band annie's Weblog

I have a parallel blog in French at


September 5, 2010


5 Jaw-Dropping Stories In Wikileaks’ Archives

Begging For National Attention
By Nick Turse

04 September, 2010

Many files, beyond the Afghan War Diary and the ‘Collateral Murder’ video, continue to hide in plain sight on Wikileaks’ Web site

In December 2008, I received an email message from Julian Assange — the now world-famous public face of the whistleblower organization, Wikileaks. I don’t recall why or how it came about, but he invited me to join a counterinsurgency “analysis team” alongside a number of other academics, journalists and analysts.

The idea was to offer us embargoed material, much as Wikileaks recently did with the files of the Afghan War Diary — a 6-year archive of tens of thousands of classified military documents, dealing with the U.S. war in Afghanistan — giving the New York Times, the Guardian and Der Spiegel advance access to the documents. The reason for doing so was because Wikileaks had released a number of important U.S. military counterinsurgency manuals in the preceding months, but few reporters had shown much interest in them. Operating in a media environment where breaking the story is key and the fear of being scooped limits the amount of time and energy publications are willing to invest on documents sitting out in public, Assange carried out a trial run of a strategy that served Wikileaks exceptionally well this year.

I never wrote anything on the embargoed counterinsurgency manuals and the “analysis team” either petered out or gave up on me. But just as was the case then, today there are many files, beyond the much-publicized Afghan War Diary and the “Collateral Murder” video of a U.S. Army Apache attack helicopter mowing down people in Baghdad in 2007, that continue to hide in plain sight on Wikileaks’ Web site. Below are just five examples of the types of documents available at that deserve in-depth analysis and national media attention.

COIN of the Realm

Those counterinsurgency (COIN) manuals I read and then never wrote about, as well as other related materials, are still available at Wikileaks and have taken on ever-increasing importance as COIN has become the strategy du jour for the U.S. war in Afghanistan. Wikileaks currently offers no fewer than eight core U.S. counterinsurgency manuals and handbooks as well as numerous supporting materials with special bearing on COIN operations. One of the most important is the U.S. Special Forces Southern Afghanistan Counterinsurgency Handbook of 2006 which was designed to provide “guidance to the commanders and staffs of combined-arms forces that have a primary mission of eliminating insurgent forces and discusses the nature of organized guerrilla units and underground elements and their supporters.”

The handbook is notable for the fact that it is incredibly unsophisticated and rehashes lots of well-worn material on guerrillas and conventional efforts to defeat them. As a result, it explains a great deal about why and how the U.S. finds itself nearly a decade into a war against a rather rag-tag insurgency without exceptionally fervent popular support or the sponsorship of a major power.

Another COIN-related document of special interest on Wikileaks’ Web site is the September 2008 U.S. Army Special Operations Forces Unconventional Warfare manual. Defined as “[o]perations conducted by, with, or through irregular forces in support of a resistance movement, an insurgency, or conventional military operations,” unconventional warfare (UW) is just one of the panoply of other non-traditional types of operations, like irregular warfare and counterinsurgency, that the U.S. military both studies and carries out. At nearly 250 pages, the acronym-filled manual offers everything from a stilted primer on U.S. “national power” to guidance on when to begin conducting psychological operations in a UW campaign (“as early as possible”) to obtuse and near-useless formulations that, in almost any other publication, would be red-lined by an editor. For example:

The information environment is the total of individuals, organizations, and systems that collect, process, disseminate, or act on information. The actors include leaders, decision makers, individuals, and organizations. Resources include the materials and systems employed to collect, analyze, apply, or disseminate information. The information environment is where humans and automated systems observe, orient, decide, and act upon information, and is therefore the principal environment of decision making. Even though the information environment is considered distinct, it resides within each of the four domains of air, land, sea, and space.

The manual is also filled with dubious assertions, like this one that people from the Indian tribes of the Great Plains, the Philippines, Nicaragua, Haiti, the Dominican Republic, Korea, Vietnam, Cambodia, Laos, Grenada, Panama, Iraq, and Afghanistan, to name a few locales, might dispute:

The United States avoids resorting to military force, preferring to wield all other instruments of power in the pursuit of national objectives and in the context of international competition and conflict. Therefore, diplomacy routinely blocks the need for the application of the military instrument of power.

Other U.S. Military Material

U.S. military documents found at Wikileaks’ Web site are not, however, limited to COIN-related material. There are, to take just two examples, the March 2004 Standard Operating Procedures (SOP) for Camp Delta — the main prison facility at the U.S. naval base in Guantanamo Bay, Cuba — and the U.S. military’s Rules of Engagement (ROE) for Iraq circa 2005, both of which are of potential use to reporters and scholars evaluating U.S. military treatment of noncombatants during the Bush years.

One very different but no less interesting report is the “Marine Corps Midrange Threat Estimate: 2005-2015,” which was prepared by Marine Corps Intelligence’s Global Threats Branch. “Marine Corps forces will be challenged by emerging technical, military, and geopolitical threats; by thegrowing resourcefulness and the ingenuity of non-state actors and terrorist networks; and by natural disasters,” begins the report. “The U.S. military must develop more agile strategies and adaptive tactics if it is to succeed in this complex environment.” The Marines were changing, said the report, to do just that.

“The threat environment facing today’s Marines can be defined in three words: unconventional, unforeseen, and unpredictable,” reads the document. Despite admitting that future threats were largely unforeseeable, Marine Intelligence still endeavored to forecast the likelihood of various intervention scenarios “based on an independent, data-driven methodology that assessed the conditions for possible Marine intervention or assistance in the selected countries,” more specifically, “20 states of interest that represent a wide range of potential future security challenges for the Marine Corps.”

For those interested in keeping score over the next five years, the Marine Corps’ report forecasts that counterterrorism missions by U.S. Marines in Albania, Bangladesh, Colombia and Saudi Arabia are “possible” — the mid-range on the three-point scale of likelihood — as are COIN missions in Liberia, Syria and Uzbekistan. Countries that rated “high” on the scale, when it came to the chance of conducting counterterrorism operations, included Ethiopia, Georgia, Mauritania, and Nigeria, while Iran and North Korea were rated as “high” when it came “major regional contingencies” — that is full-scale wars.

Insider Information from the CIA

Wikileaks offers access to a number of documents prepared by the U.S. Central Intelligence Agency (CIA) which, if not for the site, would likely be totally out of the reach of the very taxpayers who foot the bill for them. These files include everything from a report about the threat Al Qaeda poses to the United States, which was prepared by the Agency’s Counterterrorism Center’s Office of Terrorism Analysis in 2005 to a 10-page book listing the briefings about the U.S. use of “enhanced interrogation techniques” (also known as torture) provided to members of Congress during 2009.

Another especially intriguing CIA document, with special bearing on the war in Afghanistan, was released by Wikileaks this spring and offers a window into the ways in which the United States thinks about allied countries, their people and the worth of their opinions.

Since taking office in January 2009, President Barack Obama has repeatedly escalated the war in Afghanistan, increasing troop numbers, boosting air strikes by unmanned drones, and sending more CIA agents and covert operators into the country. Over that same time period, opposition to the war in allied NATO countries has been on the rise, as Canada declared it would withdraw its 2,800 soldiers by the end of 2011 and the Dutch government collapsed under the weight of anti-war sentiment.

This spring, a month after the Dutch government fell, the CIA “Red Cell” — an analytic team “charged by the Director of Intelligence with taking a pronounced ‘out-of-the-box’ approach that will provoke thought and offer an alternative viewpoint” — issued a report on “Sustaining West European Support for the NATO-led Mission” in Afghanistan. The document, produced in collaboration with an Agency “strategic communications” expert and analysts from the State Department’s Bureau of Intelligence and Research (INR), outlines strategies for manipulating public opinion in France, Germany, and other allied NATO nations in order to further U.S. war aims in Afghanistan.

The report, classified confidential, and not surprisingly, not to be shown to foreign nationals, noted that public apathy in France and Germany — where most citizens have paid scant attention to the war — has allowed their national governments “to disregard popular opposition and steadily increase their troop contributions to the International Security Assistance Force (ISAF)… despite the opposition of 80 percent of German and French respondents to increased ISAF deployments.” The document cautions that increased ISAF casualties or press coverage of civilian carnage might catch the attention of the European public and increase hostility toward the war effort. The worse case scenario being that, as elections approach, the Dutch troop withdrawal might cause “politicians elsewhere [to] cite a precedent for ‘listening to the voters.’”

To forestall the possibility that NATO nations will respond to public will, the CIA report suggests focused propaganda campaigns, dubbed an “iterative strategic communication program.” For France, it suggests tailored messages focused on civilians and refugees that will “leverage French (and other European) guilt” to the advantage of the U.S. For Germans, increasing positive press about the military situation combined with scare tactics highlighting the possibility that defeat in Afghanistan might “heighten Germany’s exposure to terrorism, opium, and refugees” were offered as viable strategies. The CIA team also indicated that Afghan women could be deployed, as part of a concerted strategy, to manipulate public opinion in support of the war effort.

Foreign Government Documents

While classified U.S. government records may be the highest profile materials that appear on, they are far from alone. Other governments have also seen their documents, whether leaked directly to Wikileaks or reposted from elsewhere, exposed via the Web site. One example is a secret, 186-page database of settlements, written in Hebrew, that was compiled by the Israeli government. Writing about it earlier this year, Steven Aftergood, the head of the project on government secrecy at the Federation of American Scientists explained:

The database provides a concise description of each of the dozens of settlements, including their location, legal status, population, and even the origins of their names, which are often Biblically inspired. Crucially, the database makes clear that unauthorized and illegal construction activity has taken place in most of the settlements.

Another example of the type of foreign government information available through Wikileaks is the Indian Army’s doctrine from 2004, which demonstrates that stilted language and statements of the obvious are not limited to U.S. military manuals. Consider this gem:

Offensive operations are a decisive form of winning a war. Their purpose is to attain the desired end state and achieve decisive victory. Offensive operations seek to seize the initiative from the enemy, retain it and exploit the dividends accruing from such actions. These operations end when the force either achieves the desired end state or reaches its culmination point.

Corporate Documents

Earlier this year, Aftergood castigated Wikileaks for posting everything from documents detailing the secret rituals of sororities to those shedding light on the shadowy rites of Masons and Mormons. “This is not whistleblowing and it is not journalism,” he wrote. “It is a kind of information vandalism.”

Wikileaks also offers a selection of internal corporate memos, manuals and emails, some of which intersect with matters of politics, law enforcement and/or national security issues. One prime example is an email reportedly sent by Anthony Jones, the vice president and senior site executive of mega-defense contractor Boeing’s Huntsville, Alabama operations to plant employees in an effort to combat Obama administration efforts to make cuts to the company’s ground-based midcourse missile defense system. Offering subordinates talking points and contact information for Congressional representatives, the email even suggests that workers’ families might also become involved in the campaign. Missing from the note is even a mention of Boeing’s financial interests. The email, instead, frames all concerns in terms of U.S. national security.

Another corporate document that is available at is the Microsoft Global Criminal Compliance Handbook. In February of this year, — a Web site that, since the 1990s, has “welcome[d] documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance” — posted the manual and was shut down by its hosting provider, Network Solutions, at Microsoft’s behest.

Labeled “Confidential For Law Enforcement Use Only,” the 22-page manual contains no trade secrets, but did allow Microsoft customers to learn just what information the software giant is retaining from their Hotmail and Xbox Live accounts and under what circumstances it will be turned over to law enforcement when presented with a subpoena, court order or search warrant. (“Xbox Live records every IP address you ever use to login and stores them for perpetuity,”’s Ryan Singel noted in an article published earlier this year.)

What Else Wikileaks Has to Offer

While most media outlets and bloggers alike, are seemingly content to wait for Wikileaks to unveil a second batch of documents — roughly 15,000 in all — about the Afghan war in the days ahead, other important materials are waiting for intrepid reporters and researchers to wade in and make something of the information.

While the chilling “Collateral Murder” video and the gargantuan Afghan War Diary have, quite rightly, garnered a tremendous amount of attention for this year, the site has long offered much more in the way of classified, shadowy or otherwise unavailable material from public and private sources. It remains a relatively untapped or at least undertapped treasure trove for journalists, bloggers and academic researchers willing to put in the time and effort.

Nick Turse is the associate editor of An award-winning journalist, his work has appeared in the Los Angeles Times, the Nation, and regularly at TomDispatch. His latest book, The Case for Withdrawal from Afghanistan (Verso), which brings together leading analysts from across the political spectrum, will be published later this month. He is currently a fellow at Harvard University’s Radcliffe Institute. You can follow him on Twitter @NickTurse, on at, and on Facebook. His website is


Flying the flag, faking the news

John Pilger

Loud noises from Washington about a US pull-out from Iraq are a poor disguise for America’s determination to keep waging war. And the same sort of spin is at work here in Britain

Edward Bernays, the American nephew of Sigmund Freud, is said to have invented modern propaganda. During the First World War, he was one of a group of influential liberals who mounted a secret government campaign to persuade reluctant Americans to send an army to the bloodbath in Europe. In his book Propaganda, published in 1928, Bernays wrote that the “intelligent manipulation of the organised habits and opinions of the masses is an important element in democratic society”, and that the manipulators “constitute an invisible government which is the true ruling power in our country”. Instead of propaganda, he coined the euphemism “public relations”.

The American tobacco industry hired Bernays to convince women that they should smoke in public. By associating smoking with women’s
liberation, he made cigarettes “torches of freedom”. In 1954, he conjured a communist menace in Guatemala as an excuse for overthrowing the democratically elected government, whose social reforms were threatening the United Fruit Company’s monopoly of the banana trade. He called it a “liberation”.

Bernays was no rabid right-winger. He was an elitist liberal who believed that “engineering public consent” was for the greater good. This could be achieved by the creation of “false realities” which then became “news events”. Here are examples of how it is done these days.

False reality The last US combat troops have left Iraq “as promised, on schedule”, according to President Barack Obama. The TV news has been filled with cinematic images of the “last US soldiers”, silhouetted against the dawn light, crossing the border into Kuwait.

Fact They have not left. At least 50,000 troops will continue to operate from 94 bases. American air assaults are unchanged, as are special forces’ assassinations. The number of “military contractors” is 100,000 and rising. Most Iraqi oil is now under direct foreign control.

False reality BBC presenters have described the departing US troops as a “sort of victorious army” that has achieved “a remarkable change in [Iraq’s] fortunes”. Their commander, General David Petraeus, is a “celebrity”, “charming”, “savvy” and “remarkable”.

Fact There is no victory of any sort. There is a catastrophic disaster, and attempts to present it as otherwise are a model of Bernays’s campaign to “rebrand” the slaughter of the First World War as “necessary” and “noble”. In 1980, Ronald Reagan, running for president, rebranded the invasion of Vietnam, in which up to three million people died, as a “noble cause”, a theme taken up enthusiastically by Hollywood. Today’s Iraq war movies have a similar purging theme: the invader as both idealist and victim.

False reality It is not known how many Iraqis have died. They are “countless”, or maybe “in the tens of thousands”.

Fact As a direct consequence of the Anglo-American-led invasion, a million Iraqis have died. This figure, from Opinion Research Business, follows peer-reviewed research by Johns Hopkins University in Washington, DC, whose methods were secretly affirmed as “best practice” and “robust” by the Blair government’s chief scientific adviser. This is rarely reported or presented to “charming” American generals. Neither is the dispossession of four million Iraqis, the malnourishment of most Iraqi children, the epidemic of mental illness, or the poisoning of the environment.

False reality The British economy has a deficit of billions which must be reduced with cuts in public services and regressive taxation, in a spirit of “we’re all in this together”.

Fact We are not in this together. What is remarkable about this PR triumph is that only 18 months ago, the diametric opposite filled TV screens and front pages. Then, in a state of shock, truth became unavoidable, if briefly. The Wall Street and City of London trough was on full view for the first time, along with the venality of once-celebrated snouts. Billions in public money went to inept and crooked organisations known as banks, which were spared debt liability by their Labour government sponsors.

Within a year, record profits and personal bonuses were posted and the “black hole” was no longer the responsibility of the banks, whose debt is to be paid by those not in any way responsible: the public. The received media wisdom of this “necessity” is now a chorus, from the BBC to the Sun. A masterstroke, Bernays would surely say.

False reality Ed Miliband offers a “genuine alternative” as leader of the Labour Party.

Fact Miliband, like his brother and almost all those standing for the Labour leadership, is immersed in the effluent of New Labour. As a New Labour MP and minister, he did not refuse to serve under Blair or to speak out against Labour’s persistent warmongering. He now calls the invasion of Iraq a “profound mistake”. Calling it a mistake insults the memory and the dead. It was a crime, of which the evidence is voluminous. He has nothing new to say about the other colonial wars, none of them mistakes. Neither has he demanded basic social justice – that those who caused the recession clear up the mess and that Britain’s fabulously rich corporate minority be taxed seriously, starting with Rupert Murdoch.

The good news is that false realities often fail when the public trusts its own critical intelligence. Two classified documents recently released by WikiLeaks express the CIA’s concern that the populations of European countries, which oppose their governments’ war policies, are not succumbing to the usual propaganda spun through the media.

For the rulers of the world, this is a conundrum, because their unaccountable power rests on the false reality that no popular resistance works. And it does.


Create a free website or blog at

Up ↑