulllo
hold was theirs nov. from the m.iin pile of htxlios. to the trash
pile with Noor Lkken, lo ihc shot up houses and buiklings. to
the van inside of which, among lho bottles, thev disetivered
;meBushmaster Six. Bravo Seven," a Bravo Companv snkhef
alkd over lho radio "I'vogol oh von Iratji KIAs. one small t hiW
voundotl. Over,"
I he Apac-ho erew s were lisiening
"Ah, damn." one n | them saiil.
"We need lo ovac this thild." Bravo Seven mnlinuoil "She's

/ g o t a v*oumI to the IHUV. DCK .an t
She in .

to got evac ' , I . Over."
-Well. (IS thi-ir lauh Inr Uiivgmg i h t i . kids lo a batlU." a
crew nu mlicr s.ild.
"Thai's righL^ihemhoi said, ami lor a kw more minutes ili, v
eiMitinueil lo circh and waii h.
Thov saw more Humvcs arriving, one nl w hit b .liove up
onto the trash|pile. right mer the [wrl containing wlut was loll
irf \ o o r - I Ith-en s UHIV

\

"That guy just drove .iver .»I«.dv,"

got .1 xvoun.i ;,. the l>elly. Doc v-in't do anvthing he,,

She i i , . d .

to get evae'd. Over."
"Well, it's their fault lor bringing their kids to ,r battle," .1
crew member sjid.
•I

U u l \\3f n
A r a l t l » n t h f v tk "

, m I n a n n t l . r p a r t ,4 VI A m i n as m n r , ,

, n d m n r , K r a v o C n m p a n . ».UIi . J , n n . n l » I K " > ' » a > 1 - '
.Vljrih, t h , « , l d i » " h n nn t k

l v n u l i , i « ' « >••,> l i r » ' k )

l"'l

l i « l . - h m U n l a g u a n i l n » c r . p f r k . ' l " U t at a l l n l th.- , i . i - h , a m i
»,KI

IU„-IU

ami W I V I ^ H I V . " V V V

a i n ' l . v , r p . n n a h., al.U- t n l i n ' l

an i r . O i n all t h i s .1,11."
S i m c i h f n . . V l a r i h h i d lvarm-,1 l i n » | i c n i i h . - i i , h,- » a . , .-.p.i-.alK n n | u i i , 2 > . " h . n a n M P k i l l , ' l I " . I n " " ! ^ " ' I " ' '
Jr. C r a i g ' , i m n i o r u l « r v i c » l,a,l I x i n ,«> l " l y
later, a , M a l . h
o(xn,
k

all n l t l .

" " I ,"">,


h . » l i , - «alt
m , i . k . r x p , ~ - , l . » • j r . K M . m . . M> g m l c y , . I f

, . n u l d Ial. r .'xplain

"'S'

k'M"

I'

'

I' l l

a.
"

18217

7/7/2013

gut 3 w o u m ! l o t h e I K - I I V . D O C c a n t d o a n y t h i n g h e , , - She m etis
t o get r v a c M . < ) v e r . "
" W e l l . It's t h e i r l a u h f o r k i n g i n g t h e n kitts l o a i M t t h . " a
c r e w n k m i t o r saki
" T h a t ' s r i g h t . ' l b e o t h e r s a k i . a m i Uir a lew m o r e m i n u l e s i h o v
c o n l i n u e i l t o c i r t h a n d w a n h.
_ f T h o v saw m o r e H u m v t t s a r r i v i n g , o n e n l w h i c h d r o v e

un

/ m t o t h e i r a s h j p i l e . r i g h t over the p a r i t . s t a i n i n g w l u t was l o I l X
ol \ , K , r I hloen slKwIy

abndt."

' T h a t guv just d r o v e t r
- D i d he?"
-^,ah."
- W e l l , i h e v ' r i d e a t l . so
T h e v w a t c l k - d a soUlter e m e r g e I r o m l h o van c r a d l i n g t h e
w - o u m l ^ l g i r l a n d r u n w i t h h e r i n his a r m s i n t h e a r m s

vehkk

l h a l w a s g o i n g l o ev j c u a l . h e r t o a h o s p i t a l
Thev

vvati-hod a n n t l n i snhlw r t m e r g e f i o m the v a n a f e w
l u n t k t l t h i l d . t h i s out- a l i t t k

Thev s.»w more I l u m v . . s arriv i n g . one of w h i c h iliirt e up
onto the trash|pile, right over the p j r t c o n t a i n i n g w l w l was left
ol' N o o r - t l d e e n ' s body.
" T h a t guv just drov e over a bodv."
" D i d he?"
"Yeah."
" W e l l , thev're dead, so

could later expla i

v t - r v happv

I r e m e m b e r t o o l i n g so h a p p v . W h e n I h e a n l thov

w o r e e n g a g i n g , w h i n I h e a n l t h , rt \ t h i i t c t n K I A , I w a s |U!it t o
h a p p v , h o i aust C r a i g had just d i e d , . i n d it f o i l l i k e , v o u k n o w , w e

As l l i e A f i a r h o s pet k y | n i l . IK- a m i a n o t h e r s o l d i e r w e n t t h r o u g h
a g a l e III i l l , w a l l i t i a l l h o v a n h a d c r a s h o i l i n t o a n d a g a i n s t w h k h
C h m a g h had t r i e d l o lake cover.
There,
ihrv

m the ctnirlvard

liounc)

Marxh

two

ln
injured

ck>ser

at the

who

had Iv, en li fling

knt-w

hat I sp, nl ih,

rrali/i

tl lhal

In[i

was still

raised
March
signal

ilk

his hamls
hati

Iraqis,
Iwti,

Chmagh
morning

inin

aiwl

leariH-il

tuWh
was

to kill

Iratjis

whn
\ merit

eves

with

hweliiigors
did

street

when

view,

ol tho other.

h.»ve ken

was di-atl.

ht krd

d his twn
what

from

might

the van,

tvntinm

. and as Marv-li

hitklon

one on lop

who

trving

nm-
alivi

I tie- wiml

td a tumso,

mnro

As

tht-

two

as far as Mars
an soklit
Bul

llie

him,

one
lho

Ingolhor.
thov

h

rs. ho

wanted

tin
man
whkh
to

jnmds.

So M a r c h Intikott al t i n - m a n a m i r u N x - d his t w o

hfrhngers

logelhc-r, l o o .
A n d t h e n i)ri>pjx-el his l e t l h a m l a n t I e x t o n c k - d t h e m ick I l e h i t - *
ger o f his right hand.
A n d t h e n said t o t h e o t h e r s o k i i e r . " C r a i g ' s prot*ablv |ust s n
tint; up there d r t n k i n i ; brer, going.

H a h ! Thai's a l l 1 m - e d o i l . ' "

A n d t h a i was t h e ilav's t h i r d v e r s i o n o l w a r .

As t o r l h o l o u r t h v e r s i t m . it tK C u r r t - d late i n t h e d a v . l u c k twi t h * '
r O B . a f t e r K a u / l a r u h a m i t h e s^vklierv h a d h n i s h e d t h e i r w o r k i n

The V k m w hv i m w a k t u i t h m a g h a m i N o i «

fUk rn.

T h o v h a d b r o u g h t bat k N n o r l lelren's c a m e r a s a n d o v a n i i n t - d
t h e i m a g e s t o si-i i t lit w a s a j o u r n a l i s t or a n i n s u r g e n t

10

18218

Prosecution Exhibit 15 Transcript of Video
00:03 Okay I got it.
00:05 Last conversation Hotel Two-Six.
00:09 Roger Hotel Two-Six, uh, Victor Charlie Alpha. Look, do you want your Hotel Two-Two
two element.
00:14 I got a black vehicle under target. It's arriving right to the north of the mosque.
00:17 Yeah, I would like that. Over.
00:21 Moving south by the mosque dome. Down that road.
00:27 Okay we got a target fifteen coming at you. It's a guy with a weapon.
00:32 Roger.
00:39 There's a...
00:42 There's about, ah, four or five...
00:44 Bushmaster Six copy One-Six.
00:48 ...this location and there's more that keep walking by and one of them has a weapon.
00:52 Roger received target fifteen.
00:55 Okay.
00:57 See all those people standing down there.
01:06 Affirmed. And open the courtyard.
01:09 Yeah roger. I just estimate there's probably about twenty of them.
01:13 There's one, yeah.
01:15 Oh yeah.
01:181 don't know if that's a...
01:19 Hey Bushmaster element, copy on the one-six.
01:21 Thats a weapon.
01:22 Yeah.
01:23 Hotel Two-Six; Crazy Horse One-Eight.
01:29 Copy on the one-six, Bushmaster Six-Romeo. Roger.
01:32 Fucking prick.
01:33 Hotel Two-Six this is Crazy Horse One-Eight. Have individuals with weapons.
01:41 Yup. He's got a weapon too.
01:43 Hotel Two-Six; Crazy Horse One-Eight. Have five to six individuals with AK47s.
Request permission to engage.
01:51 Roger that. Uh, we have no personnel east of our position. So, uh, you are free to engage.
Over.
02:00 All right, we'll be engaging.
02:02 Roger, go ahead.
02:03 I'm gorma... I can't get 'em now because they're behind that building.
02:09 Um, hey Bushmaster element...
02:10 He's got an RPG.
02:11 All right, we got a guy with an RPG.
02:13 I'm gonna fire.
02:14 Okay.

18219

02:151^0 hold on. Let's come around. Behind buildings right now fi'om our point of
view....Okay,we're gonna come around.
02:19HotelTwoSix; have eyes on individual with RPG. Getting ready to fire.^ewon't...
02:23 Yeah,wehadaguy shoot—and now he's behind the building.
02:2^ God damn it.
02:28 Uh, negative, he was, uh, right in fiont of the Brad. Uh,'bout, there, one o'clock.
02:34 Haven't seen anything since then.
02:3^.Iustfi.ickin',onceyougeton'emjustopen'emup.
02:38 Roger,Iam
02:40Isee your element, uh, got about four Humvees, uh, out along...
02:43 You'reclear
02:44 Allright, firing
02:47 Let me know when you've got them.
02:49 Lets shoot.
02:50 Light'em all up.
02:52 Come on, firel
02:57 Roger, ^eep shooting, keep shooting.
02:59 keep shooting.
03:02 keep shooting.
03:05 Hotel..BushmasterTwoSix,BushmasterTwo-Six,we need to move, time now^
03:I0AlIright,we just engaged all eight individuals.
03:12Yeah,we see two birds and we're still firing.
03:14Roger
03:I5Igot'em
03:l^Two-six, this isTwo-Six,we're mobile.
03:I9Oops, I'm sorry what was going on7
03:20Goddamnit,I^yle
03:23 All right, hahaha,Ihit'em...
03:28 Uh, you're clear.
03:30 All right, I'mjust trying to find targets again.
03:38 Bushmaster Six, this is BushmasterTwoSix.
03:40 Gotabunchofbodieslayin'there.
03:42 All right,we got about, uh, eight individuals.
03:4^Yeah, we got one guy crav^ling around down there, but, uh, you know, we got, definitely
got something.
03:5I^e're shooting some more.
03:52 Roger
03:5^ Hey,youshoot, I'll talk
03:57 HotelTwo-Six;Crazyhorse One-Eight.
04:01 Crazyhorse One-Eight; this is HotelTwo-Six.Over.
04:03 Roger. Currently engaging approximately eight individuals, uh^IA,tth RPGs, and AI^
47s

18220

04:12 HotelTwo-Six,you need to move to that location once Crazyhorse is done and get
pictures. Over.
04:20 Six beacon gaia.
04:24 SergeantTwenty is the location.
04:28 HotelTwo-Six; Crazyhorse One-Eight.
04:31Oh, yeah, look at those dead bastards.
04:3^^ice
04:37Two-Six; Crazyhorse One-Eight.
04:44 ^ice
04:47 Good shoot.
04:48 Thank you
04:53 HotelTwo Six
04:55 HotelTwo Six; Crazyhorse One Eight.
05:03 Crazyhorse One-Eight; Bushmaster Seven. Go ahead.
05:0^ Bushmaster Seven; Crazyhorse OneEight.Uh, location ofbodies, Mike Bravo fivefour
five-eight eight-sixone-seven.
05:15 Hey,good on the uh...
05:I7Eive-four-five-eight eight-six-one-seven. Over.
05:2IThis is Crazyhorse OneEight,that'sagood copy. They're onastreet infi^ontof an open,
uh, courtyard withabunchofblueuh trucks, bunch ofvehicles in the courtyard.
05:30 There's one guy moving down there but he's uh, he's wounded.
05:35 All right,we'll let'em know^ so they can hurry up and get over here.
05:40 OneEight,we also have one individual, uh, appears to be wounded trying to crawl away.
05:49 Roger,we're gonna move down there.
05:51 Roger,we'll cease fire.
05:54 Yeah,we won't shoot anymore.
0^:01 He's getting up.
0^:02 Maybe he hasaweapon down in his hand7
0^:04 l^o,Ihaven't seen one yet.
0^:07Isee you guys got that guy crawling right now on that curb.
0^:08Yeah,Igot him.Iput two rounds near him, and you guys were shooting over there too, so
uh we'll see.
0^:I4Yeah,rogerthat
0^:I^BushmasterThirty-Six Element; this is uhHotelTwo-Seven over.
0^:21 HotelTwo-Seven; Bushmaster Seven go ahead.
0^:24 Roger I'm just trying to make sure you guys have my turf, over.
0^:3IRoger we got your turf
0^:33 Come on, buddy.
0^:38 All you gofta do is pick upaweapon.
0^:44 Crazyhorse this is Bushmaster Eive, Bushmaster Pour break.^eare right below you right
time now can you walk us onto that location over.
0^:54 This isTwoSix roger. I'll pop fiares.^ealso have one individual moving.^e're looking

18221

for weapons. If we seeaweapon,we're gonna engage.
07:07YeahBushmaster,wehaveavan that's approaching and picking up the bodies.
07:14^here's that van at7
07:15Right down there by the bodies.
07:l^Okay,yeah
07:18Bushmaster; Crazyhorse.behave individuals going to the scene, looks like possibly uh
picking up bodies and weapons.
07:25 Let me engage.
07:28 Canlshoot7
07:3IRoger. Break. Uh Crazyhorse One-Eight request permission to uh engage
07:3^ Picking up the wounded^
07:38 Yeah,we're trying toget permission to engage.
07:4ICome on, let us shoots
07:44 Bushmaster; Crazyhorse One-Eight.
07:49 They're taking him.
07:51 Bushmaster; Crazyhorse One-Eight.
07:5^ This is Bushmaster Seven, go ahead.
07:59 Roger.^ehaveablackSUV-uh Bongo truck picking up the bodies. Request permission
to engage.
08:02 Puck
08:0^ This is Bushmaster Seven, roger.This is Bushmaster Seven, roger.Engage.
08:12 One-Eight, engage.
08:12 Clear
08:13 Come onl
08:17Clear.
08:20Clear
08:21^e're engaging.
08:2^ Coming around. Clear.
08:27 Roger.Trying to uh...
08:32 Clear
08:35 Ihear'emco..Ilost'eminthedust.
08:3^Igot'em
08:41Pmfiring
08:42 This is Bushmaster forty got any BOA on that truck. Over.
08:44You're clear.
08:47 This is ah Crazyhorse. Stand by.
08:47 Ican't shoot for some reason.
08:49Goahead
08:50 Ithinkthevan'sdisabled.
08:53 Go ahead and shoot it.
08:54Igot an azimuth limitft^rsome reason
09:00Goleft

18222

09:03 Clearleft
09:15 All right, Bushmaster Crazyhorse One-Eight.
09:20Avehicle appears to be disabled.
09:22 There were approximately four to five individuals in vehicle moving bodies.
09:28 Your lead Bradley should take the next right.
09:31 That's cruising east down the road.
09:341'^^o more shooting.
09:38 Crazyhorse; this is Bushmaster Pour.^e'removingadismounted element straight south
through the Bradleys.
09:44Ihave your Elemuh, Bradley element turning south down the road where the
engagements were.
09:53 Last call on station's uh Bradley element say again.
09:5^ Roger this is Crazyhorse.
09:58 Your lead Bradley just tumed south down the road where all the engagements happened.
10:03 Should haveavan in the middle of the road with about twelve to fifteen bodies.
10:11Oh yeah, look at that. Right through the windshields
10:14Hahal
10:l^Allright.There were uh approximately four to five individuals in that truck, so I'm
counting about twelve to fifteen.
10:24Iwould say that'safairly accurate assessment so far.
10:27 Rogerthat
10:29Iwant to just be advised Six, Bushmaster Six are getting mounted up right now.
10:35 Okay,roger. Hey,we can't fiex down that road towards that, uh,where Crazyhorse
engaged.
10:43 So, uh,Idon't know if you want us to do so or stay put. Over.
10:4^ ^ h y can't they go down there7
10:5^Ithink we whacked'em all.
10:58 That's right, good
10:59 This is HotelTwoSix
11:03 Hey you got my dismounted element right there over to your left.
ll:O^Roger,Isee'em.
ll:11Hey yeah, roger, be advised, there were some guys popping out with A^s behind that dirt
pile break.
l l : I 9 ^ e a l s o took some RPGs off, uh, earlier, so just uh make sure your men keep your eyes
open.
11 2^ Roger.
11 27And,uh, Bushmaster ahead are, uh,Hote1Two-Six; Crazyhorse One-Eight.
11 33 Crazyhorse One-Eight; this is HotelTwo-Six.
11 35YeahTwo-Six; Crazyhorse One-Eight.
11 37Uh,1ocationIhave about twelve to fifteen dead bodies.
11 42 Uh,where else are we takingfirefrom'^
11 48 Ctirrently we're not being engaged, ah, butjust south ofthat location. Break.

18223

11:55You should see dismounted elements with Humvees moving to the cast, over.
12:01This is Crazyhorse One-Eight; we have elements in sight.
12:05 BushmasterThree-Six.
12:07 I'm gonna get downaliftle lower.
12:09 Allright
12:10I'm gonna come downaliftle lower and takeaquick gander.
12:13 Rogerthat.
12:14Six; this is ft^ur.^e're headed to the area where Crazyhorse engaged.
12:2^ Bushmaster Six; this is HotelTwoSix.
12:28 Request to go to the south to our original BP so ifyoufiushedthem to the south we will be
there to uh intercept over.
12:39 Hey this is Bushmaster Seven; we're coming up on B...on the ass end ofthe Brads.
12:54 Hey uh, Bushmaster Element; this is Copperhead One-Six break.
13:00 ^e're moving in the vicinity ofthe engagement area and looks like we've got some slight
movement ftom ah, the ah van that was engaged.
13:0^ Looks likeakid. Over.
13:11This is Bushmaster Seven, roger. Uh,we'reaboutahundred meters behind you.
13:1^Got that big pile, to the right7
13:18Roger, you gonna pull inhered Oo you want me to push stuff so you can, uh, get clearof
it7
13:21 Right on the comer7
13:22 ^hat'sthat7
13:23 Got that big pile ofbodies to the right, on the comer7
13:24Yeah, right here.
13:25^egotadismounted infantry and vehicles, over.
13:30 Again, roger.
13:31 And clear.
13:48 There's the Bradley right there.
13:51 Got'em
14:00 Hotel two-six; are you uh at this grid over7
14:05YeahIwanted to get you around so didn't you just get that one dude to scare them all
away.It worked out prefty good.
14:llldidn't want those flickers to run away and scafter.
14:12Yeah
14:15Bushmaster Six; HotelTwo-Six.Roger,we lilted up with our two element they are all
mounted up in our trucks break.
14:23 removed south so that we could ah possibly intercept personnel beingfiushedsouth. So
we are vicinity fifth Street.
14:30 And ah phase line Gadins. Over.
14:37 Bring the trucks in, cordon this area off
14:39 Can we move the Bradleyft^rwardso we can bring trucks in and cordon off this area.
14:44 If the Bradleys could take the south cordon, that could help outalot.

18224

14:53 Bushmaster or element.^hich Element called in Crazyhorse to engage the eightelem
eightmenteamontopofaroof7
15:02 Bushmaster Six; this is HotelTwo-Six.Uh,Ibelieve that was me.
15:07 They uh had A^-47sand were to our cast, so,where we were taking small arms fire.
Over.
15:20 Hotel Crazyhorse One-Eight.
15:2^ Crazyhorse One-Eight; this is HotelTwo-Six.
15:28YeahTwo-Six.One-EightIjust also wanted to make sure you knew that we hadaguy
with an RPG cropping round the comer getting ready to fire on your location.
15:3^ That's why we ah, requested permission to engage.
15:40 Ok, roger that.Tango mike.
15:4^ HotelTwo-Six; do you understand me, over7
15:51Idid not copy last, uh, you got stepped on. Say again please7
1^:00 They cordoned offthe building that the helicopters killed the personnel on.
1^:04 Don't go anywhere else we need to cordon offthat building so we can get on top ofthe
roofand SSC the building. Over.
1^:13 HotelTwo-Six; Crazyhorse One-Eight.
l^:l^ThisisHotelTwo-Six.
l^:19Hey,whoever was talking about rooftops, know that all the personnel we engaged were
ground level.Isay again ground level.
1^:27 Rogerlcopy ground level.Over.
1^:30 One-Eight roger.
1^:33 Canlgetagrid to that one more time please7
l^:3^Target twenty.
1^:3^ Roger
l^:40You want me to take over talking to them7
1^:42 S'alright
1^:4^ Seven-Six Romeo Over.
1^:49 Roger, I've got uh eleven Iraqi I^IAs. One small child wounded. Over.
1^:57 Roger.Ah damn. Oh well.
17:04 Roger,weneed,weneedauh to evac this child. Ah, she's gotauh, she's gotawound to
the belly.
17:10Ican't do anything here.She needs to get evaced. Over.
17:18Bushmaster Seven, Bushmaster Seven; this is Bushmaster Six Romeo.
17:20 fenced your location over.
17:25 Roger,we're at the location where Crazyhorse engaged the RPG tire break.
17:37 Grid five four five-eight.
17:4^^ell it's their fault for bringing their kids intoabattle.
17:48 That'sright
17:5^ Got uh, eleven.
18:01Yeahuh,roger.^e're monitoring.
18:02 Sorry

18225

18:04^0 problem
18:07 Correction eight six one six.
18:l^Lookingft^rmoreindividua1ssouth.
18:18BushmasterSix-Bushmaster Seven.
18:29 That guyjust drove overabody.
18:31Ha,ha,didhe7
18:32Yeah
18:37 Maybe it was justavisual illusion, but it looked like it.
18:41 ^ell,they'redead, so
18:44 Bushmaster Six; HotelTwoSix over.
18:5^ Six; this is Pour.Igot one individual looks like he's got an RPG round laying underneath
him. Break.
19:05 I^robably like to get..
19:10Lookatthat
19:12Bushmaster Six; HotelTwo-Six over.
19:29 Bushmaster Six; Romeo HotelTwo-Six over.
19:44 Bushmaster Six; HotelTwo-Six over.
19:5^ HotelTwoSix; Bushmaster Seven co-located with Six.
20:08 HotelTwoSix; Bushmaster Seven.
20:10Bushmaster Seven; HotelTwo-Six over.
20:I4Roger,wegotalittle girl who needs to be evaced.^hat's your location over7
20:22 On route Gadins,Iam all the way to the south. Solam Gadins and f i f t h Street.
20:28 Isay again Gadins and fifth Street, over.
20:40 Bushmaster Seven; HotelTwo-Six.Do you want us to push to your location7
20:55 Hey,uh,Ineed to get the Brads to drop radslgotawounded girl we need to take her to
Rustamyan.
21:04 Bushmaster Seven; HotelTwoSix.Do you want us to move to your location over7
21:30 Bushmaster Six; HotelTwo-Six over.
21:34 HotelTwo-Six; this is Bushmaster Seven. Roger, come to our location.
21:390kay,roger,we're moving up north on Gadins and then we will push east to your location.
22:0^ Bushmaster elements be advised we have friendlies coming fiom the south to your
location.Over.
22:13 All right, got'em moving up ftom the south.
22:35 Bushmaster elements be advised we are coming up ftom the east over.
23:49 Hey One-Two; follow me over. I'm going to try and get out ofhere as quickly as possible.
24:10You guys all right back there7
24:13Yeah,we're with you.
24:35 Lotta guys down there.
24:37 Oh yeah
24:37 Came out ofthe woodwork.
24:38 This is Operation, ah. Operation Secure.
25:l^Yeah we have fifty rounds left.
^

18226

25:17Yep
25:19TwoSix; Six Romeo over.
25:21Two-Six; Romeo over.
25:23 Hey roger,what's your current location over7
25:47 Six; speak it's Romeo.
25:50 Three-Six Romeo; Six Romeo over.
25:52 Roger, at the six once it's back on this guy.
25:5^ Lost him.
2^:00 that's he gotforus7
2^:01 Standby
2^:0^ HotelTwo-Six; Crazyhorse One-Eight.
2^:21 Hey,did you got action on that target yet over7
2^:25 Speak to Charlie roger.
2^:32 HotelTwo-Six; Crazyhorse OneEight.
2^:55 Bushmaster Six; Crazyhorse One Eight.
2^:59 Roger, you have traftic over.
27:02 Roger. Uh, just wondering ifyou had anything else you wanted us to drive on7
27:08Yeah roger keep on, ah, for the time being over.
27:11Six calls Six Romeo. Can you tell battalion that two civilian children casualties are
coming
back to Rustamyan in the Bradley over.
27:2^ Six calls Six Romeo.
27:29 Bushmaster Six Copper ^hite Six.
27:32 Copperhead ^hite Six; this is Bushmaster Six Romeo over.
27:3^ Roger, that'sanegative on the evac ofthe two, ah, civilian, ah, kids to,ah, rusty they're
going to have the IPs l i t ^ up with us over here.Break. IPs will take them up toalocal hospital
over.
27:50 That^sagood copy over.
27:54 One six over.
28:08 ^herethey'reallgoingto.
28:10Sayagain7
28:12^here all those dismounts are going to7
28:18Going into this hous-.Sorry
29:29 Three Six,Three Six; Bushmaster Six Romeo over.
29:37 Six Romeo, Six Romeo.
29:39 Roger, Bushmaster Seven wants an up on all personnel in your platoon over.
29:44 Roger
30:08 ...ftiendlies on the roof.
30:10CrazyhorseOneEight; this is Bushmaster four over.
30:12Bushmaster Pour; this is Crazyhorse One-Eight.
30:15 Roger,Ican ah hear small arms fire ftom your engagement area at two zero zero zero ah
about three hundred meters ftom that objective over.

18227

30:27 Crazyhorse; ftom whatlunderstand small arms fire at two zero zero zero degrees about
two hundred meters.
30:39 .lust to the southwest.
30:41 Yup
30:49 Right about where we engaged.
30:51Yeah, One ofthem with that RPG or whatever.
30:55 He'sgotaweapon.GotanRI^ AI^47.
30:58 HotelTwoSix; Crazyhorse OneEight.
31:02 Gonna lose him.
31:03 Crazyhorse One-Eight this is HotelTwo-Six over.
31:08 Roger, have another individual withaweapon.
31:10Dammit, they're in the same building.
31:12Hey roger that, just make sure that ah, you're firing ftom west to cast over.
31:l^.Iust went in the building.
31:18CrazyhorseThree and four will be on their way.
31:21The individual walked into the building previously past grid. So there's at least six
individuals in that building with weapons.
31:30^ecanputamissileinit.
31:31If you'd like, ah, Crazyhorse One-Eight could putamissile in that building.
31:4^ It'satriangle building. Appears to be ah, abandoned.
31:51 Yeah, looks like it's under construction, abandoned.
31:52 Appears to be abandoned, under construction.
31:5^ Uh,likelsaid, six individuals walked in there ftom our previous engagement.
32:01Crazyhorse One-Eight; this is Bushmaster Six Romeo. If you've PIDed the individuals in
the building with weapons, go ahead and engage the building over.
32:08 Crazyhorse One Eight; will be coming up north to south engaging with Hellfire.
32:13 All right, I'm going to do manual.
32:17Allright,we've been cleared to engage with...
32:18This is Bushmaster Six Romeo.Crazyhorse One Eight is going to be engaging north to
south with Hellfire missiles over.
32:24 This is HotelTwoSix. Roger.
32:2^ All right, you ready7
32:271'^o, I'm trying to get over to the IS^ovember.Trying to find the fucking...
32:33 This is Bushmaster Six. Has that RPG round been extended already or is it still live, over.
32:38 Looks live to me.
32:40 Let me know when you're going to fire.
32:44 All right, I'm flicking havingabrainfart.^here's the man advancement7
32:48 You got one on the clutch on the bottom left on your left door.
32:54 Roger let me stand by.
32:57 Gotit7
32:59^0
33:03 Allright
10

18228

33:09 Let me just putakilo in there.
33:12 0k
33:15Gotit7
33:21 Putakilo in7
33:22 All right, let me get back.
33:2^ I'm gonna come around, get some more distance.
33:27 Roger that, you're clear.
33:33 Got more individuals in there.
33:3^You wanna hit ftom north to south or you wanna go ftom west to east7Idon^twanna fire
with theftiendliesright there, you know.
33:41 Yeah, go north to south.
33:53 Right, come around, right.
33:5^ I'mjust gonna put one or two in, ifthey want any more.
34:09 Right
34:12 found the missile.
34:15Roger, f l l get you in this straight.
34:1^You're clear.
34:17I'm tiring.
34:2^Targethit
34:28 It wasamissile.
34:29 Left
34:32 You're clear. I'm above you.
34:3^ Crazyhorse One-Eight; was that explosion you engaging over7
34:38 Crazyhorse One Eight, roger. Engaging building with one hellfire.
34:4^ Let's come around and we'll clear the smoke, ^e'll fire one more.
34:50 Hey uh,we're going to wait for the smoke to clear.
34:52Yes Crazyhorse One Eight now.'^e're going to put one more missile into the building.
34:57Yeah,diditah,gointhebui1ding7Iseethewallknockedoutoftheway.
34:59Yeah,itwentin.
35:01 Bushmaster Six Romeo; this is HotelTwo-Six.Yeah roger, that was Crazyhorse engaging
with one Hellfire over.
35:10Yeahroger,Igota^ovemberifyouwant.
35:12fireaway.
35:I3Youwantustofire7
35:18Youready7
35:19Yep
35:20 Bushmaster Six Romeo. They are going to engage ah, with one more Hellfire in that
building.
35:24 Uh shit, whyldoIhaveAPfiashing on there7
35:47 W^e're not even going to watch this fucking shit7
35:49 Till next one. It won't come around,Ineedalittle more distance.
35:53 Still wantmeto shoot7
II

18229

35:57 You guys,ft^IIowinghot.
35:59 Roger
3^:13You are clear.
3^:14Roger.
3^:1^You going to bring up the missile7
3^:18Roger
3^:19And firing.
3^:20 Come down7There you go.
3^:23 fire
3^:24 Allright
3^:28 I've got, ah backscafter.
3^:30 All right, come around.
3^:32 Roger.
3^:34 Coming around left, backscatter.
3^:53 There it goesl Look at that bitch gol
3^:5^Patooshl
37:03 Ah, sweet
37:07iSleedaliftle more room.
37:091'',^ice missile.
37:11Doesitlookgood7
37:12Sweef
37:l^Uh,youready7
37:18Roger
37:30 There'salotofdust
37:3^ Crazyhorse One-Eight; this is HoteITwo-Six.^asthereaBDA7
37:40 This is Crazyhorse One-Eight. Stand by,engaging with another Hellfire.
37:43 Allright
37:45 You're clear
37:47 Lemme know when I'm clear.
37:50 Rogerthat
37:59 Alright, he wasn't
38:02 HotelTwo-Six; Crazyhorse One-Eight.
38:07 Go ahead, Crazyhorse One Eight.
38:09 Roger, building destroyed. Engaged with three hellfire missiles.

12

18230

Prosecution Exhibit 15 Transcript of Video
00:03 Okay I got it.
00:05 Last conversation Hotel Two-Six.
00:09 Roger Hotel Two-Six, uh, Victor Charlie Alpha. Look, do you want your Hotel Two-Two
two element.
00:141 got a black vehicle under target. It's arriving right to the north of the mosque.
00:17 Yeah, I would like that. Over.
00:21 Moving south by the mosque dome. Down that road.
00:27 Okay we got a target fifteen coming at you. It's a guy with a weapon.
00:32 Roger.
00:39 There's a...
00:42 There's about, ah, four or five...
00:44 Bushmaster Six copy One-Six.
00:48 ...this location and there's more that keep walking by and one of them has a weapon.
00:52 Roger received target fifteen.
00:55 Okay.
00:57 See all those people standing down there.
01:06 Affirmed. And open the courtyard.
01:09 Yeah roger. I just estimate there's probably about twenty of them.
01:13 There's one, yeah.
01:15 Oh yeah.
01:181 don't know if that's a...
01:19 Hey Bushmaster element, copy on the one-six.
01:21 Thats a weapon.
01:22 Yeah.
01:23 Hotel Two-Six; Crazy Horse One-Eight.
01:29 Copy on the one-six, Bushmaster Six-Romeo. Roger.
01:32 Fucking prick.
01:33 Hotel Two-Six this is Crazy Horse One-Eight. Have individuals with weapons.
01:41 Yup. He's got a weapon too.
01:43 Hotel Two-Six; Crazy Horse One-Eight. Have five to six individuals with AK47s.
Request permission to engage.
01:51 Roger that. Uh, we have no persormel east of our position. So, uh, you are free to engage.
Over.
02:00 All right, we'll be engaging.
02:02 Roger, go ahead.
02:03 I'm gonna... I can't get 'em now because they're behind that building.
02:09 Um, hey Bushmaster element...
02:10 He's got an RPG.
02:11 All right, we got a guy with an RPG.
02:13 I'm gonna fire.
02:14 Okay.

•M

^^B^^'.^^^B^^^^^^

^^^^^^^^^^^^^^^^^^^^^^

PB^B

'^^^

of

I^^^i^^

18231

02:151^0 hold on. Let's come around. Behind buildings right now ftom our point of
view....Okay,we're gonna come around.
02:19HotelTwo-Six; have eyes on individual with RPG. Gefting ready to fire.^ewon't...
02:23 Yeah,we hadaguy shoot—and now he's behind the building.
02:2^ God damn it.
02:28 Uh, negative, he was, uh, right in ftont ofthe Brad. Uh,'bout, there, one o'clock.
02:34 Haven't seen anything since then.
02:3^.Iustfuckin',onceyougeton'emjustopen'emup.
02:38 Roger,Iam
02:40Isee your element, uh, got about four Humvees, uh, out along...
02:43 You'reclear
02:44 Allright, firing.
02:47 Let me know when you've got them.
02:49 Lets shoot
02:50 Light'em all up
02:52 Come on, firel
02:57 Roger. I^eep shooting, keep shooting.
02:59 keep shooting.
03:02 keep shooting.
03:05 Hotel..BushmasterTwo-Six,BushmasterTwo-Six,we need to move, time nowl
03:10Allright,we just engaged all eight individuals.
03:12Yeah,we see two birds and we're still firing.
03:14Roger.
03:15Igot'em
03:l^Two-six, this isTwo-Six,we're mobile.
03:19Oops, I'm sorry what was going on7
03:20Goddamnit,I^yle
03:23 All right, hahaha,Ihit'em...
03:28 Uh,you'reclear
03:30 All right, I'mjust trying to find targets again.
03:38 Bushmaster Six, this is BushmasterTwo-Six.
03:40 Gotabunchofbodieslayin'there.
03:42 All right,we got about, uh, eight individuals.
03:4^Yeah,we got one guy crawling around down there, but, uh, you know,we got, definitely
got something.
03:51^e're shooting some more.
03:52 Roger
03:5^ Hey,youshoot, I'll talk.
03:57 HotelTwo-Six; Crazyhorse One-Eight.
04:01Crazyhorse OneEight; this is HotelTwoSix.Over.
04:03 Roger. Currently engaging approximately eight individuals, uh^IA,uh RPGs, and AIs^47s

18232

04:12HotelTwo-Six, you need to move to that location once Crazyhorse is done and get
pictures. Over.
04:20 Six beacon gaia.
04:24SergeantTwenty is the location.
04:28 HotelTwo-Six; Crazyhorse OneEight.
04:31Oh, yeah, look at those dead bastards.
04:3^^ice
04:37Two-Six; Crazyhorse One-Eight.
04:44 ^ice
04:47 Good shoot.
04:48 Thank you
04:53 HotelTwo Six
04:55 HotelTwo-Six; Crazyhorse One-Eight.
05:03 Crazyhorse One Eight; Bushmaster Seven. Go ahead.
05:0^ Bushmaster Seven; Crazyhorse One-Eight. Uh, location ofbodies, Mike Bravo five-four
five-eight eight-six-one-seven.
05:15 Hey,good on the uh...
05:17Five-four-five-eighteightsix-one-seven.Over.
05:21This is Crazyhorse One-Eight, that'sagood copy. They're onastreet in ftont of an open,
uh, courtyard withabunchofblueuhtmcks, bunch of vehicles in the courtyard.
05:30 There's one guy moving down there but he's uh, he's wounded.
05:35 All right,we'll let'em know so they can hurry up and get over here.
05:40 OneEight,we also have one individual, uh, appears to be wounded trying to crawl away.
05:49 Roger,we're gonna move down there.
05:51 Roger,we'll cease fire.
05:54Yeah,we won't shoot anymore.
0^:01 He's getting up.
0^:02 Maybe he hasaweapondov^ in his hand7
0^:04 ^o,Ihaven't seen one yet.
0^:07Isee you guys got that guy crawling right now on that curb.
0^:08Yeah,Igothim.Iput two rounds near him, and you guys were shooting over there too, so
uh we'll see.
0^:14Yeah, rogerthat.
0^:l^BushmasterThirtySix Element; this is uhHotelTwo-Seven over.
0^:21 HotelTwo-Seven; Bushmaster Seven go ahead.
0^:24 Roger I'mjust trying to make sure you guys have my turf, over.
0^:31Roger we got your turf
0^:33 Come on, buddy.
0^:38 All you gofta do is pick upaweapon.
0^:44 Crazyhorse this is Bushmaster Five, Bushmaster Four break.^eare right below you right
time now can you walk us onto that location over.
0^:54 This isTwoSix roger. I'll pop fiares.^ealso have one individual moving.^e're looking

18233

for weapons. Ifweseeaweapon,we're gonna engage.
07:07YeahBushmaster,wehaveavan that's approaching and picking up the bodies.
07:14^here'sthatvanat7
07:15Right down there by the bodies.
07:l^Okay,yeah
07:18Bushmaster; Crazyhorse.behave individuals going to the scene, looks like possibly uh
picking up bodies and weapons.
07:25 Let me engage.
07:28 Canlshoot7
07:31Roger. Break. Uh Crazyhorse One-Eight request permission to uh engage
07:3^ Picking up the wounded7
07:38 Yeah,we're trying to get permission to engage.
07:41 Come on, let us shootl
07:44 Bushmaster; Crazyhorse One Eight.
07:49 They're taking him.
07:51 Bushmaster; Crazyhorse One-Eight.
07:5^ This is Bushmaster Seven, go ahead.
07:59 Roger.^ehaveablackSUV-uh Bongo truck picking up the bodies.Request permission
to engage.
08:02 Fuck
08:0^ This is Bushmaster Seven, roger.This is Bushmaster Seven, roger. Engage.
08:12One-Eight, engage.
08:12Clear
08:13 Comeonl
08:17Clear
08:20Clear
08:21^e're engaging.
08:2^ Coming around. Clear.
08:27 Roger.Trying to uh...
08:32 Clear
08:35 1hear'emco..llost'eminthedust.
08:3^1got'em.
08:41fmfiring
08:42 This is Bushmaster Forty got any BDA on that truck. Over.
08:44 You'reclear
08:47 This is ah Crazyhorse. Stand by.
08:47 Ican't shoot for some reason.
08:49Goahead
08:50 Ithink the van's disabled.
08:53 Go ahead and shoot it.
08:54 1got an azimuth limit for some reason
09:00Goleft

18234

09:03 Clearleft
09:15 All right, Bushmaster Crazyhorse One Eighf
09:20Avehicle appears to be disabled.
09:22 There were approximatelyft^urto five individuals in vehicle moving bodies.
09:28 Your lead Bradley should take the next right.
09:31That's cruising east down the road.
09:34 ISlo more shooting.
09:38 Crazyhorse; this is Bushmaster Four.^e'removingadismounted element straight south
through the Bradleys.
09:441have your Elem-uh, Bradley element turning south down the road where the
engagements were.
09:53 Last call on station's uh Bradley element say again.
09:5^ Roger this is Crazyhorse.
09:58 Your lead Bradley just tumed south down the road where all the engagements happened.
10:03 Should haveavan in the middle of the road with about twelve to fifteen bodies.
10:llOh yeah, look at that. Right through the windshieldl
10:14Hahal
10:1^Allright.There were uh approximately four to five individuals in that truck, so I'm
counting about twelve to fifteen.
10:24Iwould say that'safairly accurate assessment so far.
10:27 Rogerthat
10:29Iwant to just be advised Six, Bushmaster Six are gefting mounted up right now.
10:35Okay,roger. Hey,we can't fiex down that road towards that, uh,where Crazyhorse
engaged.
10:43 So, uh,Idon't know if you want us to do so or stay put. Over.
10:4^ ^ h y can't they go down there7
10:5^1think we whacked'em aft.
10:58That'sright,good
10:59 This is HotelTwoSix.
11:03 Hey you got my dismounted element right there over to your left.
ll:O^Roger,lsee'em.
I L I l H e y yeah, roger, be advised, there were some guys popping out with A^s behind that dirt
pile break.
ll:19^ealso took some RPGs off, uh, earlier, so just uh make sure your men keep your eyes
open.
11:2^ Roger
11:27And,uh, Bushmaster ahead are, uh,HotelTwo-Six; Crazyhorse One-Eight.
11:33 Crazyhorse One-Eight; this is HotelTwoSix.
ll:35YeahTwo-Six; Crazyhorse One-Eight.
11:37 Uh,locationIhave about twelve to fifteen dead bodies.
11:42 Uh,where else are we takingfireftom7
11:48 Currently we're not being engaged, ah, butjust south ofthat location. Break.

18235

11:55You should see dismounted elements with Humvees moving to the cast, over.
12:01This is Crazyhorse One Eight; we have elements in sight.
12:05 BushmasterThree-Six.
12:07 I'm gonna get downaliftle lower.
12:09 Aftright
12:10I'm gonna come downaliftle lower and takeaquick gander.
12:13 Rogerthat.
12:14Six; this is four.^e're headed to the area where Crazyhorse engaged.
12:2^ BushmasterSix; this is HotelTwo-Six.
12:28 Request to go to the south to our original BP so ifyoufiushedthem to the south we will be
there to uh intercept over.
12:39 Hey this is Bushmaster Seven; we're coming up on B... on the ass end of the Brads.
12:54 Hey uh, Bushmaster Element; this is Copperhead One-Six break.
13:00 ^e're moving in the vicinity ofthe engagement area and looks like we've got some slight
movement ftom ah, the ah van that was engaged.
13:0^ Looks likeakid. Over.
13:llThis is Bushmaster Seven, roger. Uh,we'reaboutahundred meters behind you.
13:l^Gotthatbigpile,totheright7
13:18Roger, you gonna puft in here7 Do you want me to push stuff so you can, uh, get clear of
it7
13:21 Right on the comer7
13:22W^hat'sthat7
13:23 Got that big pile ofbodies to the right, on the comer7
13:24Yeah, right here.
13:25^egotadismounted infantry and vehicles, over.
13:30 Again, roger.
13:31And clear.
13:48 There's the Bradley right there.
13:51 Got'em
14:00 Hotel two six; are you uh at this grid over7
14:05Yeahlwanted to get you around so didn't you just get that one dude to scare them aft
away. It worked out pretty good.
14:llldidn't want those fuckers to run away and scafter.
14:12Yeah
14:15Bushmaster Six; HotelTwoSix.Roger,we linked up with our two element they are aft
mounted up in our trucks break.
14:23 removed south so that we could ah possibly intercept personnel beingfiushedsouth. So
we are vicinity Fifth Street.
14:30 And ah phase line Gadins. Over.
14:37 Bring the trucks in, cordon this area off.
14:39 Can we move the Bradley forward so we can bring trucks in and cordon off this area.
14:44 If the Bradleys could take the south cordon, that could help outalot.

18236

14:53 Bushmaster or element.^i^ich Element called in Crazyhorse to engage the eight-elem
eightmenteamontopofaroof7
15:02 Bushmaster Six; this is HotelTwo-Six.Uh,Ibelieve that was me.
15:07 They uh had AIs^47sand were to our cast, so,where we were taking small arms fire.
Over.
15:20 Hotel Crazyhorse One-Eight.
15:2^ Crazyhorse One-Eight; this is HotelTwo-Six.
15:28YeahTwo-Six.One-EightIjust also wanted to make sure you knew that we hadaguy
with an RPG cropping round the comer gefting ready to fire on your location.
15:3^ That's why we ah, requested permission to engage.
15:40 Ok, roger that.Tango mike.
15:4^ HotelTwo-Six; do you understand me, over7
15:51Idid not copy last, uh, you got stepped on. Say again please7
1^:00 They cordoned offthe building that the helicopters killed the personnel on.
1^:04 Don't go anywhere else we need to cordon offthat building so we can get on top ofthe
roofand SSC the building. Over.
1^:13 HotelTwo-Six; Crazyhorse One-Eight.
l^:l^ThisisHotelTwo-Six.
l^:19Hey,whoever was talking about rooftops, know that aft the personnel we engaged were
ground levef Isay again ground levef
1^:27 Rogerlcopy ground levef Over.
1^:30 One-Eight roger.
1^:33 Canlgetagrid to that one more time please7
l^:3^Target twenty.
1^:3^ Roger.
1^:40You want me to take over talking to them7
1^:42 S'alright
1^:4^ Seven-Six Romeo Over.
1^:49 Roger, I've got uh eleven Iraqi Is^IAs. One smaft child wounded. Over.
1^:57 Roger. Ah damn. Oh welf
17:04 Roger,weneed,weneedauh to evac this child. Ah, she's gotauh, she's gotawound to
the belly.
17:10Ican't do anything here. She needs to get evaced. Over.
17:18Bushmaster Seven, Bushmaster Seven; this is Bushmaster Six Romeo.
17:20 fenced your location over.
17:25 Roger,we're at the location where Crazyhorse engaged the RPG tire break.
17:37 Gridfivefour-five-eight.
17:4^^eft it's their I^ult for bringing their kids intoabaftle.
17:48That'sright
17:5^ Got uh, eleven.
18:01Yeahuh,roger.^e're monitoring.
18:02 Sorry

18237

18:04^0 problem
18:07 Correction eight-six-one-six.
18:l^Looking for more individuals-south.
18:18BushmasterSix-Bushmaster Seven.
18:29 That guyjust drove overabody.
18:31 Ha,ha,didhe7
18:32Yeah
18:37Maybe it was justavisual illusion, but it looked like it.
18:41 ^ e l l , they're dead, so.
18:44 Bushmaster Six; HotelTwo-Six over.
18:5^ Six; this is Four.Igot one individual looks like he's got an RPG round laying underneath
him. Break.
19:05 Probably like to get...
19:10Lookatthat
19:12 Bushmaster Six; HotelTwo-Six over.
19:29 Bushmaster Six; Romeo HotelTwo-Six over.
19:44 Bushmaster Six; HotelTwo-Six over.
19:5^ HotelTwo-Six; Bushmaster Seven co-located with Six.
20:08 HotelTwo-Six; Bushmaster Seven.
20:10Bushmaster Seven; HotelTwoSix over.
20:14Roger,wegotalittle girl who needs to be evaced.^hat's your location over7
20:22 On route Gadins,lam all the way to the south. Solam Gadins and Fifth Street.
20:28 Isay again Gadins and Fifth Street, over.
20:40 Bushmaster Seven; HotelTwo-Six. Do you want us to push to your location7
20:55 Hey,uh,Ineed to get the Brads to drop radslgotawounded girl we need to take her to
Rustamyan.
21:04 Bushmaster Seven; HotelTwo-Six. Do you want us to move to your location over7
21:30 Bushmaster Six; HotelTwoSix over.
21:34 HotelTwo-Six; this is Bushmaster Seven. Roger, come to our location.
21:39 Okay,roger,we're moving up north on Gadins and then we wift push east to your location.
22:0^ Bushmaster elements be advised we haveftiendliescoming ftom the south to your
location. Over.
22:13 All right, got'em moving up ftom the south.
22:35 Bushmaster elements be advised we are coming up ftom the east over.
23:49 Hey One-Two; follow me over. I'm going to try and get out ofhere as quickly as possible.
24:10You guys aft right back there7
24:13Yeah,we're with you.
24:35 Lotta guys down there.
24:37 Oh yeah
24:37 Came out ofthe woodwork.
24:38 This is Operation, ah. Operation Secure.
25:l^Yeah we have fifty rounds left.
^

18238

25:17Yep
25:19TwoSix; Six Romeo over.
25:21Two-Six; Romeo over.
25:23 Hey roger,whafs your current location over7
25:47 Six; speak it's Romeo.
25:50 Three-Six Romeo; Six Romeo over.
25:52 Roger, at the six once it's back on this guy.
25:5^ Lost him.
2^:00 that's he gotforus7
2^:01 Standby
2^:0^ HotelTwo-Six; Crazyhorse One-Eight.
2^:21 Hey,did you got action on that target yet over7
2^:25 Speak to Charlie roger.
2^:32 HotelTwo-Six; Crazyhorse One-Eight.
2^:55 Bushmaster Six; Crazyhorse One Eight.
2^:59 Roger, you have traffic over.
27:02 Roger. Uh, just wondering if you had anything else you wanted us to drive on7
27:08 Yeah roger keep on, ah, for the time being over.
27:llSix calls Six Romeo.Can you teft battalion that fwo civilian children casualties are
coming
back to Rustamyan in the Bradley over.
27:2^ Six calls Six Romeo.
27:29 Bushmaster Six Copper ^^ite Six.
27:32 Copperhead ^^ite Six; this is Bushmaster Six Romeo over.
27:3^ Roger, that'sanegative on the evac of the two, ah, civilian, ah, kids to, ah, rusty they're
going to have the IPs link up with us over here.Break. IPs will take them up toalocal hospital
over.
27:50 That^sagood copy over.
27:54 One six over.
28:08 ^here they're all goingto
28:10Sayagain7
28:12^here all those dismounts are going to7
28:18Going into this hous-.Sorry
29:29 Three Six,Three Six; Bushmaster Six Romeo over.
29:37 Six Romeo, Six Romeo.
29:39 Roger, Bushmaster Seven wants an up on aft personnel in your platoon over.
29:44 Roger
30:08 ...ftiendlies on the roof
30:10Crazyhorse One-Eight; this is Bushmaster Four over.
30:12Bushmaster Four; this is Crazyhorse One-Eight.
30:15Roger,Ican ah hear smaft arms fire ftom your engagement area at two zero zero zero ah
about three hundred meters ftom that objective over.

18239

30:27 Crazyhorse; ftom whatlunderstand small arms fire at fwo zero zero zero degrees about
two hundred meters.
30:39 .lust to the southwest.
30:41 Yup
30:49 Right about where we engaged.
30:51 Yeah, One ofthem with that RPG or whatever.
30:55 He's gotaweapon. GotanRI^AI^ 47.
30:58 HotelTwo-Six; Crazyhorse One-Eight.
31:02 Gonna lose him.
31:03 Crazyhorse One-Eight this is HotelTwo-Six over.
31:08 Roger, have another individual withaweapon.
31:10Dammit, they're in the same building.
31:12 Hey roger that,just make sure that ah, you're firing ftom west to cast over.
31:l^.Iust went in the building.
31:18CrazyhorseThree and Four will be on their way.
31:21 The individual walked into the building previously past grid. So there's at least six
individuals in that building with weapons.
31:30 ^ecan putamissile in it.
31:31Ifyou'dlike, ah, Crazyhorse One-Eight could putamissile in that building.
31:4^ It'satriangle building. Appears to be ah, abandoned.
31:51 Yeah, looks like it's under constmction, abandoned.
31:52 Appears to be abandoned, under constmction.
31:5^ Uh,likelsaid, six individuals walked in there ftom our previous engagement.
32:01Crazyhorse One-Eight; this is Bushmaster Six Romeo. If you've PIDed the individuals in
the building with weapons, go ahead and engage the building over.
32:08 Crazyhorse One-Eight; will be coming up north to south engaging with Hellfire.
32:13 Aft right, I'm going to do manual.
32:17Aftright,we've been cleared to engage with...
32:18This is Bushmaster Six Romeo.Crazyhorse One Eight is going to be engaging north to
south with Hellfire missiles over.
32:24 This is HotelTwo-Six. Roger.
32:2^ Aft right, you ready7
32:271^0, I'm trying to get over to the l^ovember.Trying to find the fucking...
32:33 This is Bushmaster Six. Has that RPG round been extended already or is it stift live, over.
32:38 Looks live to me.
32:40 Let me know when you're going to fire.
32:44 Aft right, I'm fucking havingabrainf^rt.^here's the man advancement7
32:48 You got one on the clutch on the bottom left on your left door.
32:54 Roger let me stand by.
32:57 Gotit7
32:591^0
33:03 Aftright
10

18240

33:09 Let me just putakilo in there.
33:120k
33:15Gotit7
33:21 Putakilo in7
33:22 All right, let me get back.
33:2^ I'm gonna come around, get some more distance.
33:27 Roger that, you're clear.
33:33 Got more individuals in there.
33:3^You wanna hit ftom north to south or you wanna go ftom west to east7Idon^twanna fire
with the friendliesrightthere, you know.
33:41Yeah, go north to south.
33:53 Right, come around, right.
33:5^ I'mjust gonna put one or two in, ifthey want any more.
34:09 Right
34:12 Found the missile.
34:15Roger,fft get you in this straight.
34:l^You're clear.
34:17I'm tiring.
34:2^Targethit
34:28 It wasamissile.
34:29 Left
34:32 You're clear. I'm above you.
34:3^ Crazyhorse One-Eight; was that explosion you engaging over7
34:38 Crazyhorse One Eight, roger. Engaging building with one hellfire.
34:4^ Let's come around and we'll clear the smoke, ^e'ft fire one more.
34:50 Hey uh,we're going to wait for the smoke to clear.
34:52 Yes Crazyhorse One Eight now.^e're going to put one more missile into the building.
34:57Yeah, did it ah, go in the building7Isee the wall knocked out ofthe way.
34:59Yeah,ftwentin.
35:01BushmasterSix Romeo; this is HotelTwo-Six.Yeah roger, that was Crazyhorse engaging
with one Hellfire over.
35:10Yeahroger,Igotal^ovemberifyouwant.
35:12 Fire away.
35:13Youwantustofire7
35:18Youready7
35:19Yep
35:20 Bushmaster Six Romeo.They are going to engage ah,with one more Hellfire in that
building.
35:24 Uhshit,whyIdoIhaveAPfiashing on there7
35:47 ^e're not even going to watch this fucking shit7
35:49 Tift next one.It won't come around,Ineedalittle more distance.
35:53 Still want me to shoot7
II

18241

35:57 You guys, following hot.
35:59 Roger
3^:13You are clear.
3^:14Roger.
3^:1^You going to bring up the missile7
3^:18Roger
3^:19And firing.
3^:20 Come down7There you go.
3^:23 Fire
3^:24 All righf
3^:28 I've got, ah backscatter.
3^:30 All right, come around.
3^:32 Roger.
3^:34 Coming around left, backscafter.
3^:53 There it goes^ Look at that bitch gol
3^:5^Patooshl
37:03 Ah, sweet.
37:07 ^eedaliftle more room.
37:09 l^ice missile.
37:llDoesitlookgood7
37:12Sweet
37:l^Uh,youready7
37:18Roger.
37:30 There'salotof dust
37:3^ Crazyhorse One-Eight; this is HotelTwo-Six.^asthereaBDA7
37:40 This is Crazyhorse One-Eight. Stand by,engaging with another Hellfire.
37:43 Allright
37:45 You'reclear.
37:47 Lemme know when I'm clear.
37:50 Rogerthat.
37:59 Alright, he wasn't.
38:02 HotelTwo-Six; Crazyhorse One-Eight.
38:07 Go ahead, Crazyhorse One-Eight.
38:09 Roger, building destroyed. Engaged with three hellfire missiles.

12

18242

REUTERS

i

Writer's Direct Dial
+1 (646) 223 4212
Writer's Email
;,-iiii",:ir, !:ii'^,;ui;'.i;>;i> w-r

July 25, 2007

Via Email
Bryan Whitman
Deputy Assistant Secretary for Public Affairs
Department of Defense
The Pentagon
Washington, DC 20301-1000

Re:

FOIA Request relating t o the killing of Reuters journalists Mr. Namir NoorEldeen a n d Mr. Saeed Chmagh

Dear Deputy Assistant Secretary Whitman:
This is a request under the Freedom of Information Act (5 U.S.C. § 552) for:
All documents, reports, information, video and audio recordings and any
other evidence or materials (whether in hard copy or electronic form) in
the possession of the Department of Defense relating to the killing of
Reuters staffers Namir Noor-Eldenn and Saeed Chmagh in Baghdad, Iraq
on July 12, 2007 during the operations overseen that day by 2nd
Battalion, 16th Infrantry Regiment, 4th Infantry Combat Brigade, 1st
Infantry Division ("2nd Battalion").
This request includes, but is not limited to, any video recordings taken by
Apache helicopters, other air support craft, humvees and any armored
ground vehicles in the area, whether under the command of 2nd Battalion
or other units operating in support of 2nd Battalion.
This request also includes, but is not limited to, evidence and materials
obtained in the course of the investigation into the killings of Mssrs. NoorEldeen and Chmagh being conducted by Brigadier General Vincent
Brooks.
Reuters is willing to pay reasonable fees incurred in the course of produce the materials
requested herein.
Reuters America '.nc.
The Retitrry. [iijilrlinrj

TSK716

nA-fili^'y

ManningB_00412534

•)! tf-jtr't

Ciot'p

.3 TliTie.? Square

rel 646-223 4 0 0 0

Now York NY 10036

www. r o u t o r s . c o ^

I'LC, >•»
oi I -r-lrtn

' ("•!(' tA.iW
Ht.rp

DEFENSE EXHIBIT / A for ifk^dHcstion
PAGE OFFERED:
FACE ADMITTED:,
PAGE
of
PAGES

18243

REUTERS t

July 25, 2007
Bryan Whitman
Page 2

As this information concerns a matter of urgency, please provide an expedited review of
this request and contact me directly by telephone or email if you have any questions or
need additional information
Sincerely yours,
'
/

ly,

2:

Thomas S. Kim
Senior Vice President
Global Head of Compliance Assurance
Principal Legal Counsel
cc:

ManningB_00412535

Rear Admiral I Mark Fox (via email)

18244

L M n B s ; .\
(.I'^M R.^L {:OW;.:%\D
Oi ViCKOI- 'i\A\'.i'nW.\ Oi \ j 4fT
r,

,A

24 April 2(X)9
Mr. Thomas S Kim
Reuters America Inc.
The Reuters Building
.3 Times Squiue
New York. NY 10036
Dear Mi. Kim.
I am willing in response lo your Freedom of Infonnahon Act (FOIA) request for all
documents, reports, information, video and audio recordings relating lo the deaths of Mr. Namir
Noor-lildeen and Mr. Saeed Chmagh. Reuters joumalists.
USCENTCOM conducted a through search and located eight responsive documents. After
reviewing the infornjaiion, i h^ve cieterniined diat three {.Atlack Mission Request, Mission
Journal, and Slory Board) documents are currently and property classified in accordance with
Executive Order 12958, as amended, sections 1.4(a), military plans, operations, or weapon
systems; and 1.4(c), intelligence activities. Therefore, the national security information is
withheld pursuant 5 U.S.C. .552(b)(1). classified information. Additional infonnation identified
in ail eight documents is protected piuvsuani to 5 U.S.C. 552 (b)(2)liigii, information regarding
internal mies or practices; (b)(3), as it relates to 10 U.S.C. i3{)b, personnel in overseas, sensitive
or routinely deployable units; (b)(5). inter-agency records; and (b)(6), protection of personal
privacy. As such. I'm enclosing six partially released documents. Tlie Mission Journal and
Story Board documents arc withheld in their entirety.

Accordingly, in my capacity as the Initial Denial Autiiority. by withholding this information I
am panially denying your request. The cost for processing your request is S352. Please make
payment lo U.S. Treasury' Department and remit to USCENTCOM for processing. If you arc not
satisfied with tins action, you may appeal to the appellate authority, the Director of
Adntinislration and Management, Office of the Secretary of Defense. To submit your appeal,
you should write directly to the Defense Freedom of Information Policy Office. Attn: Mr. James
Hogan, 1155 Defense Pentagon, Washington D.C. 20301-1155. Your appeal should be
postmarked within 60 calendar days of the date of this teller, should cite case number 07-0240,
and should be clearly marked "Freedom of Information Act Appeal."

ManningB_00412536

18245

It you have any questions regarding this FOIA request, please contact my FOIA Requester
Service Center at (813) 827-1810 and refer to USCENTCOM FOIA 07-0240 when inquiring.
Sincei'clv,

J^Y W. HOOD
lajor General, U.S. Army
Enclosures:
Action By Appointing Authority
Sworn Statements
Attack Mission Request
Photographs
Isl Air Cavalry Brigade AR 15-6 Investigation
2nd Brigade Com'nat Team 15-6 Investigation
DD Form 2086. Record of FOIA Processing Cost

ManningB_00412537





3 23?
- 3 fl? .1-8.246
siivci?
-131? {vi

UNITED STATES CENTRAL COMMAND
1: 15 sotmt BOUNDARY BOULEVARD
MACDILL M8 mace FLORIDA 33621-5201

13 October 20lO



Tampa, Florida, 33608.
FOR United Suites Anny Office ofthe Judge Advocate General USA OTJAG

SUBJECT: CENTCOM Assessment of the 1? Cavalry Division Classi?cation Determination of
Apache Video {Tasker 20100921-044)

References: (A) Email chain ?om OUSD
(B) CENITCOM Regulation (CCR 380-14, USCENT COM Security Classification
Guide 0110, Dated: 26 Februaxy 2010

1. Purpose. The purpose of this memorandum is to provide a position in response to the
question of whether or not the information contained in the subject video should be
classi?ed at any level {Reference A).

2. CENTCOM Position. In our view. the video in question should be deemed
UNCLASSIFIED. Reference 8 sets out guidance for classi?cation of materials in the
CENTCOM Area of Responsibility. The guidance covers a wide range ofissucs, but in
this instance the relevant category is on page ?Speci?c Operational Information.?
Under this category, operaticsnal information may be ifthe information
describes a past event in genetic terms, provides no indicators of potential futme
operations. does not provide speci?c locations, unit data, capabilities, or does not
embarrass Coalition The subject video meets these criteria and should therefoze
be It is possible that some elements ofthe video may have warranted
higher classi?cation at the time of the event, but without specific operational context we
cannot now make an amessrne-at on this.

:1

3. The POC for this memorandum is MAJ Btian J. Salie at ?or via email at
I.



M. DON AN
RADM, USN
Director of Operations

Classi?ed by: CCR 380-14, USCENTCOM Security Classification Guide 0110, Dated: 26
Febmaxy 20i0

Reason; 1.4

Declassify: 17 September 2010 +10 years or upon completion of project. whichever is sooner

- 33?} Wm

-

9%



18247

iiiiii
AFFIDAVIT OF CHRISTOPHER BUTLER
www.archivc.otg
415.561.6707
415.840 0391 i-lax

1. I am the Office Manager at the Internet Archive, located in San Francisco,
California. I make this declaration ofmy own personal knowledge.

Innrnct .Archive

300 l unsKHi .\vauit
San i rancisco. CN
. 94118

2. The internet Archive is a website that provides access to a digital library of
Internet sltcs and other cultural artifacts in digital form. Like a paper library, we provide
free access to researchers, historians, scholars, and the general public. The internet
Archive has partnered with and receives support from various institutions, including the
Library of Congress.
3. The Internet Archive has created a service known as the Way back Machine. The
Way back Machine makes it possible to surf more than 240 billion pages stored in the
Internet Archive's web archive. Visitors to the Way back Machine can search archives
by URL (i.e., a website address). If archived records for a URL are available, the visitor
will be presented with a list of available dates. The visitor may select one ofthose
dates, and then begin surfing on an archived version of the Web. The links on the
archived files, when served by the Wayback Machine, point to other archived files
(whether HTML pages or images). If a visitor clicks on a link on an archived page, the
Wayback Machine will serve the archived file with the closest available date to the page
upon which the link appeared and was clicked.
4. The archived data made viewable and browseable by the Wayback Machine is
compiled using software programs known as craw lers, which surf the Web and
automatically store copies of web files, preserving thesefilesas they exist at the point of
time of capture.
5. The Intemet Archive assigns a URL on its site to the archived files in the format
http://web.archive.org/web/fYear in yyyy][Month in mm][Day in dd][Time code in
hh:mm:ss]/[Archived URL]. Thus, the Intemet Archive URL
http://web.archive.Org/web/19970126045828/http://www.archive.org/ would be the
URL for the record of the Internet Archive home page HTML file
(http://www.archive.org/) archived on January 26, 1997 at 4:58 a.m. and 28 seconds
(1997/01 /26 al 04:58:28). A web browser may be set such that a printout from il will
display the URL of a web page in the printout's footer. The date assigned by the Internet
Archive applies to the HTML file but not to image files linked therein. Thus images that
appear on a page may not have been archived on the same date as the HTML file.
Likewise, if a website is designed with "frames." the date assigned by the Intemet
Archive applies to the frameset as a whole, and not the individual pages within each
frame.
6. Regarding archivedfilesstored in and made available via the Wayback
Machine, 1 further declare that:
A. to the best that the electronic systems involved can accurately record
and reflect, such files were captured at or near the time of the date
refiected in the URL assigned to each file by virtue of an automated
transfer of electronic data;

_

DEFENSE EXHlBlTf__for i ( k n t i ^ ^
PAGE OFFERED:
PAGE ApMlTTED:_
PAGE__of_PAGES

18248

^ ^ ^ ^

13. such records were captured by Internet Archive or received from third
party donors in the course ofreguiarly conducted activity by the
Internet Archive: and
C. the Internet Archive captures, stores, and receives from third party
donors web data asaregular practice.
7. The web archives for the year 2009 in the Wayback Machine at web.archive.org
were largely obtained from third-party organisations, which donated the archived data,
captured by automated electronic systems, to the Internet Archive. Ido not affirm that
these web archives were set forth by, or from information transmitted by, people with
knowledge ofthe information recorded therein.
8. This document is the Internet Archive'sstandard affidavit, the affidavit Intemet
Archive normally provides to parties seeking to useWayback Machine records as
evidence in legal proceedings, with additional language provided in paragraphs ^-8.
9. Attached hereto as ^:i^hibitAare true and accurate copies of printouts of the
Internet Archive^s records of the HTML files for theURLs and the dates specified in the
footer ofthe printout.
10.Ideclare under penalty of perjurythat the foregoing is true and correct.

DATE

: Clr;l>
o

(:

Christopher Butler

State of Calilomla, County of t ) ' ^ * * f^L> ^
Subscrit>ed and sworn to (or atfirmed)
>^
before me on this.
.clayo(_liZ&_


. . 2 0 . )3
!
o
t
(
J :
proved to me on the heals of satisfactory evidence to be the
personpg) who appeared (wfore me.

..by

L i ^ . 54tpL<

Signature —

(Seat)
^
JAMES RICHARD PRECIT
ECIT

\

Commission # 1942800
BOO I
Notify PuWIc - California
rnia 1
x^gmgc/

San Francisco County
g
My Comm. Expires Jul 1.2015 t
v - v v v v ^ v w w v v f

Exhibit A

'raft:The Most Wanted Leaks of 2009 - Wikileaks

1 of 1
18250

D raftrThe Most Wanted Leaks of 2009
From Wikileaks
2009's Most Wanted Leaks—the concealed documents or recordings most sought after by a country's joumalists, activists,
historians, lawyers, police, or human rights investigators.

Help us clarify and background the nominations so we can
discover which are significant and which are not. You may
securely and anonymously add information to this page for each
entry (click "edit" next to each country).
WikiLeaks will prioritize the list based on the available
information and seek to obtain the leading candidates directly,
through the legal system, or indirectly through ours network of
joumalists, intelligence sources, volunteers and readers. If you
email us (wl-editor@ljsf.org) we will alert you when the record
has been obtained.
The current order reflects the order of submission and is unlikely
to be related to the final order.
Winners for each country will receive a cash prize upto 1000
EUR, depending on how many countries submit.
Documents or other materials added nominated must:
• Be likely to have political, diplomatic, ethical or historical
impact on release.
• Be known to exist or have existed.
• Be plausibly obtainable to a well motivated insider or
outsider. For instance the entire collection of documents
held by the Chinese Ministry of Public Security { ^ ^ X K
# % S ^ ^ a P ) is not plausibly obtainable, but a specific
document or group of documents may be.
• Be well defined, and if possible, specific. Three examples
of well defined and specific:
• Inquiry into the Treatment of Detainees in US
Custody, 20 Nov 2008.
• East Timor Presidential assassination intelligence
intercept map 2008.
• Camp Delta Standard Operating Procedure (2004).
An acceptable example, which is known to exist and well
defined, but not specific:
• The current list of websites or URLS filtered by the
Chinese Public Security Bureau's "Great Firewall of
China" censorship system.
• Be described in enough detail so that a court, dissident
insider or visiting outsider not already familiar with the
material or its subject matter may be able to quickly locate
it, and will be motivated to do so.

Contents
1 International organizations
2 Austria
3 Australia
4 Bahrain
5 Canada
6 China
7 Colombia
8 Egypt
9 Finland
10 France
11 Germany
12 Greece
13 Guatemala
14 Italy
15 Kenya
16 Libya
17 Madagascar
18 Mali
19 Mexico
20 Niger
21 Norway
22 Puerto Rico
23 Rwanda
24 Russia
25 Slovenia
26 Sudan
27 Syria
28 Switzerland
29 Swaziland
30 Trinidad and Tobago
31 Uganda
32 United Kingdom
33 United States
• 33.1 Bulk databases
• 33.2 Federal politics
• 33.3 Military and Intelligence
. 33.4 Banking
• 33.5 Environment
• 33.6 Media
• 33.7 Religion

ttp://web.archive.org/web/20091104212937/http://wikileaks.org/wiki/Draft:The Most Wanted Leaks_of„2009

iraft:The Most Wanted Leaks of 2009 - Wikileaks

2 of 1
18251

Should, where possible, list all organizations, locations
and/or websites suspected of holding the material or
having information about how to access it.

34 Vatican

Be attentive to the content of your nomination. Do not worry
about making formatting mistakes. All copies of this page are kept and reviewed.
In the rare cases were a document might be destroyed or vaulted if it appeared on this list, send your nomination privately to
wl-editor@ljsf.org or securely via Chat.

International organizations
• Bilderberg Group meeting minutes, papers and annual reports of since 1954. WikiLeaks has some years already.
Bilderberg is an annual off-the record conference of transatlantic political, economic and ideological agenda setters. As
an historically important confidential document collection it is probably only equaled by Cabinet minutes and high
level intelligence and diplomatic assessments. Leads: There are some older, previously unnoticed records in boxes at
Uni of Illinois http://www.library.illinois.edu/archives/uasfa/1535051.pdf (1956-1970) the George Bush library,
http://bushlibrary.tamu.edu/research/finding_aids/pdfs/08-0379-F.pdf and the Eisenhower Library in Kansas
http://www.eisenhower.utexas.edu/Research/Finding_Aids/PDFs/Jackson_CD_Records.pdf
• Requests to the Security Council in 2003 that the Security Council look at what was happening in Darfur, and any
notes of discussions leading to the decision not to look at the situation
• Documents regarding the founding and operation of Alliance Base, cover name for a secret Westem Counterterrorist
Intelligence Center in Paris.

Austria
• E-Mail traffic between minister offinanceProell and Christian Konrad, who is advocate general of Raiffeisen bank.
• E-Mail traffic of FPO delegate Anton Mahdalik with Viennese mayor Michael Haupl and/or deputy mayor Michael
Ludwig containing threats when renting municipal ground to the Viennese trailor park ("Wagenplatz Wien").
• Source-code as well as certifications for the Austrian e-Voting system used in students elections.

Australia
• Federal cabinet minutes from the special session held on 18 March 2003. Context (/web/20091104212937/http:
//en.wikisource.org/wiki/John_Howard's_speech_to_the_Australian_Parliament_-_18_March_2003)
• The report of the national broadband network expert working group.
• Versions of the ACMA URL blacklist newer than 19 March 2009.
• Full details of filtering hardware/software vendors participating in government-sponsored ISP-level censorship
technology trials, including (but not limited to):
• Any and all commimications between filter vendors and govemment departments prior to, during, and after the
trials
• Any and all transactions, contracts, and otherfinancialarrangements involving filter vendors
• URL blacklist(s) used during above trials. Alleged (by govemment) to be ACMA URL blacklist.
• Full statistical breakdown of results of above trials, since Enex TestLab will not make them publicly available, and the
public report will be compiled by the same govemment department which is spearheading the censorship proposal (see
here (/web/20091104212937/http://www.cm.com.au/News/151876,conroy-promises-to-release-isp-level-filteringreport.aspx) and here (/web/20091104212937/http://www.amnet.com.au/article/314195
/enex_testlabs_isp_filtering_trial_up_scratch).
• URL blacklist as used by Watchdog NZ during private censorship technology trial by ISP Exetel in May 2009. Alleged
(by Watchdog) to have been IWF list (see United Kingdom).
• Written exam NSW police officers must take annually before they can be issued with Tasers.
• Volume 1 of the New South Wales-Commonwealth Joint Task Force Report on Dmg Trafficking. It was suppressed at
time of publication and has not yet been released. Possibly contains information on Nugan Hand Bank, CIA and drug
trafficking and/or connections of Peter Abeles and Bela Csidei to dmgs. But we wont know until it is no longer
suppressed.

ttp://web.archive.org/web/20091104212937/http://wikileaks.org/wiki/Draft:The Most_Wanted Leaks of 2009

^raft:The Most WantedLeaksof2009 Wikileaks

3ofl
18252

^al^rain
^ Documents disclosing the number of citizenships that have been granted in the last few years, in an effort to change the
country's demography.See Political naturalisationlll(/web/20091l04212937/http://www.ihrc.org.uk
/show.php7id^2860)

Canada
^ Documents disclosing the number of Authorization to Carry permits the provinces have issued for the purposes of
preservation oflife.Provincial ChiefFirearms Officers have refused to release this information citing that it could
potentially compromise the identities of those that hold licenses.

Cl^ina
^ Alist of URLs and keywords censored filtered by the Great Firewall of China.WikiLeaks has previously released
related information, for example, watch lists, policies and several thousand URLs for CCTV and Baidu, but not for
general http filtering.
^ Policy options on Darfur formulated in response to the so-called Genocide Olympics campaign led byAmerican
actress,Mia Farrow,and notes of meetings in 2007 between Stephen Spielberg and Chinese Foreign Ministry officials
prior to Spielberg's resignation as Artistic Director of the 2008 Beijing Olympics.

CoIon^I^ia
^The DAS (Departamento Administrativo de Seguridad) is reported to have surveilledawide array of public officials,
private citizens, and organizations. Documents wanted: contracts to supply software for intemet surveillance to
Colombian policy agencies and details of the software supplied.
^ ^ ^ ^
^The complete list of current political prisoners and the charges against them.

Finland
DThe so called Tiitisen Lista, the list ofl8persons claimed to have been in active contact with East German security
services (Stasi). The list was received from the West German intelligence services (BND) in 1990 and since classified
by the order ofPresident Koivisto as adviced by the head of the Finnish Security Police (Suojelupoliisi),Seppo
Tiitinen.It is mmoured that several curtent or formertop Finnish politicians appear on the list.
^The Bilderberg 2009 raport,Finnish President Tarja Halonen secured the papers.The request comes Finnish
ex-President Martti Ahtisaari,aformer Bilderberg participant.

France
^The list of people with an office at the Elys^e and their function (to expose resident lobbyists,etc.)
^ Documents regarding the founding and operation of Alliance Base,cover name forasecret Westem Counterterrorist
Intelligence Center in Paris.
^ The Monthly Health Report ofPresident Nicolas Sarkozy.as promised by himself during the last presidential elections.

C^em(an^
^TheStasi(/web/2009ll04212937/http://en.wikipedia.org/wiki/Stasi)filesofFederal Chancellor AngelaDorothea
Merkel (maiden name Kasner) and other leading politicians, which are known to exist, but withheld from public.
^The Stasi files relating to operation Gladio/stay behind organisations in relation to right-wing terrorism in Germany
(/web/20091l042l2937/http://wwwheisede/tp/r4/artikel/30/30390/lhnnl),asperaparliamentaryrequestbythe
Green party.
^The complete Toll-Collect contracts.

Itp://web.archive.org/web/20091l042l2937/http://wikileaks.org/wiki/Draft:The Most Wanted Leaks of 2009

iraft:TheMostWantedLeaksof2009 Wikileaks

4ofl
18253

^Cross-Border Leasing contracts of the Berlin Transport Corporation (BVG).
^The so called'Atlas der Wut",adocument about the risk of riots in different german regions.The list is said to be
updated regulary and was first written in 2005.
^ -The list ofNPD party members.
^The censorship filter list for the proposed national,mandatory censorship system. The list will be compiled by German
federal criminal police BKA and distributed to intemet service providers.
^The contents of the contract between the BKA and some ISPs that has already been signed,but is kept secret due to
"public safety" and copyright concems(seehttp://blog.fefe.de/7ts^b4fa8af8).
^The List ofMedia Harmful toYoungPeople(the censorship system already in place).The "virtual media" part of this
list is distributed to search engine providers and is illegal to publish. It probably could be reverse engineered using the
differences between googlecom andgoogle.de search results.Also,if you want to knowifaspecific medium is on the
list,you can send an enquiry to liste@bundespruefstelle.de(mailto:liste@bundespmefstelle.de)("Bundesprufstelle" is
the agency responsible for keeping the list).
^ Ursula von der Leyen's driver's logs (Fahrtenbuecher)that she refuses to make public.

C^reeee
^Documents related to the Athens affair that have yet to be released (including those from countries other than Greece.)

Cruaten^ala
^ All documents on Plan Victoria 82, Plan Sofia and Plan Firmeza 83.
^ Final report of United Nations'Historical Clarification Commission(CEH) into the killing of 200,000 Mayan people
and the involvement of the US govemment and American corporations.The report official sources(militar interviews,
campaign plans,etc)are kept secret by the UN in NYC.
^ Documents on Canadian corporation named Goldcorp withamining operation in Guatemala, especially information on
where the Gold they extract is processed and who is buying the gold(wethittk it might beaSwiss company).
Detail:
PLANVICTORIAANDPLANSOFL^^
in the process of trying to bring military personal involved in human rights violations and massacres that happen during the
civil war in Guatemala to justice,the military have been required to declassify many war documents.Inacase,that went all
the way to the Supreme Court of Guatemala,the Court dictatedasentence that confirmed the obligation of the Ministry of
Defense of Guatemala to hand over the official documentation of four specific military operations: Campana Sofia 82,
Victoria 82, Firmeza 83 and Operacion Ixil. The Supreme Court sentence indicated that this achieves had to be declassified
and made public yesterday.
These military operations were carried out in the 80s. According to the CEH, Historical Clarification Commission of
Guatemala final report contained in "Guatemala: Memory ofSilence",these military operations resulted in massacres and
severe humanrightsviolations.
The Minister ofDefense AbrahamValenzuela only delivered partial information about plansVictoria 82 and Firmeza 83,two
of the four requested plans. He indicated that he had no knowledge of the other two plans before he became Minister of
Defense and that he ignores where the documentation could be. He stated that he could not deliver the complete plans
"Victoria 82"y"Firmeza 83" because certain information was considered state secret andaconcem of national security.
^ "'Plan Sofia"aderivative of ""PlanVictoria 82",was of special concern to
human rights activists: this plan was conceived in Iulyl982,four months afterGeneral Efrain Rios Montt came into power.^
^SOWEWILLREAULYLIKETOOBTAINTHECOMPLETEDOCUMENTSOFPLANVICTORIA
82,PLANS0FIAA1^DPLANFIRMEZA83^

ttp://web.archive.org/web/2009ll04212937/http://wikileaks.org/wiki/Draft:The Most Wanted Leaks of 2009

iraft:The Most Wanted Leaksof2009 Wikileaks

5ofl
18254

^CEHARCHIVES^
The United Nations'Historical Clarification Commission (CEH^ for Guatemala tssuedareport where the US govemment and
several American corporations were accused ofcomplicity in the genocide of nearly 200,000 Mayan people during
Guatemalans bloody 36-year civil war. Thefinal3,600-pageCEH report clearly places the blame for most of the 200,000
deaths on the 7racist7 policy of the Guatemalan govemment and holds the country7s military and paramilitary forces
responsible forthe actual killings.tortures and disappearances.
However,it accuses the US of directly and indirectly supportinga7fratricidalconfrontation7by providing sustained training,
arms andfinancialaidThe report is based on the testimony of9,200 people from all sides ofthe conflict and other
documents^,classified and Secret,protected in the UN headquarters in NYC.^The CEH investigated42,000 human rights
violations, 29,000 of which resulted in deaths or disappearances and therefore, the documents under UN custody are
fundamental for the prosecution ofthose responsible ofthe crimes.
^GUATEMALA,SWITZERLAND ANDCANADA^
ACanadian corporation named Goldcorp hasamining operation in Guatemala with poor environmental conditions and
harming health of many workers andacommunity asawhole.We will like to know:
-Where the Gold they extract is processed.
-Who Is buying the gold (we think it might beaSwiss company)

^^^1^
^ ^//documents pertaining to Nazi Germany and theVatican,as well as those relating to the post-war rat line to
Argentina. Refer to http://news.bbc.co.Uk/2/hi/europe/26ll847.stm
^The^//Italian censorship,of which Wikileaks currently only hasasubset.

^en^a
^The international investigative firm Kroll associates produced at least four reports on high level Kenyan cormption
after first term of the Kibaki govemment.Adraft version of one of the reports The looting ofKenya,was previously
published by WikiLeaks.The reports were given to selected members ofPresident Kibaki's cabinet at the time and are
likely still held by http://www.kroll.com.uk/, notably lead investigator Andrew Marshall.

Lil^^a
^ Documents indicating arrangements with the Sudanese government to grant land in Darfur to Arab settlers from Libya
(Civilians and adminisrators on the gruond in Darfur indicate this has been
taking place).

^adagasear
Both sides of the political conflict in Madagascar are crying fouls about the deals made by their counterparts with foreign
entities. The release of the official documents with respect to contract negotiations about:
^ Oil exploitation in the region ofBemolanga(SouthofMadagascar)byTotal^others
^ an obvious one but the proposed final contract before rejection of the land deal with Daewoo Logistics.
^-The recent agreement with Saudi investment group on staple products and proposed ^2 billion USD investment.
DThe revised mining exploitation agreement with Sheritt in Ambatovy and RioTinto in Fort-Dauphin.
^ Least but not last, the complete list of current political prisoners and the charges against them.

^ali

Itp://web.archive.org/web/2009ll04212937/http://wikileaks.org/wiki/Draft:The Most Wanted Leaks of 2009

iraft:The Most WantedLeaksof2009 Wikileaks

6ofl
18255

^ Documents indicating arrangements with the Sudanese govemment to grant land in Darfur to Arab settlers from Mali
(Civilians and adminisrators on the gruond in Darfur indicate this has been
taking place)

^e^ieo
^Zapotec indigenous people demand transparency fromU.S.Scholar and full disclosure of all the agreements between
U.S.Govemment and their agencies andU.S.geography scholar Peter IIerlihy,especially confidential agreements with
Foreign Military Studies Office.Prof.Herlihy failed to mention that he received funding from the Foreign Military
Studies Office of theU.S.Armed Forces on the research of "Mexico Indigena" project.Mexico Indigena Project forms
part of the Bowman Expeditions,amore extensive geographic research project backed andfinancedby the FMSO,
among other institutions.The FMSO inputs information intoaglobal database that forms an integral part of the Human
Terrain System (HTS),aUnited States Army counterinsurgency strategy designed by Foreign Military Studies Office
and applied within indigenous communities, among others.
^ Documents to unveil the real purpose of "Ruta Maya 2002 Isuzu Challenge". The convoy was commanded by Ben Nun
Avihu,Israeli militar and Moshe Savir,geography expert and around 50 tourists in 40 Isuzu Jeep. Some communities
linked the incursion with biopiracy. The terrain they explored is controled by the EZLN.
^ Documents related with the fraud and corruption around FOBAPROA (Fondo Bancario de Proteccion alAhorto).
^ Documents offinancialoperations just before thefinancialcrisis ofl994(some say the govemment knew before that
the crisis was coming and took advantage ofthe information protecting their interests).
^ Documents related with the World Bank credit and application of the budget to combat swine flu.
^ Documents related with the technology curtently used in cellphones in Mexico to implement the RENAUTprogram
(/web/200911042l2937/http://www.renaut.gob.mx/RENAUT/) Information about the security technology used to
protect data collected from users.
^ Documents related to the transparency ofPlan Merida (/web/20091l042l2937/http://en.wikipedia.org/wiki/M
^C3^A9rida_Initiative)

^iger
^ Documents indicating arrangements with the Sudanese government to grant land in Darfurto Arab settlers from Niger
(Civilians and adminisrators on the gruond in Darfur indicate this has been taking place).

^or^a^
^The secret verdict in the court case between the ISP LyseTele and the law firm Simonsen,decided the 5th ofMay
2009,where Simonsen demanded LyseTele disclose the identity information ofafile sharer suspected of uploadinga
copy of the movie Max Manus to thefile-sharingcommunity.

Puerto Rieo
^TheFBlhas not yetfinisheddeclassifying all the secret files related to surveillance ofPuerto Rican individuals and
organizations from the 1930 70 s http://www.prsecretfiles.net/index.html(not to mention,large sections of the files are
blacked out by the FBI). In addition, there are thousands of secret files produced by Puerto Rican police that were only
briefly made available to individuals themselves, and have now been closed off to the public. These documents provide
evidence of quiteasignificant spying and intimidation operation by the United States and local police against leftists
and independence movement leaders.

Rwanda
^ Documentation offinancialassistance given by the Rwandan govemment to General Laurant Nkunda for operations in
the DRC

Russia

ttp://web.archive.org/web/2009II04212937/http://wiki1eaks.org/wiki/Draft:-The Most Wanted Leaks of 2009

^raft:The Most WantedLeaksof2009 Wikileaks

7ofl
18256

^ Intemal Kremlin, FSB and SVRR documents and emails into the series of Moscow apparement building bombings
shortly before Putin s Presidential election
^ Complete technical documentation ofthe "Perimetr" system (a.k.a. "Dead Hand""),along history of deployment and
removal from deployment (ifdone). Political documents relating to the deployment of ""Perimetr".
DMaps,floor plans,and blueprints ofMountYamantaw and Kosvinsky Mountain,and any otherfacilities similar to the
conjectured facilities there, including names and locations.
^ Documents related to the VRYAN crisis, especially political documents, analyses of intelligence, and specific steps
taken. Information on the mindset of the Politburo, as well as intelligence services, and what exactly they feared, and
how credible they believed their fear to be.
^ Soviet psychological profiles and political analyses of American politicians.
^ Alist and description of the various agents prepared by the various Soviet and Russian bioweapons prograttts.
Indications of whether they developed recombinant DNA based agents,and what those are specifically.Weaponization
of agents, including re-entry vehicle mounting. Doctrine for use, including deniable use. Vaccines and treatments for
affected personnel.
^Technical plans,manuals,and blueprints forthe SS-27 SickleB(Topol-M),along with the Bulava.
^ Documents relating to nuclear warplans of the Soviet Union and Russia.
^ Documents relating to orbital weapons systems,and whether the Soviets ever deployed them(or still deploy them)
such as orbital HANE devices.

Slovenia
^Taped conversations between Slovenian opposition leader lanezlansa and Croatian prime minister Ivo Sanader in the
summer of 2004, held by Slovenian intelligence service SOVA.The tapes supposedly show the two were arrangeing
incidents on the coutry border that could help Slovenian opposition win the parliamentary elections in the falL

Sudan
^ Documents detailing discussions during 2005 meeting between Salah Gosh and the CIA (for which the CIA flew Gosh
on privatejet from Khartoum to CIA HO). See: http://www.sudantribune.com/article.php37id_article^10205

S^ia
^ All the documents related to the assasination,in 1965,ofMehdi Ben Barka still held in France,USA,Israel and
Morocco. In 1976, thanks to the Freedom of information Act, the US govemement recognized that the CIA had about
1800 classified documents about his assassination. Theses documents are still classified.

Switzerland
DThe full Comu Report.See http://en.wikipedia.org/wiki/Projekt-26^The_Comu Report

Swaziland
^ Expense accounts ofKing Mswati,the Ot^een Mother and the Kings wives.
^ Intelligence memos from the Ministry of Defence or Police about the pro-democracy organization, PUDEMO.

Trinidad and Tol^ago
^The Report on the Commission ofEnquiry into the constmction of the new Piarco Airport. This identified corrupt
practices in the spending of public funds.The Commissions report was delivered in August 2003.Nearly6years later,
itsfindingshave not been made public.
^The Report on the Caroni Bridge Collapse.Aman was killed whenabridgecollapsedafew years ago: again the
public has not been made aware of the report s findings.
^ Documents in relation to payments of attomeys by state. Numbers of these payments are being kept secret from the
public.

^ Acopy of the contract for the billion-dollar Waterfront Development Project.
ttp://web.archive.org/web/200911042l2937/http://wikileaks.org/wiki/Draft:The Most Wanted Leaks of 2009

^raft:TheMostWantedLeaksof2009 Wikileaks

8ofl
18257

^List of recipients and amounts of scholarships sponsored by Ministty of Culture for study abroad.
^ Report of thefindingsof the current C^^^^.^.^/^^^^^^^/B^/^^^^/^^/^^^^/i:^^.^r^^^^^
Detail:
As far asTrinidad andTobago goes,our govemment tends to pay lip service to the principles of transparency and
accountability.For instance,there isaFreedom of Information Act which,by law,allows the public to seek information from
govemment departments.But quite often,when such attempts are made by the citizenry,the govemment bars full disclosure.
Depending on how importantapiece of information is to Joe Public,he may actually have to tum to the courts to ""force" the
govemment to reveal facts that should be disclosed voluntarily.Followingareafew examples of
documents that should be made public, but have not been:
^The Report on the Commission ofEnquiry into the construction of the new Piarco Airport This identified cormpt
practices in the spending of public funds.The Commissions report was delivered in August 2003.Nearly6years later,
its findings have not been made public.
DThe Report on the Caroni Bridge Collapse.Aman was killed whenabridgecollapsedafew years ago: again the
public has not been made aware of the report s findings.
^The Opposition recently brought up in Parliament the issue of taxpayers" money being used to pay attomeys by state.
Although the public hasaright to know how much of its funds were used in paying said attomeys,the Attomey
General refused to disclose the sums, saying it would be an invasion of the lawyers'privacy.
^ The same goes forarecent request in Parliament,whereby ^the Minister of Planning and Development was asked to
produceacopy of the contract for the billion-dollar Waterfront Development Projects.The Ministers response was
that she could not produce said contract for public discussion because there wasaconfidentiality clause contained
therein (foraproject being built with public funds).
^ The Ministry of Culture recently awarded scholarships for students to study abroad-when asked in Parliament to
disclose the list of recipients and the dollar value of the scholarships, the response was that this was private
information.
As such,many citizens are concemed that thefindingsofthe current ^Commission ofEnquiry into the local constmction
sectors, like many Commisions before it, will never see the light of day.

I^ganda
The government ofUganda has recently signedanumberofprofit-sharing agreements with several oil companies that are
conducting explorations in southwestem Uganda.My friend was in Kampala in January and spoke withanumber of
joumalists who believe that releasing these documents would beamajor step in increased transparency with respect to the
country's emerging oil industry.
^ Ugandan profit-sharing agreements with oil companies in south-western Uganda

Ignited ^ngdon^
^ List of current and expired D-Notices 1^21 (/web/2009ll04212937/http://www.dnotice.org.uk/the_system.htm)
^Theletter-RRanditsDANotice
^The secret cabinetminutes(/web/20091l042l2937/http://news.bbc.co.uk/2/hi/uk_news/politics/7752009.stm)and
legal advice (/web/20091l04212937/http://news.bbc.co.uk/2/hi/uk_news/politics/4381379.stm) pertainingto the
allegedly illegal war and ongoing occupation oflraq.
^ Documents revealing why the trial ofWangYam,who was convicted ofkilling Allan Chappelow, was held in camera,
the first UK murdertrial ever heard behind closed doors without access by press or public.
^ UK Govemment documentation into the investigation ofRoger Hollis,head ofMI5 between 1956 and 1965,including
the report by LordTrend, into the serious but apparently unproven allegations ofbeingaRussian Spy.
^ Copies of govemment minutes of meetings between Gordon Brown and/or Alistair Darling and representatives of
Lloyds Bank relating to the proposed takeover ofUBOS.
^ Acopy of the police intelligence handed to E.ON about climate change protestors.131 (/web/2009ll042l2937/http:
//www.guardian.co.tik/uk/2009/apr/20/police-intelligence-e-onberr)
^Documents detailing the information stored and collected by the Wythenshawe intelligence centre.141

^tp://web.archive.org/web/2009ll042l2937/http://wikileaks.org/wiki/Draft:The Most Wanted Leaks of 2009

^raft:-TheMostWantedLeaksof2009 Wikileaks

9of1
18258

(/web/200911042l2937/http://www.timesonline.co.uk/tol/travel/news/article5683677.ece)
^ Censorship list for the United Kingdom's "voluntary" filter system.Known to be held byThe Intemet Watch
Foundation (/web/2009ll04212937/http://www.iwf.org.uk/).Companies and their subsidiaries which are currently
being supplied with the IWF list. Most ISP's in the UK haveacopy of the IP's on the list.
^ The proper reasons for nationalisation of Northem Rock and Bradford^Bingley,and the subsequent sale of the latter's
savings buisiness to Santander.
^ Information regarding the valuation process to determine compensation for fromer shareholdersofNorthem Rock and
Bradford^Bingley,that is,the information the independent valuer uses to determine the final value of the
comapanies.
^Records of events during the twelve months leading up to the nationalisation ofBradford^Bingley.
^ Documents from Solicitors Regulation Authority's investigation into Davenport Lyons threatening letters related to
filesharing.
^The full unredacted copy of receipts and documentation relating to MPs expenses as was partly released by the Daily
Telegraph: in addition, any private communications regarding the leak of these expenses, especially if said
communications are politically significant.

Ignited States
l^i^lk^a^al^as^s
^Amirror of the complete Intellipedia site as ofll/1/2008,including article history.
^ Amirror of the Common Core database as ofll/1/2008.
DThe complete CIA Open Source Center analytical database.The database is extensive, unclassified,non-public,but
relatively accessible to certain outsiders afterjumping through hoops https://www.opensource.gov/
^The complete PACER database.The PACER database contains most US federal court records.They are legally public
documents,currently behindapaywall and unsearchable.Were the documents to be public the behavior of many
corporations would come to light. See http://arstechnica.com/tech-policy/news/2009/04/case-against-pacer.ars

F^^^^ali^oli^i^s
^ The missing five million White House emails-possibly no longer in existence.
^ Chenney and Rumsfeld Archives
^The White House visitors list
^Minutes or notes for VP Cheney's Energy Conference.
^The1141 pages of ACTA background documents not released to the EFF by the US Trade Representative(see 151
(/web/20091104212937/https://secure.eff.org/site/Advocacy7cmd^display^page^UserAction^id^420))
D Alist of all Whitehouse and senior federal govemment employees holding dual citizenship and the countries they
represent.

^ili^ai^yand^n^^lli^enc^
^TheSIOP
^OPLAN/CONPLAN 8022,2003 revision
^OPLAN/CONPLAl^ 8044,2007 revision
^ CIA detainee interrogation videos. While the CIA claims to have destroyed 92 of the videos, others are known to
remain.
^The US "'Black Budget",from inception to present,with line items,hopefully annotated and explained.
^ Detainee abuse photos withheld by the Obama administration.
^Ut^edacted Inquiry into theTreatmentofDetainees in US Custody,20 Nov 2008.
^ Memorandum between the CIA and the Department of State detailing any constraints on Darfur policy caused by
actual or anticipated Sudanese govemment cooperation on counter-tertorism, including CIA request to USUN that
Salah Gosh be removed from the UN Panel ofExperts list ofthose recontmended for sanction.See:
http://www.sudantribune.com/article.php37id_article^l0205
^ Department of State and CIA contributions to the Obama Administrations 2009 Sudan Policy Review,in particular
with respect to: a) Whetherto support the ICC arrest warrant against Sudanese President Bashir:b)whether to takea
confrontational or an appeasement approach to the Sudanese govemment on the issue ofDarfur.

Itp://web.archive.org/web/20091104212937/http://wikileaks.org/wiki/Draft:The Most Wanted Leaks of 2009

^raft:TheMostWantedLeaksof2009 Wikileaks

lOofl
18259

DCamp Delta (Guantanamo)Standard Operating Procedure 2005-2009.
^Camp Delta (Guantanamo) Interrogation Standard Operating Procedure 2003-2009.
^ Correspondence between the National Security Agency and American telecom companies such as AT^T, Verizon, and
Owest, regarding the warrantless wiretapping program. Cortespondence involving telecoms who cooperated with the
NSA(e.g.AT^T) may give dilTerent information than telecoms who refused(e.g.O^est),but both types would better
shed light on the NSAsprogram.The existence ofthis correspondence is well documented in the media, for example
that O^cst s lawyers refused to cooperate because the FISA Court had not signed off on it.
^h^aqandAfttanistan US Army Rules ofEngagement2007 2009 (SECRET)
^CIA/DL^GA/NSAanalysesofthe VRYAN crisisofl983.
^Technical specifications of the KH-lland follow-on satellites with similar capabilities.
^The contents of the Football,and how they changed over the years during the different Administrations.
^ What Pollard stole and gave to the Mossad, the full text.
^ US psychological profiles and political analyses of Soviet leaders.
D Documents relating to orbital weapons systems,and whether the US ever deployed them(or still deploy them) such as
orbital HANE devices.
^ Information about the PAN satellite and the agency responsible for it http://spaceflightnow.com/news/n0905
/26milspace/
^Commander Directed Report oflnvestigation Conceming an UnauthorizedTransferofNuclear Warheads Between
MinotAFB,NorthDakotaandBarksdale AFB,Louisiana 30 August2007(S//FRD//MR)
^ Investigation into the Shipment of Sensitive Missile Components toTaiwan (ADM Donald Report)-22May2008
(S//FRD//NOFOR^)
^AirForceComprehensiveAssessmentofNuclearSustainment(CA^S) July 2008 (S//FRD//NOFORN)
^ General Order Number One issued by commanders in Iraq and Afghanistan
^ Reports about Colombian "falsos positives"
^ Unredacted copy ofDept of Justices Office of Inspector General"s"AReview of the FBI'sActions Connection With
Allegations Raised By Contract Linguist Sibel Edmonds" Julyl,2004 (redacted version here http://www.wbez.org
/FILES/sibel.pdf)
^ All secret annexes for,attachments to,unredacted versions of,and documents implicitly or explicitly referenced
in the following documents, which may be partially available in unclassified form:
^ National Security Presidential Directive5l,"National Continuity Policy",May9,2007,also known as
l^omeland Security Presidential Directive 20
^Federal Preparedness Circular 65,"Federal Executive Branch Continuity of Operations (COOP)",July 26,
1999
^FederalResponse Plan 1FEMA9230.1-PL1,April 1999
^ Presidential Decision Directive 67, ""Enduring Constitutional Govemment and Continuity of Govemment
Operations",October21,1998
^ Presidential Decision Directive 63,"Critical Infrastmcttu^eProtection(CIP)",May 22,1998
^Presidential Decision Directive 62,"Protection Against Unconventional Threats to the Homeland and
Americans Overseas", May 22,1998
^^^Ci^,^ Federal Response Planning Guidance01-94,"Continuity of Operations(COOP)",December4,
1994
^ ^^^^7National Security Directive 69, "Enduring Constitutional Govemment", June 2,1992
^ ^^Ci^.^ Federal Preparedness Circu1ar61,"Emergency Succession to Key Positions of the Federal
Departments and Agencies", August 2,1991
^ Federal Preparedness Circular 62,"Delegation of Authorities for Emergency Situations",Augustl,1991
^ Federal Preparedness Circular 60, " Continuity of the Executive Branch of the Federal Govemment at the
Fleadquarters Level During National Security Emergencies", November 20,1990
^ National Security Directive 37, ""Enduring Constitutional Govemment", April 18,1990
^ Executive Order 12656,""Assignment ofEmergency Preparedness Responsibilities",November 18,1988
^ Executive Order 12472,"Assignment ofNational Security and Emergency Preparedness
Telecommunications Functions",April3,1984
^/^^^i^^NSDD 55,""Enduring National Leadership" September 14,1982
^ Executive Order 12148,"Federal Emergency Management",July20,1979
^ Alist of the actual facilities in the Federal Relocation Arc,as of the present time,along with their locations.
^ Blueprints,maps,and floor plans ofMWEOC.
^ Blueprints,maps,and floor plans ofSiteR(Raven Rock).

ttp://web.archive.org/web/2009ll04212937/http://wikileaks.org/wiki/Draft:The Most Wanted Leaks of 2009

iraft:TheMostWantedLeaksof2009 Wikileaks

llofl
18260

^ Blueprints and floor plans of all unmentioned facilities in the Federal Relocation Arc, including historical
ones.
^a^^^^
^The complete list of identities of the 52,000 wealthy American clients suspected ofhiding^l5 billion at UBS to avoid
taxes, including the names of any elected or appointed govemment or former govemment officials.
^The complete details of Goldman,Sachs^Co.'s counterparty exposure to AIG prior to the Federal bailout of AIG in
September,2008.
^^vi^i^^en^^
^ Monsanto's intemal evaluations of GMO products including safety and pollen drift,

l^e^a
DThe Editorial Guidelines for Fox News
^Emails relating to suppressed GO Magazine article on Putins rise by Scott Anderson mentioned atl61
(/web/2009ll042l2937/http://www.npr.org/templates/story/story.php7storyld^ll2530364)
Reli^io^
^ Mormons Church records
^ With recent leak ofl999/2006 Church Handbook oflnstmctions,pertinent documents and covertly
photographed artifacts in the vault at Church Office building or subsidy in Salt Lake City,Utah which expose
and negate Mormon Churchs claim of divinity and its monopoly on "'tmth."I.e.the concealed remnants of
diaries and letters written by formerearly Mormon apostle William McLellin 171 (/web/2009ll04212937/http:
//en.wikipedia.org/wiki/William_E._M^27Lellin^Personal_writings).McLellin diary and documents was the
main point of interest for convicted double murderer/bomber Mark Hofmann's planned forgery attempt to
deceive Mormon leaders to obtain in fraud by deception monetary reward to suppress truth of early Mormon
history unfavorable to current Mormon religion. For more info, 181 (/web/2009ll042l2937/http://www.utlm.org
/onlinebooks/trackingch3.htm).
^Documents ofMormon Churchs billion-dollar investment in City Creek Mall and Condominium in SLC,which
may put Mormon Church s IRS tax-exempt status in jeopardy if there is verification of the allegation the Church
used tithe and offering monetary contributions by the members to fund the project under the umbrella of
tax-exempted religious freedom.
^Mormon Church leaderships involvement in politics,such as correspondence to ecclesiastical subordinates
(bishopric)on policy and attitude towards same-sex civil rights^other sensitive issues relevant and conceming
to the leaders.As well as recorded cortespondences between Mormon members ofUtah legislation and Church
leaders on sensitive political issuBr^/^^^^^^es for legislation purposes which may contravene the separation of
church and state.
^ Uncovered film or audio recording featuring the play with the actor portraying Protestant minister encouraged by
Satan/Lucifer (portrayed by actor) to spread false doctrines to attack all religions outside ofMormon religion as
""abominable" which was exhibited for qualified "'temple reconm^end" audiences in all of the existing temples
priorto removal in 1990(almost like leaked Scientology orientation video) 191 (/web/200911042l2937/http:
//www.exmormon.org/mormon/mormon288.htm).
^ Unearthed secret audio or video recording inside Mormon temple with the temple members swearing ""blood
oath"before removal in 19901101 (/web/20091l042l2937/http://enwikipediaorg
/wiki/Blood_oath_(Latter_Day_Saints))
^ Documented Church leaders" and lay clergy"s cover-up of physical/sexual abuse and rape of minors by
missionaries and members without reporting to law enforcement in some cases1lll(/web/2009ll04212937/http:
//www.exmormon.org/mormon/mormon384.htm).
voider editions ofChurchHandbooksoflnstt^uctions from the first edition up1121(/web/2009ll042l2937/http:
//en.wikipedia.org/wiki/Church_IIandbook_of_Instmctions^IIistory)for comparison to recent leaked 1968
(tmncated),1999 and 2006editions.

ttp://web.archive.org/web/20091l04212937/http://wikileaks.org/wiki/Draft:The Most Wanted Leaks of 2009

iraft:TheMostWantedLeaksof2009

Wikileaks

12ofl
18261

Vatiean
^ The Index of the Vatican Secret Archive.At present prescrened scholars are allowed to see it but not copy it(under
scholar rule^l6http://asv.vatican.va/en/fond/amm.htm)
Retrieved from ""https://secure.wikileaks.Org/wiki/Draft:The_Most_Wanted_Leaks_of_2009"
Categories: AnalyseslUnitedStateslBulgarialCzechRepubliclDenmarklEstonialFrancelGermanyllcelandlltalyl
LatvialLithuanialNetherlandslNorwaylPolandlRomanialSlovenialSpainlTurkeylUnitedKingdomlSwitzerlandl
SwedenlMaltalPortugallLuxembourglFinlandlBelgiumlCypruslCanadalSlovakia

^^^^

^ ^ 1 ^ ^ ^ ^ , ^ ^ ^

B^.

^

^

^ ^ . ^

ttp://web.archive.org/web/2009ll04212937/htm://wikileaks.org/wiki/Draft:The Most Wanted Leaks of 2009

iraft:The Most Wanted Leaks of 2009-sort - Wikileaks

I of 1
18262

D raftrThe Most Wanted Leaks of 2009-sort
From Wikileaks
Somewhat sorted entries of the most-wanted list. Work in progress, TODO: Add brief, entity and date for each entry.

Contents
1 Austria
2 Australia
3 Bahrain
4 China
5 Colombia
6 Finland
7 France
8 Germany
9 Greece
10 Guatemala
11 Italy
12 Kenya
13 Libya
14 Madagascar
15MaU
16 Mexico
17 Niger
18 Norway
19 Puerto Rico
20 Rwanda
21 Russia
22 Slovenia
23 Sudan
24 Syria
25 Switzerland
26 Swaziland
27 Trinidad and Tobago
28 Uganda
29 United Kingdom
30 United Nations
31 United States
32 Vatican
33 Intemational organizations

Austria
Austrian e-Voting system used in students elections.
• Date: 18 May 2009
• Brief: We seek for details about Austrian voting system used in students elections, which includes but is not
limited to source code and certifications.
• Entity: Scytl (/web/20091105061330/http://www.scytl .com/) (programming)
• Entity: Austrian Federal Computation Center (/web/20091105061330/http://www.brz.gv.at/Portal.Node
/brz/public 7gentics .am=PCP&p .contentid= 10007.17664) (hosting)

ttp://web.archive.org/web/20091105061330/http://wiki1eaks.org/wiki/Draft:The Most Wanted Leaks of .2009-sort

^raft:TheMostWantedLeaksof2009 sort Wikileaks

2ofl
18263

^ Entity: Ministry ofScience(/web/2009110506l330/http://www.bmwf.gv.at/submenue/english/) (initiator)
^Entity: Robert Krimmer (/web/2009ll0506l330/http://www.e-voting.cc/topics/Team/)(consulting)
D ^l^aiItra^cbetw^t^.^osefProKaut^ Christian konrad.
^Date:777
^ Brief: E-Mail traffic between minister offinanceJosef Proll and Christian Konrad, who is advocate general of
Raiffeisen bank.
^Entity: JosefProll()Osef.proell@bmf.gv.at)
^Entity: Christian Konrad
^ ^ - ^ a i l traffic of Alston Mahdalil^ with l^ichaeinauplaud/or Michael L^udwi^
^Date:777
^ Brief: E-Mail traffic ofFPO delegate Anton Mahdalik with Viennese mayor Michael Haupl and/or deputy mayor
Michael Ludwig containing threats when renting municipal ground to the Viennese trailor park ( "Wagenplatz
Wien")
1^ Entity: Anton Mahdalik (toni.mahdalik@fpoe.at)
^Entity: Michael Haupl (michael.haeupl@wien.gv.at)

Australia
^ACMAU^^blacl^ist
^Date:l9March 2009 and later
^ BriefVersions of the ACMA URL blacklist newer than l9March 2009.1^^/^1^^,^ previously released three
versions of the list, two of which included WikiLeaks or its subpages.
^Entity: Australian Communications and Media Authority (/web/2009ll05061330/http://www.acma.gov.au
/WEB/UOMEPAGE/PC^HOME)
^ Censorship technolo^ in Australia
^Date:2009
^Entity: Australian Communications and Media Authority (/web/2009ll05061330/http://www.acma.gov.au
/WEB/HOMEPAGE/PC^HOME)
^Entity: Enex Testlabs (/web/20091105061330/http://www.testlabcom.au/)
^Entity: WatchdogNZ(/web/2009ll0506l330/http://www.watchdognetnz/)
^Entity: 1www.iwf.org.uk Intemet Watch Foundation!
^Entity: Exetel ISP (/web/20091105061330/http://exetel.com.au/news_main.php)
^Brief: Full details of filtering hardware/software vendors participating in govemment-sponsored ISP-level
censorship technology trials, including (but not limited to):
^ Any and all communications between filter vendors and govemment departments priorto,during, and
after the trials
^ Any and all transactions, contracts, and other financial arrangements involving filter vendors
^Details:
^ URL blacklist(s)used during above trials.Alleged (by govemment) to be ACMA URL blacklist.
^Full statistical breakdown of results of above trials (in the event that Enex Testlabs do not make them
publicly available).
^ URL blacklist as used by Watchdog NZ during private censorship technology trial by ISP Exetel in May
2009.Alleged (by Watchdog) to have been IWF list(see United Kingdom).
^ Full statistical breakdown of results ofWatchdog/Exetel's censorship technology trial-Exetel's official
response(/web/2009ll0506l330/http://forumexetel.com.au/viewtopicphp7f^^t^3l857^p244129)
seems lacking.
^ A n m ^ l N S ^ Police test
^Brief: Written exam NSW police officers must take annually before they can be issued with Tasers.
^Entity: NSWPolice(/web/2009ll05061330/http://wwwpolicenswgovau/)

^aln^ain

Itp://web.archive.org/web/2009ll0506l330/http://wikileaks.org/wiki/Draft:The Most Wanted Leaks of 2009 sort

iraft:TheMostWantedLeaksof2009 sort Wikileaks

3ofl
18264

^Documents re^ardin^ changes to countrysdemo^raphy.
^ Brief: Documents disclosing the number of citizenships that have been granted in the last few years, in an effort
to change the country's demography.See Political naturalisation1ll(/web/20091105061330/http:
//www.ihrc.org.uk/show.php7id^2860).

China
^Golden Shield Project
^Brief:AlistofURLs and keywords censored filtered by the Golden Shield Project(Great Firewall of China).
WikiLeaks has previously released related information, for example, watch lists, policies and several thousand
URLs forCCTV and Baidu,but not for general http filtering.
^Entity: Ministry of public security (/web/20091l05061330/http://www.mps.gov.ctt/)
^Genocide Olympics campaign
^Date:28thMarch2007
^Brief: Policy options on Darfur formulated in response to the so-called Genocide Olympics campaign led by
American actress, Mia Farrow, and notes of meetings in 2007 between Stephen Spielberg and Chinese Foreign
Ministry officials priorto Spielberg's resignation as Artistic Directorofthe 2008 Beijing Olympics.

Colon^hia
^Surveillance of citizens and organisations
^ Brief:The DAS (Departamento Administrativo de Seguridad) is reported to have surveilledawide array of
public officials, private citizens, and organizations. Documents wanted: contracts to supply software for intemet
surveillance to Colombian policy agencies and details of the software supplied.
^Entity: DAS (/web/2009ll05061330/http://wwwdasgovco/)

Finland
Tiitisen ^ista
^ Brief: The so called Tiitisen Lista,the list ofl8persons claimed to have been in active contact with East German
security services (Stasi).The list was received from the West German intelligence services (BND)in 1990 and
since classified by the order ofPresident Koivisto as adviced by the head ofthe Finnish Security Police
(Suojelupoliisi),SeppoTiitinen.lt is mmoured that several current or formertop Finnish politicians appear on
the list.
^Entity: Stasi (/web/2009ll0506l330/http://enwikipedia.org/wiki/Stasi)
^Entity: Koivisto (/web/20091l05061330/http://www.valtioneuvosto.fi/hakemisto/ministerikortisto
/ministeritiedot.asp7nro^167)
^Entity: Suojelupoliisi (/web/2009ll05061330/http://www.poliisi.fi/supo/)

Franee
NicholasSarl^o^yhealthreport
^Brief: The Monthly Health Report ofPresident Nicolas Sarkozy.aspronnsed by himself during the last
presidential elections.

C^ern^an^
Ceusorshi^ittGeru^atty
^ Details:
^ The censorship filter list for the proposed national, mandatory censorship system. The list will be compiled
by German federal criminal police BKA and distributed to intemet service providers.
^The contents of the contract between the BKA and some ISPs that has already been signed,but is kept
secret due to ""public safety" and copyright concems(seehttp://blog.fefe.de/7ts^b4fa8af8).
^The List ofMedia Harmful toYoungPeople(the censorship system already in place).The "virtual media"

ttp://web.archive.org/web/20091105061330/http://wikileaks.org/wiki/Draft:The Most Wanted Leaks of 2009 sort

iraft:The Most WantedLeaksof2009 sort Wikileaks

4ofl
18265

part of this list is distributed to search engine providers and is illegal to publish. It probably could be
reverse engineered using the differences between google.comandgoogle.de search results.Also,ifyou
want to knowifaspecific medium is on the list,you can send an enquiry to liste@bundespmefstelle.de
(mailto:liste@bundespmefstelle.de)("Bundesprufstelle" is the agency responsible for keeping the list).
^Entity: Bundesprufstelle(/web/20091l0506l330/http://wwwbundespmefstelle.de/)
^Entity: BKA (/web/2009ll0506l330/http://wwwbkade/)
^PoliticiansStasililes
^The Stasi (/web/2009ll05061330/http://en.wikipedia.org/wiki/Stasi)filesofFederal Chancellor AngelaDorothea
Merkel (maiden name Kasner) and other leading politicians, which are known to exist, but withheld from public
^ Operation Gladio
^Brief: The Stasi files relating to operation Gladio/stay behind organisations in relation to right-wing tertorism in
Germany (/web/20091105061330/http://www.heise.de/tp/r4/artikel/30/30390/l.hnnl),as peraparliamentary
request by the Green party.
^AtlasDer^ut
^Brief: The so called"Atlas der Wut",adocument about the risk of riots in different german regions.The list is
said to be updated regulary and was first written in 2005.
DThe list ofN^lO party members

Creeee
The Athens Affair
^Brief: Documents related to the Athens phone tapping affairthat have yet to be released (including those from
countries otherthan Greece)Context(/web/2009ll05061330/http://www.spectmm.ieee.org/telecont/security
/the-athens-affair/0)

Cuaten^ala
^PlanVictoria
Plan Soda and PiauFerme^ ^3
^ Brief: All documents on PlanVictoria 82,Plan Sofia and Plan Firmeza 83.
^Detail:
Within the process of trying to bring military personal involved in human rights violations and massacres that
happen during the civil war in Guatemala tojustice, the military have been required to declassify many war
documents.Inacase,that went all the way to the Supreme Court of Guatemala, the Court dictatedasentence
that confirmed the obligation ofthe Ministry ofDefenseofGuatemala to hand over the official documentation of
four specific military operations: Campana Sofia 82, Victoria 82, Firmeza 83 and Operacion Ixil. The Supreme
Court sentence indicated that the archives had to be declassified.
These military operations were carried out in the 80s. According to the CEH, Historical Clarification
Commission of Guatemala final report contained in "Guatemala: Memory of Silence", these military operations
resulted in massacres and severe human rights violations.
The Minister ofDefense AbrahamValenzuela only delivered partial information about plans Victoria 82 and
Firmeza 83,two ofthe four requested plans.He indicated that he had no knowledge ofthe other two plans
before he became MinisterofDefense and that he ignores where the documentation could be.He stated that he
could not deliver the complete plans "Victoria 82"y "Firmeza 83" because certain information was considered
state secret andaconcem of national security.
""Plan Sofia",aderivative of "PlanVictoria 82",was of special concern to human rights activists: this plan was
conceived in Julyl982,four months after General Efrain Rios Montt came into power.
^ T h e C ^ ^ archives
^Brief: Final report ofUnited Nations" Historical Clarification Commission (CEH) into the killing of 200,000

ttp://web archive .org/web/20091105061330/http://wikileaks.org/wiki/Draft:The Most^Wanted Leaks of 2009-sort

^raft:The Most WantedLeaksof2009 sort Wikileaks

5ofl
18266

Mayan people and the involvement of the US govemment and American corporations. The report official
sources(military interviews,campaign plans,etc)are kept secret by the UN in NYC.
^Detail:
The United Nations" Historical Clarification Commission (CEH) for Guatemala issuedareport where the US
govemment and several American corporations were accused of complicity in the genocide of nearly200,000
Mayan people during Guatemala7sbloody36-year civil war. Thefinal3,600-pageCEH report clearly places the
blame for most ofthe 200,000 deaths on the "racist" policy ofthe Guatemalan govemment and holds the
country7s military and paramilitary forces responsible for the actual killings, tortures and disappearances.
However, it accuses the US of directly and indirectly supportinga"fratricidalconfrontation"by providing
sustained training,arms andfinancialaidThe report is based on the testimony of9,200 people from all sides of
the confiict and other documents^, classified and Secret, protected in the UN headquarters in NYC.-fhe CEH
investigated 42,000 human rights violations, 2 9 , ( ^ of which resulted in deaths or disappearances and therefore,
the documents under UN custody are fundamental for the prosecution ofthose responsible ofthe crimes.
^ Goldcorp affair
^Brief^Documents on Canadian corporation named Goldcorp withamining operation in Guatemala,especially
information on where the Gold they extract is processed and who is buying the gold(we think it might bea
Swiss company).
^DetaiLACanadian corporation named Goldcorp hasamining operation in Guatemala with poor environmental
conditions and harming health of many workers andacommunity asawhole.Where the Gold they extract is
processed7 Who is buying the gold (we think it ntight beaSwiss company)7

^tal^
Italian censorship list
^ Brief:The^//Italian censorship,of whichWikileaks currently only hasasubset.

^en^a
^Reports on hi^h level corruption in IKibal^i government
^ Brief:The intemational investigative firm Kroll associates produced at least four reports on high level Kenyan
cormption after first term of the Kibaki govemmenLAdraft version of one of the reports The looting ofKenya,
was previously published by WikiLeaks.The reports were given to selected members ofPresident Kibaki's
cabinet at the time and are likely still held by http://www.kroll.com.uk/, notably lead investigator Andrew
MarshalL
^Entity: President Kibaki
^Entity: Kroll (/web/2009ll0506l330/http://wwwkroll.com.uk/)

Lih^a
^Arrau^euteutswiththeSudanesegovernment
^ Brief: Documents indicating artangements with the Sudanese govemment to grant land in Darfur to Arab settlers
from Libya(Civilians and adminisrators on the gmond in Darfur indicate this has been taking place).

^adagasear
Both sides of the political confiict in Madagascar are crying fouls about the deals made by their counterparts with foreign
entities.The release ofthe official documents with respect to contract negotiations about:
^ Oil exploitation in the region ofBemolanga(SouthofMadagascar)byTotal^others
^ Detail: Oil and Gas in Madagascar-Industry Overview (/web/2009ll05061330/http://www.mbendi.com
/indy/oilg/af/md/p0005.htm),Infos on Total licensing (/web/20091l0506l330/http://www.scandoil.com/moxiebm2/news/total-farms-into-the-bemolanga-heavy-oil-license-i.shtml)
^ an obvious one but the proposed final contract before rejection of the land deal with Daewoo Logistics.

ttp://web.archive.org/web/2009ll05061330/http://wikileaks.org/wiki/Draft:The Most Wanted Leaks of 2009 sort

^raft:TheMostWantedLeaksof2009 sort Wikileaks

6of1
18267

^The recent agreement with Saudi investment group on staple products and proposed ^2 billion USD investment.
^The revised mining exploitation agreement with Sheritt in Ambatovy and RioTinto in Fort-Dauphin.
^ Least but not last, the complete list of curtent political prisoners and the charges against them.

^ali
Arrangements with the Sudanese government
^ Brief: Documents indicating arrangements with the Sudanese govemment to grant land in Darfur to Arab settlers
from Mali(Civilians and adminisrators on the gruond in Darfur indicate this has been taking place).

^e^ieo
Agreements between USA and Peter herlihy
^ Brief: Zapotec indigenous people demand transparency fromU.S.Scholar and full disclosure of all the
agreements betweenU.S.Govemment and their agencies andU.S.geography scholar Peter Herlihy,especially
confidential agreements with Foreign Military Studies Office.Prof.Herlihy failed to mention that he received
funding from the Foreign Military Studies Office of theU.S.Armed Forces on the research of "Mexico
Indigena" project. Mexico Indigena Project forms part of the Bowman Expeditions,amore extensive geographic
research project backed and financed by the FMSO, among other institutions. The FMSO inputs information into
aglobal database that forms an integral part of the Human Terrain System (HTS),aUnited States Army
counterinsurgency strategy designed by Foreign Military Studies Office and applied within indigenous
communities, among others.
^Entity: FMSO(/web/2009ll0506l330/http://fmsoleavenwortharmy.mil/)
^Entity: Peter Herlihy (/web/20091l0506l330/http://www2.ku.edu/-^geography/peoplepages/IIerlihy_P.shtml)
Ruta Maya 2002 Hsu^ Challenge
^ Brief: Documents to unveil the real purpose of "Ruta Maya 2002 Isuzu Challenge". The convoy was commanded
by Ben NunAvihu,Israeh militar and Moshe Savir, geography expert and around 50 tourists in 40 Isuzu Jeep.
Some communities linked the incursion with biopiracy.The terrain they explored is controled by the EZLN.
^ Entity: Ben Nun Avihu
^ Entity: Moshe Savir
^Entity: EZLN (/web/2009ll0506l330/http://www.ezln.org.mx/)
CorruptionaroundF08APROA
^ Brief: Documents related with the fraud and cormption around FOBAPROA (Fondo Bancario de Proteccion al
Ahorro).
^Entity: FOBAPROAl(/web/2009ll0506l330/http://www.cddhcu.gob.mx/cronica^7/contenido/cont2
/fobaprol.htm)2(/web/2009ll0506l330/http://enwikipediaorg/wiki/Fobaproa)
Financial operations before crisis
^Documents offinancialoperations just before the financial crisis ofl994(/web/20091l05061330/http:
//en.wikipedia.org/wiki/l994_economic_crisis_in_Mexico)(some say the govemment knew before that the
crisis was coming and took advantage of the information protecting their interests).
^ o r l ^ ^ a n ^ credit
^Brief: Documents related with the World Bank credit and application of the budget to combat swine flu.
^Entity: WorldBank(/web/20091l0506l330/http://wwwworldbankorg/mx)
Renault program
^ Brief: Documents related with the technology curtently used in cellphones in Mexico to implement the
RENAUT program (/web/2009ll0506l330/http://wwwrenautgobmx/RENAUT/) Information aboutthe
security technology used to protect data collected from users.
Plan Merida
^ Brief: Documents related to the transparency ofPlan Merida (/web/2009ll0506l330/http://en.wikipedia.org
/wiki/M^C3^A9rida_Initiative)

^tp://web.archive.org/web/2009ll0506l330/http://wikileaks.org/wiki/Draft:TheMostWanted Leaks of 2009 sort

iraft:The Most Wanted Leaks of 2009-sort - Wikileaks

7 of 1
18268

Niger
. Arrangements with the Sudanese govemment
• Brief: Documents indicating arrangements with the Sudanese govemment to grant land in Darfur to Arab settlers
from Niger (Civilians and adminisrators on the gmond in Darfur indicate this has been taking place).

Norway
. Court case between Lyse Tele and Simonsen
• Brief: The secret verdict in the court case between the ISP Lyse Tele and the law firm Simonsen, decided the 5th
of May 2009, where Simonsen demanded Lyse Tele disclose the identity information of a file sharer suspected of
uploading a copy of the movie Max Manus to thefile-sharingcommunity.
. Entity: Lyse Tele (/web/20091105061330/http://www.lyse.no/)
• Entity: Simonsen (/web/20091105061330/http://www.simonsenlaw.no/)

Puerto Rico
• FBI surveillance of Puerto Rico citizens
• Brief: The FBI has not yetfinisheddeclassifying all the secretfilesrelated to surveillance of Puerto Rican
individuals and organizations from the 1930-70's http://www.pr-secretfiles.net/index.html (not to mention, large
sections of the files are blacked out by the FBI). In addition, there are thousands of secretfilesproduced by
Puerto Rican police that were only briefly made available to individuals themselves, and have now been closed
off to the public. These documents provide evidence of quite a significant spying and intimidation operation by
the United States and local police against leftists and independence movement leaders.
. Entity: FBI (/web/2009110506l330/http://www.fl)i.gov/)

Rwanda
• Financial aid for Laurant Nktmda
• Brief: Documentation offinancialassistance given by the Rwandan govemment to General Laurant Nkunda for
operations in the DRC.
• Entity: Laurent Nkunda (/web/20091105061330/http://en.wikipedia.org/wiki/Laurent_Nkunda)

Russia
• VRYAN crisis documentation
• Brief: Documents related to the VRYAN crisis, especially political documents, analyses of intelligence, and
specific steps taken. Information on the mindset of the Politburo, as well as intelligence services, and what
exactly they feared, and how credible they believed their fear to be.
. Maps for Kremlm and military hideouts
• Brief: Maps, floor plans, and blueprints of Mount Yamantaw and Kosvinsky Mountain.
. Technology analysis
• Brief: Technical plans, manuals, and blueprints for the SS-27 Sickle B (Topol-M), along with the Bulava.
• Brief: Documents relating to nuclear warplans of the Soviet Union and Russia.
• Brief: Documents relating to orbital weapons systems, and whether the Soviets ever deployed them (or still
deploy them) such as orbital HANE devices.
• Brief: A list and description of the various agents prepared by the various Soviet and Russian bioweapons
programs. Indications of whether they developed recombinant DNA based agents, and what those are
specifically. Weaponization of agents, including re-entry vehicle mounting. Doctrine for use, including deniable
use. Vaccines and treatments for affected personnel.

Slovenia

ttp://web.archive.ore/web/20091105061330/http://wikileaks.org/wiki/Draft:The Most Wanted Leaks of 2009-sort

^raft:TheMostWantedLeaksof2009 sort Wikileaks

8ofl
18269

^Taped conversations between Slovenian opposition leader and Croatian PM
^ Brief: Taped conversations between Slovenian opposition leader Janez Jansa and Croatian prime ntinister Ivo
Sanader,recorded by Slovenian intelligence service SOVA.
^Date: Summer 2004
^ Entity: JanezJansa
^Entity: Ivo Sanader
^Entity: SOVA

Sudan
^Salah Gosh and the CIA
DDate: 2005
D Documents detailing discussions during 2005 meeting between Salah Gosh and the CIA (for which the CIA flew
Gosh on private jet from Khartoum to CIA HO) See: http://www.sudantribune.com
/article.php37id_article^l0205
DMaliease
DBrief: Documents indicating artangements with the Sudanese govemment to grant land in Darfur to Arab settlers
from Mah (Civilians and adminisrators on the gmond in Darfur indicate this has been taking place).
DLibyacase
DBrief: Documents indicating arrangements with the Sudanese govemment to grant land in Darfurto Arab settlers
from Libya (Civilians and adminisrators on the gmond in Darfur indicate this has been taking place).
DNigercase
DBrief: Documents indicating arrangements with the Sudanese govemment to grant land in Darfur to Arab settlers
from Niger(Civilians and adminisrators on the gmond in Darfur indicate this has been taking place).

Syria
D AssasinationofMehdiBenBarka
DBrief: All the documents related to the assasination,in 1965,ofMehdi Ben Barka still held in France,USA,
Israel and Morocco.Inl976,thanks to the Freedom of information Act,the US govemement recognized that the
CIA had about 1800 classified documents about his assassination. Theses documents are still classified.

Switzerland
DCornu report
D Brief: The full Comu Report. See http://en.wikipedia.org/wiki/Projekt 26^The_Comu_Report

Swaziland
D F ^ ^ n ^ accounts ofKing Mswati, the Ot^een Mother and the IGngs wives.
DMemos from Ministry off^efense or Police
D Brief: Intelligence memos from the Ministry ofDefence or Police about the pro-democracy organization,
PUDEMO
DEntity:Pudemo(/web/20091105061330/http://www.pudemo.org/)
DEntity:MinisfryofDefense(/web/2009ll0506l330/http://www.gov.sz/home.asp7pid^59)

Trinidad and Tohago
D Commissionofl^n^uiryreports
DBrief: The Report on the Commission ofEnquiry into the constmction of the new Piarco Airport. This identified
cormpt practices in the spending ofpublic funds. The Contmission's report was delivered in August 2003.
Nearly6yearslater,its findings have not been made public.

Itp://web.archive.org/web/2009ll05061330/http://wikileaks.org/wiki/Draft:The Most Wanted Leaks of 2009 sort

^raft:TheMostWantedLeaksof2009 sort Wikileaks

9ofl
18270

D Brief: Report of thefindingsof the curtent C^^^/,^,^^^^^^r^^^/^/^r^^/^^/^^^/^^^^^r^^^/^r^,^^^r^^
D Entity: Commission Enquiry (/web/2009ll0506l330/http://www.constmctionenquiry.gov.tt/)
^Entity: Piarco airport (/web/2009110506l330/http://www.piarcoairport.com/)
DCaroni Bridge collapse
DBrief: The Report on the Caroni Bridge Collapse.Aman was killed whenabridgecollapsedafew years ago:
again the public has not been made aware ofthe report's findings.
DDate: 2ndAugust2008
D Waterfront f^velopment Project
DBriefAcopy of the contract for the billion-dollar Waterfront Development Project.
DEntity:7udecott7(/web/2009ll05061330/http://www.udecottcom/)
^Scholarships sponsored by Ministry of Culture
DBrief: List of recipients and amounts of scholarships sponsored by Ministry of Culture for study abroad.
^Entity: Ministry ofCulture (/web/2009ll0506l330/http://wwwgovtt/)
DDetail:
As far asTrinidad andTobago goes,our govemment tends to pay lip service to the principles of transparency
and accountability.For instance,there isaFreedom ofinformation Act which,by law,allows the public to seek
information from govemment departments.But quite often,when such attempts are made by the citizenry,the
govemment bars full disclosure.Depending on how importantapiece of information is to Joe Public,he may
actually have to tum to the courts to "force" the govemment to reveal facts that should be disclosed voluntarily.
Following areafew examples of documents that should be made public,but have not been:
DThe Report on the Commission ofEnquiry into the constmction of the new Piarco Airport This identified cormpt
practices in the spending of public funds.The Commission's report was delivered in August 2003.Nearly6years later,
itsfindingshave not been made public.
DThe Report on the Caroni Bridge Collapse.Aman was killed whenabridgecollapsedafew years ago: again the
public has not been made aware ofthe report's findings.
DThe Opposition recently brought up in Parliament the issue of taxpayers'money being used to pay attomeys by state.
Although the public hasaright to know how much of its funds were used in paying said attomeys,the Attomey
General refused to disclose the sums, saying it would be an invasion of the lawyers'privacy.
D The same goes forarecent request in Parliament,whereby ^the Minister ofPlanning and Development was asked to
produceacopy of the contract for the billion-dollar Waterfront Development Projects.The Ministers response was
that she could not produce said contract for public discussion because there wasaconfidentiality clause contained
therein (foraproject being built with public funds).
DThe Ministry of Culture recently awarded scholarships for students to study abroad when asked in Parliament to
disclose the list of recipients and the dollar value of the scholarships, the response was that this was private
information.

I^ganda
D^gandanproHtsharingagreementswithoilcompaniesinsouthwestern Uganda
DBrief: The govemment ofUganda has recently signedanumberofprofit-sharing agreements with several oil
companies that are conducting explorations in southwestem Uganda.Releasing these documents would bea
major step in increased transparency with respect to the country s emerging oil industry.

Ignited I^ngdom
D Censorship in UI^
D Brief: List of current and expired D-Notices
DEntity: dnotice (/web/2009ll0506l330/http://www.dnotice.org.uk/the_system.htm)
D Brief: secret gag orders, injunctions and legal threats sent to UK newspapers
DEntity: legal contact addresses at the Guardian,Daily Mail,Times,Independent,Evening Standard,etc.
DBrief: Censorship list for the United Kingdom's "volunt^" filter system.Known to be held byThe Intemet

ttp://web.archive.org/web/20091l05061330/http://wikileaks.org/wiki/Draft:The Most Wanted Leaks of 2009 sort

^raft:The Most WantedLeaksof2009 sort Wikileaks

lOofl
18271

Watch Foundation (/web/2009l105061330/http://www.iwf.org.uk/).Companies and their subsidiaries which are
curtently being supplied with the IWF list. Most ISP's in the UK haveacopy of the IP's on the list.
^Entity: The Intemet Watch Foundation (/web/2009ll0506l330/http://wwwiwforguk/)
Dlrat^ war planning
DBrief: The secret cabinet minutes (/web/2009ll0506l330/http://news.bbc.co.uk/2/hi/uk_news/politics
/7752009.stm)andlegaladvice(/web/2009ll05061330/http://newsbbccouk/2/hi/uk_news/politics
/4381379.stm) pertaining to the allegedly illegal war and ongoing occupation oflraq.
D linger Hollis surveillance
D Brief: UK Govemment documentation into the investigation ofRoger Hollis,head ofMI5 between 1956 and
1965,including the report by Lord Trend,into the serious but apparently unproven allegations ofbeingaRussian
Spy
DEntity:MI5(/web/2009l10506l330/http://wwwmi5govuk/)
D Wythenshawe intelligence centre
D Brief: Documents detailing the information stored and collected by the Wythenshawe intelligence centre.121
(/web/2009110506l330/http://www.timesonline.co.uk/tol/travel/news/article5683677.ece)
D Police surveillance on climate change protestors
D Brief:Acopy of the police intelligence handed to EON about climate change protestors.131
(/web/2009ll05061330/http://www.guardian.co.uk/uk/2009/apr/20/policeintelligenceeonberr)
DEntity:EON(/web/2009ll0506l330/http://www.eonukcom/)
D MP expenses
D Brief: The full MP expenses data: how much theTelegraph paid for them.
DEntity: Daily Telegraph (/web/20091l0506l330/http://www.telegraph.couk/)
DEntity:UKParliament(/web/20091l05061330/http://www.parliamentuk/)
D Allan Ca^^elow murder
DBrief: Documents revealing why the trial ofWangYam,who was convicted ofkilling Allan Chappelow, was
held in camera, the first UK murdertrial ever heard behind closed doors without access by press or public14]
(/web/2009ll0506l330/http://enwikipediaorg/wiki/Allan_Chappelow)
DNationalisationofNorthemRockandBradford^Bringley
DBrief: The proper reasons for nationalisation ofNorthem Rock and Bradford^Bingley,and the subsequent sale
of the latter's savings buisiness to Santander.
DBrief: Records of events during the twelve months leading up to the nationalisation of Bradford^Bingley.
D Brief: Information regarding the valuation process to determine compensation for fromer shareholders of
Northem Rock and Bradford^Bingley,that is,the information the independent valuer uses to determine the
final value ofthe comapanies.
DEntity:B^B(/web/2009ll0506l330/http://wwwbbgcouk/)
^Entity: Northem Rock (/web/2009ll0506l330/http://www.northemrock.couk/)
DnBOS takeover
D Brief: Copies of govemment minutes of meetings between Gordon Brown and/or Alistair Darling and
representatives ofLloyds Bank relating to the proposed takeover ofllBOS.
D Investigation into Daveport Lyons
D Brief: Documents from Solicitors Regulation Authority's investigation into Davenport Lyons threatening letters
related to filesharing.

Ignited Nations
D Security Council and Darfur
DBrief: Requests to the Security Council in 2003 that the Security Council look at what was happening in Darfur,
and any notes of discussions leading to the decision not to look at the situation.

ttp://web.archive.org/web/20091105061330/http://wikileaks.org/wiki/Draft:The Most Wanted Leaks of 2009-sort

^raft:TheMostWantedLeaksof2009 sort Wikileaks

llofl
18272

DDate: 2003
DEntity: UN Security Council

Ignited States
Important bulk databases
DIntellipedia
DBrief: Classified intelligence community site as ofll/l/2008,including article history.
Dopensot^cgov
DBrief: The complete CIA Open Source Center analytical database.The database is extensive,unclassified,
non public, but relatively accessible to certain outsiders after jumping through hoops. Despite its name, you need
to be govemment official to gain access to it.
DEntity: opensource.gov (/web/2009ll0506l330/http://www.opensource.gov/)
DPacer database
D Brief: The complete PACER database. The PACER database contains extensive US federal court records. They
are public documents,curtently behindapaywalL See http://arstechnica.com/tech-policy/news/2009/04/caseagainst-pacer.ars
DEntity: PACER

(/web/2009ll0506l330/http://pacer.pscuscourtsgov/)

Federal i^olitics
D The missing five million White House emails—possibly no longer in existence.
D Chenney and Rumsfeld Archives
DThe White House visitor's list
D Minutes or notes for VP Cheney's Energy Conference.
DThel141 pages of ACTA background documents not released to the EFF by the US Trade Representative(see 151
(/web/2009ll0506l330/https://secure.eff.org/site/Advocacy7cmd-display^page-UserAction^id^420))
D Alist of all Whitehouse and senior federal govemment employees holding dual citizenship and the countries they
represent.
Military and Intelligence
DTheSIOP
DOPLAN/CONPLAl^ 8022,2003 revision
DOPLAN/CONPLAN 8044,2007 revision
D CIA detainee interrogation videos. While the CIA claims to have destroyed 92 of the videos, others are known to
remain.
DThe US "Black Budget",from inception to present,with line items,hopefully annotated and explained.
D Detainee abuse photos withheld by the Obama administration.
D Wiretapping program led by NSA
DBrief: Correspondence between the National Security Agency and American telecom companies such as AT^T,
Verizon, and Owest, regarding the warrantless wiretapping program. Cortespondence involving telecoms who
cooperated with the NSA(e.g.AT^T) may give different information than telecoms who refused(e.g.O^est),
but both types would better shed light on the NSAsprogram.The existence ofthis cortespondence is well
documented in the media, for example that O^est s lawyers refused to cooperate because the FISA Court had not
signed off on it.
DEntity:NSA(/web/20091l05061330/http://www.nsagov/)
DEntity:0^est(/web/2009ll0506l330/http://www.qwest.cont/)
DEntity:AT^T(/web/20091l05061330/http://wwwattcom/)
DEntity: Verizon (/web/2009ll0506l330/http://www.verizon.com/)
D Uttredacted copy ofDept of Justices Office oflnspectorGeneral's'AReview of the FBI'sActions Connection With
AllegationsRaisedByContt^actLinguistSibelEdmonds" July 1,2004(redactedversionhere http://wwwwbez.org
/FILES/sibel.pdf)
D Camp Delta(Guantanamo)Standard Operating Procedure 2005-2009.

ttp://web.archive.org/web/20091105061330/http://wikileaks.org/wiki/Draft:The Most Wanted Leaks„of„2009-sort

iraft:The Most WantedLeaksof2009 sort Wikileaks

12ofl
18273

DfraqUSArt^yRulesofEngagement2007 2009(SECRET).
D Unredacted Inquiry into theTreatmentofDetainees in US Custody,20 Nov 2008.
D Memorandum between the CIA and the Department of State detailing any constraints on Darfur policy caused by
actual or anticipated Sudanese govemment cooperation on counter-terrorism, including CIA request to USUN that
Salah Gosh be removed from the UN Panel ofExperts list ofthose recottmtended for sanction.See:
http://www.sudantribune.cont/article.php37id_articlei^l0205
^Department of State and CIA contributions to the Obama Administration's 2009 Sudan Policy Review.in particular
with respect to: a) Whether to support the ICC arrest warrant against Sudanese President Bashir:b)whether to takea
confrontational or an appeasement approach to the Sudanese govemment on the issue of Darfur.
D Camp Delta (Guantanamo)Standard Operating Procedure 2005-2009.
D Camp Delta (Guantanamo)Interrogation Standard Operating Procedure 2003-2009.
D Correspondence between the National Security Agency and American telecom companies such as AT^T,Verizon,and
Owest, regarding the wartantless wiretapping program. Cortespondence involving telecoms who cooperated with the
NSA(e.g.AT^T) may give different information than telecoms who refused(e.g.O^est),but both types would better
shed light on the NSA's program. The existence of this correspondence is well documented in the media, for example
that Owest's lawyers refused to cooperate because the FISA Court had not signed off on it.
DfraqandAfhanistan US Army RulesofEngagement2007 2009 (SECRET).
DCL^DL^GA/NSAanalysesofthe VRYAN crisisofl983
^Technical specifications of the KH-lland follow-on satellites with similar capabilities.
DThe contents of the Football,and how they changed over the years during the different Administrations.
D What Pollard stole and gave to the Mossad, the full text.
DUS psychological profiles and political analyses of Soviet leaders.
DDocuments relating to orbital weapons systems,and whether the US ever deployed them(or still deploy them) such as
orbital HANE devices.
DInformation about the PAN satellite and the agency responsible for it http://spaceflightnow.com/news/n0905
/26milspace/
D Commander Directed Report oflnvestigation Conceming an UnauthorizedTransferofNuclear Warheads Between
MinotAFB,NorthDakotaandBarksdale AFB,Louisiana 30 August2007(S//FRD//MR)
D Investigation into the Shipment of Sensitive Missile Components toTaiwan (ADM Donald Report)-22May2008
(S//FRD//NOFORN)
DAirForceComprehensiveAssessmentofNuclearSustainment(CANS) July 2008 (S//FRD//NOFORl^)
D General Order Number One issued by commanders in Iraq and Afghanistan
D Reports about Colombian falsos positives'
D Unredacted copy ofDept of Justice's Office oflnspectorGeneral's'AReview of the FBI'sActions Connection With
Allegations Raised By Contract Linguist Sibel Edmonds" Julyl,2004 (redacted version here http://www.wbez.org
/FILES/sibelpdf)
D All secret annexes for,attachments to,unredacted versions of,and documents implicitly or explicitly referenced
in the following documents, which may be partially available in unclassified form:
D National Security Presidential Directive5l,"National Continuity Policy",May9,2007,also known as
Homeland Security Presidential Directive 20
D Federal Preparedness Circular 65,"Federal Executive Branch Continuity of Operations(COOP)",July 26,
1999
DFederal Response Plan 1FEMA9230 1 PL1,April 1999
D Presidential Decision Directive 67, "Enduring Constitutional Govemment and Continuity of Govemment
Operations",October21,1998
D Presidential Decision Directive 63,"Critical Infrastructure Protection(CIP)",May 22,1998
DPresidential Decision Directive 62,"Protection Against Unconventional Threats to the Homeland and
Americans Overseas",May22,1998
D/^^C^.^ Federal Response Planning Guidance01-94,"Continuity of Operations (COOP)",December4,
1994
D PD^l^7National Security Directive 69, "Enduring Constitutional Govemment",June 2,1992
D^^C^.^ Federal Preparedness Circular6l,"Emergency Succession to Key Positions of the Federal
Departments and Agencies", August 2,1991
D Federal Preparedness Circular 62,"Delegation of Authorities for Emergency Situations",Augustl,1991
DFederal Preparedness Circular 60,"Continuity of the Executive Branch of the Federal Govemment at the
Headquarters Level During National Security Emergencies", November 20,1990

ttp://web.archive.org/web/20091105061330/http://wiki1eaks.org/wiki/Draft:The Most Wanted Leaks of 2009 sort

iraft:TheMostWantedLeaksof2009 sort Wikileaks

13of1
18274

D National Security Directive 37,"'Enduring Constitutional Govemment",Aprill8,1990
D Executive Order 12656,"Assignment ofEmergency Preparedness Responsibilities",November 18,1988
D Executive Order 12472,""Assignment ofNational Security and Emergency Preparedness
Telecommunications Functions",April3,1984
D / ^ ^ ^ i ^ ^ NSDD 55,"Enduring National Leadership" September 14,1982
D Executive Order 12148, "Federal Emergency Management",July 20,1979
D Alist of the actual facilities in the Federal Relocation Arc,as of the present time,along with their locations.
DBlueprints,maps,and floor plans ofMWEOC.
D Blueprints,maps,and floor plans ofSiteR(Raven Rock).
D Blueprints and fioor plans of all unmentioned facilities in the Federal Relocation Arc, including historical
ones.
Banking
DThe complete list of identities of the 52,000 wealthy American clients suspected ofhiding^l5 billion at UBS to avoid
taxes, including the names of any elected or appointed govemment or former govemment officials.
DThe complete details of Goldman,Sachs^Co."s counterparty exposure to AIG prior to the Federal bailout of AIG in
September,2008.
environment
D Monsanto s intemal evaluations of GMO products including safety and pollen drift.
Media
DThe Editorial Guidelines for Fox News
DEmails relating to suppressed GO Magazine article on Putins rise by Scott Anderson mentioned at161
(/web/20091105061330/http://wwwnprorg/templates/story/storyphp7storyld-ll2530364)
Religion
Mormons Church records
D With recent leak ofl999/2006 Church Handbook oflnstmctions,pertinent documents and covertly
photographed artifacts in the vault at Church Office building or subsidy in Salt Lake City,Utah which expose
and negate Mormon Churchs claim of divinity and its monopoly on ""tmth."I.e.the concealed remnants of
diaries and letters written by formerearly Mormon apostle William McLellin 171 (/web/2009ll05061330/http:
//en.wikipedia.org/wiki/William_E._M^27Lellin^Personal_writings).McLellin diary and documents was the
main point of interest for convicted double murderer/bomber Mark Hofmann's planned forgery attempt to
deceive Mormon leaders to obtain in fraud by deception monetary reward to suppress truth of early Mormon
history unfavorable to current Mormon religion. For more info,181 (/web/2009110506l330/http://www.utlm.org
/onlinebooks/trackingch3.htm).
DDocuments ofMormon Church's billion-dollar investment in City Creek Mall and Condominium in SLC,which
may put Mormon Church's IRS tax-exempt status in jeopardy if there is verification of the allegation the Church
used tithe and offering monetary contributions by the members to fund the project under the umbrella of
tax-exempted religious freedom.
D Mormon Church leadership's involvement in politics, such as correspondence to ecclesiastical subordinates
(bishopric)on policy and attitude towards same-sex civil rights^other sensitive issues relevant and conceming
to the leaders. As well as recorded correspondences between Mormon members of Utah legislation and Church
leaders on sensitive political issu7^^//^^^^.^^es for legislation purposes which may contravene the separation of
church and state.
D Uncovered film or audio recording featuring the play with the actor portraying Protestant minister encouraged by
Satan/Lucifer (pomayed by actor) to spread false doctrines to attack all religions outside ofMormon religion as
'"abominable" which was exhibited for qualified "temple recommend" audiences in all of the existing temples
prior to removal in I990(almost like leaked Scientology orientation video) 191 (/web/20091l0506l330/http:
//www.exmormon.org/mormon/mormon288.htm).
D Unearthed secret audio or video recording inside Mormon temple with the temple members swearing "blood
oath" beforeremoval in 19901101 (/web/2009110506l330/http://en wikipediaorg

Itp://web.archive.org/web/2009110506l330/http://wiki1eaks.org/wiki/Draft:TheMostWanted Leaks of 2009 sort

iraft:The Most WantedLeaksof2009 sort Wikileaks

14ofl
18275

/wiki/Blood_oath_(Latter_Day_Saints))
D Documented Church leaders" and lay clergy"s cover-up of physical/sexual abuse and rape of minors by
missionaries and members without reporting to law enforcement in some cases1111(/web/20091l05061330/http:
//www.exmormon.org/mormon/mormon384.htm).
DOlder editions of Church Handbooks oflnsttuctions from the first edition up1121(/web/2009ll05061330/http:
//en.wtkipedia.org/wiki/Church Handbook of_Instmctions^History)for comparison to recent leakedl968
(tmncated),1999 and 2006editions.

Vatican
D Vatican secret archives
D Brief:The Index of theVatican Secret Archive.At present pre-screned scholars are allowed to see it but not copy
it(under scholar m1e^l6http://asv.vatican.va/en/fond/amm.htm)
DVaticansdocumentsonnaziGermany
D Brief: B^//documents pertaining to Nazi Germany and the Vatican,as well as those relating to the post-warrat
line to Argentina. Refer to http://news.bbc.co.Uk/2/hi/europe/26ll847.stm

International organizations
DBi^derberg Group
D Brief: Bilderberg Group meeting minutes,papers and annual reports of sincel954.WikiLeaks has some years
already.Bilderberg is an annual off-the record conference of transatlantic political,economic and ideological
agenda setters. As an historically important confidential document collection it is probably only equaled by
Cabinet minutes and high level intelligence and diplomatic assessments.Leads:There are some older,previously
unnoticed records in boxes at Uni of Illinois http://www.library.illinois.edu/archives/uasfa/1535051.pdf
(1956-1970) the George Bush library,http://bushlibrary.tamu.edtt/research/finding_aids/pdfs/08-0379-F.pdf and
the Eisenhower Library in Kansas http://www.eisenhower.utexas.edu/Research/Finding_Aids
/PDFs/JacksonCDRecordspdf
DEntity: Bilderberg Group (/web/20091105061330/http://en.wtkipedia.org/wiki/Bi1derberg_Group)
D Alliance Base
D Brief: Documents regarding the founding and operation of Alliance Base (/web/2009ll05061330/http:
//en.wikipedia.org/wiki/Alliance_Base).
Retrieved from ""https://secure.wikileaks.Org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort"
Categories: BulgarialCzechRepubliclDenmarklEstonialFrancelGermanyllcelandlltalylLatvialLithuanial
NetherlandslNorwaylPolandlRomanialSlovenialSpainlTurkeylUnitedKingdomlSwitzerlandlSwedenlMaltal
PortugallLuxembourglFinlandlBelgiumlCypruslCanadalSlovakialUnited States

ttp://web.archive.org/web/20091105061330/http://wikileaks.org/wiki/Draft:The Most Wanted Leaks of 2009-sort

18276

Conversation with bradass87 at 2/21/2009 7:27:49 PM on ZJemptv (aim)
(7:27:49 PM) bradass87: hi
(7:27:55 PM) ZJ: Hi
(7:28:20 PM) bradass87: you dont know my, i apologize, i got this from your youtube channel
(7:28:22 PM) bradass87: *me
(7:28:31 PM) ZJ: No problem, there's a reason I put it on there :P
(7:29:37 PM) bradass87: i did a search on info theory, books, videos, etc... bought books on it,
watched some of your videos... then i saw your more personal stuff and figured you were on the
same page
(7:29:40 PM) bradass87: *as me
(7:29:58 PM) ZJ: Cool
(7:30:10 PM) bradass87: oh, my name is brad manning, btw
(7:30:23 PM) ZJ: I'm Zach Antolak, nice to meet you
(7:30:34 PM) bradass87: :formal handshake:
(7:30:39 PM) bradass87: =P
(7:32:01 PM) bradass87: im 21, male, and i dont really know where im from xD... but my stuff is
in potomac, maryland... outside DC... and i live and work at fort drum in upstate ny
(7:32:28 PM) ZJ: I'm from the south suburbs of Chicago, pretty much generic suburbia around
here
(7:34:07 PM) bradass87: yessh, i spent some time out there in chi-town... i was there in '06...
lived in a pickup truck, sleeping in the ohare parking lot, commuting downtown during the day...
LONG story
(7:34:21 PM) ZJ: that sure sounds fun :P
(7:35:28 PM) bradass87: surprisingly it was, i actually had got a job at the guitar center on
halsted by a home depot
(7:36:01 PM) bradass87: my father kicked me out ofhis house in Oklahoma City in early 06
(7:36:12 PM) ZJ: I think I've been to that guitar center

o
DEFENSE EXHIBIT rS for identification
PAGEOFFERED:
PAGE ADMITTED:
PAGE
of
PAGES

p

i of 39

18277

(7:38:19PM) bradass87:tguess ill tell you the basic life story since tm at it already...iwas bom
in Oklahoma, lived in the small town of crescent, disproportionately evangelical town...iwas the
science and computer nerd through school...not the most friendly of places, butidtd my best
(7:38:59 PM)ZJ:^eah, I've heard Oklahoma isn't the most intellectually welcoming place
(7:40:39 PM)bradass87:my father is from Chicago, my mother is from britain...they divorced in
2000, my mother gained custody,andthenimoved with her to southwest wales,whereiftnished
school...however, she became ill and dependant on alcohol,andihadnt really assimiliated into
british life, so atl7y/o in desperationtcalled my father andiwent back to Oklahoma to live, his
new wife didnt exactly like me, so she forced him to kick me out
(7:41:27 PM)ZJ:That'sawfLtl...lhaveafew step-parents and ex-stepparents floating arotmd,
and they really suck
(7:41:43 PM)bradass87:tlived in tulsaforalittle bit, then Chicago, thenisettled with my aunt
and uncle in potomac maryland
(7:42:51 PM)bradass87:iworked at Starbucks, and abercrombie and fitch...as fun as those jobs
were they werent really getting me anywhere...twanted to go to college, butididnt have any
family ties to push it
(7:44:13 PM)bradass87:istarted looking lor an intemship,ihadaprogrammtng and design one
at ^oto.com(even today's design elements are mostly my work)
(7:44:58 PM)bradass87:seeing as it was DC,igave the Intel fteldashot...got few bites,
however
(7:45:51 PM)bradass87: somehow one ofmy resumes ended up in an army recruiters'hands...
and came knocking at my door
(7:46:40 PM)bradass87:and now after basic training and Intel school training,iltnd myself at
Fort Drum as an intelligence analyst for 2BCT,10th Mountain Division
(7:46:53 PM)ZJ:Awesome
(7:47:26 PM)bradass87: its so-so... the army world drives me nuts
(7:48:20 PM)bradass87:ido computations and analytical work, as well as preparing weekly
Intel briefings for the commander
(7:49:32 PM)bradass87:uhhm...im politically active, even more so af^er enlisting... living under
Don't Ask Don'tTell will certainly do that
(7:49:53 PM)ZJ:^eah,lcan't say I'd ever enlist, for that reason in particular

l^^ge2of39

18278

(7:50:27 PM)bradass87:yes, but seeing as it will get me through college, andigetabit more
ofastory...maybe its worth it ^L
(7:50:54 PM)bradass87:anyway,sorry to bore ya with my story ^P
(7:51:10PM) ZJ:No problem...my life story isn't nearly as interesting :P
(7:52:01PM) ZJ: I've lived around here my whole life, dropped out ofhigh school whenlwas
14, nowlmake websites for people
(7:52:56 PM)bradass87:ah,why did you drop out
(7:53:58 PM)ZJ:High school was an intensely unpleasant experience, everyone was at least2
years older thanlwas and they were difficult to relate to, nobody there seemed to be interested
in actually learning anything, and by the timelwas done with sophomore year my grades were
so bad they put me in summer school
(7:54:10PM) ZJ:ldidn't care to waste anothertwo years there
(7:54:34 PM)bradass87:ah, yes, being gifted inapublic education system sucks ass
(7:54:50 PM)ZJ:^oyeah,Ijust got my ged last year
(7:56:06 PM)bradass87:iwas lucky enough to go through the private british curriculmfi^r
secondary education, so my experience wasalittle better...finished that up atl6, but thenturmoil
came once again
(7:56:41PM) ZJ:^ometimesIwonderhowlwould've done inadifferent system
(7:59:54 PM)bradass87: well, in the systemiwas in, the pupils were seperated in classes by
their determined ability from the previous year...they called them sets...ifyou showed ability in
aparticular subject, you would be placed inahigher "set" with other pupilsof similar ability and
interest, the lower sets spent more time on teaching the basics to uninterested or unruly pupils,
and the higher sets would teach more interesting, extra stuff, with the middle sets teaching bythe-book
(8:01:25 PM)ZJ: Oh yeah, we had that, there were honors classes, academic classes, and basic
classes
(8:01:58 PM)ZJ: Initially they just put me in all the honors classes butldidn't really feel like
doing the work because it was repetitive and uninteresting, so they moved me to the academic
classes
(8:02:05 PM)ZJ:needless to say that didn't really help anything
l^^ge3of39

18279

(8:03:12PM) bradass87:lol, dont worry,even in britainiflunked math in sell,and won second
in the f^l^ mathematical challenge... my teacher HATED that, he routinely called me out for
being sucha"yank"
(8:04:37 PM)bradass87: oh well, stuffhappens...gotta get through it, and then try to fix it when
you get in the position to
(8:04:52 PM)ZJ:yeah
(8:05:12PM) ZJ:l've always learnt better on my own,lwas always learning more afl^er school
thanldidwhilelwas in school
(8:05:35 PM)ZJ:kindawhylhaven'tsigned up forthecommunitycollegearoundhereyet,it's
not likeacommunity college has courses on information theory
(8:05:45 PM)ZJ:the highest class they have is "microsol^ office"
(8:05:53 PM)bradass87: ick
(8:06:08 PM)ZJ:solfigure it's not really worth wasting money on
(8:07:20 PM)bradass87:same thing with me, imreadingalot more, delving deeper into
philosophy,art, physics, btology,politicstheniever did in school...whats even better with my
current position is thatican apply whatileam to provide more information to my officers and
commanders, and hopefiilly save lives...ifigure that justifies my sudden choice to this
(8:08:02 PM)ZJ:yeah,Ijust research whatever interests me
(8:08:08 PM)bradass87::)
(8:08:23 PM)ZJ:lmight end up taking some classes on math just to get up to speed,ldropped
out beforelcould take precalc
(8:10:25 PM)bradass87: community college sucks,ispentasemester at montgomery college in
maryland...shuffling2and 1/2 jobs and covering old topics, and still not being able to afford it...
it didnt pay off
(8:11:09 PM)bradass87:ihopeican^OMEHO^ get intoanice university and study physics
forabachelorsormasters(doctorateifim smart enoughs)
(8:12:49 PM)bradass87:anyway,its nice meeting ya^P
(8:13:00 PM)bradass87:isentyouafacebook request
(8:13:llPM)ZJ:yeah,laddedyou

1^8ge^of39

18280

(8:14:23 PM)bradass87:ah thank you...im not exactlyademocrat btw...ijust knowthe^...^
stonewall dems intimately well^-)
(8:16:08 PM)ZJ:lol,niffy
(8:17:14PM) bradass87:ihave long arms andawide footprint, despite my low profile near
military installations
(8:19:04 PM)bradass87: so where do you plan on going from where you are now7
(8:20:48 PM)ZJ:ldon'tknow,really
(8:20:55 PM)ZJ:I've never been good with long-term planning
(8:21:06 PM)ZJ:lmean,lcan make plans...it's the execution part that trips me up
(8:21:17PM) bradass87:ah yes, of mice and men
(8:25:13 PM)bradass87: my plan is pretty simple but vague... get credentials, nice ones... ones
that make it difficult for really creepy conservative people to attack... then jtnnp into politics
(8:25:35 PM)ZJ:ldon't know ifl'dget involved with politics...activism, maybe
(8:26:53 PM)bradass87:activism is fun
(8:27:13 PM)bradass87:itdoesnt do much unless you get heard, however...
(8:30:52 PM)bradass87:worringly,"terrortsts"areaform of political activist, however, they
recruit yoLtng people with troubled lives(asick family member, extremely poor upbringing, etc^
offer themamonetary solution, take them intoacamp, give them psychoactive drugs,
^syhologically drug them li^r many months, give them an explosivejacket or rigged vehicle, give
them heavy doses ofuppers and send them on their way to try and kill themselves...ifthey go
through with it(which is what the uppers are supposed to do)
(8:32:22 PM)bradass87:most of the time though, they just getapoor person, and pay them
money to place roadside bombs
(8:32:54 PM)bradass87:its socio-economic, ratherthanreligous
(8:33:27PM)ZJ:yeah
(8:33:30 PM)ZJ:it'satragedy
(8:35:53 PM)bradass87:we try our best to keep it from beingatragedy,thats what all the
infrastructure, schools, elections, and military training out there is for

l^^geSof39

18281

(8:37:09 PM)bradass87:aye...my headhunt
(8:38:16PM) bradass87:blah,italkalot
(8:38:29 PM)ZJ:ldon'tmind
(8:38:48 PM)bradass87:thanks^)
(8:40:32 PM)bradass87: so what are you doing now7^P
(8:40:38 PM)ZJ: Making dinner:p
(8:40:52 PM)bradass87: oh sorry,do you need time to eat7
(8:41:00 PM)ZJ:NahIjust bring itto my desk, lol
(8:41:17PM)bradass87:efltcent
(8:41:28 PM)bradass87:just dont get sticky or greasy keys, yuck
(8:41:36 PM)ZJ:^eahl'm careful aboutthat
(8:41:41PM) ZJ:lcan'tstandmoststickythings
(8:41:54 PM)bradass87: cant blame ya
(8:44:02 PM)bradass87:ilove taking any break from this life...ipromisedmyselfi'dgo to
Chicago beforeideploy to afghanistan (november-januarytimefrime)
(8:44:37 PM)bradass87:idoalakeshore drive run...from grant park to lincoln park
(8:48:12 PM)ZJ:stay safe in afghanistan, dude :^
(8:55:58 PM)bradass87:ohiwill try
(8:57:06 PM)bradass87:im more concemed about making sure that everyone, soldiers, marines,
contractor, even the local nationals, get home to their families
(8:57:26PM)ZJ:yeah
(8:58:52 PM)bradass87:ifeelagreat responsibility and duty to people...its strange,iknow
(8:59:03 PM)ZJ:nah,lunderstand
(9:00:18PM) bradass87:iapprectatethat,igetalot of puzzled looks and c^uestions from people

l^age^of39

18282

(9:01:10PM) bradass87: so, whats yourO^ of choice7
(9:01:20 PM)ZJ: I'm onXPrightnow
(9:01:26PM)ZJ:butlused2000untillastyear
(9:01:42 PM)bradass87: do you speak linux
(9:01:56 PM)ZJ: my only experience with linux is when sshing into webservers
(9:02:21 PM)bradass87: ah yes, ssh... the good'ol days...
(9:02:45 PM)ZJ:whenIgetanewcomputerlmight install linux on this one
(9:03:07 PM)bradass87:military is all f d up...contracts with closed source developers with
incompatible sof^are... drives me Nf^T^
(9:03:29 PM)ZJ:that is ridiculous, it's hard to ensure security when the source is unavailable
(9:03:53 PM)bradass87:y6S, even worse its o^en lowest bidder...
(9:05:03 PM)bradass87:used to be the cream of the crop...now its outdated non-backward
compatible suites ofbuggy software that were originally used l^r civilian purposes, then
modified for military but not exactly thoroughly tested
(9:05:36 PM)bradass87:then they get contractors who dont know anything about computers to
teach it...
(9:06:42 PM)bradass87:and its all OI^^,be69U96 we c^t exactly 6^^
because the sofl^ware which bugs out is ofl:en times onmachines which are staoiped with bigred
SECRET stickers
(9:06:57PM) ZJ:thafsprettylame
(9:07:12 PM)bradass87:itis,itis
(9:07:52 PM)bradass87: but, luckilyiuse my DC contacts fi^om Starbucks and get the word out
to those higher up in the chain...
(9:08:15PM) bradass87: its not what y'know,its who y'know^-)
(9:08:56 PM)ZJ:Ican imagine two guys in sunglasses meeting atastarbucks to quickly hand
over an envelope... just to get some minor bug repaired

^^ge^of39

18283

(9:10:32 PM)bradass87: lol, glamorous, but no...its more likeiknewthis It colonel from the
DIA at Starbucks beforeiwas in the military...slept with him once or twice, theniget in the
military,inotice the problems, call him and say,hey,ftnd someone who can fix this
(9:12:45 PM)bradass87:in public eye, I^S Intel services are mysterious^ in the real world,
intelligence isagoofy,clunky,and annoying process, slowly adapting and getting streamlined
(9:12:53 PM)bradass87:int6llipedi9:^D
(9:14:26 PM)ZJ: oh yeah,Iheardaboutthat
(9:14:29 PM)ZJ:do6sitworkwelI7
(9:16:11PM) bradass87: its sloooooow... they need more servers and bandwidth, and there needs
to be more people that are actually interested in online collaboration to add stuff through that
disemination channel, but yes, the concept works and is slowly becoming useful
(9:17:32 PM)bradass87: so, got any fun clients7
(9:19:16PM) ZJ:notreally,just like minor artists who needasite to show their work
(9:21:30 PM)bradass87: brings back so many memories...beingawebdev for some clients, its
hilarious...alot of them show you what they want...you roll your eyes and tell them what they
actually want, they say they really dont want to veer from that idea, do what you intended
anyway,and then they are like:ididn't know that you could do that
(9:22:05 PM)ZJ:mine want the worst color schemes, andltry to make it work well but you can
only do so much with some colors, but they like it anyway
(9:23:59 PM)bradass87:there are so many factors that laymen dont thit^abouL..readability fi:^r
typeface si^es,availabltty of typefaces on certain machines, colorblindness,varying monitor
sizes, and general aesthetic
(9:29:59 PM)bradass87:ispent most of my free time working onasuite of tools: AJAX tools
fordynamicpages,PHP/MySt^Eappsforserversidecontent,XMERPCframeworkfor
communicating between the front end AJAX and the database, and thenasuiteoftools for Flash
usingtheXMERPC
(9:30:55 PM)ZJ:yeah,ldon'treally do flash^a^axstuff,mostofthetime it's juststatictemplates,
mys^l for the more complicated stuff
(9:31:44 PM)bradass87:ilike to joke was web 2.0 before web 2.0^Pwebl9beta7
(9:32:05 PM)ZJ: webNaN

^age^of39

18284

(9:34:29 PM)bradass87: but it was company ftinding and lack ofmanpower that killed my job at
zoto...flickr creamed us because my boss wasamarketing retard...and my video hosting project
f:^rzoto,ahard sell for my boss being an intern...was just an untested theory.and an engine to
convert uploaded videos and stream them through Flash... tumed out another company took that
torch and ran with it
(9:34:53 PM)ZJ:youtube^
(9:35:07PM) bradass87:ofcourse^^P
(9:36:16PM) bradass87: not bad foral7y/otho,icame out withaconcept engine and
framework...iguess an alpha version, to show to my boss about the same time as youtube went
beta
(9:36:37PM) ZJ:that'sprettyneat
(9:38:30 PM)bradass87:yeah, but...its all history...inventions are something that one person
does and its all them, they are about who discovers them first... tomedison takes credit for
inventing the lightbulb^ but there were many people working on the idea ofincandecent electric
lighting willing to take that claim for themselves
(9:39:18PM) bradass87: but hereiam, four years later
(9:39:59 PM)bradass87:alot ofthat creative energy has subsided...its still there, its just
waiting...ihope
(9:41:48 PM)bradass87:im surprised you havent asked the usual c^uestion: why isagay,
libertarian, atheist, computer nerd in the army
(9:42:02 PM)ZJ:well^l69t^S66whyyot^'dl^v6 your rea^
(9:42:15PM) ZJ: ifyou can use it to your advantage and help otherpeople, that's cool
(9:42:28 PM)ZJ:it does seem like an interestingjob, army thing asid6
(9:42:32 PM)bradass87:iguess..^
(9:43:20 PM)bradass87: oh its fascinating, but it sucks on the count of recieving credit and^
niovingup
(9:43:52 PM)bradass87:wesharealot:)
(9:46:47 PM)bradass87:^^hmm,shouldiorderpizza7
(9:47:05 PM)ZJ:dependsifit'sfromagood pizza place

l^^ge9of39

18285

(9:47:18PM) bradass87:dominoes pizza, fort drum...xD
(9:47:28 PM)bradass87: its, often okay
(9:48:11PM) bradass87:actually,ill try and orderasandwich...if only subway or ^uizznos
delivered
(9:48:18PM) bradass87:omg, if Starbucks delivered xD
(9:48:22 PM)ZJ:^uiznos has good meatball subs
(9:51:43 PM)bradass87:yay,dominos sandwich on its way,ihope it was worth it
(9:52:21 PM)bradass87:what time do you normally go to bed7
(9:52:30 PM)ZJ:usually early in the moming and sleep all day
(9:52:43 PM)ZJ: I've always been that way for some reason
(9:52:55 PM)bradass87:im naturally noctemal
(9:53:15 PM)ZJ:Ilove the night, it's dark and ^uietandlcan be alone
(9:55:08 PM)bradass87:but,imust wake up for PTat 0650 every moming, do my few miles of
running, cardio,or muscular strength and endurance training with the rest ofthe section for over
an hour, go to my barracks room, shower, get in my uniform, and go to the office for the day,
with an hour andabit for lunch, andinormally get into my room byl730
(9:55:29 PM)bradass87:weekdays tho...weekends, anything goes ^D
(9:56:14PM) ZJ:yeah,Ihaven't had to be onaregular schedule forawhile
(9:56:25 PM)ZJ:school was difficult becauselhad trouble getting to sleep early
(9:56:45 PM)bradass87:the digital existence
(9:56:57 PM)ZJ:the intemet is24/7 which is perfect for me
(9:59:33 PM)bradass87:theam^y took me,awebdev,threw me intoarigid schedule, removed
tne fi^om my digital self and threw me in the forests of missoLtriforlOweeks with an old M-16
i^agan era load bearing equipment, and 50 twanging people hailing from places likeTexas,
Alabama, Georgia, and Mississippi... joy
(9:59:51 PM)ZJ:well that sounds...interesting
(10:00:14PM) bradass87:ohi^ was...but frightening atthe same time
l^^ge^0of39

18286

(10:02:03 PM)bradass87:being around my platoon for 24hoursaday...it took them awhile, but
they started figuring me out, making fitnofme, mocking me, harassing me, heating up with one
ortwophysic9lattack9...whi6hif6ndedoffjustfio6^butitwasscary
(10:03:02 PM)bradass87:damn,ijust read that...what the hell didiput myself through
(10:03:19PM) ZJ:yeah,ldoubt I'd everjoin the military
(10:03:40 PM)bradass87:firstthey'dcuturhurr
(10:04:08 PM)bradass87: scream at ya, tell you what to do... correct your every eyetwitch
(10:05:39 PM)bradass87:itservesasimple purpose tho:asense of Lmity,duty,andadisciplio6
^oactcalmlyinstressft^lsituations
(10:06:08 PM)bradass87:imsorry,ijust keep talking and talking
(10:06:14PM)ZJ:oh,ldon'tmind
(10:06:47PM) bradass87:im sure youc^relatesomewhattho
(10:06:56PM)ZJ:yeah
(10:10:15 PM)bradass87:iactuaIlybelievewhatthearmytriestornal^^^
diverse place fttll ofpeople defending the country...male, ^male, black, white, gay,straight,
christian, jewish,asian, old oryoung, it doesnt matter to me^ we all wear the same green
tinifi^rm...but its stillamale-dominated,christian-right, oppressive organization, withafew
hidden jems of diversity
(10:10:41PM) ZJ:yeah, that's kindawhatlthought, from reading about it
(10:11:34 PM)bradass87:ithinkimightwriteabookwheniget older
(10:11:50 PM)ZJ:writingisfun
(10:12:01 PM)bradass87:itis^)
(10:12:36 PM)bradass87:iused to haveablog and youtube vlog...butihad to delete for
secLtrity reasons...
(10:13:15PM) bradass87:thesedays,iwork through proxies, im the anecdotal evidence in many
ofmy friends blogs^)
(10:14:31PM) bradass87:ihope you getadecent pay from yotn^ design work
(10:14:40 PM)ZJ:yeah,it'sdecent
1^8ge^^of39

18287

(10:15:24 PM)bradass87:thats good
(10:16:55 PM)bradass87:you should get into college and give it your best shot...just think
about the fact that someone like me is spending 4 years in the military jtist to get the opportunity

(10:17:19PM) ZJ:yeah,it'sabig investment, I'd have to be sure to find the right one
(10:19:23 PM)bradass87:im not scared of aiming high...iknow its all the same stuff you leam,
^ut those f^ncy sounding colleges can take your career fiirther if careftil...l^Cberkeley,camegie
mellon,MIT,university of Chicago
(10:19:42 PM)bradass87:caltech,et6
(10:19:50 PM)bradass87:comell^)
(10:20:07 PM)ZJ:yeah,Iremember whenlwas 12 and just starting high school the counselors
Were like "so what are yotn^ plans f:^r college" and it was like,Ididn't even know anything
ABOl^T college
(10:20:31PM) ZJ:soljust went along with what they said andlwas like "okay I'm going to
graduate when I'ml6and go to MIT and beamathematician and workfortheNSA^"
(10:20:41PM) ZJ: can you believelactuaiiy believed that forawhile :p
(10:21:04 PM)bradass87:SIGfNT^soundsfun^butisterriblyboringintheend...
(10:22:35 PM) bradass87:ithink fulfilling childhood dreams can be ftin, but imleaming that i f
you dont aim high, you ftrstly,dont achieve them, and secondly,you find your more ^realistic^
dreams to be tmrewarding...
(10:24:04 PM)bradass87:iwant to be like my idols: richardfeynman, carl sagan,harveymilk^
etc
(10:24:24 PM)ZJ:thatwouldbenice
(10:25:55 PM)bradass87:its not the strongest of people who survive, its the ones most
responsive to change
(10:26:10PM) ZJ:didn't clarence darrow say something like that
(10:26:34 PM)bradass87: close, darwin,just replacing people with species
(10:26:43 PM)bradass87:ortheotherwayaround

l^^ge^^of39

18288

(10:28:59 PM)bradass87:c^uestion: guantanamo bay,the closure is good, but what do we do
about the detainees
(10:29:43 PM)ZJ:whatlwant to know is^ are these people literally so dangerot^t^^^^^
be kept inalocation outside the country
(10:30:03 PM)ZJ:altemately,are our own prisons in this country so insecure that they can't be
relied on to keep prisoners imprisoned
(10:33:01 PM)bradass87:well, some ofthem are actually pretty dangerous indeed...some of
them weren't dangerous before, but are now in fact dangerous because we imprisoned them fo^
^olong(don't^uote me on that, l^rthe love of my career), and others might, withalittle more
^an an apology would easily fit back into society...who's who...worryingly,you cant really tell
(10:33:38 PM)ZJ:well, one thing's for sure, you can't keep people imprisoned forever without
some kind of trial or charges
(10:35:45 PM)bradass87:the reason thats dif^cult: the things we have tried them on are
classified information, connected with other pieces of classified information...so ifatrial is
^one, it might have to be done in some kind ofmodifted trial, where pieces ofevidence which
8ireclassifiedarepresentedoti^yit^acl^^^
(10:36:11PM) bradass87:its all very weird and complicated
(10:36:41PM) ZJ:andaconviction on the basis ofevidence thatnobodycanknowabouthold^
practically no credibility
(10:36:58 PM)bradass87:mhmni
i^lO:37:10PM)bradass87:itsabizarre situation
(10:38:59 PM)bradass87:some ofthem are indeeddangerous, and those that have lefl have, and
iasaliberal and someone against gitmo will tell you...yes, many of those previously released,
^ven though innocent before^ are ^uicli^yrecrtiited as leading figti^es for new win
^oups
(10:39:18PM) ZJ: yeah thereare no easy answers fo this one
(10:40:49 PM)bradass87:sometimesiwish it were all black and white like the mediaand
politicians present it... him, he's the badguy,oh and he, he's the good guy...its all shades of
blurry grey
(10:48:29 PM)bradass87:is it gray or grey ^7
(10:48:38 PM)ZJ:either,lprefergrey

l^age^3of39

18289

10:49:01 PM)bradass87:tsee "gray" is an americanism
10:49:59 PM)bradass87:istill write harbour and travelled the british way ^P
10:54:15PM) bradass87:probably heading to bed soon, eastem time here andidont want to
throw my body all out of whack :P
10:55:16PM) bradass87:keeping my boyfriend informed on my status, he's my neuroscience
ma^oratbrandeis
10:55:50 PM)ZJ:awesome, neuroscience is fitn stuff
10:56:07 PM)bradass87:it is...he's so zany and cute
10:57:50 PM)bradass87:he bought meadozen roses, andibought us matching ec^uality
bracelets to wear
10:58:02 PM)bradass87:forvday
10:58:12PM)ZJ:aww,that'ssweet
10:58:31PM) bradass87:lol,he didnt shave tho...drives me nuts when he doesnt shave xD
10:58:43 PM)bradass87:httt^://r^hotos-e.akfbcdnnet/photos-ak-sncl/v888/229/42/1370640054/
nl370640054 30195476 4564ip^
10:58:56 PM)ZJ:he'sacutie
10:59:08 PM)bradass87:unshaved: http://photos-e.ll.facebook.com/photos-llsncl/v888/229/42/1370640054/nl370640054 30193980 8080it^^
10:59:47 PM)bradass87:cute,butscruffy^P
11:00:01 PM)ZJ: lol
11:00:52 PM)bradass87:he wins the arguement tho, because his stubble isntabrasive,whereas
my5o'clock shadow is razorsharp
11:02:05 PM)bradass87:rawr,he outsmarts me all to of^en:)
11:05:01 PM)bradass87:anyway,im going into semisleep mode, it was great talking to you,i
hope we can chat again sometime, give meamessagewhenever,ilike to keep in contacts)
11:08:32 PM)ZJ:alright,later:)

l^8ge^^of39

18290

(11:08:54 PM)bradass87:keep posting videos tho,you're onto something, b t w : )
(11:09:13 PM)bradass87:g'night
Conversation with bradass87at2/22/2009 6:35:00 PMonZJemptv(aim)
(6:35:00 PM)bradass87: hi
(6:35:09 PM)ZJ:Hi
(6:35:24 PM)bradass87:are you familiar with thunderfOOt
(6:35:45 PM)ZJ: isn't he that really popular atheist on youtube
(6:35:52 PM)bradass87:yes
(6:36:38 PM)bradass87:tumsouthe'shavinganissue with youtubeoverthevotebots,and they
suspended his account: http://^^^^vw.voutube.com/watch7v^r2EA^^l^^A
(6:37:31PM) ZJ:wow,did they even bother to explain why
(6:37:49 PM)bradass87: community violation
(6:38:02 PM)ZJ: what the hell isa"community violation" that could be anything
(6:38:16PM)bradass87:exactly,watch the video, it explains
(6:47:39 PM)bradass87: conceming, huh7
(6:47:56 PM)ZJ:yeah
(7:44:05 PM)bradass87:hey
(7:44:09 PM)ZJ:sup
(7:44:20 PM)bradass87:meh,weekend is ending
(7:44:29 PM)bradass87:backto the grind...
(7:45:34 PM)bradass87: gotta get up, stand around in formation for awhile, doalittle miming,
takeashower, and then tomorrow,ihave been scheduled to rec^ualify with the M4 at the firing
range ...ugggh
(7:45:53 PM)ZJ:man, it's been years since I've usedagun

1^8ge^Sof39

18291

(7:46:47PM) bradass87:itsarifled carbine, buthey,youdontgetyelledatifyou call itagun
xD
(7:47:03 PM)ZJ:yeahsee,Idon't know anything about them^:P
(7:47:18PM) bradass87:which is good
(7:47:27 PM)bradass87:you shouldn't, you don't really need to...^)
(7:47:57 PM)ZJ:yeah,lfigureifldon'tneedagun, my life is going pretty well
PlCl^f^P
(7:48:06 PM)bradass87:^)
(7:51:08 PM)bradass87:rattattat
tattat

rattattat.rattattat.tattat...rattattat..tattat...tattat...

(7:51:34 PM)bradass87: its going to drive me crazy ^z
(7:53:06 PM)bradass87:whats the weather like in chi7
(7:53:15PM) ZJ: cold, it was snowing the other day
(7:53:19PM) ZJ:now it's just freezing
(7:53:41PM) bra gtdass87: its windy, withalight sleet
(7:54:08 PM)bradass87:lake effect drop zone: oswego,pulsaki,watertown, and fort dmm
(7:54:18PM) bradass87:180 inches this year :eyeroll:
(8:24:30 PM)bradass87:whatyou up to now7
(8:26:40 PM)ZJ:ohnothingmuch
(8:27:08 PM)bradass87:^)
(8:45:25 PM)bradass87:igive up, imbored...^P
(8:45:39 PM)ZJ:yeah I'm trying to getapython program to work
(8:45:46 PM)bradass87:eek^E
(8:46:21 PM)bradass87: never beenabig fan of python, had muchoproblemo with memory
leaks
l^age^^of39

18292

(8:46:42 PM)bradass87: doesn't benchmark well f:^r production either
(8:47:58 PM)bradass87:stackless python wasagood fork, imho
(8:48:15PM) ZJ:yeahIdon't really know anything about any of that I'm just leaming it
(8:48:50 PM)bradass87: gotchya...what you leaming it for7 nothing specificitakeit7
(8:48:59 PM)ZJ:yeah no real reason just lor the hell ofit
(8:49:12PM) bradass87:any current direction7what you trying to do7
(8:49:34 PM)ZJ:I'mjustplayingaroundwithit,currentlyusingsomereally basic genetic
algorithms
(8:49:42 PM)bradass87:ishee
(8:51:16PM) bradass87:ilast used python at zoto...zoto runs AJAX front-end, PHP mediator.
Python organizer fi:^r the Database and its BLOB image data
(8:51:31PM) bradass87:ImageMagick for manipulation of the images
(8:52:49 PM)bradass87:26 17
(8:53:49 PM)ZJ:yeah, something like that
(8:54:04 PM)bradass87:windowsbinary7
(8:54:13 PM)ZJ:yeah
(8:54:38 PM)bradass87:k
(8:55:04 PM)ZJ:lhavecygwin but it's kind of pointless since python on windows is like, the
same thing
(8:55:19PM) bradass87:cygwin kills memory
(8:55:41PM) ZJ: open the python interpreter in cygwin, or in windows, it all seems to work the
same
(8:56:00 PM)bradass87:yes, but...cygwin mns it slower than the windows native
(8:56:52 PM)bradass87: when writing production sofl^ware, speed and memory usage are the
ultimate achilles heel

l^^ge^^of39

18293

(9:02:47PM) bradass87:my computer just didaHARD crash, not even bluescreen, just went
black and froze up(caps lock light didnt blink when key was pressed)
(9:03:05 PM)ZJ:Iused to see that happen when it overheated
(9:03:43 PM)bradass87:iwas installing the pyinterp
(9:07:04 PM)bradass87: ok, went fine this time
(9:08:44 PM)bradass87: Okies, im going to grab vim now
(9:10:05 PM)bradass87:lol,ihaven't played around with programming fi:^rawhile^^^
(9:10:13 PM)ZJ:Itried figuring outvim
(9:10:23 PM)ZJ: but there wasn't really much pointto it
(9:10:25 PM)ZJ:sinceIhavescite
(9:11:37 PM)bradass87: doesnt matter, some people will be emacs, some will be vim...imjusta
native vimmer
(9:11:55 PM)bradass87:inever have to touch the mouse with vim
(9:12:54 PM)bradass87:ifeel like my inner child is coming out all ofasudden
(9:15:48 PM)bradass87:can you throw me what you got ^o7
(9:16:38 PM)ZJ:what,scite7
(9:16:47 PM)bradass87:no,what you're working on^)
(9:16:58 PM)ZJ:l'm only working on it because...it's not working right
(9:17:10PM) ZJ:it's ridiculously bad, I'd be embarrassed for anyone else to see it
(9:17:22 PM)bradass87:im not one to critique
(9:18:01 PM)bradass87:imfascinated
(9:18:17PM)ZJ:Ineedtogetitinorderftrst
(9:26:13 PM)bradass87:whatsitdoing7
(9:26:33 PM)ZJ:lailing to evolve properly

l^^ge^^of39

18294

(9:26:55 PM)ZJ:Imadeaclass for it when previously it was just an assortment offnnctions, but
I've obviously messed something up in the process
(9:27:40 PM)bradass87:ah yes, going fromarandom set ofloosely connected functions to an
OOP method, not pretty
(9:27:57 PM)bradass87:still got the assortment of functions7
(9:28:17PM) ZJ:somewhere around here
(9:28:30 PM)bradass87: backup, dear, backups)
(9:28:54 PM)bradass87:iusually try and move stuff over one fttnction atatime...tho you cant
always do that
(9:32:06 PM)bradass87::twiddles thumbs:
(9:35:51PM) bradass87:print"rawr^"
(9:36:52 PM)bradass87: ok, ill stop armoying you
(9:37:00 PM)ZJ: lol
(9:37:34 PM)bradass87:ijust want to help, you remind me of..well...me xD
(9:38:01PM) ZJ:Ithink this program is beyond rescue, better to start from scratch literally
sketching out every step ofit asaflowchart
(9:38:08 PM)ZJ:right now it'sahelpless entanglement of confitsion
(9:38:39 PM)bradass87:heehee, thats whatithoughtwhenireverseengineered my first content
management system, php-nuke
(9:39:07 PM)bradass87:how many lines is it7
(9:39:30 PM)ZJ: like 200,haha
(9:39:34 PM)ZJ:I'mnewatthis
(9:40:14PM) bradass87:^whistle^ phew...thatsawhole 2007
(9:40:31PM) ZJ:without braces like php and c, there are fewer wasted lines
(9:40:41PM) bradass87:iknowzit:)
(9:40:55 PM)bradass87:iremember when 200 lines of anything sounded likealot
^8ge^9of39

18295

(9:41:15PM) bradass87:iwaslike,9...phasic
(9:42:34 PM)bradass87:inever got the whole flowchart thing...
(9:42:58 PM)bradass87:probablywhyineverreally got the whole using arithmetic to solve
algebra either
(9:45:04 PM)bradass87:im not trying to be fecicious,ijusthaveawildcuriousityandilove to
help people
(9:47:54 PM)bradass87:have you already started from scratch7
(9:48:22PM)ZJ:twice,lol
(9:49:14PM) bradass87: is it built aroundalormula7
(9:49:36PM)ZJ:hardly
(9:49:45 PM)ZJ:if you can call all ofthisaformula
(9:49:50 PM)ZJ:formula makes me think of math
(9:49:55 PM)ZJ:thereisn'tmuch math to this
(9:50:19PM) bradass87:all programs are math^)
(9:50:37PM) ZJ:in terms of shttnting symbols around, yeah
(9:51:43 PM)bradass87: is itacontinuous loop
(9:51:54 PM)ZJ: only until it finds the best answer
(9:52:12PM) bradass87:20^uestions^P
(9:52:51 PM)bradass87: is it built onaconcept by someone else7
(9:53:07 PM)ZJ:yeah, it's adapted from someone else's c^^ code forabasic genetic algorithm
(9:53:37PM) bradass87:GAGS7
(9:53:48 PM)ZJ:dunnowhatthatmeans
(9:54:53 PM)ZJ:the basic concept forthe one I've made is that you setatarget ofaspecific
string ofbitsofacertain length, you generateapopulation of random bitstrings to begin with,
each ofthem are evaluated withafitness function to see how well-adapted they are which is just
how many points at which it matches the target string
I^^ge20of39

18296

(9:55:04 PM)ZJ: i f i t matches all ofthem, it wins and the whole thing is over
(9:55:21 PM)ZJ: but if none ofthem do, it uses crossover recombination and mutation to
generateanew generation
(9:55:22 PM)bradass87:aha
(9:55:33 PM)bradass87:isee how that would work
(9:55:42 PM)ZJ:so they just get closer and closer to the target, you can actually see it
happening, until one ofthem finally gets it right
(9:55:59 PM)bradass87:gui or cmdline7
(9:56:05 PM)bradass87:cmdiassume
(9:56:13 PM)ZJ: command line,Idon't know enough python for guis yet
(9:56:27PM)bradass87: dont
(9:57:16PM) bradass87: but this isac,c^^ guy saying that, soihaveahuge bias ^D
(9:58:09 PM)bradass87: so its justasimple genetic algorithm in python:-)
(9:58:14PM) ZJ:yeah
(9:58:32 PM)ZJ:not even really an algorithm, the bit string would supposedly beachromosome
that codes forase^uence of operations
(9:58:36PM)ZJ:analgorithm
(9:58:42 PM)ZJ:butIhaven'tprogressedthatfaryet
(9:58:52 PM)bradass87: base four7
(9:59:37 PM)ZJ:theprogramIcopied it from used sequences of4bits to indicate numbers or
basic arithmetic operations
(9:59:57PM) bradass87::)
(10:00:06PM) bradass87:suchfiin^^^
(10:00:10PM) bradass87:^ crazy
(10:00:15 PM)ZJ:yeah,whenitworks

^8ge2^of39

18297

10:00:35 PM)bradass87:10000 failures are worth the success sometime
10:02:14PM) bradass87:y'know whats kind of silly,but practical, and potentially
moneymaking, is finding prime ntnnber sequencing
10:06:13 PM)bradass87:thatwasaprojectidid back in...late 037
10:06:55 PM)bradass87:finding prime numbers with past so many digits, theresareward for
finding one and confirming it
10:08:42 PM)bradass87:looks like someone actually won that last august, with 13 million
digits, f^CLA
10:10:07 PM)ZJ: oh yeah, mersetme prime search
10:10:16PM) bradass87:mhmm
10:10:59 PM)bradass87:mine was written inc, it wasalotsimplerthan GIMPS, but clunkier
andunveriliable
10:11:50 PM)bradass87:you dabble much in crypto7
10:11:57 PM)ZJ:notreally,no
10:12:07 PM)ZJ:Iftgure my information isn't important enough for anyone to steal
10:12:30 PM)bradass87:Rijndael (AES) kicksass^P
10:12:49 PM)bradass87:12years, not been broken
10:14:03 PM)bradass87:thats what we(thegovemment)use
10:14:14PM) ZJ:yeah, I've heardaboutthis
10:15:04 PM)bradass87:what really sucks tho, is the fact that since, we cant break it...because
we use it, but its public... so everyone else uses it...
10:15:24 PM)bradass87:so, that causes issues
10:16:58 PM)bradass87 is offering to send file rijndael.cpp
10:17:09 PM)bradass87:this is my implementation ofit...
10:17:20 PM)ZJ: my file transfer doesn't work on pidgin, itjust locks up the entire system
10:17:32PM) bradass87:ah,ishee
1^8ge22of39

18298

(10:17:34 PM)bradass87 canceled the transferofrijndael.cpp
(10:18:09 PM)bradass87:its justasimple implementation of rijndaelimade,soicould try and
figure outaway to break it
(10:18:25PM) bradass87:^phailz
(10:19:01 PM)bradass87:ishould probably go to bed and stop bombarding you with nonsense
(10:19:08 PM)ZJ:oh,Idon'tmind
(10:19:37 PM)bradass87:lol,iguess my nonsense is better than someone elses nonsense
(10:22:13 PM)bradass87:4865781f^0626162791f^06865782e
(10:48:06 PM)bradass87:goodnight
(10:48:17PM)ZJ:gnight
Conversation with bradass87 at 2/27/20095:23:18PM on ZJemptv(aim)
(5:23:18PM) bradass87:hola
(5:23:26 PM)ZJ: sup
(5:23:42 PM)bradass87: its the weekend, yay
(5:24:28 PM)bradass87:ftnished producing my brief fbr brigade staff meeting on monday,all
settochillaxfortwodays^)
(5:24:44 PM)ZJ: cool
(5:25:17PM) bradass87: snow is finally melting here...ican see the ground again ^D
(5:25:30 PM)ZJ:we're still gettingalittle snow here
(5:25:58 PM)bradass87:we've had snow on the ground since thanksgiving weekend...icried
whenisaw my first patch of mud
(5:26:58 PM)bradass87:so hows life7
(5:27:05 PM)ZJ:pretty good
(5:27:09 PM)ZJ:leamingtkinter
(5:27:26 PM)bradass87: fun
l^^ge23of39

18299

(5:27:48 PM)bradass87:ilostalot of money on the market today
(5:27:58 PM)ZJ:ohdear
(5:29:35 PM)bradass87:ibankedalot of money on the possibility citigroup's govemment deal
was going to mean bailout money for the bank, but the govemment wasnt going to takea
preferred stake...they tooka38^ preferred stake, and the already dying price dropped 40^
(5:30:27 PM)bradass87: looks like ill be holding my stake for several months, rather thanafew
days
(5:31:27 PM)bradass87:idid buy more citi shares while its still so low...its not going to go out
ofbusiness, so the price will go up
eventually
(5:31:38 PM)ZJ:yeah,mighttakeawhile
(5:32:10PM)bradass87: my advice: don't play the market
(5:32:29 PM)bradass87:you can make money i^uickly...but you can lose it just as ^uick
(5:32:55 PM)ZJ:Idon't have enough money to bother with that anyway :P
(5:33:23 PM)bradass87:istartedwith^l500..ihaveabout ^850 now^^^
(5:33:45 PM)ZJ:lthinklhadlike^l3000 in stocks before this whole economything
(5:33:50 PM)ZJ:now it's been cut in half
(5:33:59 PM)bradass87:heh, hold on to what you got
(5:34:34 PM)bradass87: if you're already playing the game, then go ahead and B1^^,B1^^,
BI^^... it'll never be this easy and affordable to play the market
(5:35:09 PM)bradass87: improbably going to dumpagood portion of my next paycheck into
the market, too
(5:38:32 PM)bradass87:im getting the vibe you're an introvert7
(5:38:56 PM)ZJ:Idon'tknow,is that likeahard-and-fast distinction that can be determined
(5:39:21 PM)bradass87:itcan be
(5:39:40 PM)bradass87:ipsychoanalyze too much tho
(6:10:50 PM)bradass87:rawr^...whats going on in chi-town

1^8ge2^of39

18300

(6:11:23 PM)ZJ:lol,notverymuch
(6:11:44 PM)bradass87: big city,lots of suburbs...c'mon, something
(6:11:59 PM)bradass87:closest thing to civilization for me is syracuse70 miles south ^P
(6:12:53 PM)ZJ:yeah,Idon't go downtown much
(6:12:58 PM)ZJ:just during Christmas
(6:13:07 PM)bradass87:take the opportunity
(6:13:16PM) bradass87:imean:TAI^ETHEOPPORTl^IT^
(6:14:00 PM)bradass87:the streets ofthe downtown ma^or cities are the most fantastic place in
this country
(8:35:53 PM)bradass87:^ou heard about this right http://w^vw.silencit^^chiistians.com/
(8:36:04 PM)ZJ:yeah,notthatI'vewatchedit
(8:36:41PM) bradass87:im slowly watching pieces ofit,ican only takeafew minutes atatime
(8:37:19PM) ZJ:fascistswithapersecutioncomplex,what else is new
(8:38:17PM) bradass87:flashy graphics, btizzwords,andagreener "save the environment" ethic
(8:38:47PM) bradass87:rick warren reference in there :P
(8:39:31PM) bradass87:afuzzy warm and friendly fascist is stillafascist,right7
(8:39:47 PM)ZJ:fascismwithasmiley face
(8:41:07 PM)bradass87: Love your family.Recycle.I^ill Jews.
(7:39:00 PM)bradass87:have you seen Andromedas^ake's first few vids ofthe "welcome to
the f^niverse" series yet7
(7:40:05 PM)ZJ:Ihaven't
(7:40:19PM) bradass87:
http:^/www.^outube.com/watch7v^M5McvNTdEAE^feature^channeI pa^e^--trailer
(7:40:35 PM)bradass87:http://wwwyoutubecom/viewp^aylist7p^lBCD9A77E08118F8^-playlist(vidland2)

l^^ge25of39

18301

(7:41:23 PM)ZJ:awesome
(7:52:55 PM)bradass87: its gorgeous^)
(2:35:53 AM) bradass87:ithinkim going to make my own videos)
(2:36:57 AM)ZJ:cool
(2:37:04 AM) ZJ:it'sdefinitelyworthit
(2:37:11 AM) bradass87:im downloading adobe after effects
(2:37:44 AM) bradass87:"Propensity^Intent"
(2:38:10AM) bradass87: it'll beahistory,current status of^ and call for repeal ofDADT...
(2:38:33 AM) bradass87:narrarative rather than vlog
(2:39:08 AM) ZJ:sounds good
Conversation with bradass87 at 3/2/2009 12:53:19AM onZJemptv(aim)
(12:53:19AM) bradass87: sleep isacrutch:P
(12:58:34 AM) ZJ:lstay awake too long and then crash
(12:58:44 AM) bradass87:heehee
(12:58:50 AM) bradass87: sounds like the life
(12:59:07AM) bradass87: intelligent people just cant sleep these days
(12:59:18AM) bradass87:when so much information is available all the time
(12:59:27 AM)ZJ:yeah
(12:59:57AM) bradass87: so what are we working on tonight7
(1:00:09 AM)ZJ:watching24:D
(1:00:32 AM) bradass87:ithink jack bauer is going to save the day,afl^er 22 plot twists of course
(1:00:42 AM)ZJ:we'll see :P
(1:00:57AM) bradass87:istopped watching afier season4

^^ge28of39

18302

(1:01:12 AM) ZJ: but that means you missed out on5:^
(1:01:13 AM) bradass87:and now that im living the Intel life, its even less likelyiwill do so
(1:01:27AM) ZJ:Ilove their techno jargon
(1:01:31AM) ZJ: open upasocket^
(1:01:57AM) bradass87:my favorite cliche in movies and television
(1:02:08 AM) bradass87:the military command room
(1:02:55 AM) bradass87: everything is so sleek and high tech, multiple screens, bright lights, and
lots ofspace, huge amounts ofit
(1:04:30 AM) bradass87:inreality,itsadimly lit room crowded to the point you cant move an
inch without having to quietly say "excuse me sir" "pardon me sergeant ma^or"... cables trip you
up everywhere, papers stacked everywhere...
(1:04:58 AM) ZJ:daylisfi^om2001,ithasn'texactly aged well
(1:05:05 AM) ZJ:Iforgot how big cell phones were back then
(1:05:29 AM) bradass87:ijust think back to my father's motorola
(l:05:50AM)bradass87:hegaveittomewhenheboughtanewonewheniwasakid
(1:05:59 AM)ZJ:wasitthestartac7
(1:06:51 AM) bradass87:itwasa^5000, 21b brick...the biggest part wasabattery...ipretended
it wasamachinegun, the antanna was its barrel, and the battery was its ammo clip xD
(1:07:01 AM)ZJ:hahah
(1:07:29 AM) bradass87: oh no, much older
(1:07:53 AM) ZJ:Iremember my uncle hadastartac, we were like "that'saphone7but it's so
tiny^"
(1:08:17AM) bradass87:http://www.oaktreeent.con^web^hotos/Telephones/
Motorola Brick Cell Phone web.jpg it was this^^^
(1:08:58 AM) ZJ: it would be awesome ifeveryone had one ofthose nowadays and they were
always jabbering away on it in public
(1:09:18AM) bradass87:http:^/et^wikipedia.org/wikt/Motoro^aDynaTAC
^^ge^^of39

18303

1:09:40 AM) bradass87:lol
1:10:38 AM) bradass87: brings back memories
1:12:17AM) bradass87:ihadafascination building stuff with lego, and with army stuff with
^reen and tan soldiers...ialso had handmedown dolls from my sister, barbie dolls...
(1:12:36 AM)
(1:12:52 AM)
(1:13:53 AM)
(1:14:20 AM)
weird
(1:14:48 AM)
(1:14:59 AM)
(1:15:02 AM)
(1:15:04 AM)
(1:15:07 AM)
(1:15:16 AM)
(1:15:25 AM)
(1:15:35 AM)
(1:15:42 AM)
(1:15:46 AM)
(1:16:14 AM)
(1:16:37 AM)
(1:16:48 AM)
(1:17:01 AM)
(1:17:36 AM)

l^^ge^8of39

18304

l:17:41AM)ZJ:really7
1:17:47AM) bradass87: mhmm
1:18:42 AM) bradass87: we tooka^uiz together, one of those think of anyone in the woods
things
1:19:28 AM) bradass87:well,when it came to who is most important to our lives,ianswered
with his name
1:19:43 AM) bradass87: his response was god...
1:19:50 AM)ZJ: oh dear
1:20:09 AM) bradass87:awkward7
1:20:15 AM)ZJ:^uite
l:20:33 AM)bradass87:ithasntbeenaproblemasofyet
1:21:06 AM) bradass87:butifigure down the line we might have to reconcile
1:21:31AM) ZJ:it usually comes up at some point
1:22:19AM) bradass87:he'saregularchurchgoer,adevout catholic, converted in his early
teens, from jewish parents
1:22:45 AM) bradass87:iwas raised catholic, soiget the whole schpiel
1:23:40 AM) bradass87:butithink this isapointwhereitmly dont understand him...
1:24:14AM) bradass87:that tells me his faith obviously meansawhole lot to him
1:24:36 AM) ZJ:why would someone leave their religion, and then join another
1:24:50 AM) ZJ:ifyou've realized that one religion is false, how can you not extend that to
every religion7
1:25:06 AM) bradass87:idontknow,idont have answers...ifidid,iwouldnt be fiizzled
1:27:04 AM) bradass87:this is the first time ive sensedaproblem...ijust hope itll be okay,
becauseilovehim
1:27:36 AM) ZJ: I'm sure you two can work through it
1:27:51 AM) bradass87:mhmm,
l^age29of39

18305

1:28:15 AM) bradass87: it certainly caught me off guard tho
1:28:28 AM) bradass87:sinceiplace value on people first
I:31:14AM)bradass87:my personal value to things in order: dirt/rocks/ice, single-celled
organisms, plants, man-made objects,various animals, mammalian animals, people
1:31:29 AM) ZJ:that makes sense
1:31:35 AM) ZJ: gods wouldn't even enter the picture for me
1:31:42 AM) bradass87:me either
1:31:59 AM) ZJ: it's important only in the sense ofthe effects that the concept has on people
1:32:51 AM) bradass87: it just felt,weird...being his boyfriend, being in love with him, and
feeling he is the most important person in the world to me, and then he places his faith above me
1:34:41AM) bradass87: as you can tell, it bothers mealittle...^^
1:34:50 AM)ZJ:yeah
1:35:05 AM) ZJ:religion messes people up
1:35:14AM) ZJ: it corrupts their priorities in life
1:37:33 AM) bradass87:ive asked him about it before...he's nice about it, and he knows im far,
far, from religous... but you're right, ive asked him about how he can reconcile his ways with his
beliefs and he explains it in terms of'faith" and "feeling god"...ijust shrugged these off
1:52:14AM) bradass87: imsure jack bauer is doing some amazing stuff..teleporting across los
angeles in minutes
1:52:40 AM) ZJ: someone actually madeasite to calculate that
1:52:51 AM) ZJ:where he was,where he was going, how long it took to get there
1:52:57AM) ZJ:and they would make realistic maps of this
1:53:06 AM) ZJ:at times he exceeded 600 mph
1:58:36 AM) bradass87:iknewaman who was withlstSFODD, commonly referred to as
DeltaForce"
1:58:47AM)bradass87: scariestmanievermet

I^^ge30of39

18306

(2:00:20 AM) bradass87: he would appear and disappear, hear and see stuff like where the hell
did you find that out at, jump over fences withoutasound
(2:00:23 AM) bradass87: just crazy stuff
(2:01:03 AM) bradass87: he hadacombat knife with him at all times, he would throw it at wood
and make it stick inside to scare you
(2:01:26 AM) bradass87:iknow liars and fakes, but this guy was holy shit
(2:02:59 AM) bradass87:would you call Ira^ and Afghanistan wars7
(2:03:20 AM)ZJ:notlike,a^^IIkindofwaroranything
(2:03:29 AM) ZJ: depends on the criteria for war
(2:03:39 AM) bradass87:iwas just thinking about howwe refer to them as wars, commonly
(2:03:53 AM) bradass87:would say that there isa"war" in mexico7
(2:04:15 AM) bradass87: even though, more casualties from dmg cartel related violence are
occuring there
(2:04:32AM)ZJ:hmm
(2:04:37 AM)ZJ:I'mnotsure,really
(2:04:45 AM) ZJ: fbr either, you could use the more generic term conflict
(2:04:45 AM) bradass87:iknow,its weird
(2:05:12 AM) bradass87:iwas just thinking about that this moming..
(2:05:46 AM) bradass87:we've been watching carefttlly
(2:06:09 AM) bradass87:since its in our back yard, of course
(2:06:36 AM) bradass87:Sinaloa, Gulf, Eos Zetas,
(2:07:39 AM) bradass87:6000killedlastyear,andthatsnottheACTl^AE total ^nudge^
(2:14:31AM) bradass87: oh fuck,ishouldsleep
(2:14:35 AM) bradass87:gn'ight
(2:14:38 AM) bradass87:g'night
l^age3^of39

18307

(2:14:43 AM)ZJ:gnight
Conversation with bradass87 at 3/8/2009 6:05:59 PM on ZJemptv(aim)
(6:05:59 PM)bradass87:doyouknowlatin7
(6:09:24 PM)ZJ:notreally,no
(6:18:09 PM)bradass87:trying to leam...iam linguistically challenged
(6:18:34 PM)ZJ:yeahItookacouple years ofit like...7years ago
(6:18:37PM)ZJ:butIforgotit
(6:19:05 PM)bradass87: conjugations... declinations or something like that... my head is about to
explode
(6:20:16PM) bradass87:puer,puella,vir,femina...
(6:20:25 PM)bradass87:thats my knowledge inanutshell:-)
(6:20:58 PM)bradass87:pueri,puellae,viri,feminae...just doubled my knowledge
(2:36:56 AM) bradass87:hi
(2:37:01AM)ZJ:sup
(2:37:18AM) bradass87:heh,went to sleep early,andiwoke up in the middle of the night...
yay7
(2:37:29 AM) ZJ:lollhate when thathappens
(2:37:48 AM) bradass87: my head is spinning
(2:38:18AM) bradass87:^sigh^
(2:38:40 AM) bradass87: ive got fi:^reign affairs on my mind constantly now...
(2:39:31AM) bradass87:mexico's spiralling violence, Pakistan's instability,northkorea's
rhetorical posturing... blah blah blah
(2:40:20 AM) bradass87: one ofthe bad parts ofthejob, having to think about bad stu^
(2:40:48 AM) ZJ:I've just been catching up on24...Isuppose it's like foreign affairs for
complete idiots

1^8ge32of39

18308

(2:41:33 AM) bradass87:hehehe... well, thejason bourne club isnt as fttn as television and
movies make it out to be
(2:42:00 AM) bradass87: just readastate department release...
(2:42:49 AM) bradass87:keepasmile on your face, andaknife behind your back
(2:44:08 AM) bradass87:im going to boston this weekend, that might put my mind at ease for at
leastamoment
(2:45:07AM) ZJ:I've never been to boston, is it nice
(2:46:28 AM) bradass87:its lovely...ispendalot of time in the college portions with my
boyfriend...he goes to brandeisin^altham, Mass...we go to Cambridgealot when im there,
where Harvard and MlTare
Conversation with bradass87at3^22/2009 11:20:16PMonZJemptv(aim)
(11:20:16PM) bradass87:heIlo
(ll:22:37PM)ZJ:sup
(11:22:49 PM)bradass87:latenight .
(11:23:32 PM)ZJ: indeed
(11:24:31PM) bradass87:im getting back into my programmer mode, albeit not deeply
(11:26:35 PM)bradass87:im working on an htcidentTt^aekerformy unit, to update the c u r r ^
one we have^om the unit's last deployment
(11:27:39 PM) bradass87: http://www.designerbrad.com/its/index.php
(11:28:02 PM) bradass87: it gives me a chance tcrplay with php/mysql/ajax
(11:30:20 PM) ZJ: nifty
(11:31:19 PM) bradass87: its coming along nicely so far, i figure
(11:31:34 PM) bradass87: heh, none of it is usable at all
Conversation with bradass87 at 5/3/2009 8:29:34 PM on ZJemptv (aim)
(8:29:34 PM) bradass87: in DC =D
(8:29:59 PM) bradass87: hi, btw
Page 33 of 39

18309

(8:34:47PM) ZJ:hi
(8:36:36 PM)bradass87:taking classes in the day,playing politics in the evening
(8:36:40 PM)bradass87:ilove this town
(8:38:09 PM)bradass87:im attending two ma^or events...agavinnewsomgubematorial
fiindraiser,thenastonewall democratscapitol championsthingie
(8:38:33 PM)ZJ: sweet
(8:39:11PM) bradass87: ive gotaphoto scheduled will gavinnewsom, and ill be hobnobbing
with congressional folk at the other event
(8:39:16PM) bradass87:^with
(8:39:54 PM)bradass87: ill be sure to bring up issues regarding religion and homophobisa
(8:40:07PM) bradass87: ^phobia
Conversation with bradass87 at 8/1/2009 8:59:01 PMonZJemptv(aim)
(8:59:01 PM)bradass87:howdiddly
(8:59:30 PM)ZJ:sup
(8:59:51 PM)bradass87: notmuch
(9:00:12PM) bradass87:igot back from ft polk recently
(9:00:29 PM)ZJ: cool
(9:00:45 PM)bradass87:what have you been up to
(9:01:08 PM)ZJ:right now I'm havingalive show on blogtv
(9:01:26 PM)bradass87: oh wow
(9:01:56 PM)bradass87:how long are you doing that for7
(9:02:05 PM)ZJ:forthenextllhoursorso
(9:03:30PM)bradass87:ah,ishee...ifound the link, its connecting now
(9:04:20 PM)bradass87:seem to be gettingalotofharassment^E

P8ge3^of39

18310

(9:04:33 PM)ZJ: oh, they'realways like that
(9:06:23 PM)bradass87:iused to doawebcamshowafew years ago...noone watched of
course
(9:09:01 PM)bradass87:where is everyone chattering to you from7
(9:09:14PM)ZJ: http://www.blogtv.eom/people/Z.lemptv
(9:09:19PM) ZJ:thereisabox on the right side
(9:09:56 PM)bradass87: had to refresh...iguess the page was broken
(9:13:31PM) bradass87:ibriefedthe210BrigadeCombatTeam (BCT), Colonel Millerabout6
times during JRTC in Louisiana onaclassified webcam...of course it was buggy as all hell
(9:13:39 PM)bradass87:my bad
(9:13:42 PM)ZJ:noproblem
(9:13:45 PM)ZJ:thislagslikehelltoo
(9:13:51 PM)ZJ: because my system is slow
(9:19:14PM) bradass87:sorry to AIM again: what do you plan on doingjobwise over the course
ofthe next2years7
(9:19:29 PM)ZJ:probablygetajob at kmart or something
(9:19:51 PM)bradass87:are you sure about that7
(9:20:36 PM)ZJ:no,Imight end up at walgreens...
(9:21:47PM) bradass87:hmm...how about public relations7
(9:24:33 PM)bradass87:youhavetalent
(9:24:41PM)ZJ:inpublicrelations7
(9:25:08 PM)bradass87:you're online with 66 viewers...you makealot of open and honest
videos
^B^
(9:41:24 PM)bradass87:i'dlike to hire you/work with you in the fixture

Page 3S of 39

18311

(9:41:47PM)ZJ:really7
(9:42:10PM) bradass87:yes
(9:45:32 PM)bradass87:you probably think im crazy ^P
(9:45:44 PM)ZJ:notnecessarily:P
(9:46:22 PM)bradass87: indeed you are
(9:47:53 PM)bradass87: how have you been supporting yourself, financially7
(9:50:19PM) ZJ: currently I'm living with my parents and doing odd jobs regarding technology
(9:56:00 PM)bradass87:im not sure how my lifeis going to pan out overthe next 26 months..^
(9:57:11PM) bradass87:2months pre-deployment, 12monthsofiraq...and another 12month^
of recovery and garrison...all assumingidont get discharged underDADT...but the moment!
leave the military,im planning on breaking out in all directions
(9:57:46 PM)ZJ:man, stay safe iniraq
(10:01:26 PM)bradass87:im an analyst,ishadowabrigadeconmiiander...also, the shia majority
in the location we are going doesn't want to screw around with the l^S...theyre stockpiling fresh
weapons...because the moment they leave, they plan on removing stmnis out of the region tothe
southeast and northeast ofbaghdad
(10:02:01 PM)bradass87:imtryin^to figure outawaytopreventacivilwarthe second v^e
le^^e
(10:02:47PM) ZJ:thatsoundsvery bad
(10:03:22 PM)bradass87:if you're busy,ican leave you alone
(10:03:47PM)ZJ:no,goahead
(10:08:50 PM)bradass87:ican provide you with some training/support over the next few
months for technical matters...if you would like...
^...^damnshilt tab wont let me finish
(10:11:58 PM)bradass87:^shiflretum
(10:16:28 PM)bradass87:ihopeim not creeping you out
(10:16:34PM)ZJ: ofcoursenot
Page36of39

18312

10:49:40 PM)bradass87:have you been to the guitar center onNHalsted7
10:49:57 PM)ZJ: I've been toaguitar center butlsuck at directions so it may have been that
one
10:50:48 PM)bradass87: haha, the only other one is in Gary someplace... so yes that was it... i
worked there forabrief period of time during my travels inal992nissan pickup
10:51:02 PM)ZJ:Isee
10:52:01 PM)bradass87:any interest in an AJAX driven blog/content management system
10:52:19PM)ZJ:I'vedoneCMSesbutnotwitha)ax
10:53:26 PM)bradass87:ive built an XML RPC client/server engine,whichim currently
using for the brigade event tracking system
10:54:20 PM)bradass87:itsamishmash of freetext data management, geospatial data
management, and statistical data
10:55:37 PM)bradass87:iget this feeling like all ofit has business potential, but im stuck here
^sigh^
11:04:07 PM)bradass87:im enjoying your debates^)
11:13:49 PM)bradass87:httt^://swisham^^.wordpress.com/boyfriend's blog
11:19:00 PM)bradass87:brian green-elegant universe —great resource
11:19:05 PM)bradass87:on string theory
Conversation with bradass87 at 8/7/2009 10:30:22 PMonZJemptv(aim)
10:30:22 PM)bradass87:helloagain
10:30:31PM)ZJ:hi
10:30:37 PM)bradass87:whatyou up to7
10:32:04 PM)bradass87:^ahem^
10:32:10PM) ZJ:probably gonna make some food,Ihaven't eaten all day
10:32:12 PM)bradass87:sorry,pressed wrong button somewhere
10:32:22 PM)ZJ:butIdid wake up onlyacouple hours ago
Page3^of39

18313

(10:32:32 PM)bradass87:funfun
(10:32:41PM) bradass87:itookanap earlier
(10:33:11PM) bradass87:^sigh^
(10:34:59 PM)bradass87:idont mean to sound overdramatic,but im quite lonely
(10:37:31PM)ZJ:aww
(10:37:42 PM)bradass87:im okay
Conversation with bradass87 at 8/8/2009 1:55:17AM on ZJemptv(aim)
(1:55:17AM) bradass87: are you familiar with meyersbriggs7
(1:55:27AM) ZJ:the personality types7 vaguely yes
(1:55:33 AM) bradass87: do you know yours7
(1:56:04 AM)ZJ:IthinkIwasISTJlasttimeIchecked
(1:56:22 AM) bradass87:^ENTJ
(2:01:12 AM) bradass87: blah —iwish there were something to do
(2:03:23 AM) bradass87: everyone is asleep ^L
Conversation with bradass87 at 8/10/2009 1:59:32 AM onZJemptv(aim)
(1:59:31AM) bradass87:helloagain^D
(1:59:43 AM)ZJ: sup
(1:59:48 AM) bradass87: blah
(1:59:56 AM) bradass87: another late night
(2:00:03 AM)ZJ:yeah,same
(2:00:27AM) bradass87:at least you're an hour behind me
(2:01:39 AM) bradass87: do you know of"kalamazoo,michigan"7
(2:01:54 AM) ZJ: I've heard oftheplace

Page 3^ of 39

18314

(2:02:17AM) bradass87: lol,imight be going there in the next month or so...
(2:02:40 AM) bradass87:its

outthere

(2:02:51 AM) bradass87:butiguessim in the middle of nowhere as well
(2:04:03 AM) bradass87: what do you thii^ ofthe olsen-boies lawsuit thing
(2:04:19AM) ZJ:Idon'tknowifit's the best strategy
(2:04:30 AM) ZJ: it seems like they could be riskingalot
(2:04:35 AM) bradass87: mhmm
(2:04:59 AM) bradass87:im thinking it hasawhole lot to do with ego
(2:05:31AM) ZJ: it just seems weird olson would be involved with something like that
(2:05:58 AM) bradass87: indeed... im very skeptical
(2:06:27AM) bradass87:the good news is that the case would be withdrawn if prop8were to be
repealed in 2010
(2:06:53 AM) ZJ:are they waiting until 2012, though
(2:07:25 AM) bradass87:idont honestly know...its allabig grassroots mess
(2:11:26 AM) bradass87:no leadership
(2:11:33 AM)ZJ:yeah
(2:12:04 AM) bradass87: id love to take the reins ^^D
Conversation with bradass87 at 8/11/2009 12:58:07 AM onZJemptv(aim)
(12:58:07 AM) bradass87:htto://video^oo^le com/videoplay7docid^-6217214475742003000
veryinteresting..."how to startacult" —very very similarto basic training

Page39of39

18315

FINAL REPORT
GUANTANAMO REVIEW
TASK FORCE
January 22, 2010

Department of Justice
Department ofDefense
Department of State
Department of Homeland Security
Office of the Director
ofNational Intelligence
Joint Chiefs of Staff

/O

y

DEFENSE EXHIBITS for
»r icfentification
iaentificati
PAGE OFFERED:
PAGEADMITTED:
PAGE
of
PAGES

18316

^X^CUTIV^SU^l^AR^
On January22,2009,tbe President issued Executive Orderl3492, calling lora
prompt and comprehensive interagency review ofthe status ofall individuals currently
detained at the Guantanamo 13ay Naval 8ase and requiring tbe closure ofthe detention
lacilities there. The Executive Order ^as based on tbe finding that the appropriate
disposition ofall individuals detained at Guantanamo would further the national security
and Ibreign pohcy interests ofthe United States and the interestsofjustice.
One year after the issuance ofthe Fxecutive Order, the review ordered by the
President is now complete. After evaluating ah ofthe detainees, the review participants
have decided on the proper disposition—transfer, prosecution, or continued detention—
of all240 detainees subject to the review.
Each ofthese decisions was reached by the unanimous agreement ofthe agencies
responsible fbr the review: the Department ofJustice, Department ofDefense,
Department of^tate, Department ofHomeland^ecurity,Office ofthe Director of
National Intelhgence, and Joint ChiefsofStaff
Review Frncess
Toimplement the President^sorder, the Attorney General,as the coordinator of
the review,estabhshed the Guantanamo ReviewTask Force andaseniorlevel Review
Panel. TheTask Force was responsible lor assembling and examining relevant
information on the Guantanamo detainees and making recommendations on their proper
dispositions. The Review Panel, consisting ofofficials with delegated authority from
their respective agencies to decide the disposition of each detainee, reviewed theTask
Force^srecommendations and made disposition decisions onarohing basis. Where tbe
Review Panel did not reach consensus, or where higher-level review was appropriate, the
agency heads (^^Principals^^) named in the Executive Order determined the proper
disposition ofthe detainee.
Key leatures ofthe review process included:
^ Comprehensive Interagency Review. TheTask Force consisted of more
than 60 career prolessionals, including intelligence analysts, law enforcement
agents, and attorneys, drawn from the Department ofJustice, Department of
Defense, Department ofState, Department ofllomelandSecurity,Central
Intelligence Agency,Federal bureau oflnvestigation, and other agencies
within the intelligence community.
^

Rigorous ^^amination ofinformation. TheTask Force assembled large
volumes ofinformation Irom across the government relevant to determining
the proper disposition ofeach detainee. Task Force members examined this
information critically,giving careful consideration to the threat posed by the
detainee, the reliability ofthe underlying inlormation, and the interestsof
nationalsecurity.

18317

^

Unanimous l^eeision^al^ngbySeniorOflieials.8asedontheTask
Force^sevaluations and recommendations, senior officials representing each
agency responsible lor the review reached unanimous determinations on the
appropriate disposition lor ah detainees. In the large majority of cases, the
Review Panel was able to reachaconsensus. Where the Review Panel was
not able to reachaunanimous decision—or when additional review was
appropriate—the Principals met to determine the proper disposition.

Results of the Review
The decisions reached on the240 detainees subject to the review are as follows:
^

126 detainees were approved lor transfer. Todate,44 ofthese detainees have
been transferred from Guantanamo to countries outside the United States.

^

44 detainees over the courseofthe review were relerred lor prosecution
either in federal court oramilitary commission, and ^6 of these detainees
remain the subject ofactive cases or investigations. The Attorney General has
announced that the govemment will pursue prosecutions against six ofthese
detainees in lederal court and will pursue prosecutions against six others in
mihtary commissions.

^

4^ detainees were determined to be too dangerous to transler but not feasible
lor prosecution. They will remain in detention pursuant to the government's
authority underthe Authorization IbrUseofMilitary Force passed by
Congress in response to the attacks of^eptemberll,2001. Detainees may
challenge the legality oftheir detention in federal court and will periodically
receive further review within the Executive 13ranch.

^

^0 detainees from^emen were designated lor ^^conditional^^ detention based
on the current security environment in that country. They are not approved
fbr repatriation to^emen at this time, but may be translerred to third
countries, or repatriated to^emen in the ftiture ifthe current moratorium on
transfers to^emen is lifted and other security conditions are meL

Looking Ahead
With the completion ofthe review,an essential component ofthe effort to close
the Guantanamo detention facilities has been accomplished, beyond the review,
additional work remains to be done to implement the review decisions and to resolve
other issues relating to detainees. TheTask Force has ensured that its analysesofthe
detainees and the information collected in the course ofthe review are properly preserved
to assist in the resolution ofthese issues going forward.

18318

T A 8 L ^ OF CONTENTS
L

Introduction

1

II.

background

1

III.

The President^sExecutive Order

2

IV.

Implementing the Executive Order: The Guantanamo ReviewTask Force

3

A. Establishment of theTask Force

3

8. Task Force Structure

3

C. Guantanamo Review Panel

4

D. Task Force Information Collection

5

E. Review Phases

6

Detainee Review Guidelines

7

A. Transfer Guidelines

7

13. Prosecution Guidelines

7

C. Detention Guidelines

8

D. Review ofinformation

9

Results ofthe Review

9

A. Overview ofDecisions

9

V.

VL

13. Overview ofthe Guantanamo Detainee Population

13

Transfer Decisions

15

A. Background

15

B. Decisions

16

C. Yemeni Detainees

18

VIII. Prosecution Decisions

19

A. Background

19

B. Decisions

20

C. Detainees ^ho Cannot Be Prosecuted

22

Detention Decisions

23

A. Background

23

B. Decisions

23

C Continued Reviews

25

X.

Conditional Detention Decisions: Yemeni Detainees

25

XL

Diplomatic Efforts

26

XIL

Conclusion

28

VIL

IX.

iii

18319

I.

Introduction

An essential component ofthe President^sorder calling lor the closure ofthe
detention facilities at the Guantanamo Bay Naval Base was the initiation ofanew and
rigorous interagency review ofall individuals detained there. The purpose ofthe review
was to collect and examine information from across the government to determine which
detainees the United States should transfer or release from custody,prosecute, or
otherwise lawfully detain.
This review is now complete. After carefully considering each case, the agencies
responsible lor the review—the Department ofJustice, Department ofDefense,
Department ofState, Department ofllomelandSecurity,Office of the Director of
National Intelligence, and Joint Chiefs of^taff—have unanimously agreed on the proper
disposition of all240 detainees subject to the review. While there remain other steps
outside the scope ofthe review that must be taken belore the detention facilities at
Guantanamo can be closed, the completion ofthe review fullillsacentral element ofthe
President^sorder.
This report describes the process by which the review was conducted over the
past year, the decisions resulting from the review,and the progress made toward
implementing those decisions.
II.

Bael^groiind

Following the terrorist attacks of^eptemberll,2001,the United states was faced
with the c^uestion ofwhat to do with individuals captured in connection with military
operations in Afghanistan or in other counterterrorism operations overseas. Starting in
January2002, the military began transferringanumberofthese individuals to the
detention facilities at Guantanamo. 13y the end of2002,632 detainees had been brought
to Guantanamo. In 2003,117additional detainees were brought to the base,withlO
more detainees added in 2004, 14detainees in 2006,five detainees in 2007,and one
detainee in 2008. Since 2002,atotal of779 individuals have been detained at
Guantanamo in connection with the war against al0^^da,theTaliban, and associated
forces.
From 2002 through 2008,most ofthe individuals detained at Guantanamo were
transferred or released fromU.^.custody,with the vast majority being repatriated to their
home countries and others reseftled in third countries willing to receive them. Ofthe779
individuals detained at Guantanamo, approximately 530—almost 70 percent—were
translerred or released fromU.^.custody prior to 2009. The countries to which these
detainees were transferred include Afghanistan, Albania, Algeria, Australia, Bahrain,
Bangladesh,Belgium,13osnia, Denmark, Fgypt, France, Germany,lran,lrai^,Jordan,
Kazakhstan, l^uwait, Libya, l^aldives,Vlauritania,l^orocco, Pakistan, O^tar, Russia,
Saudi Arabia, Somalia (somaliland),^pain,^udan,^weden,Tajikistan,Tunisia,Turkey,
Uganda, the Ignited Arab Emirates, the United Kingdom,andYemen.

18320

By January20,2009,the population of detainees at Guantanamo had been
reduced to242. Of the242 remaining detainees, 59 had been approved lor transfer by the
prior administration and were awaiting implementation oftheir translers.
III.

The President s I^:i^eeiitive Order

On January22,2009,the President issued an Fxecutive Order rei^uiring the
closure ofthe detention facilities at Guantanamo within one year. Noting the length of
the detentions and the significant concerns they had raised both within the United States
and internationally, the President determined that the ^^prompt and appropriate disposition
ofthe individuals currently detained at Guantanamo and closure ofthe facilities in which
they are detained would further the national security and fbreign policy interests ofthe
United States and the interestsofjustice.^^
Accordingly,the President ordered the Executive Branch to conductaprompt and
comprehensive interagency review ofthe factual and legal bases for the continued
detention ofall individuals remaining at Guantanamo. The President ordered that the
review be coordinated by the Aftorney General and conducted with the full cooperation
and participation ofthe Secretary ofDelense, secretary ofState, Secretary ofHomeland
Security,DirectorofNational Intelligence, and Chairman ofthe Joint Chiefs ofStaff
The first task given to the review participants under the Executive Order was to
assemble, to the extent reasonably practicable, all inlormation in the possession ofthe
federal govemment pertaining to any individual then detained at Guantanamo and
relevant to determining his proper disposition.
The Executive Order then set Ibrth the tbllowing framework lor the review
participants to follow in determining the disposition ofeach detainee:
^

First, onarolling basis and as promptly as possible, determine whether it is
possible to transler or release the detainee consistent with the national security
and foreign policy interests ofthe United states and,if so,whether and how
the Secretary ofDefense may effect the detainee^stransler or release:

^

Second,with respect to any detainee not approved for transfer or release,
determine whether the lederal government should seek to prosecute the
detainee lor any offenses he may have committed, including whether it is
leasible to prosecute such individual inacourt established pursuant to Article
111 ofthe United States Constitution(/.^.^ federal court): and

^

Third, with respect to any detainee whose disposition is not achieved through
transler,release, or prosecution, select other lawful means, consistent with the
national security and foreign policy interests ofthe United States and the
interests ofjustice, lor the disposition ofthe detainee.

18321

The Executive Order further directed that the Secretary ofDefense, the Secretary
of^tate, and other review participants work to effect promptly the release or transfer of
all individuals lor whom release or transfer is possible, and that the SecretaryofState
expeditiously pursue and direct such negotiations and diplomatic efforts with foreign
governments as are necessary and appropriate to implement the order.
Finally,the Executive Order rei^uired that any individuals who remained in
detention at Guantanamo at the timeofthe closure ofthe detention facilities be returned
to their home country,released, transferred toathirdcountry,or transferred to another
United States detention facility inamanner consistent with law and the national security
and Ibreign policy interests ofthe United States.
IV.

Implementing the I^^ecntive Order: TheCnantanamoReviewTasl^Force
A.

establishment of theTasl^Force

Toimplement the Executive Order, the Attorney General established the
Guantanamo ReviewTask Force and appointed an Fxecutive Director oftheTask Force
onFebruary20,2009. TheTask Force was charged with assembling and reviewing
relevant information on the Guantanamo detainees and making recommendations to
senior level officials on the proper disposition of each detainee pursuant to the
framework set forth in the Executive Order. Toensure that the expertise and perspectives
of each participating agency were brought to bear on the review process, theTask Force
was established as an interagency entity. Further, to maximize collaboration and
exchangeofinfbrmationamongTaskForce members, allTaskForce staff were located
together inasecurefacility,onasingle floor devoted toTask Force work, and connected
electronically throughastandalone classified network.
B.

Tasl^ForeeStrttetnre

With the assistanceofthe participating agencies, theTask Force assembledastaff
ofover 60 career professionals, drawn Irom the Department ofJustice, Department of
Defense, DepartmentofState, Department ofHomeland^ecurity,Federal Bureau of
Investigation,Central Intelligence Agency,and National Counterterrorism Center.
Included in this wide range ofrepresentatives were senior military oflicers, lederal
prosecutors, FBI agents, intelligence analysts and officers, military prosecutors and
investigators, national security lawyers, civil litigators, paralegals, and administrative
assistants. During their tenure at theTaskForce, these staff members worked fulltime
on theTask Force review.
TheTask Force staff was initially organized into two review teams. The transler
team was responsible lor evaluating whether detainees could be transferred or released
consistent with the national security and foreign policy interests ofthe United States.^
' The term "release" is used to mean release from confinement without the need for continuing
security measures in the receiving country, while the term "transfer" is used to mean release from
confinement subject to appropriate security measures.

18322

The team primarily evaluated the degree ofthreat posed by the detainee toU.S.national
security,whether the threat could be mitigated through appropriate security measures,
and the potential destination countries where it appeared possible to salely transler the
detainee. The transler team was composed ofrepresentatives from each agency listed in
the Executive Order.
The prosecution team was responsible lor recommending whether the government
should seek to prosecute certain detainees in either lederal court or the military
commission system. The prosecution team was staffed predominantly by experienced
lederal prosecutors, investigative agents, and criminal appellate specialists from the
Department ofJustice,^as well as military commission prosecutors and investigative
agents from the Department ofDefense.
The work ofthe transfer and prosecution teams often overlapped, and the two
teams worked in close coordination over the course ofthe review. As described below,
after an initial review ofall the detainees, the transler and prosecution teams merged to
conductafurther review of detainees whose cases had been deferred during the initial
review.
The interagency makeup ofthe review teams was designed to ensure that all
relevant agency viewpoints—including military,intelligence, homeland security,
diplomatic, and law enforcement—were considered in the review process. Thus,
proposed recommendations for transfer or continued detention were drafted, reviewed,
and vigorously discussed in group deliberations by representatives ofeach ofthe
participating agencies. After these extensive discussions on each detainee, any dissenting
viewsofthe agency representatives were noted in the recommendations or otherwise
made known to the Review PaneL
C

Guantanamo Review Panel

TheTask Force^srecommendations,which contained detailed classified
assessments of each detainee,weresubmifted onarolling basis to the interagency
Guantanamo Review PaneL The Review Panel was established in February2009 along
with theTask Force and was composed of senior-level officialsftomeach ofthe agencies
identified in the Executive Order. Review Panel members were delegated authority
from their respective agency heads (^^Principals^^) to decide the disposition ofeach
detainee. Review Panel members were also responsible fbr ensuring that their respective
agencies made relevant inlormation in their possession available to theTask Force and

^ specifically,federal prosecutors on theTask l^orce were drawn from United states Attorneys^
t^ftices in the southern Oi^trictofNewVork,l^asternOistrictof^ewVork,WesternOi5trictofNew
^ork,district of^olumbia, eastern Oi^trictof^irginia, central district of^alifornia. Northern Oi^trict of
California, and OistrictofMaine, and from the counterterrorism section ofthe National security division
in the Oepartment of .lustice.
^ senior officials from the Central Intelligence Agency and l^ederall3ureau oflnvestigation also
regularly attended the Ireview Panel meetings to further inform the decision-making process.

18323

provided theTask Force with personnel and other resources necessary lor theTaskForce
to complete its review within the one-year time frame mandated by the PresidenL
Beginning in March 2009,the Review Panel met onaweekly basis to consider
the recommendationsoftheTask Force. The Review Panel made disposition decisions
only by unanimous agreement ofthe agencies identified in the Executive Order. Thus,
each ofthe participating agencies had an ec^ual voice in disposition decisions, and no
decisions were made by the Review Panel over the objection ofany agency. In the large
majority of cases, the Review Panel wasabletoachieveconsensusand reach decisions
regarding the detainees considered. When Review Panel members did not reach
consensus, or when higher level review was appropriate, the cases were referred to the
Principals Ibradecision. All ofthe cases referred to the Principals also ultimately
garnered the unanimous agreement ofthe participating agencies.
Onceafinal decision was made regarding the disposition ofaparticular detainee,
the decision was passed to the appropriate agencies for implementation. Ifadetaineewas
approved for transler toafbreign country asaresuh ofthe review,the Department of
State and Department ofDelense worked together to make appropriate arrangements to
effect the transfer inamanner consistent with the national security and Ibreign policy
interests ofthe United States, includingU.^.policies concerning humane treatmenL I f a
decision was made by the Review Panel lor prosecution, the case was referred to the
Department ofJustice for further investigation and review underajoint protocol
established by the Department ofjustice and Department ofDefense to determine
whether to pursue prosecution ofthe case in lederal court oramilitary commission. The
Review Panel was regularly updated on the implementation oftransler decisions and
prosecution relerrals, as well as any issues arising out ofthe implementation ofthese
decisions rec^uiring further interagency consideration.
l^.

Tasl^Foree Information Collection

In accordance with the Executive Order, theTask Force^sinitial responsibility
was to collect all government information, to the extent reasonably practicable, relevant
to determining the proper disposition ofeach detainee. The govemment did not havea
preexisting, consolidated repository ofsuch information. Rather, each lederal agency
stored information conceming Guantanamo detainees in its own systems, consistent with
its particular mission and operating protocols.
Accordingly,soon after it was formed,theTask Force initiated an eflbrt to collect
detainee inlormation and make it available for review byTask Force members. Asa
resuh ofthis complex effort, theTask Force consolidatedalarge volume ofinlbrmation
from the Department ofDefense, Central Intelligence Agency,Federal bureau of
Investigation, Department ofJustice, National ^ecurityAgency,National
Counterterrorism Center,Departmentof^tate, and Department ofHomeland security.
The documents assembled by theTask Force include summariesofbiographic
and capture inlormation: interrogation reports from custodial interviews ofthe detainees:

18324

records ofDepartment ofDefense administrative proceedings involving the detainees,
/.^,Combatant status ReviewTribunals and Administrative Review Board proceedings:
the results ofname traces run for detainees in certain intelligence databases maintained
by the Central Intelligence Agency and National SecurityAgency: the resultsofname
traces run for detainees in law enlbrcement databases maintained by the Federal Bureau
oflnvestigation: investigative records maintained by the Office ofmilitary
Commissions Prosecution (^^OMC^^) and Criminal InvestigativeTask Force within the
Department ofDefense: records assembled by the Department ofJustice lor purposes of
defending habeas litigation brought by detainees to challenge their detention: recidivism
assessments concerning Ibrmer detainees: finished intelligence products on the detainee
population and on general topics ofinterest to theTask Force^swork: and information
concerning potential destination countries fbr detainees approved for transler or release.
TheTask Force also accepted wriften submissions made on behalfOfindividual detainees
by their counsel or other representatives.
Additionally,theTask Force had accesstoavariety of external networks
containing additional inlormation on the detainees, including documentary and physical
evidence recovered through counterterrorism operations, and records conceming the
behavior, disciplinary infractions, and physical and mental health ofthe detainees during
detention. Over the course ofthe review,theTaskPorce also received briefings from the
intelligence community onanumberoftopics relevant to the review.
The review of all this information was conducted inaclassified environment
using secure systems.
^.

Review Phases

Following an initial period to stand up theTaskForce and collect detainee
inlormation,theTask Force began to review detainees on March 5,2009. The review
was conducted in two phases. During the lirst phase, theTask Force reviewed all240
detainees subject to the review.^ In accordance with the framework set Ibrth in the
Executive Order, the purpose ofthe first phase ofthe review was to identify those
detainees who could be transferred or released consistent with the national security and
foreign policy interests ofthe United states, those detainees as to whom prosecution
appeared feasible, and those detainees who rec^uiredliirther evaluation belbreadecision
could be made on their appropriate disposition.
The purpose ofthe second phase ofthe review was to reevaluate those detainees
who had been deferred during the lirst phase. Each detainee reviewed in the second
phasewasconsideredlbrtransler,prosecution,or—in the event that neitherofthese
dispositions was deemed appropriate—continued detention pursuant to the government's

^Although there were2^2 detainees at Ouantanamo when the l^xecutive Order was issued,one
detainee had already been convicted and sentenced to life in the military commission system in ^00^, and
another detainee committed suicide in lune ^^0^. Thus,there were^^O detainees whose dispositions were
reviewed under the l^xecutive Order,

18325

authority under the Authorization lor Use ofMilitary Force (^^AUMF^^) passed by
Congress in response to the attacks ofSeptemberll,2001.
V.

I^etainee Review Guidelines

In conducting its reviews, theTask Force Ibllowed detainee review guidelines
(^^Guidelines^^) developed specifically for the Executive Order review and approved by
the Review Panel. The Guidelines set Ibrth standards to apply in considering detainees
Ibrtransler, prosecution,orcontinued detention pursuant to the government^sauthority
under theAU^F.
A.

Transfer Guidelines

The Guidelines addressed three types ofevaluations relevant to determining
whetheradetainee should be recommended lor transfer or release.
The first evaluation rei^uired by the Guidelines wasathreat evaluation. The
Guidelines provided thatadetainee should be deemed eligible for transler if any threat he
poses could be sufficiently mitigated through feasible and appropriate security measures.^
The Guidelines set forthanonexclusive list offactors to be considered in evaluating the
threat posed byadetainee. In applying those factors, theTask Force was instructed to
consider the totality ofavailable inlormation regarding the detainee, and to give careful
consideration to the credibility and reliability ofthe available information.
The second evaluation rec^uired by the Guidelines was an evaluation of potential
destination(/.^.,receiving) countries. The Guidelines left theTask Force with discretion
whether to recommendadetainee lor transler only to specified countries or under
specified conditions. As with the threat evaluation, the Guidelines providedanon
exclusive set offactors by which to evaluate potential receiving countries.
The third evaluation rei^uired by the Guidelines wasalegal evaluation to ensure
that any detainee falling outside the government^slawful detention authority under the
AUMF was recommended for transler or release.
B.

Prosecution Guidelines

The Guidelines also rei^uired cases to be evaluated byTask Force prosecutors to
determine whetherafederal court or military commission prosecution should be
recommended for any oflenses the detainees may have commifted.
For the evaluation of whetheradetainee should be prosecuted in lederal court, the
Guidelines set Ibrth standards used by lederal prosecutors across the country to determine
^The guidelines further pi^ovided thatadetainee should be deemed eligible for release ifhe does
not pose an identifiable threat to the national security ofthe United states. Other than thel^Chinese
Uighur detainees,who were approved for "ti^an^fer or release,"no detainees were approved for "release"
during the course ofthe review.

18326

whetherto chargeacase, as set forth in the ^ ^ / / ^ ^ ^ / i ^ / ^ ^ B l / / ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ / . Consistent
with these standards, the Guidelines provided thatacase should be recommended lor
prosecution ifthe detainee^sconductconstitutesalederaloflense and the potentially
available admissible evidence will probably be sufficient to obtain and sustaina
conviction—unless prosecution should be declined because no substantial federal interest
would be served by prosecution. Key lactors in making this determination include the
nature and seriousness ofthe oflense: the detainee^sculpability in connection with the
offense: the detainee^swillingness to cooperate in the investigation or prosecution of
others: and the probable sentence or other consec^uences ifthe detainee is convicted.
For the evaluation of whetheradetainee should be prosecuted inamilitary
commission,Task Force prosecutors examined the potentially available admissible
evidence and consulted closely with O^C to determine the feasibility ofprosecution.
Recognizing the unii^ue nature ofthese cases, the Guidelines provided that other
lactors were also significant in determining whether to recommend prosecution,
including the need to protect classified information, such as intelligence sources and
methods.
C

l^etention Guidelines

In accordance with the Executive Order, the Guidelines provided that every effort
should be made to ensure that all detainees who could be recommended lor transfer,
release, or prosecution consistent with national security and Ibreign policy interests and
the interests ofjustice were recommended lor such dispositions. Thus, the Guidelines
provided thatadetainee should be considered eligible for continued detention under the
AU^F only i f ( l ) t h e detainee posesanational security threat that cannot be sufficiently
mitigated through feasible and appropriate security measures: (2) prosecution ofthe
detainee by the lederal government is not feasible in any forum: and (3)continued
detention without criminal charges is lawful.
The Guidelines required theTaskForce to consuh with the Department ofJustice
in conductingalegal evaluation lor each detainee considered for continued detention.
This legal evaluation addressed both the legal basis lor holding the detainee under the
AUMF and the government^scase fbr delending the detention in any habeas litigation.^
As the Supreme Court has held, inherent within the authorization oftheAUMF to
^^use all necessary and appropriate Ibrce^^ is the power to detain any individuals who fall
within the scope ofthe statute.^ AstheCourtobserved,^^by universal agreement and
* The AUMF authorizes the President to "use all necessary and appropriate force against those
nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist
attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent
any future attacks of intemational terrorism against the United States by such nations, organizations or
persons." AUMF § 2(a).
' See Hamdi v. Rumsfeld, 542 U.S. 507, 519 (2004) (plurality opinion); id. at 587 (Thomas, J.)
(dissenting).

18327

practice,^^ the power to wage war necessarily includes the authority to capture and detain
combatants in order to prevent them from ^^returning to the field ofbattle and taking up
arms once again.^^^ The scopeoftheAUMF^sdetention authority extends to those
persons who ^^planned,authorized or commifted or aided^^ the Septemberllaftacks,
^^harbored those responsible for those aftacks,^^ or ^^were partof, or substantially
supported, Taliban or alO^^da forces or associated forces that are engaged in hostilities
against the United States or its coalition partners.^^^ Accordingly, only detainees who
satisfied this standard could be designated for continued detention.
I^.

Review ofinformation

Consistent with the Guidelines^ rcL^uirement that theTask Force undertakeafresh
and comprehensive evaluation of detainee information,theTask Porce sought to make
independent evaluations ofthe facts. In many instances, theTask Force largely agreed
with prior threat assessments ofthe detainees and sometimes Ibund additional
inlormation that further substantiated such assessments. In other instances, theTask
Force Ibund prior assessments to be overstated. Some assessments, for example,
contained allegations that were not supported by the underlying source document upon
which they relied. Other assessments contained conclusions that were stated
categorically even though derived Irom uncorroborated statements or raw intelligence
reporting ofundetermined or questionable reliability. Conversely,inafew cases, the
TaskForce discovered reliable information indicating thatadetainee posedagreater
threat in some respects than prior assessments suggested.
Even after careliil examination ofthe intelligence, however, it was not always
possible to draw delinitive conclusions regardingadetainee^spastconducL Many ofthe
detainees were captured in active zonesof combat and were not previously the targets of
investigation byU.^.law enforcement authorities or the intelligence community. Much
ofwhat is known about such detainees comes from their own statements or statements
made by other detainees during custodial debrielings. TheTask Force sought to ensure
that the Review Panel and Principals were apprised in their decision-making ofany
limitations ofthe available inlormation.
VI.

Results of the Review
A.

Overview ofl^ecisions

By the oneyear mark ofJanuary 22,2010, the review participants reached
decisions on the appropriate disposition of all240 detainees subject to the Executive
Order. In sum,126 detainees were approved for transfer: 36 detainees were referred lor

* Id, at 518; see also id. at 587 (Thomas, J.) (dissenting) (same).
See Gov't Filing, in re: Guantanamo Bay Detainee Litigation, Misc. No. 08-442 (D.D.C. March
13, 2009). The United States Court of Appeals for the District of Columbia recently affirmed that
Guantanamo detainees who meet this standard are detainable. See also Al-Bihani v. Obama, — F.3d
2010 WL 10411 at *3 (D.C. Cir. Jan. 5, 2010).

18328

prosecution:^^ 48 detainees were approved for continued detention under the AUMF: and
30 detainees from Vemen were approved fbr ^^conditionaF^ detention based on present
security conditions in Vemen.
O^er^^e^ of 060^^00^

^^n^^^^
^l^i^^^lo^
13 C O ^ ^ O ^ I 0 9 ^ ^ 1 0 ^
^O^^f^O^

After careful deliberation, all ofthese decisions were reached by unanimous
agreement ofsenior officials Irom each agency responsible lor the review. Thus, each
decisioncarriestheapprovaloftheDepartmentof Justice, Department ofDelense,
Department ofState, Department ofHomeland Security, Ofhce ofthe Director of
National Intelligence, and Joint Chiel^ of Staff. A more detailed breakdown ofthe
decisions lollows.
Detainees Approved lor Transler
^

126 detainees were unanimously approved fbr transfer subject to appropriate security
measures.
o

63 ofthe 126 detainees either had been cleared lor transler by the prior
administration, ordered released by a lederal district court, or both.

o

44 ofthe 126 detainees have been translerred to date—24 to their home
countries, 18 to third countries Ibr resettlements and two to Italy for
prosecution.

o

82 ofthe 126 detainees remain at Guantanamo. Ofthese detainees:
^

16 may be repatriated to their home countries (other than Vemen)
consistent with U.S. policies on humane treatmenL The State
Department and Department ofDelense are working with these
countries conceming the security conditions and timing ofthe

As explained below, 44 cases were initially relcrred tor prosecution; 3^ ofthose cases remain
the subject ofactive referrals.

10

18329

transfers. Some ofthese detainees have obtained injunctions that
presently bar their repatriation and cannot be repatriated until these
injunctions are lifted: litigation over the injunctions is ongoing.
37 cannot be repatriated at this time due to humane treatment or
related concemsassociated with their home countries(other than
^emen). The State Department is seeking to resettle these detainees in
third countries. (Asmall number of these detainees may be transferred
to third countries for prosecution rather than resettlement.)
29arefrom^emen. In light ofthe moratorium on translers of
Guantanamo detainees toVemen announced by the President on
January5,2010, these detainees cannot be translerred to^emen at this
time. In the meantime, these detainees are eligible to be translerred to
third countries capable ofimposing appropriate security measures.
Detainees Approved for Transfer

B Transferred
• Repatriation Consistent with Humane Treatment Policy
• Repatriation Raises Humane Treatment Concerns
• Yemeni Detainees

^
16

Detainees Referred for Prosecution


Initially, 44 detainees were referred for prosecution. As a result of further evaluation
of these cases (detailed below), there are now 36 detainees who remain the subject of
active cases or investigations.
o 1 detainee (Ahmed Ghailani) has been transferred to the Southern District of
New York and will be tried for his alleged role in the 1998 bombings of the
U.S. embassies in Kenya and Tanzania.
o 5 detainees will be tried in the Southern District of New York, for their
alleged roles in the September 11 attacks, as announced by the Attorney
General.
o 6 detainees will be tried for offenses under the laws of war in a reformed
military commission system, as announced by the Attorney General.
o 24 detainees remain under review pursuant to the joint Department of JusticeDepartment ofDefense protocol. No final determination has yet been made as
to whether or in what forum these 24 detainees will be charged.

11

18330

o 8other detainees were initially relerred lor prosecution but subsequently
designated for other dispositions.
D Idetainee was translerred pursuant toacourt order in his habeas case.
^ 7detainees were relerred back to the review participants after
prosecution was deemed not leasible upon further evaluation(6were
subsequently approved for continued detention under theAUMF,and
Iwas approved for transfer).
Detainees l^eferred for P r o s e c u t i o n

^ T o h e t r i e d in federal court
^ T o h e t r i e d h y military commission
OUnderrevieyir
^Redesignated for other dispositions

^
^4

Detainees Approved Ibr Detention
^ 48 detainees were unanimously approved for continued detention under theAUMF
based onafinding that they poseanational security threat that could not be mitigated
sufficiently at this time if they were to be transferred fromU.S.custody.
o TheTask Force concluded as to all of these detainees that prosecution is not
leasible at this time in either federal court or the military commission system.
o At the same time, theTask Force concluded that there isalawfiil basis for
continuing to detain these detainees under theAUMF.
Detainees Approved lor Conditional Detention
^ 30 detainees fromYemen were unanimously approved lor ^^conditional^^ detention
based on current security conditions inYemen.
o After carefully considering the intelligence concerning the security situation
inYemen,and reviewing each detainee onacase-by-case basis, the review
participants selectedagroupof30Yemeni detainees who posealower threat
than the 48 detainees designated for continued detention under theAUVIF,but
who should not be among the first groups oftranslerstoYemen even ifthe
current moratorium on such translers is lifted.
o These 30 detainees were approved for ^^conditionaf^detention, meaning that
they may be transferred ifone ofthe following conditions is satisfied: (l)the
12

18331

security situation improves inYemen: (2)an appropriate rehabilitation
program becomes available: or(3)an appropriate thirdcountry resettlement
option becomes available. Should any ofthese conditions be satisfied,
however, the 29Yemeni detainees approved for transler would receive
priority fbr any transler options over the 30Yemeni detainees approved for
conditional detention.
B.

Overview of the Guantanamo Oetainee Population

The tbllowing section provides an overview of the240 Guantanamo detainees
reviewed under the Executive Order, including their threat characteristics and more
general background information, including country oforigin, point ofcapture, and date of
arrival at Guantanamo.
^^^^^^C^^B^^^^^^^,^^^^,^. As reflected in the decisions made in the review,there is
asubstantial degree of variation among the Guantanamo detainees fromasecurity
perspective. Although not all detainees can be neatly characterized, the following
groupings providearough overview of the recurring threat profiles seen in the
population.
^

.^^^^^^,^,^^^^^//v^.^,^^^^i:^////^/^^.^/^v^/v^^/^/^B^^^^,^/^/^^^

At the high end ofthe threat spectrum are leaders, planners, operatives, and
lacilitators within al-Oaida or associated groups who are directly implicated in
terrorist plots againstU.S.interests. Among the most notorious examples in this
group are Khalid Sheikh Mohammed,the alleged mastermind ofthe Septemberll
attacks: Ramzi bin alShibh,the alleged principal coordinator ofthe Septemberll
attacks: Abd alRahimalNashiri,the alleged mastermind ofthe attack on theU.S.S.
C^/^: Abu Farajal-Libi, who allegedly succeeded Khalid Sheikh Mohammed as alOaida^schief planner ofterrorist operations: Hambali,the alleged leader of an alOaida affiliate in Indonesia who directed numerous attacks against Western targets in
Southeast Asia: and Ahmed Ghailani,an alleged key participant in thel998
bombings oftheU.S.embassies in Kenya andTanzania. RoughlylOpercent ofthe
detainees subject to the review appear to have playedadirect role in plotting,
executing, or facilitating such attacks.
^//^^^.^ii^///^.^/^^//^i:^^^/i^^^^^/^i^//^^^/^^/^,^^^///^/^^/-^^^^

^^^^^/^^//^^.^. Other detainees played significant organizational roles within alOaida or associated terrorist organizations, even ifthey may not have been directly
involved in terrorist plots againstU.S.targets. This group includes, lor example,
individuals responsible for overseeing or providing logistical support to al O^^da^s
training operations in Afghanistan: facilitators who helped move money and
personnel lor al0^^da:acadreofUsama bin Laden^sbodyguards,whoheldauni^ue
position of trust within al O^^da: and well-trained operatives who were being
groomed by al-Oaida leaders for future terrorist operations. Roughly20 percent of
the detainees subject to the review fall within this category.

13

18332



Taliban leaders and members of anti-Coalition militia groups. The detainee
population also includes a small number of Afghan detainees who occupied
significant positions within the Taliban regime, and a small number of other Afghan
detainees who were involved in local insurgent networks in Afghanistan implicated in
attacks on Coalition forces. Less than 10 percent of the detainees subject to the
review fall within this category.



Low-level foreign fighters. A majority of the detainees reviewed appear to have been
foreign fighters with varying degrees of connection to al-Qaida, the Taliban, or
associated groups, but who lacked a significant leadership or other specialized role.
These detainees were typically captured in combat zones during the early stages of
U.S. military operations in Afghanistan, often by Northern Alliance troops or other
allied forces, without being specifically targeted for capture by (or even known to) the
U.S. military in advance. Many were relatively recent recruits to training camps in
Afghanistan run by al-Qaida or other groups, where they received limited weapons
training, but do not appear to have been among those selected for more advanced
training geared toward terrorist operations abroad.



Miscellaneous others. The remaining detainees- -roughly 5 percent—do not fit into
any of the above categories.

Country of Origin. The Guantanamo detainees reviewed included individuals
from a number of different countries, including Yemen, Afghanistan, China, Saudi
Arabia, Algeria, Tunisia, Syria, Libya, Kuwait, and Pakistan. Approximately 40
percent—97 detainees—were Yemeni, while over 10 percent were Afghan.
Yemen
Afghan. .
China
S. Arabia
Algeria
Tunisia
Syria _
Libya _
Kuwait
Pakistan
Uzbekistan
Egypt
Somalia
Sudan
Others

20

40

60

14

80

100

120

18333

Point of Capture. The large majority of the detainees in the population
reviewed—approximately 60 percent—were captured inside Afghanistan or in the
Afghanistan-Pakistan border area. Approximately 30 percent of the detainees were
captured inside Pakistan. The remaining 10 percent were captured in countries other than
Afghanistan or Pakistan.
2002
2003
2004
2005
2006
2007
2008

Arrival at Guantanamo. Most of the
detainees reviewed—approximately 80
percent—arrived at Guantanamo in 2002,
having been captured during the early
months of operations in Afghanistan. The
remaining detainees arrived in small
numbers over succeeding years.
50

VII.

100

150

200

250

Transfer Decisions
Background

As the first step in the review process, the Executive Order required the review
participants to determine which Guantanamo detainees could be transferred or released
consistent with the national security and foreign policy interests of the United States.
The Executive Orderftjrtherrequired the Secretary ofDefense, the Secretary of State,
and other review participants as appropriate, to "work to effect promptly the release or
transfer of all individuals for whom release or transfer is possible."
Prior to the initiation of the review, 59 of the 240 detainees subject to review were
approved for transfer or release by the prior administration but remained at Guantanamo
by the time the Executive Order was issued. One reason for their continued detention
was that more than half of the 59 detainees could not be returned to their home countries
consistent with U.S. policy due to post-transfer treatment concerns.'' Thus, many of the
59 detainees required resettlement in a third country, a process that takes time and
requires extensive diplomatic efforts.
In addition, 29 of the detainees subject to review were ordered released by a
federal district court as the result of habeas litigation. Of these 29 detainees, 18 were
" It is the longstanding policy of the United States not to transfer a person to a country if the
United States determines that the person is more likely than not to be tortured upon return or, in appropriate
cases, that the person has a well-founded fear of persecution and is entitled to persecution protection. This
policy is consistent with the approach taken by the United States in implementing the Convention Against
Torture and other Cruel, Inhuman or Degrading Treatment or Punishment (CAT) and the Protocol Relating
to the Status of Refugees. Accordingly, prior to any transfer, the Department of State works closely with
relevant agencies to advise on the likelihood of persecution or torture in the given country and the adequacy
and credibility of assurances obtained from the foreign government.

15

18334

ordered released after the govemment conceded the case.Theremaininglldetainees
were ordered released afteracourt reached the meritsofthe case and ruled, based ona
preponderance ofthe evidence, that the detainee was not lawfully held because he was
not part of or did not substantially support, alQaida, theTaliban, or associated forces.'^
Of the 29 detainees ordered released,18were among the 59 who had been approved by
the prior administration lor transler or release. Thus,atotalof70 detainees subject to the
review were either approved lor transler during the prior administration or ordered
released byafederal court.
B.

Decisions

Based on interagency reviews and case-by-case threat evaluations, 126 ofthe240
detainees were approved lor transfer by agreement ofsenioroflicials from the agencies
named in the Executive Order.
Thel26 detainees unanimously approved fbr transler include 44 who have been
translerred to date—24to their home countries,'^18to third countries lor resettlement,'^
and two to Italy for prosecution. Ofthe 82 detainees who remain at Guantanamo and
who have been approved for transfer,16may be repatriated to their home countries
(other thanYemen)consistent with U.S.policies concerning humane treatment, 38
cannot be repatriated due to humane treatment or related concerns in their home countries
(other thanYemen)and thus need to be resettled inathird country,and 29 are ftom
Yemen. Ualfofall detainees approved lor transler—63ofthel26—also had been
approved for transler during the prior administration, ordered released byafederal court,
orboth'^
There were considerable variations among the detainees approved for transfer.
Forasmall handful ofthese detainees, there was scant evidenceof any involvement with
terrorist groups or hostilities against Coalition forces in Alghanistan. However, lor most
ofthe detainees approved lor transfer, there were varying degrees ofevidence indicating
that they were low-level fbreign fighters affiliated with al Qaida or other groups
operating in Afghanistan. Thousandsofsuch individuals are believed to have passed
^^DftheI8cases conceded by the government,I7were brought by the Uighur detainees and
were conceded by the prior administration. 2^1even of theI8detainees have been transferred to date.
^^AtotalofI4detainees have won their habeas cases on the merits in district court The
government transferred three ofthese detainees in December 2008; thus,they were not subject to the
review. Of thellremaining detainees who were reviewed under the executive Order,seven have been
transferred to date. Ofthe four who have not been transferred,the United States is appealing the district
court'sruling in t^o ofthe cases,and is still within the time period to appeal the remaining two cases.
^^The24detainees transferred to their home countries were repatriated to Afghanistan(5),
Algeria (2), Chad(I),Iraq(I),I^uwait (2), Saudi Arabia(3),Somalia(Somaliland) (2), the United
Kingdom(l), andYemen (7).
^^Thel8detainees transferred to third countries for resettlement were transferred to 8elgium(l),
Bermuda(4), France (2), Flungary(l),Ireland (2),Portugal (2),and Palau(^).
The review participants reviewed the detainees who had been approved for transfer by the prior
Administration and designated seven such detainees(allofwhom were fromVemen) for conditional
detention instead of transfer.

16

18335

through Afghanistan from the mid l990s through 2001, recruited through networks in
various countries in the Middle East, North Aftica, and Europe. These individuals varied
in their motivations, but they typically sought to obtain military training at one ofthe
many camps operating in Afghanistan: many subsequently headed to the ftont lines to
assist theTaliban in their fight against the Northern Alliance. For the most part, these
individuals were uneducated and unskilled. Atthe camps, they typically received limited
weapons training. While al-Qaida used its camps to vet individuals for more advanced
training geared toward terrorist operations against civilian targets, onlyasmall
percentage ofcamp attendees were deemed suitable lor such operations. Thelow level
fighters approved for transler were typically assessed by the review participants not to
have been selected lor such training. Many were relatively recent recruits to the camps,
arriving in Afghanistan in the summerof2001. After the camps closed in anticipation of
the arrival ofU.S.forces in October 2001,someofthese individuals were transported by
camp personnel or otherwise made their way to theToral3ora mountain range,where
they joined fighting units, but subsequently dispersed in the face ofU.S.air attacks.
It is important to emphasize thatadecision to approveadetainee lor transler does
not reflectadecision that the detainee poses no threat or no risk of recidivism. Rather,
the decision reflects the best predictive judgmentof senior govemment officials, based on
the available information, that any threat posed by the detainee can be sufficiently
mitigated through feasible and appropriate security measures in the receiving country.
Indeed, all transfer decisions were made subject to the implementation of appropriate
security measures in the receiving country,and extensive discussions are conducted with
the receiving country about such security measures belbre any transler is implemented.
Some detainees were approved for transfer only to specific countries or under specific
conditions, andalew were approved fbr transfer only to countries with pending
prosecutions against the detainee(or an interest in pursuingafuture prosecution). Each
decision was made onacase-by-case basis, taking into account all ofthe information
about the detainee and the receiving country^sability to mitigate any threat posed by the
detainee. For certain detainees, the review participants considered the availability of
rehabilitation programs and mental health treatment in the receiving country. The review
participants also were kept inlbrmed ofintelligence assessments concerning recidivism
trends among former detainees.
It is also important to emphasize thatadecision to approveadetainee lor transler
does not equate toajudgment that the govemment lacked legal authority to hold the
detainee. Tobe sure, in some cases the review participants had concems about the
strength ofthe evidence againstadetainee and the government^sability to delend his
detention in court, and considered those factors, among others, in deciding whether to
approve the detainee for transfer. For many ofthe detainees approved lor transfer,
however, the review participants found there to be reliable evidence that the detainee had
engaged in conduct providingalawlul basis for his detention. The review participants
nonetheless considered these detainees appropriate candidates for transler ftomathreat
perspective, in light oftheir limited skills, minor organizational roles, or other factors.

17

18336

C.

Yemeni Detainees

From the outsetofthereview,it was clear that theYemeni detainees poseda
unique challenge: there were 97Yemenis subject to the review,by far the largest group
in the Guantanamo population,and the security situation inYemen had deteriorated. AlQaida was gaining strongholds in certain regions of the country,and the government of
Yemen was lacingarebellion in other regions. Potential options for rehabilitation
programs and other security measures were carelully considered throughout the course of
the review,but conditions inYemen remainedaprimary concern.
Taking into account the current intelligence regarding conditions inYemen, and
the individual backgrounds ofeach detainee, the review participants unanimously
approved 36 of the 97Yemeni detainees lor transler subject to appropriate security
measures. The decision to approve these detainees lor transfer,however, did not require
immediate implementation. Rather, by making each transfer decision contingent on the
implementation ofappropriate security measures, the review participants allowed lor
necessary flexibility in the timing ofthese translers. Under these transler decisions,
detainees would be returned toYemen only atatime, and only under conditions, deemed
appropriate fromasecurity perspective.
Todate, only seven ofthe 36Yemeni detainees approved fbr transfer have been
transferred toYemen.'^ One was translerred in September 2009 pursuant toacourt
order,and six were transferred in December 2009. The six who were repatriated in
December 2009 were selected by the unanimous agreement ofhigh-leveloflicials in the
agencies named in the Executive Order,after further individualized reviews ofthe
detainees, including consideration ofthreat-related inlormation, the evidence against the
detainees, and the government^sability to successfully delend the lawfulness oftheir
detentions in court. This decision involved high level coordination within the
government and reflectedadetermination that these six specific detainees should be
returned toYemen at that time.
There are 29Yemenis approved lor transfer who remain at Guantanamo. The
involvement ofAl-Qaida in the Arabian Peninsula—the branch ofal-Qaida based in
Yemen—in the recent attempted bombing ofan airplane headed to Detroit underscored
the continued need foradeliberate approach toward any further effort to repatriate
Yemeni detainees. In the wake ofthe attempted plot, the President publicly announceda
moratorium on the transler of detainees toYemen. Accordingly,noneofthe29Yemeni
detainees remaining at Guantanamo who are approved lor transler will be repatriated to
Yemen until the moratorium is lifted. These detainees may be considered for
resettlement in third countries subject to appropriate security measures, if such options
become available.

During the last administration,14detainees were returned toYemen,and an additional 15
Yemeni detainees were among the 59 approved for (but still awaiting) transfer as oflanuary 20, 2009.

18

18337

VIII.

Prosecution Decisions
A.

Background

The Executive Order provides that "^iln accordance with United States law,the
cases ofindividuals detained at Guantanamo not approved lor release or transfer shall be
evaluated to determine whether the Federal Government should seek to prosecute the
detained individuals fbr any oflenses they may have committed, including whether it is
feasible to prosecute such individuals befbreacourt established pursuant to Article 111 of
the United States Constitution^/.^.,federal courtl." Inaspeech at the National Archives
on May2l,2009,the President reiterated that "when leasible, we wih try those who have
violated American criminal laws in federal courts." As the President noted in his speech,
federal prosecutors havealong history of successfully prosecuting all manner of
terrorism oflenses in the lederal courts:
Our courts and juries ofour citizens are tough enough to convict terrorists,
and the record makes that clear. RamziYousef tried to blow up the World
Trade Center—he was convicted in our courts, and is servingalile
sentence in U.S. prison. ^acariasMoussaoui has been identified as the
20^'^9/llhijacker—he was convicted in our courts, and he too is servinga
lile sentence in prison. Ifwe can try those terrorists in our courts and hold
them in our prisons, then we can do the same with detainees from
Guantanamo.
The President also stressed that military commissions "haveahistory in the
United States dating back to George Washington and the Revolutionary War" and
remained "an appropriate venue for trying detainees for violations ofthe laws of war."
Accordingly,the administration proposed, and Congress has since enacted, relbrms to the
military commissions system to ensure that the commissions are lair, legitimate, and
effective.
In accordance with the President^sguidance, theTask Force evaluated detainees
fbr possible prosecution wherever there was any basis to conclude that prosecution in
either federal court oramilitary commission was appropriate and potentially leasible.
TheTask Force prosecutors Ibcused their review at first on the 23 detainees who, as of
the issuance ofthe Executive Order, were facing charges in the military commissions, as
well as several other uncharged detainees whose cases were related to those of charged
detainees.'^ TheTask Force then evaluated for possible prosecution the approximately
40 additional detainees whom OMC had designated for potential prosecution. Finally,
theTaskForce reviewed every detainee for prosecution who was deemed ineligible lor
transler.

^^Asoflanuary 22,2009,there were 12detainees whose cases had been referred toamilitary
commission, including the defendants in the Septemberllprosecution. In compliance with the Lxecutive
Order, their cases were halted.

19

18338

In conducting its reviews, theTask Force worked closely with OMC. TaskForce
members had access to OMC files, and OMC prosecutors briefed theTask Force on their
cases. Upon request, Department ofDelense investigators and FBI agents who had
worked on investigations met withTask Force members to answer their questions. The
Task Force also reviewed original source inlormation pertaining to the detainees and was
ableto identily previously unexploitedsourcesofevidence.
As theTask Force completed its prosecution reviews, it identilied those cases that
appeared leasible for prosecution in lederal court, or at least potentially leasible, if
certain investigative steps were pursued with success. In this regard, theTask Force
identifiedanumber of avenues for strengthening important cases and developing them
fbr prosecution. For example, theTask Force determined that there were more thana
thousand pieces ofpotentially relevant physical evidence (including electronic media)
seized during raids in the aftermath ofthe Septemberllattacks that had not yet been
systematically catalogued and required further evaluation for forensic testing. There
were potential cooperating witnesses who could testify against others at trial, and key fact
witnesses who needed to be interviewed. Finally,certain Ibreign governments,which
had been reluctant to cooperate with the military commissions, could be approached to
determinewhethertheywouldprovidecooperationinafederal prosecution. Given the
limited resourcesoftheTask Force to pursue this additional work, the Review Panel
referred cases that appeared potentially leasible for lederal prosecution to the Department
ofJustice for further investigation and prosecutorial review.
The Department ofJustice and Department ofDefense agreed uponajoint
protocol to establishaprocess fbr determining whether prosecution ofareferred case
should be pursued inafederal court or beforeamilitary commission. Underthe
protocol—titled/^^/^^^/^i^/Z^^i^t^^^^/^^^^^C^,^^.^,/^^^^^^^^^^!^.^^^^^^^ —there is
apresumptionthatprosecutionwill be pursued inafederal court wherever feasible,
unless other compelling lactors make it more appropriate to pursue prosecution beforea
military commission. The evaluations called for under the protocol are conducted by
teamsofboth lederal and military prosecutors. Among the criteria they apply are: the
nature ofthe offenses to be charged; the identity ofthe victims: the location ofthe crime:
the context in which the delendant was apprehended: and the manner in which the case
was investigated and by which investigative agency. The Attorney General, in
consultation with the Secretary ofDelense, makes the ultimate decision as to wherea
prosecution will be pursued.
B.

Decisions

Asaresuh oftheTaskForce^sreview,the Review Panel referred 44 cases to the
Department ofJustice for potential prosecution andadecision regarding the forum for
any prosecution.^^ Decisions to seek prosecution have been announced in l2ofthese
cases:24remain pending under the protocol: and eight ofthe detainees initially relerred
were subsequently designated lor other dispositions.
The review participants did not determine that any additional detainees were potentially
feasible for prosecution solely beforeamilitary commission at this time.

20

18339

On May2l,2009,the Department ofJustice announced that Ahmed Ghailani,
who had previously been indicted in the United States District Court for the Southem
DistrictofNewYork for his alleged role in thel998 bombings oftheU.S.embassies in
KenyaandTanzania, would be prosecuted in federal court.^^ OnJune9,2009,Ghailani
was transferred ftom Guantanamo to the Southem District ofNewYork,where his case
is pending.
On November 13,2009,the Attorney General announced that the government
would pursue prosecution in federal court in the Southern DistrictofNewYork against
the five detainees who had previously been charged belbreamilitary commission lor
their roles in the Septemberllattacks. They are:
^ Khalid Sheikh Mohammed, the alleged mastermind ofthe Septemberllplot:
^ Ramzi bin alShibh,the alleged coordinator of the Septemberllplot who acted
as intermediary between Khalid Sheikh Mohammed and the hijackers in the
United States:
^ WalidMuhammed Salih Mubarak Bin Attash(a.k.a.Khallad Bin Attash), an
alleged early member of the Septemberllplot who tested airline security on
United Airlines flights between Bangkok and Hong Kong:
^ Mustafa Ahmed al-Uawsawi,an alleged lacilitatorofhijackers and money to the
United States from his base in Dubai; and
^ Ah Abdul Aziz Ali(a.k.a.AmmarBaluchi),asecond alleged facilitator of
hijackers and money to the United Statesftomhis base in Dubai.
On the same day,the Attorney General also announced thatthe prosecution
against Abd al-Rahimal-Nashiri,the alleged mastermind ofthe bombing oftheU.S.S.
C^.i/^.would be purstied beforeamilitary commission. The Attorney General further
decided that lour other detainees whose cases were pending before military commissions
when the Executive Order was issued would remain belbre the commissions: Ahmed alDarbi,^oorUthman,Omar Khadr,and Ibrahim al-Qosi. In January 2010,the
Department ofJustice announced that Obaidullah,whom OMC had charged but whose
case had not yet been relerred toamilitarycommission,will remain in the military
commission system.
Twentyfourofthe referred cases remain pending with the Department ofJustice
under the protocol, ^o final decision has been made regarding whether or in what forum
these detainees will be prosecuted.

The decision to pursue prosecution against Ghailani in federal court was made before the joint
prosecution protocol was in effect.

21

18340

Eight ofthe relerred detainees are no longer under active consideration lor
prosecution. One detainee who had been relerred fbr prosecution was translerred
pursuant toacourt order in his habeas case. Seven additional detainees who had been
referred for prosecution were ultimately relerred back to theTask Force, based ona
determination that the cases were not leasible Ibr prosecution in either federal court or the
military commission system at this time. Six ofthese detainees were subsequently
approved for continued detention under theAUMF without criminal charges, and one
was approved Ibr transfer. Asaresuh ofthese subsequent decisions, there are currently
36 cases with active prosecution referrals.
C.

Detainees ^ h o Cannot Be Prosecuted

TheTask Force concluded that lor many detainees at Guantanamo, prosecution is
not feasible in either lederal court oramilitary commission. There are several reasons
Ibr these conclusions.
First, the vast majority ofthe detainees were captured in active zones ofcombat in
Afghanistan or the Pakistani border regions. The locus at the time oftheir capture was
the gathering ofintelligence and their removal from the fighL They were not the subjects
offormal criminal investigations, and evidence was neither gathered nor preserved with
an eye toward prosecuting them. While the intelligence about them may be accurate and
reliable, that intelligence, for various reasons, may not be admissible evidence or
sufficient to satislyacriminal burden of proofineitheramilitary commission or lederal
court. One common problem is that, Ibr many ofthe detainees, there are no witnesses
who are available to testily in any proceeding against them.
Second,many ofthe detainees cannot be prosecuted because ofjurisdictional
limitations. In many cases, even though theTask Force Ibund evidence thatadetainee
was lawfully detainable as part of al-Qaida—based on information that he attendeda
training camp, or played some role in the hierarchy ofthe organization—theTaskForce
did not find evidence that the detainee participated inaspecific terrorist ploL The lack of
such evidence can pose obstacles to pursuingaprosecution in either federal court ora
military commission. While the federal material support statutes have been used to
convict persons who have merely provided services toaterrorist organization,^.^.,by
attendingaterrorist training camp, there are potential limitations to pursuing sucha
charge against the detainees.^'
^^Amongtheselimitations^First,thetworelevantstatutes^l8USC^^ 2339Aand 2339B^
were not amended to expressly apply extraterritorially to non-U S. persons until October 2001and
December 2004, respectively. Thus,material support may not be available asacharge in the federal
system unless there is sufficient evidence to prove thatadetainee was supporting al-^aida after October
2001at the earliest. Second,the statute oflimitations for these offenses is typically eightyears (,^^^18
U.S.C,^ 328^),which may bar prosecution for offenses that occurred well before the detainee'scapture.
Third, because the statutory maximum sentence for material support isl5years(where death does not
result from the offense), sentencing considerations may weigh against pursuing prosecution in certain
cases. Some ofthese considerations would not apply to material support charges brought in the military
commissions; however, the legal viability of material support asacharge in the military commission
system has been challenged on appeal in commission proceedings.

22

18341

Notably,the principal obstacles to prosecution in the cases deemed inleasible by
theTask force typically did not stem from concems over protecting sensitive sources or
methods ftom disclosure, or concerns that the evidence against the detainee was tainted.
While such concerns were present in some cases, most detainees were deemed infeasible
Ibr prosecution based on more fundamental evidentiary and jurisdictional limitations tied
to the demandsofacriminal forum,as described above.
Significantly,theFxecutive Order does not preclude the govemment ftom
prosecuting atalater date someone who is presently designated Ibr continued detention.
Work on these cases continues. Further exploitation ofthe Ibrensic evidence could
strengthen the prosecution against some detainees. Other detainees may cooperate with
prosecutors. Ifeither the Department ofJustice or the Department ofDefense concludes
in the future that prosecution ofadetainee held without charges has become leasible in
federal court or inamilitary commission,the detention decisions made in the course of
this review would permit the prosecution to go forward.
IX.

Detention Decisions
A.

Background

Under the Executive Order, the review participants were required first to consider
whether it was possible to transfer,release, or prosecute each detainee. With respect to
any detainees who were not deemed appropriate for transler,release, or prosecution,the
review participants were required to "select lawful means, consistent with the national
security and foreign policy interests ofthe United States and the interests ofjustice, fbr
the disposition ofsuch individuals."
In accordance with this framework, detainees were first reviewed to determine
whether transler or release was consistent with the national security and fbreign policy
interests ofthe United States and whether they could be prosecuted. Ifthose options did
not appear leasible, the review participants then considered whether the detainee^s
national security threat justified continued detention under theAUMF without criminal
charges, and,ifso,whether the detainee met the legal requirements for detention.
B.

Decisions

As the resuh ofthis review,48 detainees were unanimously approved Ibr
continued detention under theAUMF.
Although each detainee presented unique issues, all ofthe detainees ultimately
designated for continued detention satisfied three core criteria: First, the totality of
available information—including credible inlormation that might not be admissible ina
criminal prosecution—indicated that the detainee posesahigh level ofthreat that cannot
be mitigated sufftciently except through continued detention: second, prosecutionofthe
detainee inafederal criminal court oramilitary commission did not appear leasible: and
third,notwithstanding the infeasibility of criminal prosecution, there isalawful basis for
the detainee^sdetention under theAUMF.

23

18342

Broadly speaking, the detainees designated for continued detention were
characterized by one or more ofthe tbllowing lactors:
^

Signilieantorgani^ational role within al-Qaida,theTaliban,or associated
forces. In contrast to the majority ofdetainees held at Guantanamo, many of
the detainees approved for detention heldaleadership or other specialized role
within al-Qaida, theTaliban, or associated forces. Some provided operational,
logistical, financial, or fundraising support Ibr al Qaida. Others were al Qaida
members who were selected to serve as bodyguards Ibr Usama bin Laden
based on their loyalty to the organization. Others wereTaliban military
commanders or seniorofftcials, or played significant roles in insurgent groups
in Afghanistan ahied with theTaliban, such as Uezb-e lslamiGulbuddin.

^

Advanced training or experience. The detainees approved for detention
tended to have more extensive training or combat experience than those
approved for transler. Some ofthese detainees were veteran^//^^^/,^/.^ with
lengthy involvement in the training camps in Alghanistan. Several had
expertise in explosives or other tactics geared toward terrorist operations.

^

l^xpressed recidivist intent. Some detainees designated for detention have,
while at Guantanamo, expressly stated or otherwise exhibited an intent to
reengage in extremist activity upon release.

D Historyofassociationswithextremistactivity Someofthedetainees
approved for detention haveahistory of engaging in extremist activities or
particularly strong ties(either directly or through lamily members)to
extremist organizations.
,^^n^//^^.^/,^^^^^i^/^^//^^. Under the FxecutiveOrder,everydetainee^s
disposition must be lawfttl. Accordingly,theTask Force consulted closely with the
Department ofJustice regarding every detainee approved Ibr continued detention to
ensure that the detainee fell within the boundsofthcGovernment^sdetention authority
under theAUMF,as described above.
^^i^.^^^^//i^^^^/c^^^^^^//^^^.^//^/^. Although dangerous and lawftilly held, the
detainees designated for detention currently cannot be prosecuted in eitheralederal court
oramilitary commission. While the reasons vary ftom detainee to detainee, generally
these detainees cannot be prosecuted because either there is presently insufftcient
admissible evidence to establish the detainee^sguihbeyondareasonable doubt in eithera
federal court or military commission, or the detainee^sconduct does not constitutea
chargeable offense in eitherafederal court or military commission. Though prosecution
currently is not feasible for these detainees, designatingadetainee for detention does not
preclude future prosecution in eitherafederal court oramilitary commission should new
evidence or other developments makeaprosecution viable.
Ti^^^.^^^^^^/^^,^^^^^/^^^^^^^//^^!^,^//^/^. Finally,none ofthe detainees
approved for detention can be salely transferred toathird country at this time. This does

24

18343

not mean that the detainee could never be safely translerred toathird country. Rather,
designating the detainee Ibr continued detention at this time indicates only that given the
detainee^scurrent threat and the current willingness or ability ofpotential destination
countries to mitigate the threat, the detainee is not currently eligible for transfer or
release. Should circumstances change(^^,should potential receiving countries
implement appropriate security measures), transfer might be appropriate in the future.
C

Continued Reviews

Detainees approved Ibr continued detention under theAUMF wih be subject to
further reviews. First, in accordance with the Supreme Court^sdecision in ^^^^^^/^^^v.
Z^^,^/^,^^ each detainee has the opportunity to seekjudicial review oftheir detention by
filingapetitionforawritofhabeascorpus in federal court. In such cases, the court
reviews whether the detainee falls within the government^slawful detention authority. In
cases where courts have concluded that the detainee is not lawfully held, the courts have
issued orders requiring the government to take diplomatic steps to achieve the detainee^s
release. Thus far, federal district courts have ruled on cases brought by four ofthe 48
detainees approved Ibr continued detention. In each ofthe lour cases, the district court
denied the habeas petition and upheld the lawfulness ofthe detention. Many other cases
are pending in district court, and some are pending on appeaf
Second, as the President stated in his speech at the National Archives,"a thorough
process ofperiodic review" is needed to ensure that "any prolonged detention is carefully
evaluated and justified." Thus, in addition to thejudicial review afforded through habeas
litigation, each detainee approved for continued detention will be subject to periodic
Executive Branch review.
X.

Conditional Detention Decisions: Yemeni Detainees

As discussed above, the review ofthe 97Yemeni detainees posed particular
challenges from the outset given the security situation inYemen. After conductinga
case-by-case review oftheYemeni detainees, the review participants unanimously agreed
that 36Yemenis (29 of whom remain at Guantanamo)are appropriate for transfer,subject
to security measures, and that 26Yemenis should continue to be detained under the
AUMF in light oftheir individual threaL In addition, there are currently fivcYemenis
with active prosecution referrals, two ofwhom the Attorney General announced will be
prosecuted in federal court for their roles in the Septemberllattacks (Ramzi bin alShibh and WalidMuhammed Salih MubarakBin Attash).
The remaining 30Yemeni detainees were determined to posealower threat than
the group of detainees designated for continued detention under theAUMF. Nonetheless,
the review participants determined,based onanumber offactors, that these 30 detainees
should not be transferred toYemen in the near Ititure and should not be among the ftrst
groups oftransfers toYemen even if the current moratorium on such transfers is lifted.
^^122S.Ct 2229(2008)

2^

18344

Thus, these 30 detainees were approved for "conditional" detention, meaning that
they may be transferred ifone ofthe following conditions is satisHed: (l)the security
situation improves inYemen; (2)an appropriate rehabilitation program becomes
available; or(3) an appropriate thirdcountry resettlement option becomes available.
Should any of these conditions be satisfied, however, the remaining 29Yemeni detainees
approved for transler would receive priority for any transler options over the 30Ycmeni
detainees approved for conditional detention.^^
At the timeofthe closure ofthe detention facilities at Guantanamo, the status of
detainees approved Ibr conditional detention will be reconsidered Ibr possible transler to
Yemen,athirdcountry,oradetention facility in the United States.
XI.

Diplomatic efforts

The President^sExecutive Order recognized that diplomatic eflorts would be
essential to the review and appropriate disposition ofindividuals detained at
Guantanamo. Toimplement the review decisions approving the transler of detainees, the
order provides that the "Secretary ofDefense, the Secretary ofState, and,as appropriate,
other Review participants shall work to effect promptly the release or transfer ofall
individuals Ibr whom release or transfer is possible." The President emphasized this
point during his speech at the National Archives, stating that for cases involving
"detainees who we have determined can be translerred salely to another country...my
Administration is in ongoing discussions withanumber of other countries about the
transfer ofdetainees to their soil."
Toft^lfill this mission,the Secretary ofState created an oflice to lead the
diplomatic efforts to transfer detainees and appointed an experienced career diplomat to
serve as the Special Envoy for the Closure ofthe Guantanamo Bay DetentionFacilities.
The highest levels in the administration supported these efforts. ThePresident,^ice
President, and Cabinet members—including the Secretary ofState, Attorney General,and
Secretary for Homeland Security—have discussed the closure ofthe Guantanamo
detention facilities and the transfer ofdetainees outside the United States with their
Ibreign government counterparts. Toassist these diplomatic efforts, the National
Counterterrorism Center facilitated the sharing ofinformation about the detainees with
fbreign governments considering whether to accept them. In addition, the govemment
arranged meetings between officials ftom interested countries and detainees at
Guantanamo to facilitate resettlement and repatriation discussions.
From the outset ofthe review,the State Department developedadiplomatic
strategy Ibr Guantanamo, focusing on efforts to resettle detainees who could not be sent
to their home countries because of posttransfer treatment concerns. lnJune2009,the
United States and European Union concludedajoint statement in support ofthe
^^Ten ofthe detainees approved for conditional detention had initially been approved for transfer
by the review participants, because the specific conditions placed on the transfer approvals of theselO
detainees were the equivalent of those used for the conditional detention category,the lOdetainees were
later redesignated for conditional detention.

26

18345

resettlement ofanumber of detainees in Europe, expressing the readiness of certain
member states to resettle former Guantanamo detainees onacase-by-case basis.
Following this joint statement,anumberofLuropean governments—such as Spain, Italy,
Portugal, and Ireland—announced that they were prepared to work out arrangements to
accept some detainees. In addition, the Government ofPalau also announced its
readiness to acceptanumberofUighur detainees. Following these initial successes, the
State Department intensified efforts to implement resettlements. Thepublicoffersby
some European governments to resettle detainees encouraged other govemments to make
similaroffers.
Todate, the diplomatic efforts taken under the Executive Order have led to the
resettlement ofl8detainees in the following seven locations: Belgium,Bermuda,
France, llungary,lreland,Palau,and Portugal.^^ Resettlement negotiations are ongoing
withanumber ofcountries,^.^.,Spain, Switzerland,and Slovakia. In addition,Italy
accepted two detainees Ibr criminal prosecution on charges stemming from pre-9/11
activities. All efforts to resettle detainees include discussions with receiving
governments about post transfer security measures, as well as other issues such as the
integration and humane treatment of resettled detainees.
The process Ibr engagingacountry on resettlement issues can be lengthy and
complicated. The State Department has engaged in discussions with dozens ofcountries
across the globe to initiate or further resettlement negotiations oncehhas been
determined thatagovernment is open to discussions. When this process is successftil,
initial receptiveness leads to discussions regarding individual detainees, Ibreign
government interagency review,fbreign government interviews of prospective
resettlement candidates, the Ibreign government^sformal decision-making process,
integration plans, and, ultimately,resettlemenL The length ofthe eflbrt often has been
influenced by political and other issues in potential resettlement countries(^^,public
perceptions of current and pastU.S.detention policies), third-country views(and
sometimes pressure)with respect to detainee resettlement, and public views ofthe
Guantanamo detention facility generally. Depending on how these factors affect
individual cases, the process can be very lengthy.
Oncearesettlement has occurred, the State Department and other agencies remain
in contact with host governments tbllowing transler on these issues. The State
Department is engaged in ongoing discussions Ibr the remaining detainees who cannot be
repatriated due to post transfer treatment concems and is on track to lind resettlement
countries for most ifnot all ofthe detainees in this category.
The State Department also has worked to repatriate detainees to their home
countries, in coordination with other agencies and with the National Security CounciL
Thus far,24detainees have been repatriated since last January to nine different
locations—Afghanistan, Algeria, Chad, Iraq, Kuwait, Saudi Arabia, Somaliland, the
United Kingdom, andYemen. All decisions to repatriate detainees have been made in
From 2002-2008, atotal ofeight Guantanamo detainees were resettled, all in Albania.

27

18346

light ofthe latest intelligence information and with the consent ofall relevant agencies.
In light ofsuch inlormation,and following the attempted terrorist attack on December 25,
2009,the President announced that repatriations toYemen would be suspended for the
foreseeable iLiture. In addition, the government has adopted enhanced procedures for the
implementation of repatriation decisions, requiringacabinetlevel review prior to going
fbrward with any repatriation.
XII.

Conclusion

The review process established pursuant to the Executive Order is now complete.
The participating agencies have reviewed and unanimously agreed on dispositions for
each ofthe240 detainees subject to the review. The agencies responsible Ibr the review
will continue to handle operational issues involving detainees, including the
implementation ofthe review determinations, and the National Security Council will
coordinate the resolution ofpolicy issues pertaining to Guantanamo. TheTask Force has
ensured that its analysesofthe detainees and the inlormation collected in the course of
the review are properly preserved to assist in the resolutionofthese issues going fbrward.

28

18347

Defense Exhibit T
2 pages
classified
"SECRET"
ordered sealed for Reason 2
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial

18348

Defense Exhibit 1^
llpages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplen^ent to the original
Record ofTrial

18349

Defense Exhibits
^pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial

18350

Defense Exhibits
2pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial

18351

Defense Exhibits
^pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial

18352

Defense Exhibits
3pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial

18353

Defense Exhibits
^pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial

18354

n>

r m . GUANTANAMO FILES

'Sh'i^^i^GlAM.fc,

^
by both Dostum and the Americans to
*ere killed were tied up at the time they
Sorters were briefed that "only" eight
rt being shot after the uprising started.
^ proposed by Luke Harding, is more
st, because a photographer "saw the
Iters whose hands had been bound by
f southern part of the fort," and that
•Ts cut the scarves from the hands of
•Alex Perry noted, "some of the dead
lance soldiers used scissors to snip off
less significantly, because so many of
y was suppressed until the Pentagon
'ts in 2006—also talked about being

TA7g CoMi/oy o/'Dg^^A?

Yerghanek and Qala Zeini
On Sunday, November 25,2001, as the uprising began in Qaia-i-Janghi,
a far larger group of Taliban soldiers—at least 4,500, but possibly
as many as 7,000—made their way from Kunduz to Yerghanek, five
miles west of the city, where they surrendered to General Dostum.
What no one either knew or cared about, however, was that among
the surrendering soldiers were hundreds of civilians who had been
caught up in the chaos or who were fleeing the hard-core al-Qaeda
and Taliban fighters making a last stand in Kunduz itself.
One of the most vivid accounts of the surrender was provided by
three young Britons who fell into this latter category. Twenty-fouryear-old Shafiq Rasul, 20-year-old Asif Iqbal and 20-year-old Rhuhcl
Ahmed—childhood friends from Tipton in the West Midlands—
, had traveled to Pakistan in September 2001. Iqbal was making
arrangements for his forthcoming marriage to a young woman in
Pakistan, Ahmed was his best man, and Rasul was planning to do
a computer course once the wedding was over, but soon after their
arrival, when the invasion of Afghanistan began, they made the fateful
decision that an exciting adventure awaited them over the border,
just a short bus-ride away. Using the money they had brought with
them, they planned to provide humanitarian aid to Afghan villagers, a
mission that also involved the adrenaline rush of being in a war zone,
and, they hoped, the opportunity to sample the Afghans' enormous
naan breads. Up close, however, the war zone was more frightening
than they had anticipated. At risk from both US bombing raids and
the Taliban, who were deeply suspicious of young men wandering
19

028334

Defense Reciprocal Discovery

00000001

18355

T^I^I--^^^.^^I^,^^,^^^OIII^^

around without beards, they tried to return to Pakistan inata^i.but
were instead taken to Kunduz. As the first groups ofTaliban soldiers
began to surrender, they clambered ontoatmck that was leaving the
city,but the vehicle wasimmediately shelled, and almostevetyoiie
on board was killed. W^ith nowhere else to turn, they surrendered to
Alliance soldiers who took their money, tbeir shoes and their warm
clothes, and marched them toYerghanek.^
Yery few of those who made their way to Yerghanek—70 at
most—were eventually transferred to Guantanamo.Of these, onlya
handful have spoken about theitexperiences,and none were in the
first convoys that set offforShebergban on tbe Sunday. Overwhelmed
by tbe sheer numbers of people flooding ont of the city, Dostum was
obligedtokeep thousands of them marooned in tbedesert while
he arranged additional transportation over thenext few days..^sa
result, neither tbe men fromTipton nor tbe others who ended up in
Guantanamo—including Abdul Rahman,a2:^yearold shopkeeper
from Kunduz, and Mohammed Saghir, a 4^ year old woodcutter
from Pakistan's ^ortbWest Frontier Province—had any inkling of
tbe grisly fate that awaited them.
W b i l e t b e v a s t c r o w d ^ o f fighters andciviliansweredisarmed,
Dostum's men recruited driverstogo to Qala Zeini. an old fort on tb
roadbetweenMazareSbarifandShebergban,wberetbosetransported
from Yerghanek were transferred into containers for tbe last stage o^
tbe journey to Sheberghan^. One of the drivers, who was in tbe fort
wbenaciinvoy of prisoners arrived that evening, said that, as soon as
the ^orthern.^lliance soldiers began stripping them of tbeir turbans
and vests, tying tbeir hands behind tbeir backs and transferring them
to tbe containers, some of tbe prisoners—those who were familiar
with recent Afghan bi.story—realized that Dostum was planning to
kill them Since 1^^7,wbenabrutalU^bek general had first seen
tbe viability of containers as cheap and convenient killing machines,
murderingl^2.^0 Taliban soldiers by leaving tbcm in containeisin tbe
summer sun, tbey bad becomeafamiliar weapon of Afghan warfare
When tbe TalibantookMa^areSbarifinl^^^,tbeydisposedoftbeir
conquered enemies in the same fashion.
According to one of tbe drivcrs,afew hours after tbe convoy bad
set off from Qala Zeiiii, tbe prisonersstarted pounding on tbesidesof
tbecontainers,sbouting,^^We'redying.GiveuswaterIWearebuman,

r
^
V
V

s

n
D

A
fi
h
h
rt
K

w
Ol

tt.
Pi
th

se
th
w
UJ

A:
sh
fr,
ni:
th
he
dii

an
wt
wt
«iC

ail
an

00000003

18356

^m:^t^^^r^^^,"^t^^Fii^^
bebind"Tbreeyearslater,baving been transported from Sbebergban
to Kandahar and then to Guantanamo, Abdul R^abman's nightmare
bad stillnot come to an endln bis tribunal, repeating bis story as be
bad so many times before, be was obliged to refute allegations that
be bad bougbtacar for theTaliban while wcaringaTalibanst^^le
turban, accompanied by bis personal security force of fourTaliban
soldiers, explaining that this wasastory that bad been conjured up
by tbe men who falsely imprisoned him in tbe first place Pinally,
someone believed bis story, and, after 40 months in detention, he was
released in April 200.^.^
Mohammed Sagbirfacedasimilar ordeal.The woodcutter was also
amissionary with jamaatalTabligbi,avast worldwide proselytizing
organization whose annual gatherings in Pakistan and Bangladesh
attract millions of follow^ers.Qver tbe years be bad been involved in
numerous preaching missions to Afghanistan, but on this occasion he
and nine other missionaries were seized by i^ortbern Alliance troops.
Saghir was also held foranigbtatYergbanek,wberebe^^witnessed
wounded and injured men buried alive with tbe dead,"and was then
taken to Qala Zeini and herded intoacontainer.^Tbe journey took
five bours,"be said.^Tt was dark, hot and suffocating as there was
not enough air in tbe container, l ifty out of tbe 2,^0 prisoners died
on ^tbe^way."Unlike Abdul Rahman,bowever,it took Sagbir less
tbanayear to convince tbe Americans of bis innocence, lie was one
of tbe first three prisoners to be freed, in ^ovember 2002,and was
tbe first e^-Guantanamo prisoner to speak in detail not only about
tbe horrors of detention in Afghanistan and Guba, but also about tbe
death convoys.^
Tbe tbrcemen from Tipton waited for another day until tbeir
transportation was arranged, and in tbeir case tbe container lorries
came at nigbt,and tbe wbolesotdid spectacle wasilluminatedby
spotlights operated byUSSpccialPorccs soldiers. Once tbe doors
were sbut,tbeirordealfollowedanow familiar pattern. ^^Tbey'd
herded maybe ^00 of us into each container...packed in so tightly
ourknees were againstoiir chests," Asif Iqbalsaid, ^^aiid almost
immediately we started to suffocate."As with some of tbe previous
journeys, ventilation was provided by northern Alliancesoldiers,
who made sure that tbeir humanitarian gesture was accompanied by
more killing.^We lived becausesomeone made boles witbamacbine

028336

Defense Reciprocal Discovery

00000003

18357

THE GUANTANAMO FILES

ig been transported from Shcberghan
tanamo, Abdul Rahman's nightmare
his tribunal, repeating bis story as he
vas obliged to refute allegations that
iliban while wearing a Taliban-style
rsonal security force of four Taliban
IS a story that had been conjured up
oned bim in tbe first place. Finally,
after 40 months in detention, he was
lilar ordeal. Tbe woodcutter was also
ilighi, a vast worldwide proselytizing
nerings in Pakistan and Bangladesh
er the years he had been involved in
Afghanistan, but on this occasion he
: seized by Northern Alliance troops,
at Yerghanek, where be "witnessed
i alive with tbe dead," and was then
into a container. "The journey took
k, hot and suffocating as there was
Fifty out of the 250 prisoners died
ihman, however, it took Saghir less
ricans of his innocence. He was one
freed, in November 2002, and was
:r to speak in detail not only about
mstan and Cuba, but also about tbe
waited for another day until their
d in their case the container lorries
urdid spectacle was illuminated by
al Forces soldiers. Once the doors
I a now familiar pattern. "They'd
b container ... packed in so tightly
sts," Asif Iqbal said, "and almost
ate." As with some of tbe previous
led by Northern Alliance soldiers,
itarian gesture was accompanied by
omeone made holes with a machine

028337

THE CONVOY OF DEATH

23

gun," Iqbal said, "though they were shooting low and still more died
from the bullets. The last thing I remember is that it got really hot, and
everyone started screaming and banging. It was like someone bad lit
a fire beneath the containers. You could feel the moisture running off
your body, and people were ripping off their clothes." When he finally
awoke, be realized that be bad not drunk anything for more than
two days, and was seriously dehydrated. Using a cloth, he wiped the
moisture off the wall and began sucking on it, until be realized he was
drinking tbe blood of those who had died. "We were like zombies," he
said. "We stank; we were covered in blood and tbe smell of death.
Shcberghan
As tbe survivors spilled out of tbe container trucks at Sheberghan,
they discovered that, although the mass executions were over, the
conditions at Dostum's prison were almost unspeakably grim. Thirtyfive hundred prisoners were crammed into a space that could only
reasonably hold five hundred, and in order to sleep they took turns
on the floor, squeezed together in four-hour shifts. Food was also a
problem. Shafiq Rasul recalled that each prisoner received a quarter
of a naan every day, and a small cup of water, and that sometimes
prisoners fought over the food. Twenty-four-year-old Sulaiman
Shah, an Afghan used car dealer, was another of the many innocents
swept up by the Northern Alliance. On his release in March 2003,
he mentioned his time at Sbebcrgban, where, he said, "life was
inhuman, all the prisoners bad diarrhea, some had tuberculosis, there
was no food for days at a time and we were subjected to beatings
and torture."* Despite Sbab's appraisal of the ill-health of the
prisoners, medical attention was non-existent. Rasul recalled, "There
were people with horrific injuries—limbs that bad been shot off and
nothing was done. I'll never forget one Arab who was missing half
his jaw. For ten days until bis death he was screaming and crying
continuously, begging to be killed."
To make matters worse, reporters were swarming around
Sheberghan, but for tbe most part they were blind to tbe suffering
of the prisoners. "All they seemed to be interested in," Rasul said,
"was if any of us knew the American Taliban John Walker Lindh."
No one realized that Lindb was not even in Sheberghan. Instead, he

Defense Reciprocal Discovery

00000004

18358

TH^^^l^^B^^T.^i^^^lVlOIIII^^

receivedinjuries to their eyes in this manner, that "ibree brothers were
blinded,"andtbatmanyoftbeprisoners—himselfincluded—bad tbeir
noses broken by tbe soldiers, lie was also one of tbe first prisoners to
describe bow^ tbe pri^^ners'copies of tbe Koran were regularlyabused.
lie explained that some of tbe soldiers "treated tbe Koran terribly,"
dropping copies in tbetoiletbucket,scrawlingobscenitiesonitspages,
and tearing out pages which tbey used to shine tbeir shoes oriowipe
out tbe toilet bucket, and added that tbey also cursed Allab and tbe
PropbetMobammed onaregular basis. Tbe abuse of tbe I^oran was
also noted bytbc BritonsTarekDergoul,SbafiqRasul,Asiflqbaland
RbiibelAbmed,andbyFbsaniillab,a2^yearoldAfgban(rcleasedin
March 2003),wbosaidtbatsoldiers in Kandahar hit bimand taunted
bim by throwing tbe Koran inatoiletB'
Some of tbe other Bahrainis also bad vivid tales to tell of tbeir
treatment at Kandahar. Isa al Murbati(wbo,se capture is related in
Gbapter 12) said that be was "shackled toapole outside in very eold
weatber,"andtbat,"everybour,US military personnel threw eold
water on ^bim^ while be was shackled to tbe pole"lIe explained
that this took place every night foraweek, and added that on one
occasion be was taken to an area away from tbe other prisoners,
because Red Gross representatives were visiting tbe camp, and tbe
authorities did not want them to see bim lt was also clear that al
Murbatiwasnottbeonlyprisonertobee^poscdtotbee^tremecold.
TbePakistaniinterviewedbyllti^anRigbtsWatcbsaidtbat"beand
other prisoners were occasionally taken outside and forced to lie on
tbe frozen ground until tbey were numb with cold."^^
Abdullah alNoaimi"witnessed other detainees being bitten by
militarydogs,"andsaidtbat"afemalesoldier,uponlearningtbat^bisj
brotberlivedintbeUSA,tbreatcnedtokillbim"Flealsodevelopeda
urinarytractinfectionandcamedownwitbafever, which madebim
vomit and left bim unable to eat, but explained that, when he was
takentotbeclinic,"amilitarydoctorallowedamilitarypolicemanto
injectbimwitbanunknownsubstaiicc.W^benbebegantobleedasa
result,tbedoctorandtbepolicemanlaugbed"FIewastbenplacedm
isolation ft^rsevenweeks,andwas ignored bytbemedicalstaff,even
though bis eyes were yellow and there was bloodmbis urine, and
addedtbatadoctortoldbim,"you'reabouttodieandtbere'snotbing
weeandofeiryou."^^

028338

Defense Reciprocal Discovery

t

h
s
n
S:

re
Ul
In
ab
by
an
of

Alti
ass I

ooooooos

18359

^
^

^ ^
^

^

^ ^
^

^
^ ^
GT

rt

^ 5

^
^ 5^

^
^

=L

1^

B


o

^
^

Ci-

^ n

^

g
g
D- S

n

^

^

4 ^

^

-

3

O
33
^

^

3^

pd

a.
3\

n

B

Si

"

O

§• 3.

O

n

3

n

5 3

3
£

n
0 3

cr?

cr

^j-

O

5

3C

C
SJ

Si

re
CL

3

Jt

:F


^

o
oa
P

H

1^

_

•,<

tX
IA

_

<

<
M

c-

g

c" 5-

s

3

->

3'°

3 o

re

"

3 c-

C

cd. ^ :
SJ

a

S

r! 11
o

re

6' ^

^
Cu SJ
3- _
"
fs 3 ;

3

a.

3

o i S'

S)

%

_

° "S 5 2"
2" m
R re ^
re CL s)

028339

«• re

3
I-l
O

O

CXQ
SJ

o'
3

S"
SJ

Iff'fi
> S.

SJ

D-

Sl

3re

BJ

Cu
Bl

3
C

re

2

3

rl

CL

>

3

6J_

3

2

"

Jf
c

O

2. g. g

s-i:

5.

|g
3. £

%

o?

8

Sl
«

SJ

CL

Ci



re

CL

o
3

^

re_

. 3

re" O

III

c/^ C

Defense Reciprocal Discovery

C re
CL CL

P3 -

5 re

CL

3
CL

n
C

z
H

§S"

g"

re

cr

Si

% S O

>
Z

>
2
o

5- q

^

re

SJ

g^'
«

i2.

re
3

pr

CL

Z-

3

3"

C

re cm S
3
CL

2

N

~.

re 5

3-

3"

5 0,

^

3'

3- B

re

'il

2 cc
SJ SJ
i iL
n g SI 5 S

cr

'"'g

n
W
S
3 ' E. re' •<
< B'
c n SJ era
c ^
"

3-

o S

=

^ X

Si

? s. " cn
n"!" 5 8
m.

C

o S- 3-re"
3
Sl re
O
re
"< SS.
S9 5
re re 3 . re SJ

3::

1:4
^

c

M

z

s.

3

Bi

?!!

>

B-

1^ n

»

C

a
3re

c

re 3

CL

SJ

B' 33- 3

n

P

S

2

3

rt

^

O-

ig:
g 2

3-

3Q

g <
t3

3

SL R

R 5
CL SJ

3

SJ

S 3
X-

3

BJ

#

%

ar »

re
<

<

s 1

re <
3"

c

g"

13

^

re >«r (/;.

11 i

cr
c

3-

re ^

c
o >

re 5

CL g . CTQ Sp
3 re
re o
^ re 4
y - C CL #

SJ

n

3

g ^

SJ
"3

37 §'

=

5.

B.

3

SJ

3- n,

3-

O

CL
re
P

Q- re .-t re tyi

CL

D- S

Sl

Si

a j (TQ

3- «
SJ xs
3-

•5 w
f a.

CJ.
EJJ

^

j;

CJ

g. 3- 6

?

3

O
CL

= 2

% R

3re

CL
CL

c "

CL

g S
3 ,3
g
CL

re

3

c

r.

cr

3"

5'

3- Bl
2 3r.- . 2^

o

3

BJ_

re

r

'<
O

re

cr %

R
^re ° 3
CL

C-

3-

^ n° ct
a.

3-

3

K

3U

' -

Orq

CR

•< 2.

CL

cnj

3

2 5; g ? ; Zg 3#^

re G

SJ

», ST <

SJ
3-

3: "5-

n

o
y3

O

SJ

Sl

re
3
o- ^ S3 o
SJ
c »
.
" ^'W
re
3- o 9,
CL

^ E# ^

3- _
3J 3
2- • <

O

o c

O
c

SJ

3
cr?

u ^^FN
5

3-

s r 3"

CJ
M

CTS

3

g 5 5 a$

re
B.

lllllfi


fl

R. iir o . y g.

X o

3
C

5! 5 3- o-

re ' u

S

•3

SJ
f?
6)
31-7
" •< re
cr
gre SJ
c
0
»

c, — o- S' 32

SJ

5- o

3-

o. g K. K
o "

u

O

z; ^ 2 o

i S- S 5' Xc-I

— re %

re

II P- £-

<

re

"8

I""

3

3-

^

re
a.

X

5' o. o
o c

re

li

m

a

g" ri n

3c

g
2 •5'
3 SJ
a.
C
3 :

re
c"
C-

tr,

r 2

Fig
(M

o

3
re
o_

Q.

5*

R 5(

S | |
=r 3
3
i %
re
crc

CR

S^S-XD

s-'g 5-

•^5-2

CL

5-

^
»

3- 3rt

q
3- R

S

Si

!y>
3

C
3
O.

K~ 3 : 05

J—

S. re 3

n
3-

3

^

u

Z

5 _c
re

C
O
3

"3

!

=
^

o

O

-<

C
rs

3

».

U

»

XI

•<

3

a

B_

c

ft

g

»

5-3

3- v;

re

KS

2.

as O . CJ
g cJ " * £
ivl

re

SJ

"

o
C
3

re
SJ

^^"g
5

o
3re

g

g-N^?

O
g

3
OS

3 5
' ^ ^ ^
»
1" I—< re
o' B. 3
-S g. 5 2 5 S. ^ 3

D. tr.

Sl
3

0

"I-

o
• CR

O-

"

irtli

o

on ^

o

S

5- —

<
-3
SJ

-

a

re
C-

a

SJ
-f,

^. 5
05
S_
re
2 cr. O5 ^ S" 9re 3
% re
o. < C £-

a-

o_

s *

O

3

^

o a..:g

3
re

o

^

M

r

U

CR.

->

re

sa

re

n
C
S n !4.
!J5

2-3 "
" 4 2

"
^ re
s'
7?
3< ^
5

3-

91

R3
t3
S3

g

S

3

3-

SJ

o y

< < g

O
3"

%
re
s>
C_

R '

r3|

o

ft

-2. 2 " ^

'4

SJ ZT'
tn TI-,
3* n6 CR
3^
C ET: l i

^ ' 3-

_.

u

sr
m

5: <

51

S 3

5-

c
5 <
5. P- 5

3"
ft

H

E-^s

"

2

CL.

T)

re"

;

3

*:

75

ft

O
re
2 . "O
~
ft

sa

11^. g

^ t

8 5-;. 5- <

O

3-

» %

g. r S

P
3
G.

I-l

3-

B.
ft

i.

C

3-

n
D.

c_
S R3,

s,

(M

3

s

K

o

3-

o- Z

M

S c-

5

O
3
r-

CL

o
K


^

3-

p

tTi

3

^ ^
;
S

2

n>

S 3

3

P ft 55 cg " ^
3 3
5-

3
OD

2 r=

ggg

^ ^ ^ ^ ^

c
- »
^ M cm
3 3- re = ' 3 "

5-| I

rs
n
ts

"3

5^

%g§

c_
2

g.

— C- O C

Z . crq

r.
C

X

~

i
El

<
re

^
3

^

3

r

CL

00000006

18360

Wy that this was true, giy,.,,

.,

and Suppression of Vice
lb Omar.
'

'^K^r&j ,

jl

G//jMf^z/^^yMO

-lneni)

OpgMs

Combatants"

rilefirst20 prisoners arrived at Guantanamo on January 11, 2002,
:ft;r 3 27-hour flight from Afghanistan. Three days later, a second
J-,i, containing 30 prisoners, touched down, and by early February,
21(1 prisoners had arrived in Guba, and another 237 were awaiting
rr.inspfttation from Kandahar. " I call the journey to Guantanamo 'the
loumey of death'" the Kuwaiti Adel al-Zamel explained in December
iiji}6. "I discreetly wished that the plane would fall to end the pain
I lelt.*" Many other released prisoners also described the misery that
,. experienced on the flight. Shafiq Rasul, who explained that the
prisoners were transported in what be and bis friends from Tipton
described as the "three-piece suit," consisting of handcuffs attached
io a metal belt and leg irons, said that be spent the whole journey
m extreme pain because tbe belt was digging into his side. "When I
rinally got to Guba," he said, " I lost feeling in my bands for the next
SIX months."'
it's still not certain when the administration's Wild West bravado
gave way to a realization that, not only would there be prisoners in
'.hi.- "War on Terror," but that, in order to exploit them as they saw
ht, they would need to be detained outside tbe jurisdiction of the US
>-"Oi]rts. On November 28,2001, the Pentagon was reportedly looking
at plans to imprison captured terrorist suspects at Guantanamo or
on the Pacific island of Guam,^ but the catalyst was an extraordinary
Piece of legislation that was announced on November 13. Acting in his
cspacity as Commander-in-Chief of the Armed Services, and without
consulting Congress, President Bush issued a Military Order declaring

028340

Defense Reciprocal Discovery

00000007

18361

GU.^^T^^^^^^^t^^I^I^N^

Flamed Ahmed explained, "Tbe questions were always the sarney if
Iknew Osama bin Laden or someone of bis inner circle, wbatlwas
doing in that region, who my contacts were, wberelbad fought, etc.
This went on for two orthree hours. They asked tbe same questions in
different ways.They finally told me that iflwasn't more cooperative,
Iwould never see my family again."^^
Initially, tbe conditions of detention were tbe most severe obstacle
facing tbe prisoners, prompting Asif Iqbal todeclare that "the
restrictions that were placed on us when w^e were in our cages were
probably tbe worst things we bad to endure." Importing tried and
tested tactics from Afghanistan, theautborities prevented tbe prisoners
from talking to one another and tbeir cages were permanently floodlit.
"Ispent tbe first month in urtersilence,"Mobammed Saghir said after
bis release, and Flamed ,^^medadded,"In tbe morning tbey woke us up
at^o'clockwitbasongbyBruceSpringsteen,^BornintbeLISA,'wbich
tbey played at full volume through tbe loudspeakers."Tbe prisoners
were allowedabandful of meager"comfort items"—twotowels,a
blanket,asheet,asmall toothbrush, shampoo,soap, flip-flops and
an insulation mat to sleep on, as well as two buckets, one for water
andoneforuse.^saurinal—but if tbey wanted to defecate tbey bad
to be escorted to^portaloo by tbe guards,wbo unshackled one of
tbeir bands, but kept an eye on them the whole time. This was not
onlya.source of humiliation for devoutMuslims, but also,as Shafiq
Rasul explained,"very often tbe guards would refuse to take us to tbe
portaloo outside and therefore people started to use tbe buckets in tbe
cells.Many of tbe people who were detained in Gamp^-Ray were ill,
often suffering from dysentery or other diseases and simply couldn't
wait until the guards decided they would take them to tbe toilet...The
smell in the cell block was terrible."Asiflqbal also described how, in
the first few weeks, tbey were "not allowed any exercise at all,"were
only"allowedoutfortwominutesaweektobaveasbowerandthen
returned to the cage,"and were often only givenaminutc to eat their
food before itwas taken away.^^
Although many prisoners said that the everyday violence that was
cc^miiionin Afghanistan was not replicatedinGuantanamo,they
explained that tbe psychological pressure was more intense, and that
tbey were absolutely terrified during the brst few weelcs in Guba. Shahq
Rasul explaincd,"During tbe whole time that we were in Guantanamo,

028341

Defense Reciprocal Discovery

OOOOOOO^

18362

INSTRUCTIONS FOR PREPARING AND ARRANGING RECORD OF TRIAL
USE OF FORM - Use this form and MCM, 1984,
Appendix 14, will be used by the trial counsel and
the reporter as a guide to the preparation of the
record of trial in general and special court-martial
cases in which a verbatim record is prepared. Air
Force uses this form and departmental
instructions as a guide to the preparation of the
record of trial in general and special court-martial
cases in which a summarized record is authorized.
Army and Navy use DD Form 491 for records of
trial in general and special court-martial cases in
which a summarized record is authorized.
Inapplicable words of the printed text will be
deleted.

8. Matters submitted by the accused pursuant to
Article 60 (MCM, 1984, RCM 1105).

COPIES - See MCM, 1984, RCM 1103(g). The
convening authority may direct the preparation of
additional copies.

12. Advice of staff judge advocate or legal officer,
when prepared pursuant to Article 34 or otherwise.

ARRANGEMENT - When forwarded to the
appropriate Judge Advocate General or for judge
advocate review pursuant to Article 64(a), the
record will be arranged and bound with allied
papers in the sequence indicated below. Trial
counsel is responsible for arranging the record as
indicated, except that items 6, 7, and 15e will be
inserted by the convening or reviewing authority,
as appropriate, and items 10 and 14 will be
inserted by either trial counsel or the convening or
reviewing authority, whichever has custody of
them.

13. Requests by counsel and action of the
convening authority taken thereon (e.g., requests
concerning delay, witnesses and depositions).

1. Front cover and inside front cover (chronology
sheet) of DD Form 490.
2. Judge advocate's review pursuant to Article
64(a), if any.
3. Request of accused for appellate defense
counsel, or waiver/withdrawal of appellate rights,
if applicable.
4. Briefs of counsel submitted after trial, if any
(Article 38(c)).
5. DD Form 494, "Court-Martial Data Sheet."

9. DD Form 458, "Charge Sheet" (unless included
at the point of arraignment in the record).
10. Congressional inquiries and replies, if any.
11. DD Form 457, "Investigating Officer's Report,"
pursuant to Article 32, if such investigation was
conducted, followed by any other papers which
accompanied the charges when referred for trial,
unless included in the record of trial proper.

14. Records of former trials.
15. Record of trial in the following order:
a. Errata sheet, if any.
b. Index sheet with reverse side containing
receipt of accused or defense counsel for copy of
record or certificate in lieu of receipt.
c. Record of proceedings in court, including
Article 39(a) sessions, if any.
d. Authentication sheet, followed by certificate
of correction, if any.
e. Action of convening authority and, if appropriate, action of officer exercising general courtmartial jurisdiction.
f. Exhibits admitted in evidence.

6. Court-martial orders promulgating the result of
trial as to each accused, in 10 copies when the
record is verbatim and in 4 copies when it is
summarized.

g. Exhibits not received in evidence. The page
of the record of trial where each exhibit was
offered and rejected will be noted on the front of
each exhibit.

7. When required, signed recommendation of
staff judge advocate or legal officer, in duplicate,
together with all clemency papers, including
clemency recommendations by court members.

h. Appellate exhibits, such as proposed instructions, written offers of proof or preliminary
evidence (real or documentary), and briefs of
counsel submitted at trial.

DD FORM 490, MAY 2000

Inside of Back Cover

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh