Monday 11 June 2012

Hot! Bradley Manning

div lang="en" dir="ltr" class="mw-content-ltr" readability="24" xml:lang="en">

United States v. Bradley Manning is the particular court-martial circumstance concerning , who is definitely imagined to have delivered government paperwork to the people possibly not titled to be given these folks around 2009 and also 2010. Media studies have alleged that this receiver ended up being of .

Manning had been arrested around May 2010. A (UCMJ) pre-trial hearing appeared to be planned intended for May/June 2011. All costs were being imagined to possess taken place "at or near" Contingency Operating Station Hammer, , last season in addition to 2010.

Charges, listed through alleged rule violation

The premiums may be digested when follows:

UCMJ 104 (Aiding the enemy): a single count. This demand displays prospective death fees .

UCMJ 92 (Failure to obey some sort of lawful obtain as well as regulation): nine counts. Mostly in connection with computers.

Army Regulation 25-2, para. 4-6(k): Forbids relocating categorised data to non-secure systems

Army Regulation 25-2, para. 4-5(a)(3): Modifying or putting in unauthorized program into a system, utilizing it pertaining to 'unintended' purposes.

Army Regulation 25-2, para. 4-5(a)(4): Circumventing stability mechanisms

Army Regulation 380-5: Improper hard drive of Classified Information

UCMJ 134 (General write-up ): twenty four counts. Most worth mentioning matters include civilian statutes in the :

: Embezzlement and Theft associated with Public Money, Property or perhaps Records. The government includes claimed that will different packages regarding details that Manning transferred were 'things of value' and includes thus incurred the pup under this specific statute.

Total variety of counts: 34

Charges, listed by document

Most involving Manning's costs will be right associated with the alleged transferral of your particular insurance policy for you to yet another party. These documents are usually while follows:

The 2007 July 12 Baghdad video

various organizations involving US cables, unclassified as well as classified

The "Reykjavik 13" US State Department cable

Records through this CIDNEI database

Records from the CIDNEA database

A Microsoft PowerPoint presentation

Records from a database

Files "BE22 PAX.zip" as well as "BE22 PAX.wmv".

email address list

a Record from

A memorandum from an intelligence agency

The mass media has alleged many of these papers would be the just like files publicized simply by , including:

The ("Collateral Murder") video

The cable

(CIDNEI)

Afghan War papers trickle out (CIDNEA)

Marcy Wheeler )

Charges, indexed in that obtain presented about the Charge Sheets

Set 1

The primary list of rates emerged on July 5, 2010. The Specifications (Spec.) are usually listed listed below throughout exactly the same order when they are generally outlined on the demand sheets. To the suitable of each one specification is really a criteria regarding the particular related files as well as actions.

Charge 1: Violation involving UCMJ Article 92 (Failure to observe a lawful order or regulation)

Spec. 1: Army Reg. 25-2, para. 4-6(k): The 3 years ago July 12 Baghdad video

Spec. 2: Army Reg. 25-2, para. 4-6(k): 50 categorised US Dept connected with State cables

Spec. 3: Army Reg. 25-2, para. 4-6(k): A categorized Microsoft Office PowerPoint presentation

Spec. 4: Army Reg. 25-2, para. 4-5(a)(3): Adding unauthorized software package to help SIPRNet

Charge 2: Violation regarding UCMJ Article 134 (General article)

Spec. 1: : The 3 years ago July 12 Baghdad video

Spec. 2: : The 3 years ago July 12 Baghdad video

Spec. 3: : The classified Cable known as "Reykjavik 13"

Spec. 4: : 50 categorized US State Dept cables

Spec. 5: : The 3 years ago July 12 Baghdad video

Spec. 6: : The categorised US State Dept Cable named "Reykjavik 13"

Spec. 7: : 150,000 diplomatic cables

Spec. 8:

Set 2

The subsequent established involving costs came up on March 1, 2011, and they are when follows:

Additional Charge 1: Violation of UCMJ Article 104 (Aiding your enemy)

Spec. 1: Knowingly giving intelligence for the enemy as a result of roundabout means

Additional Charge 2: Violation with UCMJ Article 134 (General article)

Spec. 1: (statute definitely not given): Causing data being published, if you know it is available towards enemy

Spec. 2: : A archive termed "12 JUL 07 CZ ENGAGEMENT ZONE 30 GC Anyone.avi"

Spec. 3: : Memorandi originating from a US cleverness agency

Spec. 4: : 380,000 records with the CIDNEI database

Spec. 5: : >20 information from this CIDNEI database

Spec. 6: : >90,000 information from the CIDNEA database

Spec. 7: : >20 data from the CIDNEA database

Spec. 8: : >700 details from a US Southern Command database

Spec. 9: : >3 data from the US Southern Command database

Spec. 10: : >5 documents concerning a surgery throughout Farah Province, Afghanistan

Spec. 11: : The documents "BE22 PAX.zip" in addition to "BE22 PAX.wmv"

Spec. 12: : 250,000 details on the State Dept Net-Centric Diplomacy database

Spec. 13: : >75 US State Dept cables

Spec. 14: : The State Dept wire branded "Reykjavik-13"

Spec. 15: : A file with a US Army Intelligence organization

Spec. 16: : The US Forces - Iraq Microsoft Outlook / SharePoint Exchange Server world wide correct list

Additional Charge 3: Violation connected with UCMJ Article 92 (Failure for you to observe a authorized obtain and also regulation)

Spec. 1: Army Reg. 25-2, para. 4-5(a)(4): Bypassing protection mechanisms

Spec. 2: Army Reg. 25-2, para. 4-5(a)(3): Adding unauthorized application to your SIPRNet computer

Spec. 3: Army Reg. 25-2, para. 4-5(a)(3): Adding unauthorized computer software with a SIPRNet computer

Spec. 4: Army Reg. 25-2, para. 4-5(a)(3): Using an details technique with regard to other than it has the intended purpose

Spec. 5: Army Reg. 380-5, para. 7-4: Wrongfully storing classified information

See also

Espionage Act associated with 1917

McCarran Internal Security Act / connected with 1950

Computer Fraud in addition to Abuse Act

References

, DomCLIC Project (2011). . Retrieved 2011-04-13.

US Army (2000). . Retrieved 2011-04-13.

US Army (2009). . Retrieved 2011-04-13.

Harold Edgar & Benno C. Schmidt, Jr. (1973). "The Espionage Statutes as well as Publication with Defense Information" . 73 Columbia Law Review 929, 940

Jennifer K. Elsea (2010-01-10). "Criminal Prohibitions for the Publication of Classified Defense Information"

US DOJ, Computer Crime & Intellectual Property Section , Scott Eltringham, ed. (Feb 2007). . Retrieved 2011 4 16. Chapter 1, Computer Fraud in addition to Abuse Act, pg 14

^ How Manning Stole The Cables by means of Nick Dubaz on November 30, 2010, conflicthealth.com (website involving Christopher Albon ) retr Sep 2011

, March 5 2011, Marcy Wheeler

Kim Zetter, Wired.com, May 20, 2011

Hague Academic Coalition . Retrieved 2011-04-13.

Hague Academic Coalition . Retrieved 2011-04-13.

, coming from Philip D. Cave

, Hague Justice Portal

Jason Mick - March 3, 2011, dailytech.com

, Fire Dog Lake.com

No comments:

Post a Comment