Resolved: Wikileaks is a threat to United States national security.

advertisement
PUBLIC FORUM | FEBRUARY 2011
Resolved:
Wikileaks is a threat to United States
national security.
Victory Briefs Topic Analysis Book: Public Forum February 2011 – 10PF6-Wikileaks
© 2011 Victory Briefs, LLC
Victory Briefs Topic Analysis Books are published by:
Victory Briefs, LLC
925 North Norman Place
Los Angeles, California 90049
Publisher: Victor Jih | Managing Editor: Mike Bietz | Editor: Glenn Prince | Topic Analysis Writers: Ryan Hamilton,
Sarah Rainey, Todd Rainey, Les Phillips | Evidence: Glenn Prince
For customer support, please email help@victorybriefs.com or call 310.472.6364.
10PF6-Wikileaks
www.victorybriefs.com
Page 2 of 76
!"#$%&'(&)'*!%*!+&
TABLE OF CONTENTS
1
TOPIC ANALYSIS BY RYAN HAMILTON
4
TOPIC ANALYSIS BY SARAH RAINEY
14
TOPIC ANALYSIS BY TODD RAINEY
25
TOPIC ANALYSIS BY LES PHILLIPS
34
PRO CARDS
43
WIKILEAKS LEADS TO THE DEATHS OF SOLDIERS.
43
WIKILEAKS INFORMATION IS USED AGAINS THE UNITED STATES TO COMPROMISE NATIONAL SECURITY
43
EMPERICALLY PROVEN—LEAKS SIMIILAR TO WIKILEAKS LEAD TO CIA DEATHS IN THE 1970S.
44
AS A RESULT OF WIKILEAKS, THE US IS HAVING TO PROTECT NUMEROUS INSTALLATIONS IN IRAQ AND
AFGHANISTAN THAT WERE PREVIOUSLY SAFE PROVING THE NATIONAL SECURITY THREAT.
44
THE DAMAGE HAS BEEN DONE—THE DAMAGE DONE TO OUR NATIONAL SECURITY IS IRREVERSIBLE.
45
WIKILEAKS PRESENTS A CLEAR AND PRESENT DANGER TO THE UNITED STATES.
45
WIKILEAKS UNDERMINES AFGHANISTAN HARMING US NATIONAL SECURITY
46
RAW INTELLIGENCE LEAKED BY WIKILEAKS JEOPARDIZES LIVES.
46
COMPARISONS OF WIKILEAKS TO THE PENTAGON PAPERS ARE INVALID.
46
WIKILEAKS WILL CAUSE THE DEATHS OF INNOCENT CIVILIANS
47
WIKILEAKS DESTROYS THE DEMOCRATIC PROCESS WHICH IS THE KEY TO NATIONAL SECURITY
47
WIKILEAKS SHOULD BE CLASSIFIED AS A TERRORIST ORGANIZATION GIVEN THEIR ACTIONS AGAINST
NATIONAL SECURITY
47
THE INFORMATION OBTAINED DOES NOT OUTWEIGH THE NATIONAL SECURITY INTERESTS
48
WIKILEAKS JEOPARDIZES NATIONAL SECURITY—MULTIPLE REASONS.
48
WIKILEAKS CABLES HAVE DESTORYED US DIPLOMACY WEAKING NATIONAL SECURITY.
49
WHILE THE WIKILEAKS CABLES DO NOT YIELD A NUCLEAR WAR, BUT THEY ARE JUST AS DAMAGING TO
NATIONAL SECURITY
49
COMMON SENSE SAFEGUARDS CAN PREVENT ANOTHER WIKILEAKS
49
PERSONNEL CHANGES CAN CHANGE WIKILEAKS EFFICACY IN THE FUTURE
50
IRONICALLY, THE PROGRAMS CREATED AS A RESPONSE TO WIKILEAKS ARE LIKELY TO MAKE US WEAKER,
PROVING THAT THE PARANOIA CREATED IS A THREAT TO NATIONAL SECURITY
50
WIKILEAKS UNDERMINES DIPLOMACY THREATENING NATIONAL SECURITY
51
THE EFFECTS OF WIKILEAKS YIELD TERRORISM.
51
ASSANGE COULD END UP KILLING MORE PEOPLE THAN OSAMA BIN LADEN.
51
WIKILEAKS UNDERMINES TRUST WHICH IS KEY TO NATIONAL SECURITY
52
THE UNDERMINING OF TRUST CAUSED BY WIKILEAKS COULD LEAD TO NUCLEAR ARMAGEDDON
52
HACKERS AROUND WIKILEAKS ARE UNDEMOCRATIC—THEIR VERSION OF FREEDOM WOULD LEAD TO
ANARCHY.
53
HISTORY PROVES—THE BEHAVIOR JUSTIFIED BY THE WIKILEAKS HACKERS LEADS TO DEADLY
CONSEQUENCES
54
WIKILEAKS USES THE THE PEOPLE'S RIGHT TO KNOW TO DISGUISE THEIR REAL MOTIVE TO UNDERMINE
DEMOCRATIC PRINCIPLES
54
CON CARDS
55
CAUTIOUS AND INCREMENTAL RELEASE OF INFORMATION PREVENTS WIKILEAKS FROM BEING A REAL
THREAT
55
NO EVIDENCE THAT WIKILEAKS WILL RELEASE DANGEROUS INFORMATION
55
WIKILEAKS IS CRITICAL TO THE GROWTH OF A PARTICIPATORY DEMOCRACY
56
LEAKS ARE KEY TO JOURNALISM
57
WIKILEAKS IS NOT A THREAT TO SECURITY – THE BACKLASH IS A THREAT TO FREE SOCIETY
57
WIKILEAKS IS CLOSE ENOUGH TO THE PRESS TO BE CONSIDERED FOR 1ST AMENDMENT PROTECTIONS 58
WIKILEAKS HAS REDUCED THE LIKELIHOOD OF WAR WITH IRAN
59
WIKILEAKS INCREASES NATIONAL SECURITY BY HIGHLIGHTING INTELLIGENCE LEAKS
60
WIKILEAKS HAS IMPROVED SECURITY FOR THE DEPARTMENT OF DEFENSE
61
WIKILEAKS IS LEADING TO A REDESIGN OF DIGITAL SECURITY IN THE INFORMATION SECTOR
62
NATIONAL SECURITY IS A FAÇADE WHEN IT IS BUILT ON DUPLICITY AND SECRETS
62
WIKILEAKS IS THE INTERNAL LINK TO CHECKS ON THE LEADERS OF CIVIL SOCIETY
63
WIKILEAKS EXPOSES VIOLENCE AND FORCES THE US TO BE HELD ACCOUNTABLE FOR ATROCITIES
63
WIKILEAKS KEY TO FREE PRESS – FREE PRESS IS KEY TO EXPOSING CORRUPTION
64
10PF6-Wikileaks
www.victorybriefs.com
Page 3 of 76
WIKILEAKS = FREE PRESS
64
WIKILEAKS IS NOT A THREAT – TO LIVES, NATIONAL SECURITY OR THE LAW
65
SECRECY DOES MORE HARM TO NATIONAL SECURITY THAN WIKILEAKS – HISTORY PROVES
66
EVEN THE GOVERNMENT KNOWS THAT THE REAL THREAT IS IN SECURITY LEAKS, NOT A THREAT TO
NATIONAL SECURITY
68
WIKILEAKS CAN SAVE LIVES BY STOPPING WARS BEFORE THEY START
69
SECRECY LEADS TO INCREASING MILITARISM
69
WIKILEAKS HELPS PROGRESSIVE ACTIVITS KEEP OUR SOLIDERS OUT OF DANGEROUS AND NEEDLESS
WARS
70
WIKILEAKS OPENS THE DOORS FOR PROTESTS THAT COULD COMBAT SUCCESSIVE REGIMES OF SECRECY
AND BRUTALITY
71
WIKILEAKS INCREASE INFORMATION IN AN AGE OF SECRECY WHICH IS THE KEY TO IMPROVING AND
EXPANDING DEMOCRACY
72
WIKILEAKS CABLES HAVEN’T KILLED ANYONE – AND THE INFORMATION RELEASED IS CRITICAL TO
EXPANDING TRANSPARENCY AND DEMOCRACY
72
WIKILEAKS EXPOSES THE THREAT POSED BY THE US TO THE REST OF THE GLOBE
73
WIKILEAKS DOES NOT ENDANGER ANYONE, IN FACT NO ONE EVEN NEEDS PROTECTING
74
WIKILEAKS UNCOVERS ATROCITIES DONE IN THE NAME OF THE GLOBAL POWERS
74
TRANSPARENCY IS KEY TO JEFFERSONIAN DEMOCRACY
75
NO EVIDENCE OF VIOLENCE DUE TO WIKILEAKS—AFGHANISTAN PROVES.
75
PENTAGON HYPE IS TO BLAME FOR THE WIKILEAKS/NATIONAL SECURITY LINK.
76
EMPERICALLY DENIED—PREVIOUS LINKS DID NOT LEAD TO THE DEATH OF US SPIES.
76
&
&
&
&
&
10PF6-Wikileaks
www.victorybriefs.com
Page 4 of 76
!,-./&"01234.4&53&6310&718.29,0&
I think that this is a great public forum topic: it relates to a current event
that will educate students on some of the nuances of international policies, give
cause to investigate diplomatic procedure and protocol, speculate on motivations
and psychology of the individuals making and coordinating foreign policy, and,
most importantly, delimit the very common PF strategy of using statistics to
support every argument made during the course of a round. I know that many of
my PF briefs begin with the same caveat: don’t rely solely on statistics to prove
your case, regardless of the topic or the side. It benefits no one. So many times,
judges are left listening to the seemingly endless stream of facts and figures
conjured up to support one obscure point or another, only to have the speech
end and be presented with another study which concludes the exact opposite by
the opposing team. This leaves the judge with no way to reconcile between the
two competing statistical claims and debaters are unlikely to be satisfied with any
intervention that is forced by that sort of situation.
Take this topic as a way to practice developing and articulating ideas that
don’t rely on statistical or empirical support for their proof. Focus on your ability
to deduct and induce things that follow along a logical chain of thoughts to arrive
at conclusions that will support your case and rebut your opponent’s particular
claims. Construct clever frameworks regarding what constitutes a threat – go
wild with this free and unbridled thinking, to be bound by the % sign no more.
The background on this case shouldn’t be a bore to research, either:
WikiLeaks is unique among NGOs in that it that seeks to exploit weaknesses in
governments’ information chains and systems to expose classified or sensitive
documents or data to the general public. The stated purpose of WikiLeaks is “in
exposing oppressive regimes in Asia, the former Soviet bloc, Sub-Saharan Africa
and the Middle East, but we also expect to be of assistance to people of all
regions who wish to reveal unethical behavior in their governments and
10PF6-Wikileaks
www.victorybriefs.com
Page 5 of 76
corporations.”1 Clearly that mission has been eclipsed by their more recent
release of documents that are almost exclusively related to the United States and
sometimes directly related to other countries but only insofar as that country is
the object of a description or cable by a US Diplomat or other functionary
involved in diplomatic communications. This new switch in mission seems to be
supported by comments made by Julian Assange, who has assumed a sort of
directorship of the organization, boldly declaring to those who questioned his
personal life that he was busy, he had “two wars to end.”2
Related to these leaks – directly or indirectly – is a new political movement
that is being called the Jasmine Revolution. It is a movement which has toppled
the government in Tunisia and spread the same zeal to dissidents throughout the
Mediterranean’s dictatorial regimes and through the Arabian Peninsula: Albania,
Egypt, and Saudi Arabia all have had self-immolations of the sort which
prompted the movements against the pro-Western but hopelessly greedy
Tunisian President and his family.34 The implications of these revolutions will be
discussed as they relate to US Foreign Policy in the affirmative section further
below. The point of the background research, chiefly for the affirmative, should
be to establish points on the link chain all of which can be combined to illustrate a
major threat to the national security of the United States. Negatives would do
well to be informed about these points in order to sever the chain proposed by
affirmatives – explanations as to why they’re irrelevant or untrue. That having
been said let us evaluate some of the arguments that the different sides might
employ to win the round.
1
http://web.archive.org/web/20080314204422/http://www.WikiLeaks.org/wiki/WikiLeaks:About
http://www.dailymail.co.uk/news/article-1339859/WikiLeaks-Julian-Assanges-promiscuouslifestyle-revealed-Jemima-Khan-look-away-now.html
3
http://www.dailymail.co.uk/news/article-1347626/Tunisia-riots-Presidents-wife-Leila-drovenation-streets-start-revolution.html
4
http://www.jpost.com/MiddleEast/Article.aspx?id=205180
2
10PF6-Wikileaks
www.victorybriefs.com
Page 6 of 76
Affirmative
The very nature of WikiLeaks means that it won’t pose a direct threat to
the United States: it cannot marshal armies, launch missiles, nor can it access
the information it seeks without assistance – WikiLeaks has a very limited
capability to infiltrate the information networks it seeks to use against the United
States. To do this, it must co-opt individuals who already have access to the
information it desires, and these individuals are typically those who have been
vetted by government security agencies to guard against leaks or other
betrayals. And when they do release their most potent weapon – it can hardly be
described as something that strikes fear into the average citizen of the United
States or even the world. The affirmative must overcome all of these obstacles
to demonstrating a positive threat to US national security, but I don’t think that is
a very tall order. There are a couple of ways to demonstrate a major threat:
The first and most apparent way that WikiLeaks undermines American
security is by eroding the trust that exists between governments who cooperate
with the US in the War on Terror: Charles Krauthammer, for instance, cites a
particular cable where the President of Yemen agreed to take credit (or blame)
for bombings against Islamists that were actually perpetrated by American forces
in rural Yemen. That cover, Krauthammer explains, is “pretty well blown.”5 In
addition to probably eliminating the potential for the US military to conduct these
clandestine anti-terror bombings, it invites an incredible amount of scrutiny on
other anti-terror operations in Yemen that many of that country’s citizens,
especially those who sympathize with the Islamist movement, would probably
oppose.
Yemen is the clearest case where WikiLeaks has chiseled away at the
ability of the US to cooperate with a state that has a confirmed terrorist presence:
the bombing of the USS Cole took place in the Yemeni port of Adan, and just
5
http://www2.timesdispatch.com/news/2010/dec/06/ed-kraut06-ar-696710/
10PF6-Wikileaks
www.victorybriefs.com
Page 7 of 76
months ago bomb-laden packages destined for synagogues in the Chicago area
were dispatched from terror cells operating out of Yemen. If it can be positively
established that the WikiLeaks documents have severed or significantly
hampered the working relationship between anti-terror force in the US and
Yemen, either now or in the future, it will have made a tangible, negative impact
on US national security. There is more than enough topic literature that spells
out exactly why Yemen is most likely to become the next Afghanistan in terms of
instability and potential for Islamic terrorists to gain ground.
I think this one
example, if it is developed and specific enough, can turn into a pretty solid
affirmative case that most judges will find compelling. The troubles, though, don’t
end in Yemen there when it comes to WikiLeaks threatening cooperation and
stability.
In Egypt, Hosni Mubarak, who is no Abraham Lincoln, maintains his power
through use of force and strict political controls. He has exercised what is mostly
unilateral power to outlaw the Muslim Brotherhood, which, while focused in
Egypt, has chapters across the Islamic world, an organization that seeks to
implement a more conservative Islamic regime than is currently in place. It is
also an organization that embraces terrorist tactics when necessary and has
friendly relationships with pseudo-terrorist organizations that seek control of more
traditional political structures like Hamas and Hezbollah. They are not permitted
on the ballot and they must meet in secret. It is likely that if the organization
were ever given any meaningful opportunity to take power, they would, and that
process would not likely be through democratic or peaceful means. They’ve
been linked to the assassination of the Egyptian President and Prime Minister in
the past.
That may not seem like a major deal – but just weeks ago, a similar leader
in Tunisia was forced out of his control by more benign protestors who aren’t
bent on Islamic Revolution. Zine Bine Ali cooperated with the United States and
NATO against terrorists in Tunisia, both homegrown and imported. Countries
like Tunisia – with high unemployment rates, a growing young population with
few and shrinking opportunities, not buoyed by oil wealth – are a terrorist
10PF6-Wikileaks
www.victorybriefs.com
Page 8 of 76
organizer’s best chance to recruit disenchanted youth who don’t see a path to the
future, who are more susceptible to incendiary rhetoric and looking for an outside
entity to blame for what are pretty serious problems. It is imperative that they
have a stable order as a bulwark against terrorism, and an administration that
understands the need for order against an Islamic terrorism that is a serious
challenge to peace, economic prosperity, and many various and sundry political
freedoms that people seek to enjoy, especially for women and minorities.
WikiLeaks released information that, combined with the self-immolation of a man
whose fruit stand was shut down by government authorities, has caused a major
threat to stability and given an opening for terrorists who were formerly under the
boot of a fairly moderate dictator to seize power. In Tunisia, the terrorist forces
aren’t particularly well organized and the population has traditionally practiced a
moderate form of Islam that has inoculated them against the sort of extremism
that found fertile ground in Afghanistan or is likely to find root in Egypt, should the
current order be cut down.
If the information shared by WikiLeaks sparks more political instability in
regions where organized terror is a serious concern, it can certainly be said to
pose a major threat to the national security of the United States. Let’s assume
the best scenario: that these
newly formed governments sympathetic to the
Islamic terrorist mission, like Iran, do not fund what most consider to be
international terrorist organizations that operate strictly as terrorist organizations,
they don’t provide material support to groups like Al Qeada – they can, like Iran,
seek the ability to build nuclear weapons, provide material support to proxy
groups like Hezbollah, provide sanctuary to malcontents like Al Sadr, and ally
with anti-American interests around the world, including Venezuela, and to a
lesser extent, Russia and China. This is a two pronged impact: the first has to do
with an expansion of terrorist bases and an entrenchment of radical Islamic
political thought in the guise of the traditional nation state, emboldening the
forces of terror and anti-American sentiment around the world, combined with the
ability of these disguised forces to create anti-American coalitions, switching the
power polarity of the world against the United States and in favor of what can
10PF6-Wikileaks
www.victorybriefs.com
Page 9 of 76
only be described as a darker, less transparent order that is significantly less
concerned with economic and individual freedom of their citizens and throughout
the world while at the same time being intent on bringing down the Satans, both
Great and Little.
Perhaps the country where the best case scenario seems least likely is
Yemen. The President there, Ali Saleh, maintains power in the same way that
many in the region do: through the police and military. He’s wedged between a
powerful Islamic movement that seeks his destruction because he is increasingly
allying with the United States against them and a middle class that is intolerant of
his abuse of power and undemocratic methods.
Even if we assume that the so called Jasmine Revolution doesn’t cause
further government resignations or regime changes in any other countries – one
can certainly believe that the governments with whom we once cooperated will
be thinking twice about sharing information with agents of the United States or
anyone else, for that matter. Diplomatic cables released about the leader of
Kyrgyzstan and a British Prince’s candid thoughts about the administration have
a chilling effect on all sorts of sharing. If the United States can’t protect that sort
of data from WikiLeaks, how can it be trusted with more significant intelligence –
these less than awesome leaders who often find themselves erstwhile allies of
the United States in the War on Terror will clam up. It’s even more likely now
that Tunisia has issued an arrest warrant for Tunisia’s former President on
charges of illegally obtaining and transferring his wealth.
If the information shared with the US intelligence community ends up
compromising a dictator’s future power – he might be okay with that. But he is
unlikely that he will allow, in the future, any information that would result in the
confiscation of the wealth he has amassed as a leader and, even less likely,
information that would expose him to criminal prosecution should a revolution or
regime change ever change his status as dictator. Since so much of so many of
the world’s despots wealth is very closely related to their actions as ruler, this
may mean fewer meetings, less access – after all, will the President of
Turkmenistan be likely to invite a US Diplomat into his palace to observe his
10PF6-Wikileaks
www.victorybriefs.com
Page 10 of 76
insanely expensive possessions if he knows that in the future that might be used
as state’s evidence in a prosecution against him after being the impetus for the
political movement that ousted him from power.
In this way, the chilling of
information sharing between the US and other countries who are strategically
positioned in one way or another can be seen as a threat to our security.
All of these are examples of case positions or contentions that the
affirmative can run – but the crafting of the argumentation is going to be just as
important. Each link in the chain from information to demonstrated threat has to
be carefully written and constructed in a way that rises to the level of positive
threat to be convincing for a judge and to be resistant to what are certain to be
negative claims of speculation.
WikiLeaks, after all, is just a website that
publishes information.
Negative
In addition to poking holes in the affirmative strategy, I think there is a lot
of ground to provide compelling arguments that WikiLeaks is simply not a threat
to US national security. First, the organization might not be around much longer.
It’s losing on the order of 600,000 dollars a week from undisclosed costs and has
been crippled by several financial institutions refusal to transfer payments from
supporters to the organization. Their financial troubles have caused significant
problems for WikiLeaks – they’ve had to delay releasing a cache of documents
dealing with the US financial system (bit of irony there – so much for seeking to
reveal corruption in banking corporations while relying on them to pass on your
funds..) because the organization is tied up with the diplomatic cables and
“financial troubles.”6
It’s easy to argue that with these sort of pressures – and the ones that are
likely to come in the future – WikiLeaks will probably be a flash in the pan.
They’ll fold up from institutional and financial pressures and their ability to obtain
and disseminate information will be nonexistent, the cables they currently
possess will also fall into a out of the media’s echo chamber and into the abyss –
6
http://www.cbsnews.com/8301-503983_162-20028090-503983.html
10PF6-Wikileaks
www.victorybriefs.com
Page 11 of 76
as of January 23rd, they’ve claimed only 1% of their cables have been published.7
And if that’s true – it can hardly be claimed that given the position they’re in,
they’re holding back documents that might prove a boon to their positions – scare
off the government hackers, reinvigorate their financial supporters, you know,
give them the upper hand. It doesn’t seem to jive that they’d be holding on to
99% of their information if it were good information that might result in a game
changer for their organization.
Aside from these technical aspects, I think that the proponents of
WikiLeaks have a legitimate case when they say that individuals are entitled to
the sort of information that is being leaked and that anyone who believes fighting
corruption is a threat to security has got their priorities mixed up. A pretty clear
case emerges from one of the files WikiLeaks released: the “collateral murder”
video that clearly depicts US armed forces killing civilians during combat
operations.
Actions like that, most reasonable people will agree, cannot be
tolerated in the US military or in any other country’s military and the perpetrators
of those types of actions should be brought to justice and held accountable for
their conduct – conduct which not only is reprehensible on a moral level, but
jeopardizes the very goals the military is meant to realize in Iraq and Afghanistan.
When the apparata in the military or the government are unwilling or unable to
bring evil-doers like this to justice, people should feel empowered to compel them
to do so, provide needed assistance, or take actions which will bring about
criminal proceedings. WikiLeaks is an important organization that seeks to do
this to promote justice and transparency. That isn’t a threat the security or any
organization or government that values the same principles.
The same is true in Tunisia – after all, it was Tunisians who were financing
some dictator’s family’s absurdly extravagant lifestyle that included a privately
owned tiger. That’s not justice, and my imagination tells me that most Tunisians
were deeply unsatisfied with the economic model that created their anger. The
fact that he cooperated with the United States against Islamists probably isn’t
very mitigating for the citizens of Tunis who have trouble coming up with money
7
http://www.washingtontimes.com/news/2011/jan/23/WikiLeaks-one-percent-cables-published/
10PF6-Wikileaks
www.victorybriefs.com
Page 12 of 76
to pay for food and healthcare and whose children will have even fewer
opportunities in large part because the same man who robbed them of their
material is robbing them of their ability to make a good life. And the threat to
security that is posed by his vacuum is no more a threat to the United States than
is the cooperation of our government with Egypt’s brutal crackdown on protestors
whose demands aren’t radical in any sense of the word.
Claire Berlinski
explains, “[The US is] not powerless to influence the outcome of these events.
Our Secretary of State could get on the phone and say, ‘Touch one more hair on
the head of one more protester and we pull the plug.’”8 She also notes that the
sum of US military aid to Mubarak is nearly 2 billion dollars – in many respects,
the same money that goes to keep down the Muslim Brotherhood goes to keep
down middle class Egyptians who would probably be more likely to institute the
sort of reforms that the US government openly desires: more freedom, more
political choice, more democratic institutions.
People might read that and correctly note that there is a major correlation
between democratic institutions and a peaceful, stable relationship with the US
and generally with the world. The US often rolls out as its excuse for defending
Israel that they are the only democracy in the Middle East that has significant
protections for minorities, and the government used this in part as the justification
to commence military action against Iraq. Certainly there is some value, then, in
having an ally that is committed to exposing the tin horn dictators which make life
miserable for a significant portion of the population of the world, particularly if
their actions leads to more democratic institutions – quite the contrary to being a
security threat, it seems like WikiLeaks may be assisting the United States in
realizing its policy of greater freedom abroad.
And what of all this talk about terrorists or terrorist enablers getting power
should a fall happen? The danger it seems to the US doesn’t come as directly
from WikiLeaks as it does from the United States’ interventionalist foreign policy
that often disregards what indigenous populations desire for themselves. The
8
http://ricochet.com/main-feed/Why-Egypt-Matters-to-You
10PF6-Wikileaks
www.victorybriefs.com
Page 13 of 76
US for years urged Palestinians in the West Bank to hold open and free
elections, and so they did. But once they elected Hamas, a party with whom the
US was not keen to cooperate, things did not get any better for the now
democratic West Bank.
In many respects, it got worse, and so did the
resentment that motivates a lot of terrorists to violence. In this way, the threat
isn’t from WikiLeaks at all, but from the actions perpetrated by the United States.
A SIDE NOTE:
There is a legitimate possibility that this may happen during the course of
the topic, given how much money they’re losing at the rate at which they are
losing it, WikiLeaks might close up altogether. I don’t think this closes the door
on affirmatives at all.
They things that I’ve mentioned the affirmative topic
analysis have already come to pass – which means that if WikiLeaks was going
to be a threat, it has already constituted itself as such. The negatives might take
some grammatical issue with the present tense of the resolution, but I don’t think
most judges will find this to be a compelling strategy. Even if they no longer
exist, the new type of activism that they have pioneered is likely to continue into
the future, though not with the same coverage or goals as this group. To that
end, the trail blazed by WikiLeaks will have opened a whole new can of worms
that security policy makers will have to deal with – protecting sensitive
information that has the potential to do meaningful damage to diplomatic
relationships, or worse, reveal secret plans or possessions the government
keeps secret as part of a strategy that is meant to protect Americans and their
interests.
10PF6-Wikileaks
www.victorybriefs.com
Page 14 of 76
!,-./&"01234.4&53&+1:1;&61.0<3&
Resolved: Wikileaks is a threat to United States national security.
Wiki technology is everywhere. They are open websites that can be viewed and
edited by practically anyone with an internet connection. Wikipedia, although
despised by teachers reading student papers, has become a popular informative
resource from the Sumatran Orangutan to Quantum 1/f noise. A fan of the TV
series lost? There’s a wiki for that—Lostpedia.wikia.com/. Can’t remember
Season 4, Episode 5 of Buffy? Try http://buffy.wikia.com/ for all things in the
Buffyverse. A wiki is a tool—in and of itself, it is neutral. The people who post
information or use the information found on the site decide how that info will be
used.
One particular wiki by the name of Wikileaks is causing global controversy for
posted classified and confidential information online. The Foreign Service Journal
explains that “the idea behind Wikileaks is to provide governmental transparency
while protecting whistleblowers.”9 Although the site has been shut down multiple
times, it always manages to reappear on its own or through a series of mirrors.
Mirrors are other websites that assist in transmission of Wikileaks by posting the
articles and documents on their own sites. As a result, “once the documents hit
the internet, there is no pulling them back.”10 Even if the original site is shut down
or the original document removed, the article has already been distributed
through thousands of other sites. In many cases, the files have been downloaded
by thousands – if not millions – of computers. More than a million formerly
confidential articles have been made public in this manner. Assange brags that
millions more are to follow in the name of promoting transparency and his brand
of “scientific journalism.”
9
Foreign Service Journal, Volume 84, p. 11, American Foreign Service
Association
10
CSO, Magazine, March 2009, “Olzak: Are You Vulnerable to Hacktivism?”
Available via Google Books.
10PF6-Wikileaks
www.victorybriefs.com
Page 15 of 76
While praised by some as beneficial in the name of freedom of information,
others (including the U.S. government) have condemned Wikileaks as
“hacktivism.”11 Why all the uproar? CSO magazine explains:
Even information taken out of context and subjected to spin will
float around the Net for years as the target entity ties desperately to
deny its authenticity…All these issues add up to a need to protect
any information, whether controlled by government regulation or
not, which might embarrass or cause operational interruptions if in
the wrong hands.
Wikileaks has generated a new discussion on the limits of free speech and
freedom of information. Wikileaks’ original mission was noble — to distribute the
information of Chinese dissidents and help bring down authoritarian regimes.
However, Wikileaks is taking a new, somewhat unprecedented turn. No hidden
information is sacred. By encouraging whistleblowers to spread confidential
information, has Wikileaks pushed the boundary too far?
Many organizations, including the United States government, say yes. John
Blossom in Content Nation explains that traditional news sources can uncover
shocking information about governments. However, he notes that the kind of
sensitive facts that Wikileaks reveals, most news outlets would be “hesitant to
share with the world...This approach to openness among peers can be
threatening to many organizations, including those with the power to fight
back.”12 In One Nation Under Contract, Allison Stanger argues that “while it can
serve positive purposes, the revolving door between government and the private
sector is an invitation to corruption.”13 She warns that while this door does not
necessarily need to be shut, its use should be carefully limited. In total, Wikileaks
has released more than a million confidential documents. These range “from
11
CSO, Magazine, March 2009, “Olzak: Are You Vulnerable to Hacktivism?”
Available via Google Books.
12
Content Nation: Surviving and Thriving as Social Media Changes Our Work,
Our Lives, and Our Futures, by John Blossom, 2009; Available via Google Books
13
Books
One Nation Under Contract, 2009, by Allison Stanger; Available via Google
10PF6-Wikileaks
www.victorybriefs.com
Page 16 of 76
highly classified military secrets to text messages of those killed in the 9/11
attacks.”14 Given the diversity of such leaks, WikiLeaks borders on the
unpredictable when it promotes leakage of information. Is their next post going to
expose real and troubling human rights abuses in the Congo, or will it expose
American citizens and soldiers to harm by revealing security procedures,
passwords, names, or important personal information?
How should teams identify national security interests of the U.S.? In May 2010,
the White House released a new national security strategy. The national security
interests of the United States are best states by those at the top:
Our national security strategy is, therefore, focused on renewing
American leadership so that we can more effectively advance our
interests in the 21st century. We will do so by building upon the
sources of our strength at home, while shaping an international
order that can meet the challenges of our time. This strategy
recognizes the fundamental connection between our national
security, our national competitiveness, resilience, and moral
example.
The report goes on to note that nuclear proliferation, global insecurity, conflict,
climate change, economic downturn, and lack of freedom/opportunity are all of
interest in national security concerns. While Wikileaks cannot be linked to all
areas that the report outlines, teams can focus on how Wikileaks undermines
America’s ability to shape an international order that best preserves democratic
principles. National security is broadly defined, giving teams a mélange of topics
to debate this month.
Pro teams should have an easy time finding initial research to support their side.
The founder, Julian Assange, has been labeled a terrorist by many for his work
with Wikileaks. Subsequent prosecution has been adamantly requested by many
organization furious with the effects Wikileaks may have on national security.
14
Macrowikinomics: Rebooting Business and the World By Don Tapscott, Anthony
D. Williams, 2010; Available via Google Books
10PF6-Wikileaks
www.victorybriefs.com
Page 17 of 76
Whether you find Fox News credible or not, they make a strong point for the pro
team:
But it’s not the contents of the leaked documents that matter, it’s
the fact that the U.S. government can no longer keep its secrets.
How eager will foreign leaders be now to offer candid assessments
of their own countries or comment on their neighbors? How willing
will foreign intelligence agencies be to share covert information?
For example, Saudi Arabia, one of the countries most compromised
by WikiLeaks, is our major source of intelligence on Al Qaeda in
Yemen and it’s terror plots. What if they decide they can’t risk their
sources and methods will show up on the front page of the New
York Times and other publications around the world and they stop
sharing what they know?15
U.S national security interests rely on cooperation with foreign nations,
particularly ones that can assist in the War on Terror. As one writer puts it, “trust
is vitally important to the operations of nations and governments…”16 The White
House’s National Security Policy outlines the importance of cooperation as a
means to our own national security:
[O]ur efforts to shape an international order that promotes a just
peace must facilitate cooperation capable of addressing the
problems of our time. This international order will support our
interests, but it is also an end that we seek in its own right. New
challenges hold out the prospect of opportunity, but only if the
international community breaks down the old habits of suspicion to
15
Fox News, Kathleen Troia "K.T." McFarland, a Fox News National Security Analyst and host of
FoxNews.com's DefCon 3. She is a Distinguished Adviser to the Foundation for the Defense of
Democracies and served in national security posts in the Nixon, Ford and Reagan administrations. “Yes,
WikiLeaks Is a Terrorist Organization and the Time to Act Is NOW,” November 30, 2010,
http://www.foxnews.com/opinion/2010/11/30/yes-wikileaks-terrorist-organization-time-act/
16
ZDNet, David Gewirtz, “Special Report: Could Wikileaks cause World War III or the end of the
world?” November 28, 2010, http://www.zdnet.com/blog/government/special-report-could-wikileakscause-world-war-iii-or-the-end-of-the-world/9696?tag=mantle_skin;content
10PF6-Wikileaks
www.victorybriefs.com
Page 18 of 76
build upon common interests… Efforts to prevent conflicts and keep
the peace in their aftermath can stop insecurity from spreading.17
It’s pretty understandable that foreign governments might not want to work
closely with the U.S. when they run the risk of exposing themselves to unwanted
international attention. The more WikiLeaks gets attention, the more difficult it
makes cooperation with enemy and ally alike for the United States. Therefore,
by hindering cooperation and open communication between nations, Wikileaks
directly harms the national security interests of the United States, especially in
the areas of conflict prevention. This of course is only the indirect threat posed by
WikiLeaks – nothing to speak of the ways in which the site could directly expose
highly sensitive information in more measurable ways.
Some things should remain secret, kept from public knowledge. Nuclear codes,
for example, are best kept out of the public sphere. Current locations of secret
U.S. military operations, if revealed to the world, could put American soldiers and
service members in grave danger. Wikileaks has revealed a multitude of
“secrets” including federal guidelines for the treatment of detainees in terrorism
cases, corruption in Kenya and Bermuda, and NATO numbering systems for
equipment.18 Some “secret” documents seem mundane and unimportant, hardly
a national security threat. But there are more serious issues at risk. For example,
in early February 2009, Wikileaks posted 6,680 Congressional Research Service
reports. These reports are traditionally selectively released to the public.
However, the massive release of these reports was not authorized for public
viewing.
The Con team may find occurrences like these to be beneficial since
many citizens can benefit from this free flow of information:
[T]he vast number of CRS reports now available to the public on third
party sides undercut the rationales for a policy of selective release.
Citizens have access to a wide array of CRS reports, yet the quality of
17
“National Security Strategy,” May 2010, distributed by the White House,
http://www.whitehouse.gov/sites/default/files/rss_viewer/national_security_strategy.pdf
18
Virtualpolitik: An Electronic History of Government Media-Making, 2009, by
Elizabeth Mathews Losh; Available via Google Books
10PF6-Wikileaks
www.victorybriefs.com
Page 19 of 76
those reports has not suffered, CRS’s institutional character has not
been diminished, and constitutent relationships with representatives
remain intact. As unofficial collections of CRS reports continue to
grow…citizens benefit from access to this information.19
Pro team fears of harming the credibility of the government may be unfounded.
While constituents may be benefited from additional information, some Wikileaks
products affect U.S. national interests militarily in a negative way. Months after
the CRS unveiling, Wikileaks released a sensitive counterinsurgency manual.
The 2010 compilation of primary source documents, The Iraq Papers, explains:
“This Pentagon manual made clear the historical continuity between U.S.
counterinsurgency techniques used in Latin America and Vietnam beginning in
the 1960s and those employed in Iraq years later.”20 Problem? Perhaps. As
David Gewirtz puts it, international diplomacy is a precise dance.21 In carrying out
actions unilaterally or in cooperation with other nations, states want to save as
much face as possible. However, when documents detailing the behind-thescenes dealings of those actions becomes known, it’s embarrassing and leaders
will do whatever is necessary to save face… “As we all know, people will do
incredibly idiotic things to protect their honor. So will leaders.”22 Approximately
400,000 classified documents regarding the Iraq war were suddenly in the
public’s view. Gewirtz explains how this information can cause harm in a simple,
19
Open Government: Collaboration, Transparency, and Participation in
Practice By Daniel Lathrop, Laurel Ruma, p. 246, 2010; Available via Google Books
20
The Iraq Papers,2010, by John Ehrenberg, J. Patrice McSherry, José Ramón
Sánchez; Available via Google Books
21
ZDNet, David Gewirtz, “Special Report: Could Wikileaks cause World War III
or the end of the world?” November 28, 2010,
http://www.zdnet.com/blog/government/special-report-could-wikileaks-cause-world-wariii-or-the-end-of-the-world/9696?tag=mantle_skin;content
22
ZDNet, David Gewirtz, “Special Report: Could Wikileaks cause World War III
or the end of the world?” November 28, 2010,
http://www.zdnet.com/blog/government/special-report-could-wikileaks-cause-world-wariii-or-the-end-of-the-world/9696?tag=mantle_skin;content
10PF6-Wikileaks
www.victorybriefs.com
Page 20 of 76
understable manner: (I highly encourage teams to utilize a similar delivery to
explain the negative effects.)
Cyberterrorism has second-level effects, meaning that the actions
of cyberterrorism don’t, in and of themselves, cause damage or
death. Instead, the cyberattacks create the environment where
damage can occur. Here’s a good example. Assange’s release of
confidential data won’t, as part of the action itself, kill anyone. After
all, all he’s doing is copying a pile of files up to a server. But, once
certain people get ahold of that data, they’ll get names of
confidential informants, for example, and then go hunt down and kill
those people. It’s still terrorism. It just works a little differently.23
On the other hand, wikis are neutral, remember? Con teams can gain offense in
the round by rebranding Wikileaks as beneficial to U.S. interests: Wikileaks is a
tool that the United States can use as an asset, yes—an asset, in its national
security plan. Wikileaks can help bring down dictators in parts of the world that
the United States is targeting. In this case, Wikileaks can help tacitly bring down
the threats for us through citizen power. The United States, according to the
White House report, is focused on bringing peace and prosperity to other nations.
Traditionally, this has been done through democracy building, replacing
authoritarian regimes and dictators. That’s where Wikileaks can step in.
Macrowikinomic says: “…when you put Wikileaks together with the events in Iran
and other places you can begin to see why dictators everywhere are wondering
when this new citizen power is going to come knocking on their door.”24 By
putting power to the people in the form of information, Wikileaks can spread
democracy which is critical to US national interests around the globe.
23
ZDNet, David Gewirtz, “Is Wikileaks Julian Assange worse than Osama Bin Laden?” October
25, 2010, http://www.zdnet.com/blog/government/is-wikileaks-julian-assange-worse-than-osama-binladen/9578?tag=mantle_skin;content
24
Macrowikinomics: Rebooting Business and the World By Don Tapscott, Anthony
D. Williams, 2010; Available via Google Books
10PF6-Wikileaks
www.victorybriefs.com
Page 21 of 76
Social networks have already made their mark as bastions of democracy by
documenting critical elections in the Middle East. Digital technologies, like
Wikileaks, can motivate social movements –for better or worse—towards U.S.
interests:
[T]here is copious evidence to suggest that new freedoms of
expression and networking enabled by the Web underpin a profound
shift in attitudes in many countries, especially among youth…What we
know is that the stories we convey here inspire hope—hope that the
Internet can empower freedom movements around the world to wrest
despotic regimes, even if decisive political revolutions have yet to
materialize in some of the more authoritarian countries…so buckle up,
all dictators, despots, and tyrants; it’s about to get a whole lot rougher
out there.25
Through a process known as differential recruiting, social networks provide
anyone with access to a computer access to recruiting agents for social
causes.26 Information provided via Wikileaks can give recruiters motivation and
power to recruit new members for social change, connecting individuals through
shared causes. Digital media already has a proven track record:
In recent years, we’ve also seen the dramatic effects of ‘smart mobs’ or
‘flash mobs’, crystallizing almost instantaneously around shared causes
with the help of digital technologies. All involved young, digitally literate
people
using
technology
to
organise
mass
protests
or
campaigns…Thus, mobile phones and the internet played a key role in
the overthrow of Philippines President Joseph Estrada in 2001; as they did
in the last-minute reversal of the electoral fortunes of Roh Moo-Hyun,
leading to his election as President of South Korea in 2001; and in the
25
Macrowikinomics: Rebooting Business and the World By Don Tapscott, Anthony
D. Williams, 2010; Available via Google Books
26
David Snow, et al. “Social Networks and Social Movements: A Microstructural
Approach to Differential Recruitment,” last modified May 3, 2005,
http://www2.unca.edu/sociology/docs%20for%20faculty/frank%20docs/SOC%20240/So
cial%20Networks.pdf
10PF6-Wikileaks
www.victorybriefs.com
Page 22 of 76
overthrow of Spain’s right-wing Patrido Popular in the wake of the Madrid
bombings in 2004.27 [Emphasis added]
The United States targets numerous regimes for change in the status quo. Yet
there are things that the United States as a government cannot say or do on their
own without causing serious harm. Instead, they can rely on other organizations
like Wikileaks to do their work for them. For example, China is one of the largest
traders with the United States. They are also a growing threat that the U.S.
government must carefully manage, lest relations go awry. The structure of
government between the two countries is very different. Yet both countries are
strongly invested in each other. While the United States certainly wants to reform
China’s restrictive domestic policies and bring democracy to the Chinese people,
it cannot always do so in a direct manner, i.e. forcing China to change. By
spreading the word of Chinese dissidents and uncovering Chinese government
secrets, Wikileaks can start the change that the United States wants from within
China—focusing on the tech-savvy youth. Wikileaks can spark a social
movement of young people or at least fuel a movement already started to create
change in line with U.S. national security objectives.
Is China our only concern? Of course not. Although the United States does not
allow total freedom of information by keeping some information confidential, in
general, the government enjoys pointing out the shortcomings of other regimes:
“While many of today’s authoritarian states…are arguably even more adept at
the black art of social control than their predecessors…the forms of social control
in countries like Iran, Russia, and China have only become more insidious.”28
Democracy relies on a number of freedoms, most notably speech and press. As
27
From Blogs to Bombs: The Future of Digital Technologies in Education, by
Mark Pegrum, 2009; Available via Google Books
28
Macrowikinomics: Rebooting Business and the World By Don Tapscott, Anthony
D. Williams, 2010; Available via Google Books
10PF6-Wikileaks
www.victorybriefs.com
Page 23 of 76
long as citizens accept government control and oppression, it will continue. This
is noted in the previously cited Macrowikinomics:
Citizens and businesses alike—both domestic and foreign—can
exercise some autonomy as long as they are prepared to
acknowledge the supremacy of the ruling group and comply with its
directives. And the extent to which citizens can exercise their rights
depends not on the legitimate laws and due process, but on
arbitrary and capricious decisions taken by an opaque and
unaccountable establishment.
Revolutions start when people become dissatisfied. When citizens and
businesses reject the supremacy of the ruling group and reassert their rights,
change occurs. That kind of social pressure on authoritarian regimes could
create change beneficial to U.S. interests. In the midst of this change lies
Wikileaks. Julian Assange’s controversial website was defended by The
Economist:
Organisations such as WikiLeaks, which are philosophically
opposed to state secrecy and which operate as much as is possible
outside the global nation-state system, may be the best we can
hope for in the way of promoting the climate of transparency and
accountability necessary for authentically liberal democracy.29
In directly response to arguments that the public revealing of secret information
will cause deaths around the world, the Economist answers plainly: “Of course,
those jealously protective of the privileges of unaccountable state power will tell
us that people will die if we can read their email, but so what? Different people,
29
The Economist, “In defence of Wikileaks,” November 29, 2010,
http://www.economist.com/blogs/democracyinamerica/2010/11/overseeing_state_secrecy
10PF6-Wikileaks
www.victorybriefs.com
Page 24 of 76
maybe more people, will die if we can't.” Con teams may argue that the long term
effects of Wikileaks is democratic in nature, an ideal that is certainly in line with
U.S. national security interests across the globe. The Economist writer explains:
I'd say providing that information certainly would have been a
socially worthy activity, even if it came as part of a more-or-less
indiscriminate dump of illegally obtained documents. I'm glad to see
that the quality of discussion over possible US efforts to stymie
Iran's nuclear ambitions has already become more sophisticated
and, well, better-informed due to the information provided by
WikiLeaks…If secrecy is necessary for national security and
effective diplomacy, it is also inevitable that the prerogative of
secrecy will be used to hide the misdeeds of the permanent state
and its privileged agents.
This month’s debate is an issue of framing short term and long term national
security interests. Certainly, in the short term, the United States should be
worried that Wikileaks may compromise international cooperation and military
operations. In the long term, however, perhaps the United States will realize that
Wikileaks can be a powerful tool to wield against other nations, nations that the
United States would certainly like to see change for the democratic good.
10PF6-Wikileaks
www.victorybriefs.com
Page 25 of 76
!,-./&"01234.4&53&!,==&61.0<3&
Resolved: WikiLeaks is a threat to United States national security
I’m always very excited when the topic for Public Forum is one that’s actually up
to date in the news. WikiLeaks is certainly the center of attention (or somewhere
near it) when it comes to media attention. Even as time moves the American
public’s attention away from the site and its actions, I am confident that new
information and opinion will continue to surface throughout the month of
February. There are multiple highly credible sources with differing opinions on
the WikiLeaks “scandal,” so you really don’t have a strong excuse to cut from the
local paper for your information. This brief gives my take on the news about
WikiLeaks and serves to provide a general frame for your approach to the news.
It is by no means a comprehensive take on the arguments you can make,
although I do think it adequately covers what can be reasonably expected in a
round as well as the potential benefits or pitfalls of those strategies.
WikiLeaks
WikiLeaks, believe it or not, was established in order to expose secrecy and
tyranny in Asia, Africa, and the Middle East. Most people are unaware of this fact
because much of the controversial website’s press has come about from its
exposure of many U.S. secrets, ranging from video footage of soldiers firing on
civilians in Iraq to a large package of top secret diplomatic cables.
In my
experience speaking to my peers about the topic, I find that there are some very
strong opinions of WikiLeaks on both sides – this means that my usual
preference to speak second may fall behind a preference for Pro or Con
depending on your read of the judge or what latest story has broken. This means
that even compared to other topics you will have to keep a close eye on the news
story. Public opinion polls are especially important, but you want to be sure not
to read too much into them – your judge may still be in the minority on that poll.
The issue, of course, is one currently debated in the papers between Julian
Assange, founder and owner of WikiLeaks and the United States Government,
which asserts that Assange’s actions violate the Espionage Act, that it
10PF6-Wikileaks
www.victorybriefs.com
Page 26 of 76
undermines America’s credibility abroad, and that it undermines the national
security of the United States. Assange contends that transparency is necessary
in order to promote a free society; without it, safety is irrelevant. His complaint is
that many newspapers are too quick to self-censor rather than giving information
in a scientific approach and leaving it to readers to interpret data for themselves.
National Security
The core of any National Security threat posed by WikiLeaks lies in its ability to
declassify classified information – debaters must take this component of National
Security in the proper context. In fact, nearly 854,000 people in and out of the
US government have had top-secret clearance, which is the highest clearance
for data classification. One study by the Government Accountability Office found
that a gross majority of the individuals given such classification “were missing at
least one type of documentation required by the federal investigative standards.”
In fact, this flaw in clearance is considered by the GAO to be a top priority when it
comes to U.S. security risks.30 I don’t think this fact actually affects the debate on
its own too strongly, but it’s a powerful setup for you if you are going second and
your opponent hasn’t brought it up. For the pro debater, we now recognize that
the GAO considers the potential for leaks to be a national security threat. Insofar
as WikiLeaks exists to facilitate the transmission of classified information, it
constitutes a threat.
For the con debater, we find that the threat is being
expanded not by the arrival of some new website with a pretty owner, but rather
by the abuse of the “top secret” classification. Consider that the individual who
leaked the 260,000 classified diplomatic cables was an army private who was not
himself working with the cables. One would liken WikiLeaks to a chair used in a
murder – the chair was the weapon, but it was hardly the threat. The murderer
was. A completely different Con option is to mock the GAO and say that
government transparency is not a threat to national security – or that such
transparency may be a threat but that WikiLeaks could prove a functional conduit
for sorting the rightly classified from the wrongly classified.
30
Time; “WikiLeaks’ War on Secrecy: Truth’s Consequences,” December 2, 2010.
Accessed online at http://www.time.com/time/world/article/0,8599,2034276-4,00.html
10PF6-Wikileaks
www.victorybriefs.com
Page 27 of 76
The Debate over Open Government
Consider the debate that most people have when talking about WikiLeaks: it is
one of whether Assange and his organization should be operating the site. This
month, the question is slightly different. The moral question of WikiLeaks may or
may not be pertinent. This debate is not at its core a question about the validity
of WikiLeaks, so don’t get caught up in a discussion about whether transparency
is philosophically desirable. It may very well be that WikiLeaks is undesirable but
not a threat, or that it is desirable but necessarily a national security threat. It
would kill you to dedicate a minute and a half in your first speech talking about
the legitimacy of the site only to have an opponent rebut you.
Likewise,
recognize that if your opponents dedicate a large chunk of time to saying that
WikiLeaks is bad or good (rather than whether it affects American security) you
might want to put twenty seconds out demonstrating why the morality of the site
is irrelevant to the discussion of the resolution.
This debate is very much broken down into two sections: the past and the future.
WikiLeaks has caused definite and certain harm to the United States’ image in
some ways – the Iraq War diaries and the release of thousands of diplomatic
cables notwithstanding. On the future front, we are asked not only whether
WikiLeaks has the capacity to gain access to sensitive military and security
information and whether they would likely release such information. This is an
important distinction. Does past harm demonstrate a present threat, or has
WikiLeaks reformed? Was WikiLeaks harmless once upon a time, but becoming
an imminent threat? This brief focuses on the nature of WikiLeaks in the lens of
what has happened, but be sure to keep an eye on what might be.
The Nature of WikiLeaks
Wikileaks is capable. Wikileaks has demonstrated the ability to withstand
massive DoS attacks with the help of its many members and its great financial
10PF6-Wikileaks
www.victorybriefs.com
resources.
31
Page 28 of 76
In fact, a New Yorker article makes the point that in order to
dismantle WikiLeaks, the US would essentially have to dismantle the internet.
Despite numerous lawsuits and a wide number of DoS attacks, WikiLeaks
remains operational as of this writing.32
Wikileaks may or may not care about the ramifications of its actions. Consider
that during multiple leaks, the site was asked by the Pentagon to avoid releasing
classified military documents which may affect national security.
understandable that debaters should criticize military secrecy.
It is
However,
WikiLeaks responded to these requests by releasing all documents – the
ramifications being that even if nasty government secrets are exposed, so too
can national security. Regardless of whether or not security was compromised in
a past experience, the threat exists. WikiLeaks is not always easily defended.
Consider the following excerpt from a New Yorker article:
A year and a half ago, WikiLeaks published the results of an Army test,
conducted in 2004, of electromagnetic devices designed to prevent IEDs
from being triggered. The document revealed key aspects of how the
devices
functioned
and
also
showed
that
they
interfered
with
communication systems used by soldiers—information that an insurgent
could exploit. By the time WikiLeaks published the study, the Army had
begun to deploy newer technology, but some soldiers were still using the
devices…Assange…said that he had instituted a “harm-minimization
policy,” whereby people named in certain documents were contacted
before publication, to warn them, but that there were also instances where
the members of WikiLeaks might get “blood on our hands.” 33
31
The National Business Review: “Wikileaks.org is dead; long live WikiLeaks.ch,”
December 4, 2010. Accessed online at http://www.nbr.co.nz/article/wikileaks-offlinefaces-triple-threat-134238
32
The New Yorker; “No Secrets: Julian Assange’s mission for total transparency,”
June 7, 2010. Accessed online at
http://www.newyorker.com/reporting/2010/06/07/100607fa_fact_khatchadourian?printab
le=true#ixzz1C5smFT72
33
The New Yorker; “No Secrets: Julian Assange’s mission for total transparency,”
10PF6-Wikileaks
www.victorybriefs.com
Page 29 of 76
On the flip side of the argument, WikiLeaks has proven some degree of
willingness to work with the pentagon, although the pentagon has denied any
sort of contact with WikiLeaks of the sort. This of course proves nothing – the
Pentagon could hardly afford the image of working with such an organization so
any contact would have to be denied, but it is an uphill battle to disprove a
government denial. You need a few points to do so. First, WikiLeaks has been
adamant about the release of information – it is irrational for the government to
avoid some form of cooperation if the document release is inevitable. Second,
WikiLeaks released a letter dated August 16 which was written by DoD Legal
Counsel Jeb Charles Johnson. The letter mentions the offer by WikiLeaks to
work with the pentagon. Finally, any denial by the Pentagon of contact with
Wikileaks uses the modifier “directly” when saying that WikiLeaks has not
contacted the organization – this is to avoid mentioning whether Assange or one
of his employees used a liaison.34
Bradley Manning
One character still abuzz in the news is private Bradley Manning, who is
suspected of leaking critical information to WikiLeaks (ranging from documents
about the wars in Afghanistan and Iraq to the diplomatic cables which expose
U.S. foreign policy). For the national security debate, we must ask a sort of
chicken vs egg question; in a world without WikiLeaks, would somebody like
Bradley Manning have leaked such information? One could speculate that
Manning was looking for the right means through which to expose the information
he had.
If so, WikiLeaks isn’t the threat to national security; Manning is.
However, if WikiLeaks functions as an impetus for espionage by internal sources,
US national security is at best for the con under greater pressure. This, of
June 7, 2010. Accessed online at
http://www.newyorker.com/reporting/2010/06/07/100607fa_fact_khatchadourian?printab
le=true#ixzz1C5smFT72
34
Glenn Greenwald, Salon.com; “Why won’t the Pentagon help WikiLeaks redact
documents?” August 20,2010. Accessed online at
http://www.salon.com/news/opinion/glenn_greenwald/2010/08/20/wikileaks
10PF6-Wikileaks
www.victorybriefs.com
Page 30 of 76
course, relies on the continued assumption that the information leaked by
Manning or that could be leaked by Manning represents a national security
concern.
Afghanistan
After the release of 77,000 documents regarding the Afghan War, WIkiLeaks
faced criticism from multiple human rights organizations. The head of the Afghan
Independent Human Rights Commission claimed that the release of those
documents was done with no consideration for the lives of multiple civilians who
had cooperated with NATO forces, and said that after the release of those
documents, there was a rise in the number of civilians who were killed due to the
belief that they were government collaborators.
This has its mitigations, of
course. For one, WikiLeaks may be working with some human rights groups such
as Amnesty International in order to help mask the names of Afghan civilians.35
For another matter, WikiLeaks insists that there is no instance in the NATO
record of a civilian’s life being affected in any way for collaboration as a result of
the leaks.
Diplomatic Cables
One of the most recent among the WikiLeaks document releases is a package of
some 260,000 diplomatic cables between U.S. ambassadors and the central
government. Some of these cables are simply funny (one ambassador to Italy
called the country’s prime minister a Playboy).
Others, however, may have
dangerous ramifications for U.S. national security. China, according to several
such cables, was close to moving away from its strong support for North Korea in
the six-party talks. Now that the cables have been made public, China has been
deprived of its diplomatic leverage to some extent, and it may make it much more
difficult for the U.S. to promote Korean unification, and as a result, gives strength
to one of the staunchest enemies of the United States.36 That argument relies on
35
Herald Sun; “WikiLeaks asked to censor secret files,” January 27, 2011.
Accessed online at http://www.heraldsun.com.au/news/breaking-news/wikileaks-askedto-censor-secret-files/story-e6frf7jx-1225903715328
36
Michael Trapido of News Time; “WikiLeaks: Is Julian Assange a hero, villain or
10PF6-Wikileaks
www.victorybriefs.com
Page 31 of 76
quite a few links that can be attacked, but it is one that serves to indict WikiLeaks
on the most recent cables. The diplomatic cable leaks made possible by
Manning’s actions may have had a role in the recent riots in Tunisia and Egypt.37
The argument for such impetus was that it exposed the fact that the U.S. did not
support these nations’ regimes as strongly as was projected. If the nation isn’t
willing to defend the government of Tunis, it may not be a national security
priority on its own, but the spillover effect we are witnessing in the Middle East
confirms that fallout from such cables is indeed significant.
Contingency Plan: What to do in the event that WikiLeaks shuts down.
At the moment, WikiLeaks is certainly under threat. WikiLeaks.org no longer
functions (instead, the site operates under the portal wikileaks.cz), Assange is in
prison awaiting trial for charges not related to espionage, and many financial
institutions have removed the ability for their members to make donations to the
site’s infrastructure. While unlikely, you will need a contingency plan for what to
do in the event that WikiLeaks ceases to exist.
First and foremost, remain
familiar with the previous month’s topic – a tournament director may opt to keep
the old topic as a quick fix for debaters.
Second, create alternate ways of
framing the debate that help you to continue a discussion – and be mindful that
nobody in the round can forget that WikiLeaks is done for.
You may choose to debate the round as if WikiLeaks has continued to exist. If
you mutually reach this decision with your opponents and judge I would strongly
recommend taking into account that the closure of WikiLeaks gives the pro the
argument that it was considered enough of a national security threat by the
government to be closed, and that it gives the con the argument that WikiLeaks
can’t be much of a national security threat because it is easily controlled (hinting
at the realistic disappearance of the site).
simply dangerously naïve?” December 1, 2010. Accessed online at
http://www.newstime.co.za/WorldNews/Wikileaks_:_Is_Julian_Assange_a_hero_villain_
or_simply_dangerously_na%C3%AFve/16065/
37
Foreign Policy; “Whispering at Autocrats,” January 25, 2011. Accessed online at
http://www.foreignpolicy.com/articles/2011/01/25/whispering_at_autocrats?page=0,0
10PF6-Wikileaks
www.victorybriefs.com
Page 32 of 76
You may choose to define WikiLeaks as not the site but rather as its
infrastructure. Closed or not, Assange claims that he has a full-time staff of five
secret individuals, about 40 dedicated volunteers, and close to 800 on-and-off
volunteers who help the site to function. So long as those people exist in an
increasingly networked world, WikiLeaks may last forever – just not under its
current name and leadership. This interpretation is beneficial for debate because
it creates a stable platform for both sides, and because it is arguably at the heart
of the website’s identity.
In both cases, I believe that the most strategic option is to read up on opinion
polls from multiple sites. If a local poll is available, you should consult it – if its
closure is highly publicized and results in retaliation by the site, it may be a good
sign to take the Pro approach. If the site is shut down much to the
embarrassment of the government, the Con could take the sympathetic approach
to win. If public opinion is highly divided, opt to speak second rather than
selecting your side.
Research Suggestions
Since this brief is not comprehensive, and since there is a lot to sift through,
consider taking the following as a strong guideline for your further research:
1. Julian Assange gave a speech to the Technology, Energy, and Design
(TED) institute – it’s all audio and takes under twenty minutes to hear,
but it would be very valuable not only to ensure that you are
pronouncing everything correctly in-round but so that you can better
understand what WikiLeaks may or may not do in the future. The
following
URL
links
to
the
video:
http://www.ted.com/talks/julian_assange_why_the_world_needs_wikile
aks.html (alternatively you can just google “Julian Assange ted.” This
video is the first hit.)
2. Subscribe to specific google alerts if you are able. Do not subscribe to
something broad like “wikileaks,” as this would probably send you
more junk through which you would have to sift. However, if your case
focuses on the idea that WikiLeaks is more than willing to expose
10PF6-Wikileaks
www.victorybriefs.com
Page 33 of 76
military secrets, subscribe to alerts under the terms: Wikileaks, military,
war.
3. Conduct the bulk of your research on Thursdays. It’s rather difficult to
incorporate new evidence found as you leave for a tournament, so you
need to give yourself a day to organize and print what you find, but you
also want to stay up to date. Some emergency research on Fridays is
more than acceptable, of course.
Conclusion
I know I’ve said this about three million times by now, but clarity is extremely
important to this topic. Debate over open government shouldn’t be the heart of
your research or your rhetoric – drawing attention to this distinction will help you
to belittle your opponents. Be polite when you do so. This month’s topic does
rely on quite a bit of conjecture, so build a strong case on one particular issue
rather than diversifying and “going for the throat” when an opponent mishandles
a part of the case. If you take this advice and run a single-point case, try to avoid
generic rhetoric with which the opponent can sidestep your arguments. Instead,
be very specific in your story. Name the individuals involved in the national
security threat (beyond Julian Assange). Name the servers, the countries, and
the stories. If you can’t, rather than draw attention to it use a parallel in which
something similar happened. Beyond that, though, debate isn’t all about your
case – it’s also about how well you can persuade others that it is well-made.
10PF6-Wikileaks
www.victorybriefs.com
Page 34 of 76
!,-./&"01234.4&53&$<4&>;.22.-4&
RESOLVED: THAT WIKILEAKS IS A THREAT TO U.S. NATIONAL SECURITY
This is an interesting if unbalanced resolution. On face the CON has two large
challenges. The first stems from the topic's wording, which does not ask for a
broad on-balance analysis of the effects of Wikileaks; it simply asks whether it is
a "danger" to "national security.” The CON can prove a variety of advantages to
transparency and open discourse; if “national security” has been “threatened,”
they still lose the round. The second and related difficulty lies with the audience;
many Americans, hence many public forum judges, reflexively defend the notion
of "national security," and may be particularly likely to defend U.S. national
security against the actions of some hacker from some foreign country who is
also an alleged rapist. The CON is challenged, then, to minimize the popular
concern over Wikileaks, and to re-envision the notion of "national security."
But first, let's look at definitions of terms, in ascending order of controversy.
WIKILEAKS. This is pretty easy. “An international non-profit organisation that
publishes submissions of private, secret, and classified media from anonymous
news sources and news leaks.”
38
It’s what Julian Assange does.39 The con
cannot defend, and the pro cannot indict, generic concepts of leakage, secrecy,
and openness; they have to talk about what Assange’s website does.
IS refers to the present tense. The CON might use it to restrict discussion to
current disclosures, not disclosures which might occur.
38
http://en.wikipedia.org/wiki/Wikileaks
For a thorough, informative, intimate account of what Julian Assange does, see Raffi
Khatchadourianʼs NEW YORKER profile
[http://www.newyorker.com/reporting/2010/06/07/100607fa_fact_khatchadourian]
39
10PF6-Wikileaks
www.victorybriefs.com
Page 35 of 76
THREAT. A pesky term. Random House Webster’s Unabridged’s first definition
is quite narrow (“a declaration of an intention or determination to inflict
punishment, injury, etc., in retaliation for, or conditionally upon, some action or
course; menace”).40
This and a number of legal definitions of the word
underscore an intent requirement; if I don’t intend to harm you, it’s not a threat.
Their second definition, in contrast, is infinitely elastic (“an indication or warning
of probable trouble”), with no bright line as to how proximate that trouble must be.
What constitutes a threat? You’ll debate this out. The CON will want to cultivate
phrases like “clear and present danger” and refer to legal criteria. The PRO will
talk about the magnitude of possible damage.
NATIONAL SECURITY. Debaters will find a wide range of definitions. Some are
pithy. Walter Lippmann wrote that "A nation has security when it does not have
to sacrifice its legitimate ínterests to avoid war, and is able, if challenged, to
maintain them by war." The political scientist Harold Lasswell says that "The
distinctive meaning of national security means freedom from foreign dictation."41
Most debaters will want more specific and encompassing definitions. Harold
Brown, former U.S. Secretary of Defense, defined national securty as “ the ability
to preserve the nation's physical integrity and territory; to maintain its economic
relations with the rest of the world on reasonable terms; to preserve its nature,
institution, and governance from disruption from outside; and to control its
borders."
42
The U.S. military says that national security is “A collective term
encompassing both national defense and foreign relations of the United States.
Specifically, the condition provided by: a. a military or defense advantage over
any foreign nation or group of nations; b. a favorable foreign relations position; or
40
http://dictionary.reference.com/browse/threat
Both of these definitions are quoted in Romm, Joseph J. (1993). Defining national security: the
nonmilitary aspects. Pew Project on America's Task in a Changed World (Pew Project Series).
Council on Foreign Relations. pp. 122. ISBN 9780876091357.
http://books.google.co.in/books?id=shxDOnuVcyYC. Retrieved 22 September 2010 (full view).
42
As quoted in Watson, Cynthia Ann (2008). U.S. national security: a reference handbook.
Contemporary world issues (2 (revised) ed.). ABC-CLIO. pp. 281. ISBN 9781598840414.
http://books.google.co.in/books?id=KnlIR4YO2vsC. Retrieved 24 September 2010
41
10PF6-Wikileaks
www.victorybriefs.com
Page 36 of 76
c. a defense posture capable of successfully resisting hostile or destructive
action from within or without, overt or covert.”43
These and other definitions of “national security”
share two PRO-friendly
characteristics. First, they are elastic; under their terms “national security” can
mean almost anything. (arguably …. ). Second, they treat the nation-state as an
end in itself; they’re not concerned with whether the nation-state is democratic or
dictatorial, only that it survive.
Can the CON construct a redefinition of national security, one that includes a
respect for transparency, free information, and democratic decision-making?
Perhaps they can, but I cannot find much support in the literature for such a
redefinition.
Barack Obama’s recent definition of
“U.S. national security
interests” might given the CON some small comfort (italics supplied):
“• The security of the United States, its citizens, and U.S. allies and partners;
• A strong, innovative, and growing U.S. economy in an open international
economic
system
that
promotes
opportunity
and
prosperity;
• Respect for universal values at home and around the world; and
• An international order advanced by U.S. leadership that promotes peace,
security, and opportunity through stronger cooperation to meet global
challenges.44
But this reads like a politician’s please-all definition, and “respect for universal
values” seems like a thin reed of a phrase.
The scholar Stephen Sachs
considers, and rejects, broader definitions:
43
"National security." in US NATO Military Terminology Group (2010). JP 1 (02) "Dictionary of
Military and Associated Terms", 2001 (As amended through 31 July 2010). Pentagon,
Washington: Joint Chiefs of Staff, US Department of Defense. p. 361.
http://www.dtic.mil/doctrine/new_pubs/jp1_02.pdf. Retrieved 19 September 2010.
44
OBAMA, BARACK. National Security Strategy, May 2010. Office of the President of the
United States, The White House.[1]. Accessed 23 September 2010.
10PF6-Wikileaks
www.victorybriefs.com
Page 37 of 76
[T]here is a significant danger in defining security as including everything that's
good in life--or everything that's considered 'necessary.' If it were so defined, it
would be impossible for there to be tradeoffs between security and other values,
and policies could only represent choices for one type of security as opposed to
another. The word itself thus loses its effectiveness at delineating a particular
realm of political priorities. The most oppressive and exploitative dictatorship
may, if sufficiently entrenched, appear stable and secure from the outside.
Although we might urgently desire a change in the form of government and
greater respect for human rights, it is an empirical proposition, not a certainty,
that such changes would reduce the risk of external adventures by the regime or
internal non-state-sanctioned violence45
As you’ll see, I think the CON can successfully develop broad concepts of
“national security,” but definitional support may be hard to come by. The CON
might also talk about the inherent fuzziness of the concept – that there is no
standard definition,that too often the term means only what a particular
government wants it to mean for a particular purpose at a particular moment.
PRO AND CON POSITIONS
The pro case on this topic works from an intuitive premise: US national security
is threatened by an entity that exposes sensitive government documents to
public scrutiny. The impacts of disclosure range from mere embarrassments
(which nevertheless may derail important negotiations and compromise useful
relationships) to details of military planning and strategy (which could endanger
the lives of combatants and civilians in the immediate future). The PRO will find
no shortage of useful examples, such as:
45
[http://www.stevesachs.com/papers/paper_security.html]
10PF6-Wikileaks
www.victorybriefs.com
Page 38 of 76
“The United States' top diplomat condemned Monday the secret-busting website
WikiLeaks' release of hundreds of thousands of documents that detail with
unusual frankness the nation's diplomatic interactions with other countries. The
illegal disclosure of secret information "puts people's lives in danger, threatens
our national security and undermines our efforts to work with other countries to
solve shared problems," Secretary of State Hillary Clinton said.”46
Or perhaps:
“The White House condemned the leak of a vast cache of on-the-ground reports
from US military and intelligence personnel on the war in Afghanistan, saying the
leak is “irresponsible” and harms national security. The revelation of more than
90,000 classified reports and documents spanning 2004-2009 is likely the largest
leak in the history of the US military or intelligence community. The secret reports
were obtained by WikiLeaks and given to The New York Times, London
newspaper The Guardian, and German magazine Der Spiegel, all of which
published reports on the documents Sunday. Wikileaks subsequently posted the
documents
on
its
website.”47
And again:
“The U.S. military's top officer charged Thursday that WikiLeaks founder Julian
Assange, in releasing tens of thousands of secret documents, had endangered
the lives of American troops and Afghan informants who have assisted U.S.
forces. "Mr. Assange can say whatever he likes about the greater good he thinks
he and his source are doing," Adm. Mike Mullen, the chairman of the Joint Chiefs
of Staff, told reporters. "But the truth is they might already have on their hands
the blood of some young soldier or that of an Afghan family." A Washington Post
46
http://edition.cnn.com/2010/US/11/29/wikileaks/index.html?iref=mpstoryview
http://www.csmonitor.com/World/terrorism-security/2010/0726/WikiLeaks-report-harmsnational-security-in-Afghanistan-says-White-House
47
10PF6-Wikileaks
www.victorybriefs.com
Page 39 of 76
search of the 76,000 reports released by WikiLeaks turned up at least 100
instances dealing with Afghan informants.”48
The pro can choose particular examples of harmful disclosures and explain why
they are harmful; they can also indict the very concept of an organization that
seemingly intends to publicize as much secret information as possible.
Essentially, they can argue that the conduct of foreign policy demands secrecy;
in particular, that ongoing negotiations with foreign governments cannot proceed
effectively without the cloak of secrecy (even if the public has a right to know the
details of policies and agreements, once they’re concluded).
A number of
Assange’s disclosures violate this principle, and more undoubtedly will.
The CON has several paths to victory.
First of all, the CON can construct a broad philosophical defense of freedom of
information.
This seems intuitive, and it has both philosophical49
and legal
foundation. Here is the Supreme Court , holding in Grosjean v. American Press
Co.:
“[The] informed public opinion is the most potent of all restraints upon
misgovernment,” and government measures meant to “limit the circulation of
information” to the public goes to the “heart of the natural right of the members of
an organized society, united for their common good, to impart and acquire
information about their common interests.”50
A report from The Constitution Project applies this concept to the current
discussion:
48
http://www.washingtonpost.com/wp-dyn/content/article/2010/07/29/AR2010072904900.html
49
See particularly Geoffrey R. Stone, Free Speech and National Security, 84 IND. L. J. 939, 957
(2009).
50
Grosjean v. American Press Co., 297 U.S. 233, 250 (1936).
10PF6-Wikileaks
www.victorybriefs.com
Page 40 of 76
“Secrecy is a form of government regulation that is particularly vulnerable to
abuse due to lack of oversight. The overreaching application of secrecy shuts
down the free flow of information. There is a role for privacy and confidentiality—
but when it becomes a humongous institution generating millions of documents
each year on autopilot—secrecy builds a bulwark against democracy, as Daniel
Patrick Moynihan says in his book Secrecy: An American Experience, “a hidden
metastasizing mass within government itself.”51
The CON may argue, further, that foreign policy in a liberal democracy requires
an informed citizenry who check abuses; that citizens after all are ultimately the
deciders regarding what foreign policy should be, and what national security
should mean. There’s no shortage of advocates and explainers of this principle,
across a broad ideological spectrum; indeed, CON debaters who favor libertarian
approaches have a friend in Representative Ron Paul: (. "In a free society we're
supposed to know the truth," Paul said. "In a society where truth becomes
treason, then we're in big trouble." Paul went on to state, "Why don't we
prosecute The New York Times or anybody that releases this?"52) The CON
might be well served by an anti-big government theme; it might win the hearts of
otherwise obdurate judges.
These observations about the importance of transparency are strong arguments,
and may win rounds; but strictly speaking they might not negate the resolution, if
the PRO establishes an appropriate definition of “national security.”
That leads to my second major suggestion, which is that the CON should resist
expansive definitions of “national security” and “threat,” and should press the
PRO to get concrete about how Wikileaks has harmed the U.S. Of course the
President, the head of the joint Chiefs of Staff, Secretary Clinton and others will
make angry declarations about harms to national security. The CON may argue
that this is the language of bureaucrats protecting their ability to operate in secret
51
http://2009transition.org/libertysecurity/index.php?option=com_docman&task=doc_download&gid=29&Itemid=%3Cbr%20/%3E
52
http://www.huffingtonpost.com/2010/12/10/ron-paul-wikileaks-defense_n_795014.html
10PF6-Wikileaks
www.victorybriefs.com
Page 41 of 76
and that, in large part, they are reacting to embarrassments, rather than actual
threats. CON might declare that these official effusions are just rhetoric; that
they are declarations not explanations; they provide no warrants.
The CON
should insist that the PRO explain how the disclosure of particular documents
constitute threats to national security; or how they are greater threats than, say,
civilian-killing, or clumsy diplomacy.
The CON’s credibilitymight be bolstered by citing Wikileaks’ many friends,
domestic and foreign. They include mainstream press organizations not known
for radicalism (Associated Press, Hearst) and numerous foreign governments,
not all of them hostile to American interests.
A third approach is risky but potentially powerful.
Many of the PRO’s prize
examples will involve revelation of information regarding our activities in the Arab
world; specifically, in Afghanistan. This gives the CON an opportunity to “turn”
the entire PRO strategy, to argue that the “war on terrorism: in general and the
war in Afghanistan in particular is the most genuine long-term threat to our
security (generations of young Arabs enraged and radicalized, imperialist
impositions resented, vast amounts of money spent to no good end). The CON
might propose that the more Wikileaks can do to get us out of that conflict, the
more our national security is enhanced. Commentators on Wikileaks have noted
and remembered Daniel Ellsberg’s release of the Pentagon Papers, which
documented the secret history of foreign policy decisionmaking that led to the
Vietnam War. Ellsberg’s own remarks on Wikileaks are extremely suggestive
and provocative.53 Many historians of foreign policy have argued that greater
transparency of decisionmaking could have prevented the Vietnam quagmire.
More recent revelations regarding policymaking during the George W. Bush
administration might support this position, as well.
53
http://www.csmonitor.com/USA/Military/2010/0729/WikiLeaks-Q-A-with-Daniel-Ellsberg-theman-behind-the-Pentagon-Papers
10PF6-Wikileaks
www.victorybriefs.com
Page 42 of 76
Other CON arguments are worth mentioning. The U.S. government is quick to
admonish leakers, but government officials sometimes leak sensitive materials
themselves, often for political gain. (The Valerie Plame case is one example;
selective leaks of secret dat a to build political support in Congress occur not
infrequently.) Futurists like Esther Dyson and Alvin Toffler, in their manifesto “A
Magna Carta for the Knowledge Age,” have argued that total transparency of
information will prove to be the new
foundation for universal peace and
understanding. (And, in any case, many authors have noted the inevitability of
constant disclosure.
Raffi Khatchadourian notes that Wikileaks directs its
attention toward all governments, not just ours; mightn’t universal disclosure of all
government secrets be a net plus for open societies like the U.S., who arguably
have the least to hide? A world without state secrets is possibly a more secure
world for us all. Finally, in the long run, can’t a healthy, honest foreign policy
withstand embarrassment and revelation? When Secretary Clinton’s outbursts
and jeremiads are followed by the headline “CLINTON SAYS US DIPOLOMACY
WILL SURVIVE ATTACK”54, perhaps there is room for old-fashioned liberal
optimism.
In conclusion, the February Public Forum topic engages critical issues in law,
philosophy, history and foreign policy. Debaters who read broadly and think
critically will be rewarded, and not just with wins or higher points. Enjoy your
rounds!
54
http://www.nytimes.com/2010/11/30/world/30reax.html
10PF6-Wikileaks
www.victorybriefs.com
Page 43 of 76
>6'&)"6?+&
!"#"$%&#'($%&)'(*+(*,%()%&*,'(+-('+$)"%.'/(
DAVID GURA, NPR, JULY 30, 2010, http://www.npr.org/blogs/thetwoway/2010/07/30/128868663/wikileaks-founder-may-have-blood-on-his-handsjoint-chiefs-chairman-says//GP3
At a Pentagon press briefing yesterday, Adm. Mike Mullen, Chairman of the Joint
Chiefs of Staff, commented on the publication of some 91,000 classified
documents by WikiLeaks, which was founded by Julian Assange:
"Mr. Assange can say whatever he likes about the greater good he think he and
his source are doing, but the truth is they might already have on their hands the
blood of some young soldier or that of an Afghan family," he said. "Disagree with
the war all you want, take issue with the policy, challenge me or our ground
commanders on the decisions we make to accomplish the mission we've been
given, but don't put those who willingly go into harms way even further in harm's
way just to satisfy your need to make a point."
!"#"$%&#'("0-+.1&*"+0("'(2'%)(&3&"0'(*,%(20"*%)('*&*%'(*+(
4+15.+1"'%(0&*"+0&$('%42."*6(
DAVID GURA, NPR, JULY 30, 2010, http://www.npr.org/blogs/thetwoway/2010/07/30/128868663/wikileaks-founder-may-have-blood-on-his-handsjoint-chiefs-chairman-says//GP3
"They're still — what I am concerned about with this is I think individuals who are
not involved in this kind of warfare and expose this kind of information can't —
from my perspective, can't appreciate how this kind of information is routinely
networked together inside the classified channels we use specifically," he said.
10PF6-Wikileaks
www.victorybriefs.com
Page 44 of 76
%15%."4&$$6(5.+7%08$%&#'('"1""$&.(*+(!"#"$%&#'($%&)(*+(4"&(
)%&*,'("0(*,%(9:;<'/(
ROBERT BURNS, ASSOCIATED PRESS, AUG 17, 2010,
http://mobile.salon.com/news/feature/2010/08/17/wikileaks_risks_overstated/inde
x.html//GP3
One of the most spectacular cases of exposing foreign agents was Philip Agee's
1975 book, "Inside the Company: CIA Diary."
As a former CIA officer, Agee identified in his book more than 200 agency
officers, front companies and foreign agents working for the U.S. abroad. He
wrote that this was "one way to neutralize the CIA's support to repression."
He is sometimes accused of responsibility in the death of Richard Welch, the CIA
station chief in Athens who was assassinated in 1975 by a Greek terrorist group.
&'(&(.%'2$*(+-(!"#"$%&#'=(*,%(2'("'(,&7"03(*+(5.+*%4*(021%.+2'(
"0'*&$$&*"+0'("0(".&>(&0)(&-3,&0"'*&0(*,&*(!%.%(5.%7"+2'$6(
'&-%(5.+7"03(*,%(0&*"+0&$('%42."*6(*,.%&*/(
ROBERT BURNS, ASSOCIATED PRESS, AUG 17, 2010,
http://mobile.salon.com/news/feature/2010/08/17/wikileaks_risks_overstated/inde
x.html//GP3
The vulnerability of locals who work with U.S. forces -- openly or secretly -- is not
just an issue in Afghanistan. A bipartisan group of congressmen and senators
called on the Obama administration last week to urgently expand efforts to
resettle Iraqis who have worked for U.S. agencies in Iraq, even saying an airlift
should be considered. Many of the Iraqis will be targeted for assassination by alQaida in Iraq, they said.
"Providing support for our Iraqi allies will advance U.S. national security interests
around the world, particularly in Afghanistan, by sending a message that foreign
nationals who support our work abroad can expect some measure of protection,"
the lawmakers wrote to Secretary of State Hillary Rodham Clinton.
10PF6-Wikileaks
www.victorybriefs.com
Page 45 of 76
*,%()&1&3%(,&'(?%%0()+0%8*,%()&1&3%()+0%(*+(+2.(0&*"+0&$(
'%42."*6("'("..%7%.'"?$%/(
MARK THIESSEN, THE WASHINGTON POST, AUGUST 3, 2010,
http://www.washingtonpost.com/wpdyn/content/article/2010/08/02/AR2010080202627.html//GP3
Beyond getting people killed, WikiLeaks' actions make it less likely that Afghans
and foreign intelligence services (whose reports WikiLeaks also exposed) will
cooperate with the United States in the future. And, as former CIA director Mike
Hayden has pointed out, the disclosures are a gift to adversary intelligence
services, and they will place a chill on intelligence sharing within the United
States government. The harm to our national security is immeasurable and
irreparable.
!"#"$%&#'(5.%'%0*'(&(4$%&.(&0)(5.%'%0*()&03%.(*+(*,%(20"*%)(
'*&*%'/(
MARK THIESSEN, THE WASHINGTON POST, AUGUST 3, 2010,
http://www.washingtonpost.com/wpdyn/content/article/2010/08/02/AR2010080202627.html//GP3
WikiLeaks represents a clear and present danger to the national security of the
United States. If left unmolested, Assange will become even bolder and inspire
others to imitate his example. His group is at this moment preparing to release
tens of thousands of documents that will put the lives of our troops and our allies
at risk. Will President Obama stop WikiLeaks from doing so -- or sit back and do
nothing?
10PF6-Wikileaks
www.victorybriefs.com
Page 46 of 76
!"#"$%&#'(20)%.1"0%'(&-3,&0"'*&0(,&.1"03(2'(0&*"+0&$(
'%42."*6(
DOWNLOADS EDGE, DEC 18, 2010, http://www.downloadsedge.com/wikileakshas-blood-on-its-hands-u-s-anger-over-afghan-revelations-as-fbi-joinsinquiry/2010/12/18///GP3
The White House is imploring WikiLeaks not to post any more classified
documents about the Afghanistan war, saying U.S. national security is at risk as
well as the lives of troops on the ground. Mr Gates said the documents relating
to battlefield incidents and intelligence gathering could also pose a threat to
Afghan nationals assisting the coalition. Mr Gates and Admiral Mike Mullen,
chairman of the Joint Chiefs of Staff, called the release of the ‘Afghan War Diary’
deeply damaging. They said it was potentially life-threatening for Afghan
informants co-operating with Nato forces whose names, villages, relatives’
names could be identified. A Pentagon spokesman told The Times that at least
one person whose name appears in the files had complained to Afghanistan
authorities.
.&!("0*%$$"3%04%($%&#%)(?6(!"#"$%&#'(@%+5&.)"A%'($"7%'/(
STEPHANIE CONDON, CBS NEWS, NOVEMBER 29, 2010,
http://www.cbsnews.com/8301-503544_162-20023964-503544.html//GP3
Congressmen on both sides of the aisle are condemning the massive leak of
secret U.S. documents via the website Wikileaks as a reckless act that
endangers American lives.
Senate Foreign Relations Committee Chairman John Kerry (D-Mass.) called the
release of more than 250,000 classified State Department documents a "reckless
action which jeopardizes lives by exposing raw, contemporaneous intelligence."
4+15&."'+0'(+-(!"#"$%&#'(*+(*,%(5%0*&3+0(5&5%.'(&.%("07&$")/(
STEPHANIE CONDON, CBS NEWS, NOVEMBER 29, 2010,
http://www.cbsnews.com/8301-503544_162-20023964-503544.html//GP3
While WikiLeaks founder Julian Assange said he released the documents in the
name of transparency, Kerry said that unlike the release of the Pentagon Papers,
"this is not an academic exercise about freedom of information... Instead, these
sensitive cables contain candid assessments and analysis of ongoing matters
and they should remain confidential to protect the ability of the government to
conduct lawful business with the private candor that's vital to effective
diplomacy."
10PF6-Wikileaks
www.victorybriefs.com
Page 47 of 76
!"#"$%&#'(!"$$(4&2'%(*,%()%&*,'(+-("00+4%0*(4"7"$"&0'(
STEPHANIE CONDON, CBS NEWS, NOVEMBER 29, 2010,
http://www.cbsnews.com/8301-503544_162-20023964-503544.html//GP3
Sen. Joe Lieberman (I-Conn.), chairman of the Senate Homeland Security and
Governmental Affairs Committee, called the leak "nothing less than an attack on
the national security of the United States." "By disseminating these materials,
Wikileaks is putting at risk the lives and the freedom of countless Americans and
non-Americans around the world," he said in a statement. "It is an outrageous,
reckless, and despicable action that will undermine the ability of our government
and our partners to keep our people safe and to work together to defend our vital
interests. Let there be no doubt: the individuals responsible are going to have
blood on their hands."
!"#"$%&#'()%'*.+6'(*,%()%1+4.&*"4(5.+4%''(!,"4,("'(*,%(#%6(*+(
0&*"+0&$('%42."*6(
STEPHANIE CONDON, CBS NEWS, NOVEMBER 29, 2010,
http://www.cbsnews.com/8301-503544_162-20023964-503544.html//GP3
Lieberman said American citizens guide the "balancing act" between
transparency and national security through the election of their congressional
representatives."What Wikileaks is doing is to short-circuit this entire democratic
process -- claiming for itself the exclusive, unilateral, and unchecked power to
decide what should and shouldn't be made public," he said. "This is therefore not
only an attack on our national security, but an offense against our democracy
and the principle of transparency."
!"#"$%&#'(',+2$)(?%(4$&''"-"%)(&'(&(*%..+."'*(+.3&0"A&*"+0(
3"7%0(*,%".(&4*"+0'(&3&"0'*(0&*"+0&$('%42."*6(
STEPHANIE CONDON, CBS NEWS, NOVEMBER 29, 2010,
http://www.cbsnews.com/8301-503544_162-20023964-503544.html//GP3
On CBS' "The Early Show" this morning, Rep. Peter Hoesktra (R-Mich.), ranking
Republican on the House Intelligence Committee, called the leak a "massive"
intelligence failure and said it could contain "a whole number of time bombs."
Rep. Peter King (R-N.Y.), the incoming chairman of the House Homeland
Security Committee, went so far as to say WikiLeaks should be designated as a
terrorist organization. King also wrote a letter to Attorney General Eric Holder,
asking him to "criminally charge WikiLeaks activist Julian Assange under the
Espionage Act" for conspiracy to disclose classified information.
10PF6-Wikileaks
www.victorybriefs.com
Page 48 of 76
*,%("0-+.1&*"+0(+?*&"0%)()+%'(0+*(+2*!%"3,(*,%(0&*"+0&$(
'%42."*6("0*%.%'*'(
STEPHANIE CONDON, CBS NEWS, NOVEMBER 29, 2010,
http://www.cbsnews.com/8301-503544_162-20023964-503544.html//GP3
Graham is a member of the Armed Services and Homeland Security committees.
"Leaking the material is deplorable," he continued. "The world is getting
dangerous by the day and the people who do this are really low on the food chain
as far as I'm concerned. If you can prosecute them, let's try." Also on the
program, Sen. Clair McCaskill (D-Mo.), a member of the Armed Services
Committe, said she agreed with Graham. "The people who are leaking these
documents need a gut check about their patriotism, and I think they're enjoying
the attention they're getting but, frankly, it's coming at a very high price in terms
of protecting our men and women in uniform," she said. "I hope that we can
figure out where this is coming from and go after them with the force of law."
!"#"$%&#'(@%+5&.)"A%'(0&*"+0&$('%42."*6812$*"5$%(.%&'+0'/(
STEPHANIE CONDON, CBS NEWS, NOVEMBER 29, 2010,
http://www.cbsnews.com/8301-503544_162-20023964-503544.html//GP3
Sen. Kit Bond (R-Mo.), the top Republican on the Senate Intelligence Committee,
said in a statement, "It is critical that the perpetrator who betrayed his country be
brought to justice for this deliberate treason that jeopardizes our national
security. "These leaks of stolen secret documents endanger our troops, critical
terror-fighting operations, our relationships with foreign allies, and sources
around the globe who cooperate with America at great risk to their own lives," he
added.
While most politicians aimed their fire at Wikileaks, former Alaska Gov. Sarah
Palin criticized the Obama administration for its handling of Wikileaks.
WIKILEAKS IS THE BIGGEST NATIONAL SECURITY BREACH SINCE 9-11.
DAVID SMITH, FORMER AMBASSADOR, FEDERAL COMPUTER WEEK,
JANUARY 26, 2011, http://fcw.com/Articles/2011/01/31/FEATURE-WikiLeaksinformation-sharing-ambassador-David-Smith.aspx?Page=2 //GP3
The 2,000-plus cables WikiLeaks has published are wreaking considerable
damage. Consequently, the federal government must tighten personnel and
technical security, but it must do so without alienating its very loyal workforce and
without reintroducing the stovepipes that were dismantled in the wake of the
2001 terrorist attacks.
10PF6-Wikileaks
www.victorybriefs.com
Page 49 of 76
!"#"$%&#'(4&?$%'(,&7%()%'*+.6%)(2'()"5$+1&46(!%&#"03(
0&*"+0&$('%42."*6/(
DAVID SMITH, FORMER AMBASSADOR, FEDERAL COMPUTER WEEK,
JANUARY 26, 2011, http://fcw.com/Articles/2011/01/31/FEATURE-WikiLeaksinformation-sharing-ambassador-David-Smith.aspx?Page=2 //GP3
Some of the cables reveal — or help reveal — sensitive information on people,
critical locations or other subjects. Some cables might only be embarrassing. But
the whole damage done is greater than the sum of the parts. "The WikiLeaks
disclosures have been disastrous for U.S. diplomacy," said George Yeo,
Singapore's foreign minister. "We [now] have to be more guarded in our
communications with U.S. diplomats.”
!,"$%(*,%(!"#"$%&#'(4&?$%'()+(0+*(6"%$)(&(024$%&.(!&.=(?2*(*,%6(
&.%(@2'*(&'()&1&3"03(*+(0&*"+0&$('%42."*6(
DAVID SMITH, FORMER AMBASSADOR, FEDERAL COMPUTER WEEK,
JANUARY 26, 2011, http://fcw.com/Articles/2011/01/31/FEATURE-WikiLeaksinformation-sharing-ambassador-David-Smith.aspx?Page=2 //GP3
Public disclosure of routine classified documents might not induce a nuclear
attack, but the government has a national security interest in protecting them to
preserve the efficacy of U.S. diplomacy and government operations.
Nevertheless, the government must update laws, definitions and procedures for
classified information, most of which date to the Cold War.
4+11+0('%0'%('&-%32&.)'(4&0(5.%7%0*(&0+*,%.(!"#"$%&#'(
DAVID SMITH, FORMER AMBASSADOR, FEDERAL COMPUTER WEEK,
JANUARY 26, 2011, http://fcw.com/Articles/2011/01/31/FEATURE-WikiLeaksinformation-sharing-ambassador-David-Smith.aspx?Page=2 //GP3
There are some obvious, common-sense fixes. Portable media ports must be
physically blocked on most classified computers. The ban on personal electronic
devices in classified work spaces must be enforced. Refresher training and peer
responsibility will accomplish that more effectively than handbag searches. And
to reduce the temptation to smuggle those devices, people in classified areas
should have reasonable access to the Internet or an adjacent Internet café.
10PF6-Wikileaks
www.victorybriefs.com
Page 50 of 76
5%.'+00%$(4,&03%'(4&0(4,&03%(!"#"$%&#'(%--"4&46("0(*,%(-2*2.%(
DAVID SMITH, FORMER AMBASSADOR, FEDERAL COMPUTER WEEK,
JANUARY 26, 2011, http://fcw.com/Articles/2011/01/31/FEATURE-WikiLeaksinformation-sharing-ambassador-David-Smith.aspx?Page=2 //GP3
It’s also important to borrow best practices from industry and the military to
develop programs that help identify employees who are becoming disgruntled or
disaffected or who are experiencing life problems that could affect their judgment.
In those cases, access should be controlled but not restricted. We must not
reintroduce the compartmentalization and strict need-to-know rules that were
scuttled after the 2001 terrorist attacks. Analysts must have the ability to combine
disparate information that could thwart the next threat. One security measure
could be requiring that a workplace buddy sign in with analysts seeking access to
information not directly related to his or her job. And agencies could automatically
audit the type and volume of information accessed against a user profile.
".+0"4&$$6=(*,%(5.+3.&1'(4.%&*%)(&'(&(.%'5+0'%(*+(!"#"$%&#'(&.%(
$"#%$6(*+(1&#%(2'(!%&#%.=(5.+7"03(*,&*(*,%(5&.&0+"&(4.%&*%)("'(
&(*,.%&*(*+(0&*"+0&$('%42."*6(
DAVID SMITH, FORMER AMBASSADOR, FEDERAL COMPUTER WEEK,
JANUARY 26, 2011, http://fcw.com/Articles/2011/01/31/FEATURE-WikiLeaksinformation-sharing-ambassador-David-Smith.aspx?Page=2 //GP3
“This is paranoia, not security,” said Steven Aftergood, a national security
specialist for the Federation of American Scientists, who obtained a copy of the
memo. What the administration is doing, he added, is taking programs commonly
used at the CIA and other intelligence agencies to root out potential spies and
expanding them to numerous other agencies — such as the State Department,
the Energy Department, NASA, Homeland Security and Justice — where they
are unlikely to work.
10PF6-Wikileaks
www.victorybriefs.com
Page 51 of 76
!"#"$%&#'(20)%.1"0%'()"5$+1&46(*,.%&*%0"03(0&*"+0&$('%42."*6(
DAVID GEWIRTZ, Executive director of the U.S. Strategic Perspective Institute,
ZDNET, NOVEMBER 28, 2010, http://www.zdnet.com/blog/government/specialreport-could-wikileaks-cause-world-war-iii-or-the-end-of-the-world/9696 //GP3
Although some nations are vastly larger and vastly wealthier than others, it is a
facade of diplomatic protocol that all nations and all leaders are treated as equals
— at least in public. Many nations (and the U.S., in particular) maintain protocol
offices to make sure that every diplomatic interaction goes according to plan,
stays on message, and doesn’t offend (unless, of course, it’s time to not be nice).
Internal national politics, on the other hand, is a gutter fight. Nations must
communicate with other nations according to an established protocol, but the
leaders who make that national policy must always answer to their constituents.
If the leaders can’t seem to maintain an upper hand, can’t demand respect, and
aren’t seen to be getting things done, those leaders are usually replaced.
*,%(%--%4*'(+-(!"#"$%&#'(6"%$)(*%..+."'1/(
DAVID GEWIRTZ, Executive director of the U.S. Strategic Perspective Institute,
ZDNET, OCTOBER 25, 2010, http://www.zdnet.com/blog/government/iswikileaks-julian-assange-worse-than-osama-binladen/9578?tag=mantle_skin;content //GP3
Cyberterrorism has second-level effects, meaning that the actions of
cyberterrorism don’t, in and of themselves, cause damage or death. Instead, the
cyberattacks create the environment where damage can occur. Here’s a good
example. Assange’s release of confidential data won’t, as part of the action itself,
kill anyone. After all, all he’s doing is copying a pile of files up to a server. But,
once certain people get ahold of that data, they’ll get names of confidential
informants, for example, and then go hunt down and kill those people. It’s still
terrorism. It just works a little differently.
&''&03%(4+2$)(%0)(25(#"$$"03(1+.%(5%+5$%(*,&0(+'&1&(?"0(
$&)%0/(
DAVID GEWIRTZ, Executive director of the U.S. Strategic Perspective Institute,
ZDNET, OCTOBER 25, 2010, http://www.zdnet.com/blog/government/iswikileaks-julian-assange-worse-than-osama-binladen/9578?tag=mantle_skin;content //GP3
So, Assange is, essentially, a terrorist. He needs to be stopped. He needs to be
treated by the allies in the same way we’d treat any other terrorist. He needs to
be captured, arrested, tried, and probably jailed. Since Assange is such a
publicity hound, maybe they’ll televise the trial. So, is Wikileaks Julian Assange
worse than Osama Bin Laden? I guess that depends on how many people die
based on Assange’s actions.
10PF6-Wikileaks
www.victorybriefs.com
Page 52 of 76
!"#"$%&#'(20)%.1"0%'(*.2'*(!,"4,("'(#%6(*+(0&*"+0&$('%42."*6(
DAVID GEWIRTZ, Executive director of the U.S. Strategic Perspective Institute,
ZDNET, NOVEMBER 28, 2010, http://www.zdnet.com/blog/government/specialreport-could-wikileaks-cause-world-war-iii-or-the-end-of-the-world/9696 //GP3
When nations bargain with other nations, sometimes it goes smoothly,
sometimes there’s horse-trading, and sometimes there’s pressure to be applied.
Whenever two leaders negotiate, each wants to come back to his or her country
and brag about how he won the negotiation. Neither wants to lose face. As we all
know, people will do incredibly idiotic things to protect their honor. So will
leaders. I’ve written previously about how the documents leaked by Wikileaks
could cause people to die. Wikileaks hasn’t redacted the information about
confidential informants, and it’s likely that these informants — in large numbers
— will be executed by their factions over the coming weeks and months.
*,%(20)%.1"0"03(+-(*.2'*(4&2'%)(?6(!"#"$%&#'(4+2$)($%&)(*+(
024$%&.(&.1&3%))+0(
DAVID GEWIRTZ, Executive director of the U.S. Strategic Perspective Institute,
ZDNET, NOVEMBER 28, 2010, http://www.zdnet.com/blog/government/specialreport-could-wikileaks-cause-world-war-iii-or-the-end-of-the-world/9696 //GP3
Here is where the Wikileaks risk is extreme. Manning and Assange “outed”
confidential negotiations (and, yes, pressure) about nuclear defense issues. They
“outed” defensive tactics America was taking against cyberwarfare advances by
certain other nations. They “outed” the procedures we’re going through to find
“homes” for Guantanamo prisoners. They “outed” discussions about protecting
Americans from terrorists. Each of these disclosures will likely cause leaders to
do damage control. Because diplomacy always involves more than one player,
the damage control will be different from nation to nation. Nations that were in
some level of agreement (whether coerced or not) will now find that, for political
reasons, they must agree to not agree. For some nations, the fact that this
information is now public will prevent them from being able to compromise. For
some nations, the fact that this information is now public will prevent them from
being able to trust. Trust. If you think about it, trust can be all that stands
between us and terrible circumstance, whether that’s the breakup of a family or
total, nuclear Armageddon.
10PF6-Wikileaks
www.victorybriefs.com
Page 53 of 76
,&4#%.'(&.+20)(!"#"$%&#'(&.%(20)%1+4.&*"48*,%".(7%.'"+0(+-(
-.%%)+1(!+2$)($%&)(*+(&0&.4,6/(
MORTIMER ZUCKERMAN, US NEWS AND WORLD REPORT, DECEMBER
10, 2010,
http://www.usnews.com/opinion/mzuckerman/articles/2010/12/10/wikileakscyber-war-threaten-our-way-of-life?PageNr=3 //GP3
Those people, predominant among hackers, who regard the mass WikiLeaks
dumps as a triumph for "democracy," "free speech," "speaking truth to power,"
"transparency," "the First Amendment," "the people's right to know," etc., see
themselves as idealistic, but they are at best naïve and at worst sinister. The
most recent actions by groups of hackers reveal a core philosophy that is
basically anarchic. This is notably true of the hacktivists who call themselves
Anonymous, who used their computers to consort with one another for collective
denial-of-service action following the arrest in London of WikiLeaks founder
Julian Assange to face allegations of rape and sexual molestation in Sweden.
The members of Anonymous are perfectly entitled to protest his arrest; they
regard it as a political rather than judicial act, a charge that Sweden strenuously
rejects. Suspicious hacktivists can protest on the Internet, on billboards, on TV
and radio, on T-shirts, and in the newspapers; they can march, lie down in the
street, tattoo their foreheads, wave banners, circulate petitions, whatever moves
them. What they can have no justification at all for, however, is using their skills
to shut down Internet services and disrupt the country's business, as they have
done by attacking online payment sites like MasterCard and PayPal. Most
outrageously, they can have no justification for targeting Sweden's prosecution
service, which has a legal and constitutional duty to investigate the complaints of
two female Swedish citizens.
10PF6-Wikileaks
www.victorybriefs.com
Page 54 of 76
,"'*+.6(5.+7%'8*,%(?%,&7"+.(@2'*"-"%)(?6(*,%(!"#"$%&#'(,&4#%.'(
$%&)'(*+()%&)$6(4+0'%>2%04%'(
MORTIMER ZUCKERMAN, US NEWS AND WORLD REPORT, DECEMBER
10, 2010,
http://www.usnews.com/opinion/mzuckerman/articles/2010/12/10/wikileakscyber-war-threaten-our-way-of-life?PageNr=3 //GP3
Anarchists have a long history in America of acting to create and at times
threaten a violent overthrow of civil society. An anarchist assassinated President
William McKinley in 1901 and others tried to kill Attorney General A. Mitchell
Palmer in 1919; anarchists sent 36 parcel bombs to prominent citizens in 1919
and exploded a lethal bomb on Wall Street in 1920. Our cyber anarchists would
be appalled at any comparison, but their intent is the same—the creation of
chaos—and the philosophy is the same, characterized as are all anarchic
movements by an inability to distinguish liberty from license and an overriding
narcissistic contempt for the rights of others. Of course, the license is preemptively asserted in the name of "the people."
!"#"$%&#'(2'%'(*,%(*,%(5%+5$%B'(."3,*(*+(#0+!(*+()"'32"'%(*,%".(
.%&$(1+*"7%(*+(20)%.1"0%()%1+4.&*"4(5."04"5$%'(
MORTIMER ZUCKERMAN, US NEWS AND WORLD REPORT, DECEMBER
10, 2010,
http://www.usnews.com/opinion/mzuckerman/articles/2010/12/10/wikileakscyber-war-threaten-our-way-of-life?PageNr=3 //GP3
It was in the name of the people's right to know that WikiLeaks published a secret
memo identifying some 100 factories, labs, and underwater cables that the
United States (in the view of Assistant Secretary of State P.J. Crowley) considers
critical for global security. Do "the people" want to share with enemies of
America—al-Qaeda and homegrown terrorists—the location of such facilities? Do
"the people" have a right to know the names of those informants in Afghanistan
who want to see us end the savageries of the Taliban, and who for their idealism
in naming names are now vulnerable to the Taliban's medieval vengeance? Do
the apostles of universal transparency not give a damn if the Iranian tyranny is
thereby helped to nail dissidents? Do they even care about peace and security?
Do they ever give a thought that the judgments about foreign leaders by our
diplomats are critical to the United States contemplating risky ventures for
common action?
10PF6-Wikileaks
www.victorybriefs.com
Page 55 of 76
)'*&)"6?+&
4&2*"+2'(&0)("04.%1%0*&$(.%$%&'%(+-("0-+.1&*"+0(5.%7%0*'(
!"#"$%&#'(-.+1(?%"03(&(.%&$(*,.%&*(
The Socialist Worker, December 11, 2010. [Editorial staff. “Wikileaks is not a
threat.” http://www.socialistworker.co.uk/art.php?id=23327]
The hostility comes from the simple fact that those in power believe they have
the right to keep their information private. They do not want us to know what they
think or be privy to the mechanisms they use while in power.
For instance, the leaked list of what the US considers terrorist targets tells us
nothing about terrorism, but does tell us what the US considers as vital to its
national interest—a complex web of industrial and military sites around the globe.
That those interests need policing politically and militarily is the reason that
diplomacy exists in the first place.
The messages reveal only a fraction of the information about how the system is
run—which is kept secret. If anything, by redacting the communiqués and
releasing them gradually, Wikileaks has not been a threat to the system but too
“respectable” and too cautious.
0+(%7")%04%(*,&*(!"#"$%&#'(!"$$(.%$%&'%()&03%.+2'(
"0-+.1&*"+0(
Steven Greenhut, Orange County Register, December 3rd, 2010. [“Wikileaks no
threat to free society.” http://www.ocregister.com/opinion/government-278744information-people.html]
There's no evidence that any information released will endanger anyone, and the
U.S. government reportedly refused Assange's request to work with him to scrub
any names that could be compromised. Officials will always trot out the
"endangering lives" or "protecting security" argument so they don't have to reveal
what they are doing, how they are doing it, or any misconduct or mistakes they
have made while doing it. That's human nature. I'm surprised by how readily
most Americans, liberal and conservative, are content with allowing so much of
their government to operate in secrecy, even though open government is the
cornerstone of a free society.
10PF6-Wikileaks
www.victorybriefs.com
Page 56 of 76
!"#"$%&#'("'(4."*"4&$(*+(*,%(3.+!*,(+-(&(5&.*"4"5&*+.6(
)%1+4.&46(
Steven Greenhut, Orange County Register, December 3rd, 2010. [“Wikileaks no
threat to free society.” http://www.ocregister.com/opinion/government-278744information-people.html]
Cablegate separates Americans into two categories. There are those who agree
with our founders that government power is a corrupting force, so government
officials need to be closely monitored. And there are those who have nearly blind
trust in the public-spiritedness of those who run the bureaucracies and rule us.
Put me in category A, which is why I applaud WikiLeaks and its efforts to provide
the information necessary so Americans can govern themselves in this
supposedly self-governing society.
"How can the American system be regarded as participatory if the most
potentially explosive government conduct is hidden?" writer Sheldon Richman
asked in a Christian Science Monitor column. "Are 'we the people' really in
charge or not?" That's the question of the hour.
10PF6-Wikileaks
www.victorybriefs.com
Page 57 of 76
$%&#'(&.%(#%6(*+(@+2.0&$"'1(
Steven Greenhut, Orange County Register, December 3rd, 2010. [“Wikileaks no
threat to free society.” http://www.ocregister.com/opinion/government-278744information-people.html]
Officials obfuscate and delay and then force the average citizen to go to court to
get files that are supposed to be ours, as citizens. They know that few people
can afford the legal fight, and there's little cost for refusing to adhere to public
records laws.
This is the nature of government. If it weren't for anonymous sources and leaked
information, the journalism business would serve as a press-release service for
officialdom. We're all better off because courageous people leak important
documents to the media. That's true even when leakers have a personal agenda
in releasing the information.
!"#"$%&#'("'(0+*(&(*,.%&*(*+('%42."*6(C(*,%(?&4#$&',("'(&(*,.%&*(
*+(-.%%('+4"%*6(
Evan Hansen, Wired, December 6th 2010. [“Why WikiLeaks is good for
America.” http://www.wired.com/threatlevel/2010/12/wikileaks-editorial/]
The greatest threat we face right now from WikiLeaks is not the information it has
spilled and may spill in the future, but the reactionary response to it that’s
building in the United States that promises to repudiate the rule of law and our
free speech traditions, if left unchecked.
Secrecy is routinely posited as a critical component for effective governance, a
premise that’s so widely accepted that even some journalists, whose job is to
reveal the secret workings of governments, have declared WikiLeaks’ efforts to
be out of bounds.
10PF6-Wikileaks
www.victorybriefs.com
Page 58 of 76
!"#"$%&#'("'(4$+'%(%0+23,(*+(*,%(5.%''(*+(?%(4+0'")%.%)(-+.(9'*(
&1%0)1%0*(5.+*%4*"+0'(
Evan Hansen, Wired, December 6th 2010. [“Why WikiLeaks is good for
America.” http://www.wired.com/threatlevel/2010/12/wikileaks-editorial/]
WikiLeaks’ role is not the same as the press’, since it does not always endeavor
to vet information prior to publication. But it operates within what one might call
the media ecosystem, feeding publications with original documents that are
found nowhere else and insulating them against pressures from governments
seeking to suppress information.
Instead of encouraging online service providers to blacklist sites and writing new
espionage laws that would further criminalize the publication of government
secrets, we should regard WikiLeaks as subject to the same first amendment
rights that protect The New York Times. And as a society, we should embrace
the site as an expression of the fundamental freedom that is at the core of our Bill
of Rights, not react like Chinese corporations that are happy to censor
information on behalf of their government to curry favor.
10PF6-Wikileaks
www.victorybriefs.com
Page 59 of 76
!"#"$%&#'(,&'(.%)24%)(*,%($"#%$",++)(+-(!&.(!"*,(".&0(
M.J. Rosenberg, Talking Points Memo, December 1, 2010. [“Assange Wrong:
WikiLeaks do not advance peace by advancing Bibi.”
http://tpmcafe.talkingpointsmemo.com/2010/12/01/wikileaks_makes_iran_attack_
less_likely/]
Of course, Bibi is totally wrong about the impact of the WikiLeaks. The revelation
that the Saudi, the UAE and other royals agree with the Israeli position adds
exactly nothing to the case for war. The House of Saud? Arab emirs? Whom
exactly do they speak for? Not even their own people, let alone anybody else in
the Muslim world. In fact, the Saudi endorsement alone could be the kiss of
death for Netanyahu's plans.
A more significant revelation is that the Obama administration has no intention of
resorting to force to prevent Iran from developing nuclear weapons. A host of
cables indicate that in private, as in public, only sanctions and diplomacy are on
the table.
10PF6-Wikileaks
www.victorybriefs.com
Page 60 of 76
!"#"$%&#'("04.%&'%'(0&*"+0&$('%42."*6(?6(,"3,$"3,*"03(
"0*%$$"3%04%($%&#'(
Larry Greenemeier and Charles Choi, Scientific American, December 1st 2010.
[“WikiLeaks breach highlights insider security threat.”
http://www.scientificamerican.com/article.cfm?id=wikileaks-insider-threat]
The ongoing WikiLeaks exposé not only circulated hundreds of thousands of
secretive government documents, it has also swiftly prompted changes to the
system designed to share access to them. On Tuesday, the U.S. State
Department cut off a military computer network's access to its files, dramatically
curtailing data sharing intended to help thwart future disasters like the September
11 terrorist attacks. In response to the leaks, the State Department announced it
would cut access to its database of embassy cables via the U.S. Defense
Department's Secret Internet Protocol Router Network (SIPRNet), a system of
dedicated and encrypted lines and servers set up by the Pentagon in the 1990s
to globally transmit material up to and including "secret," the government's
second-highest level of classified information. "Top secret" information may be
shared electronically via the Joint Worldwide Intelligence Communications
System (JWICS), another group of interconnected computer networks used by
Defense and State to securely transmit classified information. "We have
temporarily severed the connection between this database and one classified
network," department spokesman Philip Crowley said Tuesday during a press
briefing. "Steps are being made to correct weaknesses in the system that have
become evident because of this leak." Whereas diplomats and other officials
generally have had access to State Department cables, Crowley added that the
department has "temporarily narrowed" access to these documents.
10PF6-Wikileaks
www.victorybriefs.com
Page 61 of 76
!"#"$%&#'(,&'("15.+7%)('%42."*6(-+.(*,%()%5&.*1%0*(+-()%-%0'%(
Larry Greenemeier and Charles Choi, Scientific American, December 1st 2010.
[“WikiLeaks breach highlights insider security threat.”
http://www.scientificamerican.com/article.cfm?id=wikileaks-insider-threat]
The Defense Department claims to be enhancing its security in the wake of the
WikiLeaks fiasco, implementing two-person handling rules for moving data from
classified to unclassified systems and establishing "insider threat" working
groups to prevent further leaks. The Pentagon says it is using the methods credit
card companies use to detect suspicious or anomalous behavior and that 60
percent of its SIPRNet is now equipped with a host-based security system
(HBSS) that can monitor unusual data access or usage. The department also
claims to be accelerating HBSS deployment to the rest of its SIPRNet
systems. The Defense Department's HBSS includes a firewall, a network
intrusion prevention system, antivirus software and other security components
designed to monitor, detect and counter known cyber threats to the department's
information technology systems. The HBSS is also said to have a device control
module designed to restrict system access to peripheral devices such as thumb
drives, compact discs and other removable storage.
10PF6-Wikileaks
www.victorybriefs.com
Page 62 of 76
!"#"$%&#'("'($%&)"03(*+(&(.%)%'"30(+-()"3"*&$('%42."*6("0(*,%(
"0-+.1&*"+0('%4*+.(
Larry Greenemeier and Charles Choi, Scientific American, December 1st 2010.
[“WikiLeaks breach highlights insider security threat.”
http://www.scientificamerican.com/article.cfm?id=wikileaks-insider-threat]
Government, and for that matter corporate (reports have WikiLeaks supposedly
targeting banks next), reliance on digital environments makes it easier for
insiders to inflict the kind of damage that the State and Defense departments are
dealing with now. "You don't have to carry reams of paper and boxes outside a
facility," Yoran says (a reference to former RAND analyst Daniel Ellsberg's efforts
to publish the Pentagon Papers). "There is a need to revamp how we do security
in the digital age and to be able to provide the same level of assurance and even
higher levels of assurance with digital information as has been provided in the
analog world."
0&*"+0&$('%42."*6("'(&(-&D&)%(!,%0("*("'(?2"$*(+0()25$"4"*6(&0)(
'%4.%*'(
Norman Soloman, journalist and activist, Common Dreams.org, November 29th,
2010. [“WikiLeaks: Demystifying “Diplomacy”
http://www.commondreams.org/view/2010/11/29]
No government wants to face documentation of actual policies, goals and
priorities that directly contradict its public claims of virtue. In societies with
democratic freedoms, the governments that have the most to fear from such
disclosures are the ones that have been doing the most lying to their own people.
The recent mega-leaks are especially jarring because of the extreme contrasts
between the U.S. government's public pretenses and real-life actions. But the
standard official response is to blame the leaking messengers.
"We condemn in the strongest terms the unauthorized disclosure of classified
documents and sensitive national security information," the White House said on
Sunday.
Meanwhile, Sen. Joseph Lieberman denounced "an outrageous, reckless and
despicable action that will undermine the ability of our government and our
partners to keep our people safe and to work together to defend our vital
interests." For good measure, he twittered: "WikiLeaks' deliberate disclosure of
these diplomatic cables is nothing less than an attack on our national security."
But what kind of "national security" can be built on duplicity from a government
that is discredited and refuted by its own documents?
10PF6-Wikileaks
www.victorybriefs.com
Page 63 of 76
!"#"$%&#'("'(*,%("0*%.0&$($"0#(*+(4,%4#'(+0(*,%($%&)%.'(+-(4"7"$(
'+4"%*6(
Andrew Kennis, contributing journalist, Common Dreams.org, December 16th
2010. [“WikiLeaks and the public interest.”
http://www.commondreams.org/view/2010/12/16-0]
As Phyllis Bennis, a foreign policy analyst with the Institute of Policy Studies, put
it: "WikiLeaks isn't the Pentagon Papers, it is the raw materials the Pentagon
used to write the Pentagon Papers. The challenge for civil society is to use this
raw material to write our own Pentagon Papers."
If present indications are a reliable measure, when it comes to the information
revealed by anonymous sources and released by WikiLeaks, many leaders of
civil society and public interest workers will be doing just that - and far more - well
into the foreseeable future.
!"#"$%&#'(%E5+'%'(7"+$%04%(&0)(-+.4%'(*,%(2'(*+(?%(,%$)(
&44+20*&?$%(-+.(&*.+4"*"%'(
Pierre Tristam, Contributing Author, Common Dreams.org, November 29th,
2010. [“In praise of Wikileaks.” http://www.commondreams.org/view/2010/11/295]
Without offering specifics, the Obama administration claimed that when Wikileaks
published hundreds of thousands of documents about the Iraq and Afghan wars
earlier this year, it endangered lives of soldiers, spy agents and informants.
Similar claims were made by the Nixon administration in 1971 when the New
York Times published the Pentagon Papers, the secret military history of the
Vietnam War that revealed how, early in the 1960s, the U.S. military was aware
that the war was virtually unwinnable. Nixon claimed the papers were
endangering "national security," a vague invocation made by every president
who's tried to put government secrecy above the public's right to know to what
extent its government was breaking laws, murdering en masse, screwing up and
hiding from accountability, all at the expense of taxpayers and their patriotic
gullibility. George W. Bush and Barack Obama are the latest apologists of
deception on a mass scale, emperors whose clothes Wikileaks is stripping one
document at a time.
10PF6-Wikileaks
www.victorybriefs.com
Page 64 of 76
!"#"$%&#'(#%6(*+(-.%%(5.%''(C(-.%%(5.%''("'(#%6(*+(%E5+'"03(
4+..25*"+0(
Pierre Tristam, Contributing Author, Common Dreams.org, November 29th,
2010. [“In praise of Wikileaks.” http://www.commondreams.org/view/2010/11/295]
Those emperors might remember what the U.S. Supreme Court ruled in that
1971 decision rejecting Nixonian lust for secrecy: "The press was to serve the
governed, not the governors," Justice Hugo Black wrote, referring to the origins
of the First Amendment. "The Government's power to censor the press was
abolished so that the press would remain forever free to censure the
Government. The press was protected so that it could bare the secrets of
government and inform the people. Only a free and unrestrained press can
expose deception in government. And paramount among the responsibilities of a
free press is the duty to prevent any part of the government from deceiving the
people and sending them off to distant lands to die of foreign fevers and foreign
shot and shell. In my view, far from deserving condemnation for their courageous
reporting, the New York Times, the Washington Post and other newspapers
should be commended for serving the purpose the Founding Fathers saw so
clearly."
!"#"$%&#'(F(-.%%(5.%''(
Pierre Tristam, Contributing Author, Common Dreams.org, November 29th,
2010. [“In praise of Wikileaks.” http://www.commondreams.org/view/2010/11/295]
Don't bother claiming that Wikileaks isn't part of the free press. In many respects,
it's better: It's the raw materials. The C-Span of government's and the military's
underbellies. The Iraq and Afghanistan papers have, for example, shown that
civilian casualties have been far heavier than reported, that American soldiers
and mercenaries have murdered civilians more often than reported (read one
example), that Iran's role in the Iraq war, well known by the Bush administration,
was far heavier than the administration let on, that Pakistan's secret services,
funded by U.S. military aid, have been aiding the Taliban for years, and that, in
either Iraq's or Afghanistan's case, public notions of American successes are
undermined by the secret documents' grimmer and far less hopeful
accumulations of failures.
10PF6-Wikileaks
www.victorybriefs.com
Page 65 of 76
!"#"$%&#'("'(0+*(&(*,.%&*(C(*+($"7%'=(0&*"+0&$('%42."*6(+.(*,%(
$&!(
Pierre Tristam, Contributing Author, Common Dreams.org, November 29th,
2010. [“In praise of Wikileaks.” http://www.commondreams.org/view/2010/11/295]
But claims that Wikileaks' Assange is doing anything illegal, and more
hypocritical claims that he is endangering lives or damaging national security,
speak more of the illegalities Assange is uncovering than of his own. If it's loss of
life the U.S. government is concerned about, it should begin with paying more
attention to the soldiers and civilians it's putting in harm's way every hour in Iraq
and Afghanistan. Are "informants" and diplomats somehow higher on the totem
pole of "assets" to be protected? These aren't secret sources operating under the
protection of civilized rules and laws and codes similar to, say, the secrecy
guaranteed the whistle-blowing source behind press reports. That guarantee is in
place to help uncover wrongs, not hide them. In the world of government
secrecy, there is no such broader aim. "Assets" and diplomats are engaged in a
game rigged by its own rules and sustained by its own self-serving ends. Power
and prestige, not national security or national interest, are being protected.
10PF6-Wikileaks
www.victorybriefs.com
Page 66 of 76
'%4.%46()+%'(1+.%(,&.1(*+(0&*"+0&$('%42."*6(*,&0(!"#"$%&#'(C(
,"'*+.6(5.+7%'(
Pierre Tristam, Contributing Author, Common Dreams.org, November 29th,
2010. [“In praise of Wikileaks.” http://www.commondreams.org/view/2010/11/295]
So with extremely rare exceptions, keeping information from the public does
more harm than good. That's been true since the dawn of government secrecy.
It's been especially true during the cold war and its twin successor, the "war on
terror." That the secrets are American rather than Soviet or Iranian doesn't make
them more virtuous. It merely makes them-and us-more like Iran's and the old
Soviet Union. The assumption that secrecy is necessary doesn't stand up to
sunshine's scrutiny.
Keep in mind that it was the secret 1957 report-"Deterrence and Survival in the
Nuclear Age"-that created the fiction that the Soviet Union would overtake the
United States economically by 2000, and the equally absurd fiction of a "missile
gap" that sent the next three administrations wasting billions in dollars and
manufactured fears to close. For all its absurdities, the report was not
declassified until 1973. Imagine if a Wikileak of the time would have uncovered it
in 1957. Of course Wikileak would have been condemned, reviled, burned at
whatever stake the Eisenhower administration, so susceptible to fictions, would
have conjured up. But it would also have exposed the fictions to scrutiny, and
done what scrutiny does: it would have exposed the flaws in the report and
possibly slowed down the nation's hysterical submission to that colossal waste
created by Harry Truman in 1952, when he signed the directive creating the
National Security Agency (see: illegal wiretapping, Bush admin.) and launching
the CIA on its long odyssey of futility.
Matters didn't improve. "Just because the United States won the cold war doesn't
mean our Government did everything right," the historian and journalist Sam
Tanehaus wrote-not so ironically, in a 1998 review of Daniel Patrick Moynihan's
Secrecy: The American Experience. "On the contrary, as one of the most zealous
cold war Presidents, Ronald Reagan, delicately put it when acknowledging the
criminal excesses of the Iran-contra scandal, ‘mistakes were made.' Indeed they
were. The Central Intelligence Agency, in particular, was a command center of
malfeasance in the 1980!s. Under its Director, William Casey, the C.I.A. fed the
White House exaggerated reports of Soviet military and economic strength and
kept Congress in the dark, illegally at times, about various covert operations.
Meanwhile, a mole within the agency, Aldrich Ames, was peddling secrets to the
Kremlin, with the result that at least 12 prized overseas ‘assets' were killed."
And that, of course, was before the cataclysmic failure of intelligence that led to
9/11, the equally cataclysmic failure that led American forces on a chase for
nonexistent WMDs in Iraq in 2003, and the continuing chase of an ever-vanishing
10PF6-Wikileaks
www.victorybriefs.com
Page 67 of 76
objective in Afghanistan. Protecting the "diplomacy" behind it all ensures more
cataclysms, especially when that diplomacy has been turned into "one of those
services so ineptly called secret" (as Graham Greene put it). Wikileaks could not
be rendering a greater service.
10PF6-Wikileaks
www.victorybriefs.com
Page 68 of 76
%7%0(*,%(3+7%.01%0*(#0+!'(*,&*(*,%(.%&$(*,.%&*("'("0('%42."*6(
$%&#'=(0+*(&(*,.%&*(*+(0&*"+0&$('%42."*6(
Greg Mitchell, staff writer for The Nation, January 14th, 2011. [“Why WikiLeaks
matters.” http://www.commondreams.org/view/2011/01/14-13]
How all these issues and others are viewed by the public hinges significantly,
however, on the perceived value of the leaked cables. US officials, even in
charging foul, usually focus on the embarrassing loss of control and secrecy, not
the damaging content of the cables. And as with earlier WikiLeaks bombshellsthe massive Iraq and Afghanistan "war logs"-many critics in the media soon
labeled the Cablegate revelations minor, old hat. Some of WikiLeaks' media
partners, after a dozen days of heavy-duty reporting, severely reduced coverage
of the cables. Now most of them are emerging via El País and the Norwegian
daily Aftenposten.
10PF6-Wikileaks
www.victorybriefs.com
Page 69 of 76
!"#"$%&#'(4&0('&7%($"7%'(?6('*+55"03(!&.'(?%-+.%(*,%6('*&.*(
Ray McGovern, former CIA analyst, Common Dreams.org, August 16th, 2010.
[“Can WikiLeaks help save lives.”
http://www.commondreams.org/view/2010/08/16-6]
If independent-minded Web sites, like WikiLeaks or, say, Consortiumnews.com,
existed 43 years ago, I might have risen to the occasion and helped save the
lives of some 25,000 U.S. soldiers, and a million Vietnamese, by exposing the
lies contained in just one SECRET/EYES ONLY cable from Saigon.
I need to speak out now because I have been sickened watching the herculean
effort by Official Washington and our Fawning Corporate Media (FCM) to divert
attention from the violence and deceit in Afghanistan, reflected in thousands of
U.S. Army documents, by shooting the messenger(s) - WikiLeaks and Pvt.
Bradley Manning.
After all the indiscriminate death and destruction from nearly nine years of war,
the hypocrisy is all too transparent when WikiLeaks and suspected leaker
Manning are accused of risking lives by exposing too much truth.
Besides, I still have a guilty conscience for what I chose NOT to do in exposing
facts about the Vietnam War that might have saved lives. The sad-but-true story
recounted below is offered in the hope that those in similar circumstances today
might show more courage than I was able to muster in 1967, and take full
advantage of the incredible advancements in technology since then.
'%4.%46($%&)'(*+("04.%&'"03(1"$"*&."'1(
John Grant, contributing writer, counterpunch.org, December 3rd 2010.
[“Wikileaks is good for America.”
http://www.counterpunch.org/grant12032010.html]
Fully in line with Power, President Obama seems to see his mission as
sustaining the United States as the Top Dog in the world and sweeping under the
rug all the little bits of inconvenient information and analysis that tells those
capable of seeing it that, unless some serious, bottom-up change is begun soon,
the US is on the road to Hell.
Enter WikiLeaks. Militarism is now so prevalent in our culture that secrecy has
become a virtual fetish for the specialized class. They use it more and more to
simply hold onto top-down power as they prevent much-needed bottom-up
change.
10PF6-Wikileaks
www.victorybriefs.com
Page 70 of 76
!"#"$%&#'(,%$5'(5.+3.%''"7%(&4*"7"*'(#%%5(+2.('+$")%.'(+2*(+-(
)&03%.+2'(&0)(0%%)$%''(!&.'(
John Grant, contributing writer, counterpunch.org, December 3rd 2010.
[“Wikileaks is good for America.”
http://www.counterpunch.org/grant12032010.html]
It should be clear to Americans interested in positive, progressive change that,
despite the gray areas and any conceivable collateral damage, the WikiLeaks
revelations are helpful and positive because they help us better understand
what’s being done by the “specialized class” making decisions in our names with
our tax resources.
Hysterical charges by the Palins and the Huckabees about WikiLeaks
endangering our troops are deceptive and dishonest. It needs to be said over
and over that those leaders who committed our soldiers to the two wars we’re so
deeply entrenched in and those who keep them there are the ones endangering
their lives.
Sure it's complicated, but calls to kill the messenger only make it clear the
messenger is onto something.
10PF6-Wikileaks
www.victorybriefs.com
Page 71 of 76
!"#"$%&#'(+5%0'(*,%()++.'(-+.(5.+*%'*'(*,&*(4+2$)(4+1?&*(
'244%''"7%(.%3"1%'(+-('%4.%46(&0)(?.2*&$"*6(
John Grant, contributing writer, counterpunch.org, December 3rd 2010.
[“Wikileaks is good for America.”
http://www.counterpunch.org/grant12032010.html]
Think of the mess we face now – the financial collapse, the loss of job security,
the dismal downward slide of the American education system and, finally, the
huge waste of resources hosed into Iraq and Afghanistan.
If the Belgian physicist Jean Bricmont is right and our challenge in the West is to
define “a form of life that (does) not depend on an unsustainable relation of
domination over the rest of the world,” eight years of the Bush Administration and
its unprecedented regime of secrecy was the absolute worst thing that could
have happened to America and Americans. The current Democratic regime has
done little to change this legacy.
Julian Assange and Bradley Manning did not create the mess we now find
ourselves in. But what they have had the courage to do may just eventually let
enough sunshine in for change to happen.
10PF6-Wikileaks
www.victorybriefs.com
Page 72 of 76
!"#"$%&#'("04.%&'%("0-+.1&*"+0("0(&0(&3%(+-('%4.%46(!,"4,("'(
*,%(#%6(*+("15.+7"03(&0)(%E5&0)"03()%1+4.&46(
Bill Quigley, Law Professor at the University of New Orleans, for
Counterpunch.org, November 30th, 2010. [“Why Wikileaks is good for
democracy.” http://www.counterpunch.org/quigley11302010.html]
Since 9-11, the US government, through Presidents Bush and Obama, has
increasingly told the US public that “state secrets” will not be shared with
citizens. Candidate Obama pledged to reduce the use of state secrets, but
President Obama continued the Bush tradition. The Courts and Congress and
international allies have gone meekly along with the escalating secrecy demands
of the US Executive.
By labeling tens of millions of documents secret, the US government has created
a huge vacuum of information.
But information is the lifeblood of democracy. Information about government
contributes to a healthy democracy. Transparency and accountability are
essential elements of good government. Likewise, “a lack of government
transparency and accountability undermines democracy and gives rise to
cynicism and mistrust,” according to a 2008 Harris survey commissioned by the
Association of Government Accountants.
!"#"$%&#'(4&?$%'(,&7%0G*(#"$$%)(&06+0%(C(&0)(*,%("0-+.1&*"+0(
.%$%&'%)("'(4."*"4&$(*+(%E5&0)"03(*.&0'5&.%046(&0)()%1+4.&46(
Bill Quigley, Law Professor at the University of New Orleans, for
Counterpunch.org, November 30th, 2010. [“Why Wikileaks is good for
democracy.” http://www.counterpunch.org/quigley11302010.html]
Everyone, including Wikileaks and the other media reporting the documents,
hopes that no lives will be lost because of this. So far, that appears to be the
case as McClatchey Newspapers reported November 28, 2010, that ‘US officials
conceded that they have no evidence to date that the [prior] release of
documents led to anyone’s death.”
The US has been going in the wrong direction for years by classifying millions of
documents as secrets. Wikileaks and other media which report these so called
secrets will embarrass people yes. Wikileaks and other media will make leaders
uncomfortable yes. But embarrassment and discomfort are small prices to pay
for a healthier democracy.
Wikileaks has the potential to make transparency and accountability more robust
in the US. That is good for democracy.
10PF6-Wikileaks
www.victorybriefs.com
Page 73 of 76
!"#"$%&#'(%E5+'%'(*,%(*,.%&*(5+'%)(?6(*,%(2'(*+(*,%(.%'*(+-(*,%(
3$+?%(
Jonathan Cook, writer and journalist, counterpunch.org, November 30th, 2010.
[“Wikileaks and the New Global Order.”
http://www.counterpunch.org/cook11302010.html]
The impression of a world running out of American control has become a theme
touching all our lives over the past decade. The US invented and exported
financial deregulation, promising it to be the epitome of the new capitalism that
was going to offer the world economic salvation. The result is a banking crisis
that now threatens to topple the very governments in Europe who are
Washington’s closest allies. As the contagion of bad debt spreads through the
system, we are likely to see a growing destabilisation of the Washington order
across the globe. At the same time, the US army’s invasions in the Middle East
are stretching its financial and military muscle to tearing point, defining for a
modern audience the problem of imperial over-reach. Here too the upheaval is
offering potent possibilities to those who wish to challenge the current order. And
then there is the biggest crisis facing Washington: of a gradually unfolding
environmental catastrophe that has been caused chiefly by the same rush for
world economic dominance that spawned the banking disaster. The scale of this
problem is overawing most scientists, and starting to register with the public,
even if it is still barely acknowledged beyond platitudes by US officials. The
repercussions of ecological meltdown will be felt not just by polar bears and
tribes living on islands. It will change the way we live -- and whether we live -- in
ways that we cannot hope to foresee. At work here is a set of global forces that
the US, in its hubris, believed it could tame and dominate in its own cynical
interests. By the early 1990s that arrogance manifested itself in the claim of the
“end of history”: the world’s problems were about to be solved by US-sponsored
corporate capitalism. The new Wikileaks disclosures will help to dent those
assumptions. If a small group of activists can embarrass the most powerful
nation on earth, the world’s finite resources and its laws of nature promise a
much harsher lesson.
10PF6-Wikileaks
www.victorybriefs.com
Page 74 of 76
!"#"$%&#'()+%'(0+*(%0)&03%.(&06+0%=("0(-&4*(0+(+0%(%7%0(0%%)'(
5.+*%4*"03(
John Pilger, filmmaker and columnist, ZNet, January 14th, 2011. [“The War on
Wikileaks.” http://www.zcommunications.org/the-war-on-wikileaks-by-john-pilger]
The latest propaganda about the “damage” caused by WikiLeaks is a warning by
the US State Department to “hundreds of human rights activists, foreign
government officials and business people identified in leaked diplomatic cables of
possible threats to their safety”. This was how the New York Times dutifully
relayed it on 8 January, and it is bogus. In a letter to Congress, Secretary of
Defence Robert Gates has admitted that no sensitive intelligence sources have
been compromised. On 28 November, McClatchy Newspapers reported that “US
officials conceded they have no evidence to date that the [prior] release of
documents led to anyone’s death.” NATO in Kabul told CNN it could not find a
single person who needed protecting.
!"#"$%&#'(204+7%.'(&*.+4"*"%'()+0%("0(*,%(0&1%(+-(*,%(3$+?&$(
5+!%.'(
John Pilger, filmmaker and columnist, ZNet, January 14th, 2011. [“The War on
Wikileaks.” http://www.zcommunications.org/the-war-on-wikileaks-by-john-pilger]
The great American playwright Arthur Miller wrote: “The thought that the state …
is punishing so many innocent people is intolerable. And so the evidence has to
be internally denied.” What WikiLeaks has given us is truth, including rare and
precious insight into how and why so many innocent people have suffered in
reigns of terror disguised as wars, and executed in our name; and how the
United States has secretly and wantonly intervened in democratic governments
from Latin America to its most loyal ally in Britain.
Javier Moreno, the editor of El Pais, which published the WikiLeaks logs in
Spain, wrote, “I believe that the global interest sparked by the WikiLeaks papers
is mainly due to the simple fact that they conclusively reveal the extent to which
politicians in the West have been lying to their citizens.”
10PF6-Wikileaks
www.victorybriefs.com
Page 75 of 76
*.&0'5&.%046("'(#%6(*+(@%--%.'+0"&0()%1+4.&46(
John Pilger, filmmaker and columnist, ZNet, January 14th, 2011. [“The War on
Wikileaks.” http://www.zcommunications.org/the-war-on-wikileaks-by-john-pilger]
Crushing individuals like Julian Assange and Bradley Manning is not difficult for a
great power, however craven. The point is, we should not allow it to happen,
which means those of us meant to keep the record straight should not
collaborate in any way. Transparency and information, to paraphrase Thomas
Jefferson, are the “currency” of democratic freedom. “Every news organisation,”
a leading American constitutional lawyer told me, “should recognise that Julian
Assange is one of them, and that his prosecution will have a huge and chilling
effect on journalism”.
0+(%7")%04%(+-(7"+$%04%()2%(*+(!"#"$%&#'8&-3,&0"'*&0(5.+7%'/(
ADAM LEVINE, CNN, OCT 17, 2010,
http://edition.cnn.com/2010/US/10/16/wikileaks.assessment/index.html?hpt=T2//
GP3
The assessment, revealed in a letter from Gates to the Chairman of the Senate
Armed Services Committee, Sen. Carl Levin (D-Michigan), comes after a
thorough Pentagon review of the more than 70,000 documents posted to the
controversial whistle-blower site in July. The letter, provided to CNN, was written
August 16 by Gates in response to a query by the senator regarding the leak of
classified information. Gates said the review found most of the information
relates to "tactical military operations." "The initial assessment in no way
discounts the risk to national security," Gates wrote. "However, the review to date
has not revealed any sensitive intelligence sources and methods compromised
by the disclosure." The defense secretary said that the published documents do
contain names of some cooperating Afghans, who could face reprisal by Taliban.
But a senior NATO official in Kabul told CNN that there has not been a single
case of Afghans needing protection or to be moved because of the leak.
10PF6-Wikileaks
www.victorybriefs.com
Page 76 of 76
5%0*&3+0(,65%("'(*+(?$&1%(-+.(*,%(!"#"$%&#'H0&*"+0&$('%42."*6(
$"0#/(
ROBERT BURNS, ASSOCIATED PRESS, AUG 17, 2010,
http://mobile.salon.com/news/feature/2010/08/17/wikileaks_risks_overstated/inde
x.html//GP3
Some private analysts, in fact, think the danger has been overstated. "I am
underwhelmed by this argument. The Pentagon is hyping," says John Prados, a
military and intelligence historian who works for the anti-secrecy National
Security Archive. He said in an interview that relatively few names have surfaced
and it's not clear whether their present circumstances leave them in jeopardy.
%15%."4&$$6()%0"%)85.%7"+2'($"0#'()")(0+*($%&)(*+(*,%()%&*,(+-(
2'('5"%'/(
ROBERT BURNS, ASSOCIATED PRESS, AUG 17, 2010,
http://mobile.salon.com/news/feature/2010/08/17/wikileaks_risks_overstated/inde
x.html//GP3
Donald P. Gregg, a retired CIA officer and former U.S. ambassador to South
Korea, said in an e-mail exchange that the Pentagon's expressions of concern
have merit in this case. But he also said his own experience showed that being
unmasked as a spy is not always deadly.
"I was named and publicly denounced as a covert CIA officer by East Germany in
1958, and no one, to my knowledge, ever tried to assassinate me," Gregg said.
Download