Home » Real costs of war and culture of peace

Category Archives: Real costs of war and culture of peace

The American and Russian government 1961 and 1982 were ready to push the world in an atomic war! Only a small officer saved us, acting against his orders! Let us note, only we common people, who suffer from wars, we can make sure, that we get peace and create a global peace-order, which finally will ban wars and atomic weapons. For this we need committees everywhere, which develop a global network on the level of the civil-society to bring form there solutions through on the political level. The risk we were in in 1961 and again in 1982, were again a Russian soldier saved us, opposing his orders, should be a warning to be active. In this moment 1900 atomic-bombs on rockets are in active position, to be started!

The man who saved the world… 50 years ago, at the height of the Cuban Missile Crisis, second-in-command Vasilli Arkhipov of the Soviet submarine B-59 refused to agree with his Captain’s order to launch nuclear torpedos against US warships and setting off what might well have been a terminal superpower nuclear war.

The US had been dropping depth charges near the submarine in an attempt to force it to surface, unaware it was carrying nuclear arms. The Soviet officers, who had lost radio contact with Moscow, concluded that World War 3 had begun, and two of the officers agreed to ‘blast the warships out of the water’. Arkhipov refused to agree – unanimous consent of three officers was required – and thanks to him, we are here to talk about it.

His story is finally being told – the BBC is airing a documentary on it.

Raise a glass to Vasilli Arkhipov – the Man Who Saved the World.

Photo: The man who saved the world... 50 years ago, at the height of the Cuban Missile Crisis, second-in-command Vasilli Arkhipov of the Soviet submarine B-59 refused to agree with his Captain's order to launch nuclear torpedos against US warships and setting off what might well have been a terminal superpower nuclear war. 

The US had been dropping depth charges near the submarine in an attempt to force it to surface, unaware it was carrying nuclear arms. The Soviet officers, who had lost radio contact with Moscow, concluded that World War 3 had begun, and two of the officers agreed to 'blast the warships out of the water'. Arkhipov refused to agree - unanimous consent of three officers was required - and thanks to him, we are here to talk about it.

His story is finally being told - the BBC is airing a documentary on it.

Raise a glass to Vasilli Arkhipov - the Man Who Saved the World.

Desmond Tutu: Nuclear weapons must be eradicated for all our sakes No nation should own nuclear arms – not Iran, not North Korea, and not their critics who take the moral high ground. As an Oslo conference on nuclear weapons starts, we should not accept that a ‘select few nations can ensure the security of all by having the capacity to destroy all. Indeed, 184 nations have already made a legal undertaking never to obtain nuclear weapons, and three in four support a universal ban. ‘ But today nine nations still consider it their prerogative to possess these ghastly bombs, each capable of obliterating many thousands of innocent civilians, including children, in a flash. They appear to think that nuclear weapons afford them prestige in the international arena. But nothing could be further from the truth. Any nuclear-armed state, big or small, whatever its stripes, ought to be condemned in the strongest terms for possessing these indiscriminate, immoral weapons.

 their critics who take the moral high ground

(FILES) This file picture taken by North

As an Oslo conference on nuclear weapons starts, we should not accept that a ‘select few nations can ensure the security of all by having the capacity to destroy all.’ Photograph: Kns/AFP/Getty Images

We cannot intimidate others into behaving well when we ourselves are misbehaving. Yet that is precisely what nations armed with nuclear weapons hope to do by censuring North Korea for its nuclear tests and sounding alarm bells over Iran’s pursuit of enriched uranium. According to their logic, a select few nations can ensure the security of all by having the capacity to destroy all.

Until we overcome this double standard – until we accept that nuclear weapons are abhorrent and a grave danger no matter who possesses them, that threatening a city with radioactive incineration is intolerable no matter the nationality or religion of its inhabitants – we are unlikely to make meaningful progress in halting the spread of these monstrous devices, let alone banishing them from national arsenals.

Why, for instance, would a proliferating state pay heed to the exhortations of the US and Russia, which retain thousands of their nuclear warheads on high alert? How can Britain, France and China expect a hearing on non-proliferation while they squander billions modernising their nuclear forces? What standing has Israel to urge Iran not to acquire the bomb when it harbours its own atomic arsenal?

Nuclear weapons do not discriminate; nor should our leaders. The nuclear powers must apply the same standard to themselves as to others: zero nuclear weapons. Whereas the international community has imposed blanket bans on other weapons with horrendous effects – from biological and chemical agents to landmines and cluster munitions – it has not yet done so for the very worst weapons of all. Nuclear weapons are still seen as legitimate in the hands of some. This must change.

Around 130 governments, various UN agencies, the Red Cross and the International Campaign to Abolish Nuclear Weapons are gathering in Oslo this week to examine the catastrophic consequences of nuclear weapons and the inability of relief agencies to provide an effective response in the event of a nuclear attack. For too long, debates about nuclear arms have been divorced from such realities, focusing instead on geopolitics and narrow concepts of national security.

With enough public pressure, I believe that governments can move beyond the hypocrisy that has stymied multilateral disarmament discussions for decades, and be inspired and persuaded to embark on negotiations for a treaty to outlaw and eradicate these ultimate weapons of terror. Achieving such a ban would require somewhat of a revolution in our thinking, but it is not out of the question. Entrenched systems can be turned on their head almost overnight if there’s the will.

Let us not forget that it was only a few years ago when those who spoke about green energy and climate change were considered peculiar. Now it is widely accepted that an environmental disaster is upon us. There was once a time when people bought and sold other human beings as if they were mere chattels, things. But people eventually came to their senses. So it will be the case for nuclear arms, sooner or later.

Indeed, 184 nations have already made a legal undertaking never to obtain nuclear weapons, and three in four support a universal ban. In the early 1990s, with the collapse of apartheid nigh, South Africa voluntarily dismantled its nuclear stockpile, becoming the first nation to do so. This was an essential part of its transition from a pariah state to an accepted member of the family of nations. Around the same time, Kazakhstan, Belarus and Ukraine also relinquished their Soviet-era atomic arsenals.

But today nine nations still consider it their prerogative to possess these ghastly bombs, each capable of obliterating many thousands of innocent civilians, including children, in a flash. They appear to think that nuclear weapons afford them prestige in the international arena. But nothing could be further from the truth. Any nuclear-armed state, big or small, whatever its stripes, ought to be condemned in the strongest terms for possessing these indiscriminate, immoral weapons.

http://www.guardian.co.uk/commentisfree/2013/mar/04/nuclear-weapons-must-be-eradicated

Why Bradley Manning case should be taught in every American school: “I believed that… access to the information could spark a domestic debate on the role of the military and our foreign policy in general as it related to Iraq and Afghanistan.”

Why Bradley Manning case should be taught in every American school

02 March 2013
Bradley Manning
USA and the War on Terror

“I believed that… access to the information could spark a domestic debate on the role of the military and our foreign policy in general as it related to Iraq and Afghanistan.”


By Bradley Manning
alexaobrien.com
28 February 2013 


The statement below was read by Private First Class Bradley E. Bradley when he made his formal plea of guilty to the charge of leaking secret US files to Wikileaks and not guilty to charges of “aiding the enemy” and espionage. This rush transcript was taken by journalist Alexa O’Brien at the session of United States v. Pfc. Bradley Manning on 28 February 2013 at Fort Meade, MD, USA. Michael Ratner, lawyer to Julian Assange and WikiLeaks, attended the court hearing and in the video below says why he thinks Bradley Manning’s statement should be read by every American and taught in every US school.

Michael Ratner interviewed on Democracy Now: Why Bradley Manning’s statement should be read by every American and taught in every US school.

Bradley Manning statement 28.0.13

Personal Facts.

I am a twenty-five year old Private First Class in the United States Army currently assigned to Headquarters and Headquarters Company, HHC, US Army Garrison (USAG), Joint Base Myer, Henderson Hall, Fort Meyer, Virginia.

My [missed word] assignment I was assigned to HHC, 2nd Brigade Combat Team, 10th Mountain Division at Fort Drum, NY. My primary military occupational specialty or MOS is 35 Foxtrot intelligence analyst. I entered active duty status on 2 October 2007. I enlisted with the hope of obtaining both real world experience and earning benefits under the GI Bill for college opportunities.

Facts regarding my position as an intelligence analyst.

In order to enlist in the Army I took the Standard Armed Services Aptitude Battery or [ASVAB?]. My score on this battery was high enough for me to qualify for any enlisted MOS positon. My recruiter informed me that I should select an MOS that complimented my interests outside the military. In response, I told him that I was interested in geopolitical matters and information technology. He suggested that I consider becoming an intelligence analyst.

After researching the intelligence analyst position, I agreed that this would be a good fit for me. In particular, I enjoyed the fact that an analyst could use information derived from a variety of sources to create work products that informed the command of its available choices for determining the best course of action or COA’s. Although the MOS required working knowledge of computers, it primarily required me to consider how raw information can be combined with other available intelligence sources in order to create products that assisted the command in it’s situational awareness or SA.

I accessed that my natural interest in geopolitical affairs and my computer skills would make me an excellent intelligence analyst. After enlisting I reported to the Fort Meade military entrance processing station on 1 October 2007. I then traveled to and reported at Fort Leonard Wood, Missouri on 2 October 2007 to begin basic combat training or BCT.

Once at Fort Leonard Wood I quickly realized that I was neither physically nor mentally prepared for the requirements of basic training. My BCT experience lasted six months instead of the normal ten weeks. Due to medical issues, I was placed on a hold status. A physical examination indicated that I sustained injuries to my right soldier and left foot.

Due to those injuries I was unable to continue ‘basic’. During medical hold, I was informed that I may be out processed from the Army, however, I resisted being chaptered out because I felt that I could overcome my medical issues and continue to serve. On 2[8 or 20?] January 2008, I returned to basic combat training. This time I was better prepared and I completed training on 2 April 2008.

I then reported for the MOS specific Advanced Individual Training or AIT on 7 April 2008. AIT was an enjoyable experience for me. Unlike basic training where I felt different from the other soldiers, I fit in did well. I preferred the mental challenges of reviewing a large amount of information from various sources and trying to create useful or actionable products. I especially enjoyed the practice of analysis through the use of computer applications and methods that I was familiar with.

I graduated from AIT on 16 August 2008 and reported to my first duty station, Fort Drum, NY on 28 August 2008. As an analyst, Significant Activities or SigActs were a frequent source of information for me to use in creating work products. I started working extensively with SigActs early after my arrival at Fort Drum. My computer background allowed me to use the tools of organic to the Distributed Common Ground System-Army or D6-A computers to create polished work products for the 2nd Brigade Combat Team chain of command.

The non-commissioned officer in charge, or NCOIC, of the S2 section, then Master Sergeant David P. Adkins recognized my skills and potential and tasked me to work on a tool abandoned by a previously assigned analyst, the incident tracker. The incident tracker was viewed as a back up to the Combined Information Data Network Exchange or CIDNE and as a unit, historical reference to work with.

In the months preceding my upcoming deployment, I worked on creating a new version of the incident tracker and used SigActs to populate it. The SigActs I used were from Afghanistan, because at the time our unit was scheduled to deploy to the Logar and Wardak Provinces of Afghanistan. Later my unit was reassigned to deploy to Eastern Baghdad, Iraq. At that point, I removed the Afghanistan SigActs and switched to Iraq SigActs.

As and analyst I viewed the SigActs as historical data. I believed this view is shared by other all-source analysts as well. SigActs give a first look impression of a specific or isolated event. This event can be an improvised explosive device attack or IED, small arms fire engagement or SAF engagement with a hostile force, or any other event a specific unit documented and recorded in real time.

In my perspective the information contained within a single SigAct or group of SigActs is not very sensitive. The events encapsulated within most SigActs involve either enemy engagements or causalities. Most of this information is publicly reported by the public affairs office or PAO, embedded media pools, or host nation HN media.

As I started working with SigActs I felt they were similar to a daily journal or log that a person may keep. They capture what happens on a particular day in time. They are created immediately after the event, and are potentially updated over a period of hours until final version is published on the Combined Information Data Network Exchange. Each unit has it’s own Standard Operating Procedure or SOP for reporting recording SigActs. The SOP may differ between reporting in a particular deployment and reporting in garrison.

In garrison a SigAct normally involves personnel issues such as driving under the influence or DUI incidents or an automobile accident involving the death or serious injury of a soldier. The reports starts at the company level and goes up to the battalion, brigade, and even up to the division level.

In deployed environment a unit may observe or participate in an event and a platoon leader or platoon sergeant may report the event as a SigAct to the company headquarters and the radio transmission operator or RTO. The commander or RTO will then forward the report to the battalion battle captain or battle non-commissioned officer or NCO. Once the battalion battle captain or battle NCO receives the report they will either (1) notify the battalion operations officer or S3; (2) conduct an action, such as launching a quick reaction force; or (3) record the event and report and further report it up the chain of command to the brigade.

The reporting of each event is done by radio or over the Secret Internet Protocol Router Network or SIPRNet, normally by an assigned soldier, usually junior enlisted E-4 and below. Once the SigAct is recorded, the SigAct is further sent up the chain of command. At each level, additional information can either be added or corrected as needed. Normally within 24 to 48 hours, the updating and reporting or a particular SigAct is complete. Eventually all reports and SigActs go through the chain of command from brigade to division and division to corp. At corp level the SigAct is finalized and [missed word].

The CIDNE system contains a database that is used by thousands of Department of Defense–DoD personel including soldiers, civilians, and contractors support. It was the United States Central Command or CENTCOM reporting tool for operational reporting in Iraq and Afghanistan. Two separate but similar databases were maintained for each theater– CIDNE-I for Iraq and CIDNE-A for Afghanistan. Each database encompasses over a hundred types of reports and other historical information for access. They contain millions of vetted and finalized directories including operational intelligence reporting.

CIDNE was created to collect and analyze battle-space data to provide daily operational and Intelligence Community (IC) reporting relevant to a commander’s daily decision making process. The CIDNE-I and CIDNE-A databases contain reporting and analysis fields for multiple disciplines including Human Intelligence or HUMINT reports, Psychological Operations or PSYOP reports, Engagement reports, Counter Improvised Explosive Device or CIED reports, SigAct reports, Targeting reports, Social and Cultural reports, Civil Affairs reports, and Human Terrain reporting.

As an intelligence analyst, I had unlimited access to the CIDNE-I and CIDNE-A databases and the information contained within them. Although each table within the database is important, I primarily dealt with HUMINT reports, SigAct reports and Counter IED reports, because these reports were used to create a work-product I was required to published as an analyst.

In working on an assignment I looked anywhere and everywhere for information. As an all-source analyst, this was something that was expected. The D6-A systems had databases built in, and I utilized them on a daily basis. This simply was–the search tools available on the D6-A systems on SIPRNet such as Query Tree and the DoD and Intellink search engines.

Primarily, I utilized the CIDNE database using the historical and HUMINT reporting to conduct my analysis and provide a back up for my work product. I did statistical analysis on historical data including SigActs to back up analysis that were based on HUMINT reporting and produce charts, graphs, and tables. I also created maps and charts to conduct predictive analysis based on statistical trends. The SigAct reporting provided a reference point for what occurred and provided myself and other analysts with the information to conclude possible outcome.

Although SigAct reporting is sensitive at the time of their creation, their sensitivity normally dissipates within 48 to 72 hours as the information is either publicly released or the unit involved is no longer in the area and not in danger.

It is my understanding that the SigAct reports remain classified only because they are maintained within CIDNE– because it is only accessible on SIPRnet. Everything on CIDNE-I and CIDNE-A to include SigAct reporting was treated as classified information.

Facts regarding the storage of SigAct Reports.

As part of my training at Fort Drum, I was instructed to ensure that I create back ups of my work product. The need to create back ups was particularly acute given the relative instability and reliability of the computer systems we used in the field during deployment. These computer systems included both organic and theater provided equipment (TPE) D6-A machines.

The organic D6-A machines we brought with us into the field on our deployment were Dell [missed word] laptops and the TPE D6-A machines were Alienware brand laptops. The [M90?] D6-A laptops were the preferred machine to use as they were slightly faster and had fewer problems with dust and temperature than the theater provided Alienware laptops. I used several D6-A machines during the deployment due to various technical problems with the laptops.

With these issues several analysts lost information, but I never lost information due to the multiple backups I created. I attempted to backup as much relevant information as possible. I would save the information so that I or another analyst could quickly access it whenever a machine crashed, SIPRnet connectivity was down, or I forgot where the data was stored.

When backing up information I would do one or all of the following things based on my training:

[(1)] Physical back up. I tried to keep physical back up copies of information on paper so that the information could be grabbed quickly. Also, it was easier to brief from hard copies of research and HUMINT reports.

(2) Local drive back up. I tried to sort out information I deemed relevant and keep complete copies of the information on each of the computers I used in the Temporary Sensitive Compartmented Information Facility or T-SCIF, including my primary and secondary D6-A machines. This was stored under my user profile on the desktop.

[(3)] Shared drive backup. Each analyst had access to a ‘T’ drive– what we called ‘T’ drive shared across the SIPRnet. It allowed others to access information that was stored on it. S6 operated the ‘T’ drive.

[(4)] Compact disk rewritable or CD-RW back up. For larger datasets I saved the information onto a re-writable disk, labeled the disks, and stored them in the conference room of the T-SCIF. This redundancy permitted us to not worry about information loss. If the system crashed, I could easily pull the information from a secondary computer, the ‘T’ drive, or one of the CD-RWs.

If another analysts wanted to access my data, but I was unavailable she could find my published products directory on the ‘T’ drive or on the CD-RWs. I sorted all of my products or research by date, time, and group; and updated the information on each of the storage methods to ensure that the latest information was available to them.

During the deployment I had several of the D6-A machines crash on me. Whenever one of the computer crashed, I usually lost information but the redundancy method ensured my ability to quickly restore old backup data and add my current information to the machine when it was repaired or replaced.

I stored the backup CD-RW with larger datasets in the conference room of the T-SCIF or next to my workstation. I marked the CD-RWs based on the classification level and its content. Unclassified CD-RWs were only labeled with the content type and not marked with classification markings. Early on in the deployment, I only saved and stored the SigActs that were within or near operational environment.

Later I thought it would be easier to just to save all of the SigActs onto a CD-RW. The process would not take very long to complete and so I downloaded the SigActs from CIDNE-I onto a CD-RW. After finishing with CIDNE-I, I did the same with CIDNE-A. By retrieving the CIDNE-I and CIDNE-A SigActs I was able to retrieve the information whenever I needed it, and not rely upon the unreliable and slow SIPRnet connectivity needed to pull. Instead, I could just find the CD-RW and open up a pre-loaded spreadsheet.

This process began in late December 2009 and continued through early January 2010. I could quickly export one month of the SigAct data at a time and download in the background as I did other tasks.

The process took approximately a week for each table. After downloading the SigAct tables, I periodically updated them, by pulling the most recent SigActs and simply copying them and pasting them into the database saved on the CD-RW. I never hid the fact that I had downloaded copies of both the SigAct tables from CIDNE-I and CIDNE-A. They were stored on appropriately labeled and marked CD-RW, stored in the open.

I viewed this the saving copies of CIDNE-I and CIDNE-A as for both for my use and the use of anyone within the S2 section during the SIPRnet connectivity issues.

In addition to the SigAct tables, I had a large repository of HUMINT reports and Counter IED reports downloaded from CIDNE-I. These contained reports that were relevant to the area in and around our operational environment in Eastern Baghdad and the Diyala Province of Iraq.

In order to compress the data to fit onto a CD-RW, I used a compression algorithm called ‘bzip2’. The program used to compress the data is called ‘WinRAR’. WinRAR is an application that is free, and can be easily downloaded from the internet via the Non-Secure Internet Relay Protocol Network or NIPRnet. I downloaded WinRAR on NIPRnet and transfered it to the D6-A machine user profile desktop using a CD-RW. I did not try to hide the fact that I was downloading WinRAR onto my SIPRnet D6-A machine or computer.

With the assistance of the bzip2 algorithm using the WinRAR program, I was able to fit All of the SigActs onto a single CD-RW and relevant HUMINT and Counter ID reports onto a separate CD-RW.

Facts regarding my knowledge of the WikiLeaks Organization or WLO.

I first became vaguely aware of the WLO during my AIT at Fort Huachuca, Arizona, although I did not fully pay attention until the WLO released purported Short Messaging System or SMS messages from 11 September 2001 on 25 November 2009. At that time references to the release and the WLO website showed up in my daily Google news open source search for information related to US foreign policy.

The stories were about how WLO published about approximately 500,000 messages. I then reviewed the messages myself and realized that the posted messages were very likely real given the sheer volume and detail of the content.

After this, I began conducting research on WLO. I conducted searched on both NIPRnet and SIPRnet on WLO beginning in late November 2009 and early December 2009. At this time I also began to routinely monitor the WLO website. In response to one of my searches in 2009, I found the United States Army Counter Intelligence Center or USACIC report on the WikiLeaks organization. After reviewing the report, I believed that this report was possibly the one that my AIT referenced in early 2008.

I may or may not have saved the report on my D6-A workstation. I know I reviewed the document on other occasions throughout early 2010, and saved it on both my primary and secondary laptops. After reviewing the report, I continued doing research on WLO. However, based upon my open-source collection, I discovered information that contradicted the 2008 USACIC report including information that indicated that similar to other press agencies, WLO seemed to be dedicated to exposing illegal activities and corruption.

WLO received numerous award and recognition for its reporting activities. Also, in reviewing the WLO website, I found information regarding US military SOPs for Camp Delta at Guantanamo Bay, Cuba and information on the then outdated rules of engagement for ROE in Iraq for cross-border pursuits of former members of Saddam Hussein [missed word] government.

After seeing the information available on the WLO website, I continued following it and collecting open sources information from it. During this time period, I followed several organizations and groups including wire press agencies such as the Associated Press and Reuters and private intelligence agencies including Strategic Forecasting or Stratfor. This practice was something I was trained to do during AIT, and was something that good analysts were expected to do.

During the searches of WLO, I found several pieces of information that I found useful in my work product in my work as an analyst, specifically I recall WLO publishing documents related to weapons trafficking between two nations that affected my OP. I integrated this information into one or more of my work products.

In addition to visiting the WLO website, I began following WLO using Instand Relay Chat or IRC Client called ‘XChat’ sometime in early January 2010.

IRC is a protocol for real time internet communications by messaging and conferencing, colloquially referred to as chat rooms or chats. The IRC chat rooms are designed for group communication discussion forums. Each IRC chat room is called a channel– similar to a Television where you can tune in or follow a channel– so long as it is open and does not require [missed word].

Once you [missed word] a specific IRC conversation, other users in the conversation can see that you have joined the room. On the Internet there are millions of different IRC channels across several services. Channel topics span a range of topics covering all kinds of interests and hobbies. The primary reason for following WLO on IRC was curiosity– particularly in regards to how and why they obtained the SMS messages referenced above. I believed that collecting information on the WLO would assist me in this goal.

Initially I simply observed the IRC conversations. I wanted to know how the organization was structured, and how they obtained their data. The conversations I viewed were usually technical in nature but sometimes switched to a lively debate on issue the particular individual may have felt strongly about.

Over a period of time I became more involved in these discussions especially when conversations turned to geopolitical events and information technology topics, such as networking and encryption methods. Based on these observations, I would describe the WL organization as almost academic in nature. In addition to the WLO conversations, I participated in numerous other IRC channels acros at least three different networks. The other IRC channels I participated in normally dealt with technical topics including with Linux and Berkley Secure Distribution BSD operating systems or OS’s, networking, encryption algorithms and techniques and other more political topics, such as politics and [missed word].

I normally engaged in multiple IRC conversations simultaneously–mostly publicly, but often privately. The XChat client enabled me to manage these multiple conversations across different channels and servers. The screen for XChat was often busy, but its screens enabled me to see when something was interesting. I would then select the conversation and either observe or participate.

I really enjoyed the IRC conversations pertaining to and involving the WLO, however, at some point in late February or early March of 2010, the WLO IRC channel was no longer accessible. Instead, regular participants of this channel switched to using the Jabber server. Jabber is another internet communication [missed word] similar but more sophisticated than IRC.

The IRC and Jabber conversations, allowed me to feel connected to others even when alone. They helped pass the time and keep motivated throughout the deployment.

Facts regarding the unauthorized storage and disclosure of the SigActs.

As indicated above I created copies of the CIDNE-I and CIDNE-A SigAct tables as part of the process of backing up information. At the time I did so, I did not intend to use this information for any purpose other than for back up. However, I later decided to release this information publicly. At that time, I believe and still believe that these tables are two of the most significant documents of our time.

On 8 January 2010, I collected the CD-RW I stored in the conference room of the T-SCIF and placed it into the cargo pocket of my ACU or Army Combat Uniform. At the end of my shift, I took the CD-RW out of the T-SCIF and brought it to my Containerized Housing Unit of CHU. I copied the data onto my personal laptop. Later at the beginning of my shift, I returned the CD-RW back to the conference room of the T-SCIF. At the time I saved the SigActs to my laptop, I planned to take them with me on mid-tour leave and decide what to do with them.

At some point prior to my mid-tour, I transfered the information from my computer to a Secure Digital memory card from my digital camera. The SD card for the camera also worked on my computer and allowed me to store the SigAct tables in a secure manner for transport.

I began mid-tour leave on 23 January 2010, flying from Atlanta, Georgia to Reagan National Airport in Virginia. I arrived at the home of my aunt, Debra M. Van Alstyne, in Potomac, Maryland and quickly got into contact with my then boyfriend, Tyler R. Watkins. Tyler, then a student at Brandeis University in Waltham, Massachusetts, and I made plans for me to visit him him Boston, Massachusetts [missed word].

I was excited to see Tyler and planned on talking to Tyler about where our relationship was going and about my time in Iraq. However, when I arrived in the Boston area Tyler and I seemed to become distant. He did not seem very excited about my return from Iraq. I tried talking to him about our relationship but he refused to make any plans.

I also tried to raising the topic of releasing the CIDNE-I and CIDNE-A SigAct tables to the public. I asked Tyler hypothetical questions about what he would do if he had documents that he thought the public needed access to. Tyler really didn’t have a specific answer for me. He tried to answer the questions and be supportive, but seemed confused by the question in this context.

I then tried to be more specific, but he asked too many questions. Rather than try to explain my dilemma, I decided to just drop the conversation. After a few days in Waltham, I began to feel really bad. I was over staying my welcome, and I returned to Maryland. I spent the remainder of my time on leave in the Washington, DC area.

During this time a blizzard bombarded the mid-atlantic, and I spent a significant period of time essentially stuck in my aunt’s house in Maryland. I began to think about what I knew and the information I still had in my possession. For me, the SigActs represented the on the ground reality of both the conflicts in Iraq and Afghanistan.

I felt that we were risking so much for people that seemed unwilling to cooperate with us, leading to frustration and anger on both sides. I began to become depressed with the situation that we found ourselves increasingly mired in year after year. The SigActs documented this in great detail and provide a context of what we were seeing on the ground.

In attempting to conduct counter-terrorism or CT and counter-insurgency COIN operations we became obsessed with capturing and killing human targets on lists and not being suspicious of and avoiding cooperation with our Host Nation partners, and ignoring the second and third order effects of accomplishing short-term goals and missions. I believe that if the general public, especially the American public, had access to the information contained within the CIDNE-I and CIDNE-A tables this could spark a domestic debate on the role of the military and our foreign policy in general as [missed word] as it related to Iraq and Afghanistan.

I also believed the detailed analysis of the data over a long period of time by different sectors of society might cause society to reevaluate the need or even the desire to even to engage in counterterrorism and counterinsurgency operations that ignore the complex dynamics of the people living in the effected environment everyday.

At my aunt’s house I debated what I should do with the SigActs– in particular whether I should hold on to them– or expose them through a press agency. At this point I decided that it made sense to try to expose the SigAct tables to an American newspaper. I first called my local news paper, The Washington Post, and spoke with a woman saying that she was a reporter. I asked her if the Washington Post would be interested in receiving information that would have enormous value to the American public.

Although we spoke for about five minutes concerning the general nature of what I possessed, I do not believe she took me seriously. She informed me that the Washington Post would possibly be interested, but that such decisions were made only after seeing the information I was referring to and after consideration by senior editors.

I then decided to contact [missed word] the most popular newspaper, The New York Times. I called the public editor number on The New York Times website. The phone rang and was answered by a machine. I went through the menu to the section for news tips. I was routed to an answering machine. I left a message stating I had access to information about Iraq and Afghanistan that I believed was very important. However, despite leaving my Skype phone number and personal email address, I never received a reply from The New York Times.

I also briefly considered dropping into the office for the Political Commentary blog, Politico, however the weather conditions during my leave hampered my efforts to travel. After these failed efforts I had ultimately decided to submit the materials to the WLO. I was not sure if the WLO would actually publish these SigAct tables [missed a few words]. I was concerned that they might not be noticed by the American media. However, based upon what I read about the WLO through my research described above, this seemed to be the best medium for publishing this information to the world within my reach.

At my aunts house I joined in on an IRC conversation and stated I had information that needed to be shared with the world. I wrote that the information would help document the true cost of the wars in Iraq and Afghanistan. One of the individuals in the IRC asked me to describe the information. However, before I could describe the information another individual pointed me to the link for the WLO web site online submission system. After ending my IRC connection, I considered my options one more time. Ultimately, I felt that the right thing to do was to release the SigActs.

On 3 February 2010, I visited the WLO website on my computer and clicked on the submit documents link. Next I found the submit your information online link and elected to submit the SigActs via the onion router or TOR anonymizing network by special link. TOR is a system intended to provide anonymity online. The software routes internet traffic through a network of servers and other TOR clients in order to conceal the user’s location and identity.

I was familiar with TOR and had it previously installed on a computer to anonymously monitor the social media website of militia groups operating within central Iraq. I followed the prompts and attached the compressed data files of CIDNE-I and CIDNE-A SigActs. I attached a text file I drafted while preparing to provide the documents to the Washington Post. It provided rough guidelines saying ‘It’s already been sanitized of any source identifying information. You might need to sit on this information– perhaps 90 to 100 days to figure out how best to release such a large amount of data and to protect its source. This is possibly one of the more significant documents of our time removing the fog of war and revealing the true nature of twenty-first century asymmetric warfare. Have a good day.’

After sending this, I left the SD card in a camera case at my aunt’s house in the event I needed it again in the future. I returned from mid-tour leave on 11 February 2010. Although the information had not yet been publicly by the WLO, I felt this sense of relief by them having it. I felt I had accomplished something that allowed me to have a clear conscience based upon what I had seen and read about and knew were happening in both Iraq and Afghanistan everyday.

Facts regarding the unauthorized storage and disclosure of 10 Reykjavik 13.

I first became aware of the diplomatic cables during my training period in AIT. I later learned about the Department of State or DoS Net-centric Diplomacy NCD portal from the 2/10 Brigade Combat Team S2, Captain Steven Lim. Captain Lim sent a section wide email to the other analysts and officer in late December 2009 containing the SIPRnet link to the portal along with the instructions to look at the cables contained within them and to incorporate them into our work product.

Shortly after this I also noticed the diplomatic cables were being reported to in products from the corp level US Forces Iraq or US-I. Based upon Captain Lim’s direction to become familiar with its contents, I read virtually every published cable concerning Iraq.

I also began scanning the database and reading other random cables that piqued my curiosity. It was around this time– in early to mid-January of 2010, that I began searching the database for information on Iceland. I became interested in Iceland due to the IRC conversations I viewed in the WLO channel discussing an issue called Icesave. At this time I was not very familiar with the topic, but it seemed to be a big issue for those participating in the conversation. This is when I decided to investigate and conduct a few searches on Iceland and find out more.

At the time, I did not find anything discussing the Icesave issue either directly or indirectly. I then conducted an open source search for Icesave. I then learned that Iceland was involved in a dispute with the United Kingdom and the Netherlands concerning the financial collapse of one or more of Iceland’s banks. According to open source reporting much of the public controversy involved the United Kingdom’s use of anti-terrorism legislation against Iceland in order to freeze Icelandic access for payment of the guarantees for UK depositors that lost money.

Shortly after returning from mid-tour leave, I returned to the Net Centric Diplomacy portal to search for information on Iceland and Icesave as the topic had not abated on the WLO IRC channel. To my surprise, on 14 February 2010, I found the cable 10 Reykjavik 13, which referenced the Icesave issue directly.

The cable published on 13 January 2010 was just over two pages in length. I read the cable and quickly concluded that Iceland was essentially being bullied diplomatically by two larger European powers. It appeared to me that Iceland was out viable options and was coming to the US for assistance. Despite the quiet request for assistance, it did not appear that we were going to do anything.

From my perspective it appeared that we were not getting involved due to the lack of long term geopolitical benefit to do so. After digesting the contents of 10 Reykjavik 13 I debated whether this was something I should send to the WLO. At this point the WLO had not published or acknowledged receipt of the CIDNE-I and CIDNE-A tables. Despite not knowing that the SigActs were a priority for the WLO, I decided the cable was something that would be important. I felt that I would be able to right a wrong by having them publish this document. I burned the information onto a CD-RW on 15 February 2010, took it to my CHU, and saved it onto my personal laptop.

I navigated to the WLO website via a TOR connection like before and uploaded the document via the secure form. Amazingly, when WLO published 10 Reykjavik 13 within hours, proving that the form worked and that they must have received the SigAct tables.

Facts regarding the unauthorized storage and disclosure of the 12 July 2007 aerial weapons team or AW team video.

During the mid-February 2010 time frame the 2nd Brigade Combat Team, 10th Mountain Division targeting analysts, then Specialist Jihrleah W. Showman discussed a video that Ms. Showman had found on the ‘T’ drive.

The video depicted several individuals being engaged by an aerial weapons team. At first I did not consider the video very special, as I have viewed countless other war porn type videos depicting combat. However, the recording of audio comments by the aerial weapons team crew and the second engagement in the video of an unarmed bongo truck troubled me.

As Showman and a few other analysts and officers in the T-SCIF commented on the video and debated whether the crew violated the rules of engagement or ROE in the second engagement, I shied away from this debate, instead conducting some research on the event. I wanted to learn what happened and whether there was any background to the events of the day that the event occurred, 12 July 2007.

Using Google I searched for the event by its date by its general location. I found several new accounts involving two Reuters employees who were killed during the aerial weapon team engagement. Another story explained that Reuters had requested for a copy of the video under the Freedom of Information Act or FOIA. Reuters wanted to view the video in order to understand what had happened and to improve their safety practices in combat zones. A spokesperson for Reuters was quoted saying that the video might help avoid the reoccurrence of the tragedy and believed there was a compelling need for the immediate release of the video.

Despite the submission of the FOIA request, the news account explained that CENTCOM replied to Reuters stating that they could not give a time frame for considering a FOIA request and that the video might no longer exist. Another story I found written a year later said that even though Reuters was still pursuing their request. They still did not receive a formal response or written determination in accordance with FOIA.

The fact neither CENTCOM or Multi National Forces Iraq or MNF-I would not voluntarily release the video troubled me further. It was clear to me that the event happened because the aerial weapons team mistakenly identified Reuters employees as a potential threat and that the people in the bongo truck were merely attempting to assist the wounded. The people in the van were not a threat but merely ‘good samaritans’. The most alarming aspect of the video to me, however, was the seemly delightful bloodlust they appeared to have.

They dehumanized the individuals they were engaging and seemed to not value human life by referring to them as quote “dead bastards” unquote and congratulating each other on the ability to kill in large numbers. At one point in the video there is an individual on the ground attempting to crawl to safety. The individual is seriously wounded. Instead of calling for medical attention to the location, one of the aerial weapons team crew members verbally asks for the wounded person to pick up a weapon so that he can have a reason to engage. For me, this seems similar to a child torturing ants with a magnifying glass.

While saddened by the aerial weapons team crew’s lack of concern about human life, I was disturbed by the response of the discovery of injured children at the scene. In the video, you can see that the bongo truck driving up to assist the wounded individual. In response the aerial weapons team crew– as soon as the individuals are a threat, they repeatedly request for authorization to fire on the bongo truck and once granted they engage the vehicle at least six times.

Shortly after the second engagement, a mechanized infantry unit arrives at the scene. Within minutes, the aerial weapons team crew learns that children were in the van and despite the injuries the crew exhibits no remorse. Instead, they downplay the significance of their actions, saying quote ‘Well, it’s their fault for bringing their kid’s into a battle’ unquote.

The aerial weapons team crew members sound like they lack sympathy for the children or the parents. Later in a particularly disturbing manner, the aerial weapons team verbalizes enjoyment at the sight of one of the ground vehicles driving over a body– or one of the bodies. As I continued my research, I found an article discussing the book, The Good Soldiers, written by Washington Post writer David Finkel.

In Mr. Finkel book, he writes about the aerial weapons team attack. As, I read an online excerpt in Google Books, I followed Mr. Finkel’s account of the event belonging to the video. I quickly realize that Mr. Finkel was quoting, I feel in verbatim, the audio communications of the aerial weapons team crew.

It is clear to me that Mr. Finkel obtained access and a copy of the video during his tenue as an embedded journalist. I was aghast at Mr. Finkel’s portrayal of the incident. Reading his account, one would believe the engagement was somehow justified as ‘payback’ for an earlier attack that lead to the death of a soldier. Mr. Finkel ends his account by discussing how a soldier finds an individual still alive from the attack. He writes that the soldier finds him and sees him gesture with his two forefingers together, a common method in the Middle East to communicate that they are friendly. However, instead of assisting him, the soldier makes an obscene gesture extending his middle finger.

The individual apparently dies shortly thereafter. Reading this, I can only think of how this person was simply trying to help others, and then he quickly finds he needs help as well. To make matter worse, in the last moments of his life, he continues to express his friendly gesture– only to find himself receiving this well known gesture of unfriendliness. For me it’s all a big mess, and I am left wondering what these things mean, and how it all fits together. It burdens me emotionally.

I saved a copy of the video on my workstation. I searched for and found the rules of engagement, the rules of engagement annexes, and a flow chart from the 2007 time period– as well as an unclassified Rules of Engagement smart card from 2006. On 15 February 2010 I burned these documents onto a CD-RW, the same time I burned the 10 Reykjavik 13 cable onto a CD-RW. At the time, I placed the video and rules for engagement information onto my personal laptop in my CHU. I planned to keep this information there until I redeployed in Summer 2010. I planned on providing this to the Reuters office in London to assist them in preventing events such as this in the future.

However, after the WLO published 10 Reykjavik 13 I altered my plans. I decided to provide the video and the rules of engagement to them so that Reuters would have this information before I re-deployed from Iraq. On about 21 February 2010, I described above, I used the WLO submission form and uploaded the documents. The WLO released the video on 5 April 2010. After the release, I was concern about the impact of the video and how it would been received by the general public.

I hoped that the public would be as alarmed as me about the conduct of the aerial weapons team crew members. I wanted the American public to know that not everyone in Iraq and Afghanistan are targets that needed to be neutralized, but rather people who were struggling to live in the pressure cooker environment of what we call asymmetric warfare. After the release I was encouraged by the response in the media and general public, who observed the aerial weapons team video. As I hoped, others were just as troubled– if not more troubled that me by what they saw.

At this time, I began seeing reports claiming that the Department of Defense an CENTCOM could not confirm the authenticity of the video. Additionally, one of my supervisors, Captain Casey Fulton, stated her belief that the video was not authentic. In her response, I decided to ensure that the authenticity of the video would not be questioned in the future. On 25 February 2010, I emailed Captain Fulton, a link to the video that was on our ‘T’ drive, and a copy of the video published by WLO that was collected by the open source center, so she could compare them herself.

Around this time frame, I burned a second CD-RW containing the aerial weapons team video. In order to made it appear authentic, I placed a classification sticker and wrote Reuters FOIA REQ on its face. I placed the CD-RW in one of my personal CD cases containing a set of ‘Starting Out in Arabic CD’s.’ I planned on mailing out the CD-RW to Reuters after our re-deployment, so they could have a copy that was unquestionably authentic.

Almost immediately after submitting the aerial weapons team video and rules of engagement documents I notified the individuals in the WLO IRC to expect an important submission. I received a response from an individual going by the handle of ‘ox’– at first our conversations were general in nature, but over time as our conversations progressed, I accessed this individual to be an important part of the WLO.

Due to the strict adherence of anonymity by the WLO, we never exchanged identifying information. However, I believe the individual was likely Mr. Julian Assange [he pronounced it with three syllables], Mr. Daniel Schmidt, or a proxy representative of Mr. Assange and Schmidt.

As the communications transfered from IRC to the Jabber client, I gave ‘ox’ and later ‘pressassociation’ the name of Nathaniel Frank in my address book, after the author of a book I read in 2009.

After a period of time, I developed what I felt was a friendly relationship with Nathaniel. Our mutual interest in information technology and politics made our conversations enjoyable. We engaged in conversation often. Sometimes as long as an hour or more. I often looked forward to my conversations with Nathaniel after work.

The anonymity that was provided by TOR and the Jabber client and the WLO’s policy allowed me to feel I could just be myself, free of the concerns of social labeling and perceptions that are often placed upon me in real life. In real life, I lacked a closed friendship with the people I worked with in my section, the S2 section.

In my section, the S2 section supported battalions and the 2nd Brigade Combat Team as a whole. For instance, I lacked close ties with my roommate to his discomfort regarding my perceived sexual orientation. Over the next few months, I stayed in frequent contact with Nathaniel. We conversed on nearly a daily basis and I felt that we were developing a friendship.

Conversations covered many topics and I enjoyed the ability to talk about pretty much everything, and not just the publications that the WLO was working on. In retrospect that these dynamics were artificial and were valued more by myself than Nathaniel. For me these conversations represented an opportunity to escape from the immense pressures and anxiety that I experienced and built up through out the deployment. It seems that as I tried harder to fit in at work, the more I seemed to alienate my peers and lose respect, trust, and support I needed.

Facts regarding the unauthorized storage and disclosure of documents related to the detainments by the Iraqi Federal Police or FP, and the Detainee Assessment Briefs, and the USACIC United States Army Counter Intelligence Center report.

On 27 February 2010, a report was received from a subordinate battalion. The report described an event in which the Federal Police or FP detained 15 individuals for printing anti-Iraqi literature. On 2 March 2010, I received instructions from an S3 section officer in the 2nd Brigade Combat Team, 10th Mountain Division Tactical Operation Center or TOC to investigate the matter, and figure out who the quote ‘bad guys’ unquote were and how significant this event was for the Federal Police.

Over the course of my research I found that none of the individuals had previous ties to anti-Iraqi actions or suspected terrorist militia groups. A few hours later, I received several [playlist?] from the scene– from this subordinate battalion. They were accidentally sent to an officer on a different team on the S2 section and she forwarded them to me.

These photos included picture of the individuals, pallets of unprinted paper and seized copies of the final printed material or the printed document; and a high resolution photo of the printed material itself. I printed up one [missed word] copy of a high resolution photo– I laminated it for ease of use and transfer. I then walked to the TOC and delivered the laminated copy to our category two interpreter.

She reviewed the information and about a half and hour later delivered a rough written transcript in English to the S2 section. I read the transcript and followed up with her, asking her for her take on the content. She said it was easy for her to transcribe verbatim, since I blew up the photograph and laminated it. She said the general nature of the document was benign. The document, as I had sensed as well, was merely a scholarly critique of the then current Iraqi Prime Minister Nouri al-Maliki.

It detailed corruption within the cabinet of al-Maliki’s government and the financial impact of his corruption on the Iraqi people. After discovering this discrepancy between the Federal Police’s report and the interpreter’s transcript, I forwarded this discovery to the top OIC and the battle NCOIC. The top OIC and the overhearing battle captain informed me that they didn’t need or want to know this information anymore. They told me to quote “drop it” unquote and to just assist them and the Federal Police in finding out, where more of these print shops creating quote’ anti-Iraqi literature’ unquote.

I couldn’t believe what I heard and I returned to the T-SCIF and complained to the other analysts and my section NCOIC about what happened. Some were sympathetic, but no one wanted to do anything about it.

I am the type of person who likes to know how things work. And, as an analyst, this means I always want to figure out the truth. Unlike other analysts in my section or other sections within the 2nd Brigade Combat Team, I was not satisfied with just scratching the surface and producing canned or cookie cutter assessments. I wanted to know why something was the way it was, and what we could to correct or mitigate a situation.

I knew that if I continued to assist the Baghdad Federal Police in identifying the political opponents of Prime Minister al-Maliki, those people would be arrested and in the custody of the Special Unit of the Baghdad Federal Police and very likely tortured and not seen again for a very long time– if ever.

Instead of assisting the Special Unit of the Baghdad Federal Police, I decided to take the information and expose it to the WLO, in the hope that before the upcoming 7 March 2010 election, they could generate some immediate press on the issue and prevent this unit of the Federal Police from continuing to crack down in political opponents of al-Maliki.

On 4 March 2010, I burned the report, the photos, the high resolution copy of the pamphlet, and the interpreters hand written transcript onto a CD-RW. I took the CD-RW to my CHU and copied the data onto my personal computer. Unlike the times before, instead of uploading the information through the WLO website submission form. I made a Secure File Transfer Protocol or SFTP connection to a file drop box operated by the WLO.

The drop box contained a folder that allowed me to upload directly into it. Saving files into this directory. Allowed anyone with log in access to server to view and download them. After uploading these files to the WLO, on 5 March 2010, I notified Nathaniel over Jabber. Although sympathetic, he said that the WLO needed more information to confirm the event in order for it to be published or to gain interest in the international media.

I attempted to provide the specifics, but to my disappointment, the WLO website chose not to publish this information. At the same time, I began sifting through information from the US Southern Command or SOUTHCOM and Joint Task Force Guantanamo, Cuba or JTF-GTMO. The thought occurred to me– although unlikely, that I wouldn’t be surprised if the individuals detainees by the Federal Police might be turned over back into US custody– and ending up in the custody of Joint Task Force Guantanamo.

As I digested through the information on Joint Task Force Guantanamo, I quickly found the Detainee Assessment Briefs or DABs. I previously came across the document’s before in 2009 but did not think much about them. However, this time I was more curious in this search and I found them again.

The DABs were written in standard DoD memorandum format and addressed the commander US SOUTHCOM. Each memorandum gave basic and background information about a detainee held at some point by Joint Task Force Guantanamo. I have always been interested on the issue of the moral efficacy of our actions surrounding Joint Task Force Guantanamo. On the one hand, I have always understood the need to detain and interrogate individuals who might wish to harm the United States and our allies, however, I felt that what we were trying to do at Joint Task Force Guantanamo.

However, the more I became educated on the topic, it seemed that we found ourselves holding an increasing number of individuals indefinitely that we believed or knew to be innocent, low level foot soldiers that did not have useful intelligence and would be released if they were still held in theater.

I also recall that in early 2009 the, then newly elected president, Barack Obama, stated that he would close Joint Task Force Guantanamo, and that the facility compromised our standing over all, and diminished our quote ‘moral authority’ unquote.

After familiarizing myself with the Detainee Assessment Briefs, I agree. Reading through the Detainee Assessment Briefs, I noticed that they were not analytical products, instead they contained summaries of tear line versions of interim intelligence reports that were old or unclassified. None of the DABs contained the names of sources or quotes from tactical interrogation reports or TIR’s. Since the DABs were being sent to the US SOUTHCOM commander, I assessed that they were intended to provide very general background information on each of the detainees and not a detailed assessment.

In addition to the manner in which the DAB’s were written, I recognized that they were at least several years old, and discussed detainees that were already released from Joint Task Force Guantanamo. Based on this, I determined that the DAB’s were not very important fro either an intelligence or a national security standpoint. On 7 March 2010, during my Jabber conversation with Nathaniel, I asked him if he thought the DAB’s were of any use to anyone.

Nathaniel indicated, although he did not believe that they were of political significance, he did believe that they could be used to merge into the general historical account of what occurred at Joint Task Force Guantanamo. He also thought that the DAB’s might be helpful to the legal counsel of those currently and previously held at JTF-GTMO.

After this discussion, I decided to download the data. I used an application called Wget to download the DAB’s. I downloaded Wget off of the NIPRnet laptop in the T-SCIF, like other programs. I saved that onto a CD-RW, and placed the executable in my ‘My Documents’ directory on my user profile, on the D6-A SIPRnet workstation.

On 7 March 2010, I took the list of links for the detainee assessment briefs, and Wget downloaded them sequentially. I burned the data onto a CD-RW, and took it into my CHU, and copied them onto my personal computer. On 8 March 2010, I combined the Detainee Assessment Briefs with the United States Army Counterintelligence Center reports on the WLO, into a compressed IP file. Zip files contain multiple files which are compressed to reduce their size.

After creating the zip file, I uploaded the file onto their cloud drop box via Secure File Transfer Protocol. Once these were uploaded, I notified Nathaniel that the information was in the ‘x’ directory, which had been designated for my own use. Earlier that day, I downloaded the USACIC report on WLO.

As discussed about, I previously reviewed the report on numerous occasions and although I saved the document onto the work station before, I could not locate it. After I found the document again, I downloaded it to my work station, and saved it onto the same CD-RW as the Detainee Assessment Briefs described above.

Although my access included a great deal of information, I decided I had nothing else to send to WLO after sending the Detainee Assessment Briefs and the USACIC report. Up to this point I had sent them the following: the CIDNE-I and CIDNE-A SigActs tables; the Reykjavik 13 Department of State Cable; the 12 July 2007 aerial weapons team video and the 2006-2007 rules of engagement documents; the SigAct report and supporting documents concerning the 15 individuals detained by the Baghdad Federal Police; the USSOUTHCOM and Joint Task Force Guantanamo Detainee Assessment Briefs; a USACIC report on the WikiLeaks website and the WikiLeaks organization.

Over the next few weeks I did not send any additional information to the WLO. I continued to converse with Nathaniel over the Jabber client and in the WLO IRC channel. Although I stopped sending documents to WLO, no one associated with the WLO pressures me into giving more information. The decisions that I made to send documents and information to the WLO and the website were my own decisions, and I take full responsibility for my actions.

Facts regarding the unauthorized disclosure of Other Government Documents.

One 22 March 2010, I downloaded two documents. I found these documents over the course of my normal duties as an analysts. Based on my training and the guidance of my superiors, I look at as much information as possible.

Doings so provided me with the ability to make connections that others might miss. On several occasions during the month of March, I accessed information from a Government entity. I read several documents from a section within this Government entity. The content of two of these documents upset me greatly. I had difficulty believing what this section was doing.

On 22 March 2010, I downloaded the two documents that I found troubling. I compressed them into a zip file named blah.zip and burned them onto a CD-RW. I took the CD-RW to my CHU and saved the file to my personal computer.

I uploaded the information to the WLO website using the designated prompts.

Facts regarding the unauthorized storage and disclosure of the Net Centric Diplomacy Department of State Cables.

In late March of 2010, I received a warning over Jabber from Nathaniel, that the WLO website would be publishing the aerial weapons team video. He indicated that the WLO would be very busy and the frequency and intensity of our Jabber conversations decrease significantly. During this time, I had nothing but work to distract me.

I read more of the diplomatic cables published on the Department of State Net Centric Diplomacy. With my insatiable curiosity and interest in geopolitics I became fascinated with them. I read not only the cables on Iraq, but also about countries and events that I found interesting.

The more I read, the more I was fascinated with the way that we dealt with other nations and organizations. I also began to think the documented backdoor deals and seemingly criminal activity that didn’t seem characteristic of the de facto leader of the free world.

Up to this point,during the deployment, I had issues I struggled with and difficulty at work. Of the documents release, the cables were the only one I was not absolutely certain couldn’t harm the United States. I conducted research on the cables published on the Net Centric Diplomacy, as well as how Department of State cables worked in general.

In particular, I wanted to know how each cable was published on SIRPnet via the Net Centric Diplomacy. As part of my open source research, I found a document published by the Department of State on its official website.

The document provided guidance on caption markings for individual cables and handling instructions for their distribution. I quickly learned the caption markings clearly detailed the sensitivity of the Department of State cables. For example, NODIS or No Distribution was used for messages at the highest sensitivity and were only distributed to the authorized recipients.

The SIPDIS or SIPRnet distribution caption was applied only to recording of other information messages that were deemed appropriate for a release for a wide number of individuals. According to the Department of State guidance for a cable to have the SIPDIS [missed word] caption, it could not include other captions that were intended to limit distribution.

The SIPDIS caption was only for information that could only be shared with anyone with access to SIPRnet. I was aware that thousands of military personel, DoD, Department of State, and other civilian agencies had easy access to the tables. The fact that the SIPDIS caption was only for wide distribution made sense to me, given that the vast majority of the Net Centric Diplomacy Cables were not classified.

The more I read the cables, the more I came to the conclusion that this was the type of information that should become public. I once read a and used a quote on open diplomacy written after the First World War and how the world would be a better place if states would avoid making secret pacts and deals with and against each other.

I thought these cables were a prime example of a need for a more open diplomacy. Given all of the Department of State cables that I read, the fact that most of the cables were unclassified, and that all the cables have a SIPDIS caption.

I believe that the public release of these cables would not damage the United States, however, I did believe that the cables might be embarrassing, since they represented very honest opinions and statements behind the backs of other nations and organizations.

In many ways these cables are a catalogue of cliques and gossip. I believed exposing this information might make some within the Department of State and other government entities unhappy. On 22 March 2010, I began downloading a copy of the SIPDIS cables using the program Wget, described above.

I used instances of the Wget application to download the Net Centric Diplomacy cables in the background. As I worked on my daily tasks, the Net centric Diplomacy cables were downloaded from 28 March 2010 to 9 April 2010. After downloading the cables, I saved them on to a CD-RW.

These cables went from the earliest dates in Net Centric Diplomacy to 28 February 2010. I took the CD-RW to my CHU on 10 April 2010. I sorted the cables on my personal computer, compressed them using the bzip2 compression algorithm described above, and uploaded them to the WLO via designated drop box described above.

On 3 May 2010, I used Wget to download and update of the cables for the months of March 2010 and April 2010 and saved the information onto a zip file and burned it to a CD-RW. I then took the CD-RW to my CHU and saved those to my computer. I later found that the file was corrupted during the transfer. Although I intended to re-save another copy of these cables, I was removed from the T-SCIF on 8 May 2010 after an altercation.

Facts regarding the unauthorized storage and disclosure of Garani, Farah Province Afghanistan 15-6 Investigation and Videos.

[NB Pfc. Manning plead ‘not guilty’ to the Specification 11, Charge II for the Garani Video as charged by the government, which alleged as November charge date. Read more here.]

In late March 2010, I discovered a US CENTCOM directly on a 2009 airstrike in Afghanistan. I was searching CENTCOM I could use as an analyst. As described above, this was something that myself and other officers did on a frequent basis. As I reviewed the incident and what happened. The airstrike occurred in the Garani village in the Farah Province, Northwestern Afghanistan. It received worldwide press coverage during the time as it was reported that up to 100 to 150 Afghan civilians– mostly women and children– were accidentally killed during the airstrike.

After going through the report and the [missed word] annexes, I began to review the incident as being similar to the 12 July 2007 aerial weapons team engagements in Iraq. However, this event was noticeably different in that it involved a significantly higher number of individuals, larger aircraft and much heavier munitions. Also, the conclusions of the report are more disturbing than those of the July 2007 incident.

I did not see anything in the 15-6 report or its annexes that gave away sensitive information. Rather, the investigation and its conclusions were– what those involved should have done, and how to avoid an event like this from occurring again.

After investigating the report and its annexes, I downloaded the 15-6 investigation, PowerPoint presentations, and several other supporting documents to my D6-A workstation. I also downloaded three zip files containing the videos of the incident. I burned this information onto a CD-RW and transfered it to the personal computer in my CHU. I did later that day or the next day– I uploaded the information to the WL website this time using a new version of the WLO website submission form.

Unlike other times using the submission form above, I did not activate the TOR anonymizer. Your Honor, this concludes my statement and facts for this providence inquiry.

http://www.stopwar.org.uk/index.php/usa-war-on-terror/2287-why-bradley-mannings-statement-should-be-taught-in-every-american-school

United by Loss, Israeli & Palestinian Dads Call for a Joint Nonviolent Intifada Against Occupation

 

As protests grow in the West Bank over the death of a Palestinian inside an Israeli prison, we speak to a pair of Israeli and Palestinian fathers who’ve responded to personal tragedies with activism for peace. Bassam Aramin and Rami Elhanan united after the killings of their daughters — Aramin’s at the hands of an Israeli officer and Elhanan’s in a Palestinian suicide bombing. Once dedicated fighters for their respective causes, they have since renounced violence and become leading voices for peace. Their stories are told in the new documentary film, “Within the Eye of the Storm,” a film by Shelley Hermon. With talk of a third intifada potentially breaking out in the occupied Palestinian territories, Aramin and Elhanan join us to discuss their shared journey and why they believe both Israelis and Palestinians should join a nonviolent uprising against the Israeli occupation. [includes rush transcript]

Guests:

Bassam Aramin, former Fatah fighter, now a peace activist with Combatants for Peace. Spent seven years in an Israeli prison. His 10-year-old daughter, Abir, was killed on January 16, 2007, when an Israeli Border Police jeep fired rubber bullets in a school zone. Bassam Aramin is featured in the new documentary called Within the Eye of the Storm. The film was made with partners like The Sundance Institute, France 5 TV, and Makor & Gesher Foundations for Cinema.

Rami Elhanan, former Israeli reserve soldier turned peace activist with Combatants for Peace. He is a leading member of “Parents Circle-Families Forum,” an organization for those who lost children in conflict but nevertheless want peace. His 14-year-old daughter, Smadar, was killed in a suicide bombing in Jerusalem in September 1997. Rami Elhanan is featured in the new documentary called Within the Eye of the Storm. The film was made with partners like The Sundance Institute, France 5 TV, and Makor & Gesher Foundations for Cinema.

Rush Transcript

This transcript is available free of charge. However, donations help us provide closed captioning for the deaf and hard of hearing on our TV broadcast. Thank you for your generous contribution. Donate >

Transcript

AARON MATÉ: The death of a Palestinian prisoner in Israeli custody has sparked new protests in the occupied West Bank and even talk of a third intifada. The Israeli government claims the prisoner, Arafat Jaradat, died of a heart attack, but Palestinians say he succumbed to wounds sustained during a brutal torture. At a news conference in Ramallah, the Palestinian Authority minister for prisoner affairs said Israel is responsible for Jaradat’s death.

ISSA QARAQEA: [translated] There were visible marks in the autopsy that made it clear that the detainee Arafat Jaradat was badly tortured, which caused his immediate death. Israel bears responsibility for killing him during the interrogation.

AARON MATÉ: Arafat Jaradat had been arrested for throwing rocks at Israeli settlers.

Well, on Monday, thousands turned out as he was laid to rest in his home village of Sair. More than a dozen Palestinians were reportedly wounded in the ensuing clashes with Israeli soldiers across the West Bank.

Jaradat’s death comes amidst a sustained campaign over the plight of more than 4,500 Palestinian prisoners in Israeli jails. Around 3,000 Palestinian prisoners recently refused to eat meals in solidarity with five hunger-striking detainees. Protests in support of the prisoners have led to several clashes with Israeli troops over the past week. In the face of the growing outrage and with President Obama set to visit the region next month, Israel has asked the Palestinian Authority to contain the protests.

The conditions on the ground recall those that sparked the First Intifada in 1987, reviving speculation that we are potentially witnessing the dawn of a third uprising against Israeli occupation.

AMY GOODMAN: Well, we’re going to turn now to a new documentary about a Palestinian and an Israeli who were once dedicated fighters for their respective causes but have since renounced violence and become leading voices for peace. Both of the men, Bassam Aramin and Rami Elhanan, came face-to-face with the price of war when their young daughters were killed, one by Israeli border police and the other by a Palestinian suicide bomber. The film is called Within the Eye of the Storm. It chronicles these two men’s personal stories and their unlikely friendship. This is a clip from the film.

RAMI ELHANAN: [translated] On the 4th of September, 1997, two Palestinian terrorists blew themselves up. They killed five people that day. One of them was my daughter, Smadar.

BASSAM ARAMIN: [translated] I got a call from my eldest daughter, Arin. She was yelling, “Abir, Abir, Daddy! She was shot in the head by soldiers, and she is wounded.” I was in an Israeli prison for seven years when I was 17. I believed in eliminating the other side, which I didn’t even know.

RAMI ELHANAN: [translated] I never gave a thought to the other side. I didn’t consider that another side existed. I went through a process.

AMY GOODMAN: A clip from the trailer of the new documentary, Within the Eye of the Storm.

For more, we go to Washington, D.C., where we’re joined by Bassam Aramin and Rami Elhanan. Bassam, a former Fatah fighter, now a peace activist with Combatants for Peace, spent seven years in an Israeli prison. His 10-year-old daughter Abir was killed January 16, 2007, when an Israeli border police chief fired rubber bullets in a school zone. And Rami is a former Israeli reserve soldier turned peace activist, leading member of Parents Circle-Families Forum, an organization for those who lost children in conflict but nevertheless want peace. His 14-year-old daughter Smadar was killed in a suicide bombing in Jerusalem in September of ’97.

Bassam Aramin and Rami Elhanan, welcome to Democracy Now! You come at a very difficult time, if there is any time that isn’t difficult in the Occupied Territories. Bassam, what message do you have for President Obama as he is about to leave for Israel?

BASSAM ARAMIN: Yes, we have actually a hope that Mr. Obama will make a difference this time, not to wait for another four years. I ask him to stop the unconditional support for one side against the other, because it doesn’t help us. We will continue fight each other because of this policy, so please be objective, and be pro-Palestine-and-Israel, and be pro-peace.

AARON MATÉ: Bassam, we said at the top that there’s talk of this starting a third intifada. Do you think that’s accurate?

BASSAM ARAMIN: You know, actually, since like many months, the situation in Palestine is very bad. The behavior of the Israeli occupation became more aggressive. The killing of Arafat Jaradat, who is from my village, it’s too much. It’s too much, actually. The Palestinian people have no hope. They cannot continue living under this brutal occupation, by this way, without any hope. And we always actually call for the third intifada, which must be a different one. We call for a Palestinian-Israeli intifada against our common enemy: the Israeli occupation. We must join forces, Israelis and Palestinians, to end this occupation by nonviolent intifada, which must be started.

AMY GOODMAN: Rami Elhanan, you lost your daughter, as did Bassam. Do you share Bassam’s view on this? What would an Israeli-Palestinian intifada look like?

RAMI ELHANAN: Well, certainly I do, with all my heart. I think we both paid the highest price as an outcome of this outrageous occupation, the last occupation that exists on earth. And I think we need to do everything in our power to prevent more losses from more innocent people. And the only way to do it is by joint forces, Israeli and Palestinians, peace seekers, who will fight this horrible occupation with nonviolent resistance.

AARON MATÉ: Rami, if you could tell us your story, what you’ve done in Israel since your daughter was killed?

RAMI ELHANAN: Well, for the last 15 years, I devoted my life to go everywhere possible, to talk to anyone possible, to convey the message that we are not doomed. This is not our destiny to keep on killing each other forever, and we can change this endless cycle of violence and revenge and retaliation. The only way to do it is simply by talking to each other.

AMY GOODMAN: How did your daughter die? You, yourself, are a former Israeli soldier. Talk about what happened. It was 1997?

RAMI ELHANAN: It was the 4th of September, 1997, Thursday afternoon. Two Palestinian suicide bombers blew themselves up in Ben Yehuda Street in Jerusalem, killing five people, including three little girls. One of them was my 14-years-old Smadar. It was the first day of school. And it changed my life and blew up the bubble that I was living in.

AARON MATÉ: And talk about what you’ve done. You’ve gone and you’ve spoken to many people. And actually, in this film there’s clips of people confronting you with hostility about your activism.

RAMI ELHANAN: Well, that’s part of the game. I mean, this is the price you have to pay if you are willing to talk to your society, which turns you a cold soldier and try to ignore their reality. And your role in this equation is to put cracks in the wall of hatred and fear that divide our two nations, and sometimes it can be very difficult. I’m doing it for the last 14 years, and it gives me a reason to get out of bed in the morning.

AMY GOODMAN: Bassam Aramin, tell us about your daughter. When was she killed, and how did she die?

BASSAM ARAMIN: She was killed in the 16th of January, 2007, in front of her school 9:30 in the morning by an Israeli border police in Israel who shot and killed her in her head from the back from a distance of 15 to 20 meters, without anything. Just it was one bullet, and Abir fell down and died. She was only 10 years old. She wasn’t Fatah member or Hamas member. There were no demonstrations or violence or intifada. And she passed away after two days in Hadassah Hospital.

Again, this was like easy to go to the easy way, but we decide not to revenge, because we need to break this circle of violence and blood. And I have another five kids, and I have Israeli friends who have kids. We need to protect them. And I always said that they are all our kids, and they are all our children. I didn’t find the answer to kill an Israeli daughter or even to kill the Israeli killer, because he’s a teenager, and I consider him a victim to the past or to the memory or to the education or to the situation. We are normal people living in unnormal situations, so unfortunately sometimes our behavior became very brutal.

AARON MATÉ: Bassam, you won a judgment from an Israeli court over the killing of your daughter, which is quite rare. Can you talk about the case? And are you satisfied with how it was resolved?

BASSAM ARAMIN: Yeah, actually, after four years after they denied that the Israeli soldiers was there at all in the town, then after four-and-a-half years I need to prove that my daughter had been killed with a rubber bullet. And it was the first time that I win the case, the civil case. But my goal was to bring this hero, victim or whatever, this soldier, to the trial, and the Supreme Court decided that after four-and-a-half years, which is a long time, there’s no evidence, so they closed the file for the fourth time. Unfortunately, they have not—I have nothing to do in Israel, but I always said I have the world, and I believe in justice. And all the justice lovers around the world must support me, including many, many hundreds of my Israeli brothers and Jewish brothers around the world. And all the human beings around the world must support me because I ask to bring this man to justice, because he killing a daughter, a 10-years-old daughter, not because he’s an Israeli and I’m a Palestinian, because my child wasn’t a fighter, and she had nothing to do with this conflict.

AMY GOODMAN: We will leave it there, and I want to thank you both for being with us, Bassam Aramin and Rami Elhanan—Bassam, a former Fatah fighter; Rami, a former Israeli soldier. Both lost their daughters. This is Democracy Now! We will link to your website. Within the Eye of the Storm is their new film.

http://www.democracynow.org/2013/2/26/united_by_loss_israeli_palestinian_dads

There is power in love! Domination never lasts! Oliver Stone’s Untold History of the United States:In this “Untold History” Hiroshima, the cold war, Vietnam, Iraq — none of that would have happened if Wallace had become president in 1945.

 

 

 

TELEVISION REVIEW

Not the Standard Textbook Tales

The title alone is easy to scoff at. “Oliver Stone’s Untold History of the United States” sounds almost like a parody, a sendup of that filmmaker’s love of bombast and right-wing conspiracy. This documentary series, beginning Monday on Showtime, isn’t a joke, though some may find it laughable. It’s deadly serious but also straightforward: a 10-part indictment of the United States that doesn’t pretend to be evenhanded.

Harry S. Truman Library

Oliver Stone’s Untold History of the United States This 10-part Showtime series, which touches on the bombing of Nagasaki, begins on Monday night at 8, Eastern and Pacific times; 7 Central time.

A sortable calendar of noteworthy cultural events in the New York region, selected by Times critics.

Harry S. Truman Library

Henry A. Wallace, as a former vice president to Franklin D. Roosevelt, in Oliver Stone’s new history series.

The series doesn’t focus extensively on many of the things the United States has done right, Mr. Stone and the historian Peter Kuznick write in the introduction to their similarly titled companion book. It is more concerned with focusing a spotlight on what America has done wrong.

And that’s fair enough. There are plenty of documentaries that celebrate American exceptionalism. There should be room in today’s vast television landscape for a series that points out the exceptionable. And Mr. Stone, the director of “Platoon,” “Wall Street” and “J. F. K.,” is an all-too-eager cicerone: a dramatist of truth who tramples facts to spin alternative histories that may be grandiose and grotesque but can sometimes have a hint of grandeur.

In this reworking of the past Henry A. Wallace, the progressive who was vice president during Franklin D. Roosevelt’s third term, is puffed up as a greater hero than Roosevelt and Churchill. Stalin was bad, but Truman was just awful.

It’s too easy to focus on what Mr. Stone does wrong; it’s also useful to focus a spotlight on what he gets right. And in all the overblown rhetoric and self-righteous hyperbole (Mr. Stone is his own narrator) accuracy is sometimes hard to find.

The first four episodes made available to critics focus onWorld War II and the cold war, but the series, like the book, spans World War I to the Obama administration. President Obama, in Mr. Stone’s interpretation, isn’t really any better than Woodrow Wilson or George W. Bush: someone who took a bad situation and made it worse by selling out to “Wall Street funders with deep pockets.”

But Mr. Stone’s most pressing obsession is the atomic bomb and the cold war, which in this telling are the roots of all American foreign policy and the answer to what seems to be Mr. Stone’s unspoken question: “Why was I in Vietnam?”

Along the way he raises some valid points, notably that Americans too easily overlook the Soviet contribution in waging and winning World War II. Steven Spielberg and his ilk popularize the greatest generation and D-Day and other hard-won American victories, whereas the Russian film world has yet to produce a Slavic equivalent that could move an international audience. There is no “Band of Comrades” or “Saving Private Ivan.” What happened in Russia between 1941 and 1945 has mostly stayed in Russia.

“Untold History” makes the point that while fewer than a half-million Americans died in World War II, Mr. Stone says that as many as 27 million Soviets, military and civilian, lost their lives, though he doesn’t factor in how many of those were killed by Stalin’s repression. Different historians put that figure at anywhere from under a million to over five million.

Mr. Stone pays as much attention to Operation Barbarossa as Pearl Harbor, and shows archival material not just from Normandy and Iwo Jima but also the Battle of Stalingrad, the German invasion of Ukraine and other calamities of war.

Almost all war documentaries find room for clips from Frank Capra movies and works of propaganda, and so does this one. Mr. Stone also includes a less familiar newsreel clip of Shostakovich after he composed the Seventh Symphony, which became a hymn to the Siege of Leningrad.

Mr. Stone makes no mention of how Shostakovich was stifled, but he doesn’t overlook Stalin’s atrocities, including the 1940 massacre of Polish officers at Katyn. More often, however, he positions Stalin as a victim of British and American mistrust and double-dealing, a brutal tyrant forced to be his worst self because his Western allies didn’t do right by him.

And Truman, in this iteration, is the bigger villain, a hick and a bully who — pushed by a cabal of right-wing, racist party hacks — unfairly took the place of Wallace on the 1944 Democratic ticket and who was persuaded by those same conspirators to drop the atomic bomb on Japan. Their real motive was not to end the war and save American lives, Mr. Stone argues, but to deprive the Soviet Union of victory and its spoils in the Far East and to scare Stalin into submission.

Mr. Stone is not the first to argue that Japan was ready to give up before Hiroshima, and that it was the Soviet invasion of Manchuria that caused Emperor Hirohito to surrender (though he didn’t surrender until after Nagasaki). Mr. Stone takes pride in calling his version of the past an “untold” story, but actually that same thesis was presented on American television in two documentaries on the 50th anniversary of Hiroshima, one a British-Japanese production on A&E and History, the other an ABC News special.

Mr. Stone brings a more stentorian absolutism, leaving no room for doubt or nuance. He doesn’t allow for the idea that both versions could coexist, that the Soviet invasion of Manchuria was one of several factors, along with the two atomic bombings, that finally did the trick. He is among those true disbelievers who cannot accept that a course of action can be both unforgivably awful and apparently necessary, given the facts known at the time. Instead, he doubles down on his passionate indignation.

“Despite his denials,” Mr. Stone intones about Truman, “his flawed and tragic decision to use the bomb against Japan was meant instead as a ruthless and deeply unnecessary warning that the United States could be unrestrained by humanitarian considerations in using these same bombs against the Soviet Union.”

In this “Untold History” Hiroshima, the cold war, Vietnam, Iraq — none of that would have happened if Wallace had become president in 1945. What a wonderful world this would be.

Oliver Stone’s Untold History of the United States

Showtime, Monday nights at 8, Eastern and Pacific times; 7, Central time.

Directed and narrated by Oliver Stone; written by Mr. Stone and Peter Kuznick.

Veterans of Iraq & Afghanistan are building a movement:Iraq Veterans Against the War is organizing to heal our community, change the military, and transform society.

Iraq Veterans Against the War is organizing to heal our community, change the military, and transform society. Veterans describe the challenges they have faced and the importance of building a movement together. We can’t build this movement without your support. Donate now at: http://www.ivaw.org/support

Red Hand Day for Child Soldiers 12 Feb 2013: Red Hand Day, February 12 each year, is an annual commemoration day on which pleas are made to political leaders and events are staged around the world to draw attention to the fates of child soldiers, children who are forced to serve as soldiers in wars and armed conflicts. The aim of Red Hand Day is to call for action against this practice, and support for children who are affected by it. Children have been used repeatedly as soldiers in recent years including armed conflicts in the Democratic Republic of the Congo, Rwanda, Uganda, Sudan, Côte d’Ivoire, Myanmar, Philippines, Colombia, and Palestine.[1]Estimates on the number of children engaging in armed conflict around the world show no change between 2006 and 2009.[2][3] Rehabilitation for child-soldiers returned to their communities ranges from inadequate to non-existent.[4] – We are Child Soldiers International Child Soldiers International is an international human rights research and advocacy organisation. We seek to end the military recruitment and the use in hostilities, in any capacity, of any person under the age of 18 by state armed forces or non-state armed groups. We advocate for the release of unlawfully recruited children, promote their successful reintegration into civilian life, and call for accountability for those who unlawfully recruit or use them.

Red Hand Day for Child Soldiers

12 Feb 2013

12 February every year: Raising awareness of the plight of children forced to serve as soldiers.

Red Hand Day logoRed Hand Day is an annual commemoration drawing attention to the plight of children forced to serve as soldiers in wars and armed conflicts.

The Red Hand symbol has been used all over the world by the Coalition to Stop the Use of Child Soldiers and many civil society organisations to say no to the recruitment and use of child soldiers.

The Day was initiated in 2002 when the Optional Protocol to the Convention on the Rights of the Child on the involvement of children in armed conflict came into force on 12 February.

Since then, the number of child soldiers has hardly changed – there are still250,000 children used in wars as soldiers.

12 February has become a day for national and regional coalitions, NGOs, individuals and interested parties to hold events to highlight the issue of child soldiers.

For more information, including details of awareness-raising campaigns, visit: Red Hand Day and Child Soldiers International.

To find relevant teaching resources in our database, browse through the resources listed under the topic of ‘child soldiers’.

<< Back to Global Calendar 

Add to calendar

http://globaldimension.org.uk/calendar/event/5083

We are Child Soldiers International

Child Soldiers International is an international human rights research and advocacy organisation. We seek to end the military recruitment and the use in hostilities, in any capacity, of any person under the age of 18 by state armed forces or non-state armed groups. We advocate for the release of unlawfully recruited children, promote their successful reintegration into civilian life, and call for accountability for those who unlawfully recruit or use them.

Read more about us.

Introducing our work

We work to end the military recruitment of under-18s globally and to prevent their use in armed conflict wherever it occurs. We do this through global monitoring, in-depth work on selected countries, and research and analysis on key thematic issues relating to child soldiers. Find out more about our work (and how we seek to influence and create change at the national and international level).

Work by Theme

State armed forces

We seek to end the involvement of girls and boys in hostilities in any capacity in state armed forces and in armed groups which are allied to states. We work both in situations where children are currently involved in armed conflicts and where they could be at risk of future use because of lack of legal or practical safeguards to protect them.

Read more.

Straight-18

We campaign for the establishment in law of a minimum age of recruitment (conscription and enlistment) of 18 years by armed forces globally. We believe that a universal ban on recruitment of under-18s can and must be achieved in order to strengthen protection against child soldier use, and to safeguard other rights to which children are entitled.

Read more.

Non-state armed groups

We work to end the recruitment and use of girls and boys under the age of 18 years by non-state armed groups. We seek both to strengthen the compliance of armed groups with international standards, and to ensure that states fulfil their responsibilities to protect children against recruitment and use by such groups.

Read more.

Accountability

We seek to ensure that individuals are held to account for the unlawful recruitment and use of children both by state armed forces and non-state armed groups. To achieve this we promote the adoption of laws by states to criminalise the practice and for timely, independent and effective investigations and prosecutions (national and international) into allegations of child recruitment and use.

Read more.

DDR

We advocate for the release, recovery and social reintegration of all under-18s, girls and boys, from armed forces and armed groups whether they have been formally recruited by, or are informally associated with, them. In so doing, we seek to ensure that the full range of rights to which they are entitled are upheld.

Read more.

OPAC Implementation

The effective implementation of the Optional Protocol to the Convention on the Rights of the Child on the involvement of children in armed conflict (OPAC) by states is a core element of all of our work. We advocate for states to take measures to implement their obligations under this treaty and we support the work of the UN Committee on the Rights of the Child by submitting shadow reports on states which it examines and thematic briefings to inform its recommendations.

Read more.

Work by Country

Chad

Chad
In Chad we are working to ensure that the government fulfils its commitment to protect children from involvement in armed conflict in state armed forces by establishing legal and practical mechanisms to safeguard children against recruitment and use.

Read more.

Democratic Republic of Congo

Democratic Republic of Congo
In the Democratic Republic of the Congo (DRC) our work is focused on ensuring that the government complies with its obligations under international law to end child recruitment and use by state armed forces and non-state armed groups, and on supporting local NGOs to advocate for the same.

Read more.

Myanmar

Myanmar
In Myanmar our work is aimed at pressuring the national authorities and the UN to identify and release children currently in the ranks of state armed forces and putting in place measures needed to prevent on-going underage recruitment in state forces and armed opposition groups.

Read more.

Thailand

Thailand
In Thailand we have undertaken research and advocacy to end recruitment and use of children by state civil defence forces. We are now working to ensure that broader obligations under international law to prevent children’s involvement in armed conflict are implemented by the state.

Read more.

United Kingdom

United Kingdom
In the United Kingdom we are working to raise the minimum age of voluntary recruitment from 16 years to 18 years. Pending this, we seek improved protection of under-18s in the ranks and have already succeeded in obtaining discharge as a right for recruits aged under 18 years.

Read more.

http://www.child-soldiers.org/

zerounder18

Zero under 18 Campaign

On 25 May 2010, the Office of the Special Representative of the Secretary-General for Children and Armed Conflict along with United Nationspartners launched a campaign to achieve universal ratification of the Optional Protocol to the Convention on the Rights of the Child on theInvolvement of Children in Armed Conflict (OPAC).

Objectives

  • Achieve universal ratification;
  • Encourage all States to raise the age of voluntary recruitment to a minimum of 18 years;
  • Raise awareness of States parties’ obligation to criminalize recruitment and use of persons under the age of 18 years;
  • Promote the adoption and effective implementation of relevant national legislation.

The Optional Protocol was adopted and opened for signature, ratification and accession by General Assembly resolution A/RES/54/263 on 25May 2000. It entered into force on 12 February 2002. To date, the OPAC has been ratified by 147 countries. Since the launch of thecampaign, 16 Member States ratified and four signed the Optional Protocol.

Partners

  • Special Representative of the Secretary-General on Violence against Children
  • UNICEF
  • Office of the High Commissioner on Human Rights

Ratification process

It is important to note that all Member States who would like to become party to the Optional Protocol have to deposit a bindingdeclaration setting forth the minimum age at which it will permit voluntary recruitment into its national armed forces and a description ofthe safeguards to ensure that such recruitment is not forced or coerced. Without this mandatory declaration, the ratification and accessionis not valid. For any technical questions regarding the ratification process, please contact the UN Office of Legal Affairs.

Dina Hamdy
Legal Officer,
Treaty Section
+1 212 963 2113
hamdyd@un.org

United Nations Office of the Special Representative of the Secretary-General for Children and Armed Conflict

http://childrenandarmedconflict.un.org/

Every hour 300 children are dying because of hunger! Many of them because of these wars, which destroy so much, what people had build before!

How to Build a Culture of Empathy & Peace: The peaceworker Johan Galtung

Datei:Johan Galtung.png

Johan Galtung & Edwin Rutsch: How to Build a Culture of Empathy & Peace

Johan Galtung

From Wikipedia, the free encyclopedia
Johan Galtung

Johan Galtung in May 2011 at the 41st St. Gallen Symposium
Born 24 October 1930 (age 82)
OsloNorway
Fields Sociologypeace and conflict studiesMathematics
Institutions Columbia UniversityUniversity of OsloPeace Research Institute Oslo (PRIO)
Alma mater University of Oslo
Known for Principal founder of peace and conflict studies
Notable awards Right Livelihood Award (1987)

Johan Galtung (born 24 October 1930) is a Norwegian sociologistmathematician and the principal founder of the discipline of peace and conflict studies.[1] He founded the Peace Research Institute Oslo in 1959, serving as its director until 1970, and established the Journal of Peace Research in 1964. In 1969 he was appointed to the world’s first chair in peace and conflict studies, at the University of Oslo. He resigned his professorship in 1977 and has since held professorships at other universities. He was awarded the Right Livelihood Award in 1987.

Galtung is known for contributions to mathematics and sociology in the 1950s, political sciencein the 1960s, economics and history in the 1970s, macro historyanthropology and theology in the 1980s. He has developed several influential theories, such as the distinction between positive and negative peacestructural violence, theories on conflict and conflict resolution, the structural theory of imperialism, and the theory of the United States as simultaneously arepublic and an empire.[2]

Contents

[hide]

[edit]Biography

Galtung was born in Oslo. He earned the cand. real. (PhD)[3] degree in mathematics at the University of Oslo in 1956, and a year later completed the mag. art. (PhD)[3] degree in sociology at the same university.[2] Galtung received the first of nine honorary doctorates in 1975.[citation needed]

Galtung’s father and paternal grandfather were both physicians. The Galtung name has its origins in Hordaland, where his paternal grandfather was born. Nevertheless, his mother, Helga Holmboe, was born in central Norway, in Trøndelag, while his father was born in Østfold, in the south. Galtung has been married twice, and has two children by his first wife Ingrid Eide, Harald Galtung and Andreas Galtung, and two by his second wife Fumiko Nishimura, Irene Galtung and Fredrik Galtung, the co-founder and chief executive of Tiri.[4]

Upon receiving his mag.art. degree, Galtung moved to Columbia University, in New York City, where he taught for five semesters as an assistant professor in the Department of Sociology.[5] In 1959, Galtung returned to Oslo, where he founded the Peace Research Institute Oslo (PRIO). He served as the institute’s director until 1969, and saw the institute develop from a department within the Norwegian Institute of Social Research into an independent research institute with enabling funds from the Norwegian Ministry of Education.[6]

In 1964, Galtung led PRIO to establish the first academic journal devoted to Peace Studies: the Journal of Peace Research.[6] In the same year, he assisted in the founding of the International Peace Research Association.[7]

In 1969 he left PRIO for a position as professor of peace and conflict research at the University of Oslo, a position he held until 1978.[6] He then served as the director general of the International University Centre in Dubrovnik, also serving as the president of the World Future Studies Federation.[8] He has also held visiting positions at other universities, including Santiago, Chile, the United Nations University in Geneva, and atColumbiaPrinceton and the University of Hawaii.[9] He has served at so many universities that he has “probably taught more students on more campuses around the world than any other contemporary sociologist”.[8] Galtung is currently teaching courses in the Human ScienceDepartment at Saybrook University.[10]

He is a member of the Norwegian Academy of Science and Letters.[11]

[edit]Mediation for peace

Galtung experienced World War II in German-occupied Norway, and as a 12 year old saw his father arrested by the Nazis. By 1951 he was already a committed peace mediator, and elected to do 18 months of social service in place of his obligatory military service. After 12 months, Galtung insisted that the remainder of his social service be spent in activities relevant to peace, to which the Norwegian authorities responded by sending him to prison, where he served six months.[5]

While Galtung’s academic research is clearly intended to promote peace, he has shifted toward more concrete and constructive peace mediation as he has grown older. In 1993, he co-founded TRANSCEND: A Peace Development Environment Network,[12][non-primary source needed] an organization for conflict transformation by peaceful means. There are four traditional but unsatisfactory ways in which conflicts between two parties are handled:

  1. A wins, B loses;
  2. B wins, A loses;
  3. the solution is postponed because neither A nor B feels ready to end the conflict;
  4. a confused compromise is reached, which neither A nor B are happy with.

Galtung tries to break with these four unsatisfactory ways of handling a conflict by finding a “fifth way”, where both A and B feel that they win. The method also insists that basic human needs – such as survival, physical well-being, liberty, and identity – be respected.[citation needed]

[edit]Major ideas

Galtung first conceptualized peacebuilding by calling for systems that would create sustainable peace. The peacebuilding structures needed to address the root causes of conflict and support local capacity for peace management and conflict resolution.[13]

Galtung has held several significant positions in international research councils and has been an advisor to several international organisations. Since 2004 he has been a member of the Advisory Council of the Committee for a Democratic UN.

He has also written many empirical and theoretical articles, dealing most frequently with issues of peace and conflict research. His work is distinguished by his unique perspective as well as the importance he attributes to innovation and interdisciplinarity.

He is one of the authors of an influential account of news values which are the factors which determine what coverage is given to what stories in the news. Galtung also originated the concept of Peace Journalism, which is increasingly influential in communications and media studies.

Galtung is strongly associated with the following concepts:

  • Structural violence – widely defined as the systematic ways in which a regime prevents individuals from achieving their full potential. Institutionalized racism and sexism are examples of this.
  • Negative vs. Positive Peace – introduced the concept that peace may be more than just the absence of overt violent conflict (negative peace), and will likely include a range of relationships up to a state where nations (or any groupings in conflict) might have collaborative and supportive relationships (positive peace).

He has also distinguished himself in public debates concerning, among other things, less-developed countries, defence issues, and the Norwegian EU debate. In 1987 he was given the Right Livelihood Award. He developed the TRANSCEND Method described above. Economist and fellow peace researcher Kenneth Boulding has said of Galtung that his “output is so large and so varied that it is hard to believe that it comes from a human”.[14]

[edit]Galtung’s theory of the U.S. as a republic/empire

For Johan Galtung, the U.S. is simultaneously a republic and an empire, a distinction he believes is highly relevant. The U.S. is on one hand loved for its republican qualities, and on the other loathed by its enemies abroad for its perceived military aggressions.

Among the former qualities are its work ethic and dynamism, productivity and creativity, the idea of freedom, or liberty, and a pioneering spirit.

On the other hand its military and political manipulation are censured for their aggressiveness, arrogance, violence, hypocrisy and self-righteousness, as well as the US public ignorance of other cultures and extreme materialism.[15]

In 1973, Galtung criticised the “structural fascism” of the United States (and other Western countries) that make war to secure materials and markets, stating that: “Such an economic system is called capitalism, and when it’s spread in this way to other countries it’s called imperialism”, and has praised Fidel Castro for “break[ing] free of imperialism’s iron grip”. Galtung has stated that the United States is a “killer country” that is guilty of “neo-fascist state terrorism” and compared the United States to Nazi Germany for bombing Kosovo during the 1999 NATO bombing of Yugoslavia.[16][17]

In an article published in 2004 Galtung predicted that the US empire will “decline and fall” by 2020. He expanded on this hypothesis in his 2009 book titled The Fall of the US Empire – and Then What? Successors, Regionalization or Globalization? US Fascism or US Blossoming?.[18][19]

According to Galtung, the US empire causes “unbearable suffering and resentment” because the “exploiters/ killers/ dominators/ alienators, and those who support the US Empire because of perceived benefits” are engaging in “unequal, non-sustainable, exchange patterns”. However, Galtung added that the decline of the US empire does not imply a fall and decline of the US republic and that the “relief from the burden of Empire control and maintenance…could lead to a blossoming of the US Republic.” In the article, Galtung lists fourteen ‘contradictions’ that, he believes, in the next fifteen years, in 2020, will cause the ‘decline and fall’ of the American empire.[19]

Commenting further on these views on the radio and television program Democracy Now, he stated that he loved the American republic and hated the American empire. He added that many Americans had thanked him for this statement (on his lecture tours) because of the great difficulty they were having in trying to resolve the conflict between their love for their country and their displeasure with its foreign policy.[20]

[edit]Predictions

Since the fall of the Soviet Union, Galtung has made several predictions of when the USA will no longer be a functioning superpower, a stance that has attracted some controversy. After the beginning of the Iraq War, he revised his prediction of the “downfall of the US-Empire”, seeing it as more imminent.[21] He claims the U.S. will go through a phase as a fascist dictatorship on its path down, and that the Patriot Act is a symptom of this. He claims the election of George W. Bush cost the U.S. empire five years – although he admits that this estimate was set a bit arbitrarily. He now sets the date for the end of the American Empire at 2020, but not the American Republic. Like Great Britain, Russia and France, he says the American Republic will be better off without the Empire.

Galtung has made predictions which have failed to materialize. For example, City Journal claims that in 1953, Galtung predicted that the Soviet Union’s economy would soon overtake the West.[22]

[edit]Reception

[edit]Criticism

During the course of his career, some of Galtung statements and views have drawn criticism. A 2007 article by Bruce Bawer published in City Journal magazine and a subsequent article in February 2009 by Barbara Kay in the National Post criticised some of Galtung’s statements. Both authors criticized Galtung’s opinion that while Communist China was “repressive in a certain liberal sense”, Mao Zedong was “endlessly liberating when seen from many other perspectives that liberal theory has never understood” because China showed that “the whole theory about what an ‘open society’ is must be rewritten, probably also the theory of ‘democracy’—and it will take a long time before the West will be willing to view China as a master teacher in such subjects.” The authors also criticized Galtung’s opposition to Hungarian resistance against the Soviet invasion in 1956 and his description in 1974 of Aleksandr Solzhenitsyn and Andrei Sakharov as “persecuted elite personages”.[16][17]Both of the aforementioned articles alleged that he has suggested that the annihilation of Washington, D.C., would be a fair punishment for America’s arrogant view of itself as “a model for everyone else”. However, Galtung has called the September 11 attacks “criminal political violence”.[23]

[edit]Alleged antisemitism

Galtung was accused of antisemitism in May of 2012 (a charge he denies) by the Israeli newspaper Haaretz for: (1) suggesting the possibility of a link between the 2011 Norway attacks and Israel’s intelligence agency Mossad, (2) maintaining that “six Jewish companies” largely control the US media, (3) identifying what he contends are ironic similarities between the banking firm Goldman Sachs and the conspiratorial Elders of Zion and (4) theorizing that although not justified, anti-Semitism in post–World War I Germany was a predictable consequence of German Jewsholding influential positions.[24] As a result of such statements, in May 2012 TRANSCEND International, an organisation co-founded by Galtung, released a statement attempting to clarify his opinions.[25] On August 8, 2012, the World Peace Academy in BaselSwitzerlandannounced it was suspending Galtung from its organization, citing what it posited were his “reckless and offensive statements to questions that are specifically sensitive for Jews.”[26]

[edit]Selected works

Galtung has published more than a thousand articles and over a hundred books.[27][non-primary source needed]

  • Statistisk hypotesepröving (Statistical hypothesis testing, 1953)
  • Gandhis politiske etikk (Gandhi’s political ethics, 1955, with philosopher Arne Næss)
  • Theory and Methods of Social Research (1967)
  • Members of Two Worlds (1971)
  • Fred, vold og imperialisme (Peace, violence and imperialism, 1974)
  • Peace: Research – Education – Action (1975)
  • Europe in the Making (1989)
  • Global Glasnost: Toward a New World Information and Communication Order? (1992, with Richard C. Vincent)
  • Peace By Peaceful Means: Peace and Conflict, Development and Civilization (1996)
  • Johan uten land. På fredsveien gjennom verden (Johan without land. On the Peace Path Through the World, 2000, autobiography for which he won the Brage Prize)
  • 50 Years: 100 Peace and Conflict Perspectives (2008)
  • Democracy – Peace – Development (2008, with Paul D. Scott)
  • 50 Years: 25 Intellectual Landscapes Explored (2008)
  • Globalizing God: Religion, Spirituality and Peace (2008, with Graeme MacQueen)[28]

[edit]Selected awards and recognitions

[edit]References

  1. ^ John D. BrewerPeace processes: a sociological approach, p. 7, Polity Press, 2010
  2. a b “Johan Galtung”Norsk Biografisk Leksikon
  3. a b http://www.coe.int/T/d/Com/Dossiers/Events/2002-10-interkultureller-Dialog/CV_Galtung.asp
  4. ^ Genealogical data for Johan Galtung
  5. a b Life of Johan Galtung (in Danish)
  6. a b c PRIO biography for Johan Galtung
  7. ^ History of the IPRA
  8. a b (E. Boulding 1982: 323)
  9. ^ Dagens Nyheter 2003-01-15.
  10. ^ Saybrook.edu
  11. ^ “Gruppe 7: Samfunnsfag (herunder sosiologi, statsvitenskap og økonomi)” (in Norwegian). Norwegian Academy of Science and Letters. Retrieved 26 October 2009.
  12. ^ Transcend.org
  13. ^ PEACEBUILDING & THE UNITED NATIONS Peacebuilding Support Office, United Nations
  14. ^ (K. Boulding 1977: 75)
  15. ^ Article by Dr Zeki Ergas “Out of Sync with the world: Some Thoughts on the Coming Decline and Fall of the American Empire”.
  16. a b The Peace Racket by Bruce Bawer, City Journal, Summer 2007.
  17. a b Barbarians within the gate by Barbara Kay, National Post, February 18, 2009.
  18. ^ Prof. J. Galtung: ‘US empire will fall by 2020’ Russia Today, (posted on Youtube.
  19. a b On the Coming Decline and Fall of the US Empire by Johan Galtung, Transnational Foundation and Peace and Research (TFF), January 28, 2004.
  20. ^ Galtung on Democracy Now
  21. ^ Amerikas imperium går under innen 2020 Adressa September 23, 2004.
  22. ^ Bawer, Bruce. 2007. “The Peace Racket”. City Journal. Summer 2007..
  23. ^ “September 11 2001: Diagnosis, Prognosis, Therapy” by Johan Galtung
  24. ^ Aderet, Ofer (30 April 2012). “Pioneer of global peace studies hints at link between Norway massacre and Mossad”Haaretz. Retrieved 7 September 2012.
  25. ^ “TRANSCEND International’s Statement Concerning the Label of anti-Semitism Against Johan Galtung”. TRANSCEND International. Retrieved 8 September 2012.
  26. ^ Weinthal, Benjamin (August 9, 2012). “Swiss group suspends ‘anti-Semitic’ Norway scholar”Jerusalem PostArchived from the original on August 11, 2012. Retrieved August 11, 2012.
  27. ^ TRANSCEND biography on Johan Galtung
  28. ^ “Johan Galtung’s Publications 1948-2010”. Retrieved 8 September 2012.
  29. ^ “Jamnalal Bajaj Awards Archive”Jamnalal Bajaj Foundation.

[edit]Sources

  • Bawer, Bruce. 2007. “The Peace Racket”. City Journal. Summer 2007. Link.
  • Boulding, Elise. 1982. “Review: Social Science—For What?: Festschrift for Johan Galtung.” Contemporary Sociology. 11(3):323-324.JSTOR Stable URL
  • Boulding, Kenneth E. 1977. “Twelve Friendly Quarrels with Johan Galtung.” Journal of Peace Research. 14(1):75-86. JSTOR Stable URL

[edit]External links

Wikimedia Commons has media related to: Johan Galtung

http://en.wikipedia.org/wiki/Johan_Galtung

 

Prepare (peace-)footballmatches everywhere for 2014 in memoriam and for a world, in which wars have no place anymore: When soldiers did not follow anymore their officers and governments to kill each other, but started to play football together! Please people from Palestine and Israel, in Syria and Afghanistan, in Kongo and Somalia, follow the example of these British and German soldiers, common people, who can never win anything in the wars of their elites, but loose all! Britain’s plans for commemorating the centenary of the first world war include recreating the football match played against German troops to mark the Christmas truce which remains one of the most poignant moments of the conflict. “It is clear the Christmas truce is going to be commemorated in a very significant way. It had no real relevance to the outcome of the war but at that deeply, intensely, personal level, it is something that people really do latch on to.” “It was a totally unnecessary war. We slid into it unnecessarily. There were horrifying casualties. It was not the soldiers’ fault, it was the politicians’.”

Kickabout that captured futility of first world war to be replayed for centenary

Exclusive: Christmas truce matches to be recreated on Belgian battlefield in 2014, with £50m set aside for school trips and exhibitions

Drama reconstruction of WW1 Christmas Truce

BBC drama reconstruction of the first world war Christmas truce football match. Photograph: Lion Television/BBC

Britain’s plans for commemorating the centenary of the first world war include recreating the football match played against German troops to mark the Christmas truce which remains one of the most poignant moments of the conflict.

The proposal is one of a number of initiatives being supported by ministers in anticipation of public interest in a war during which 956,000 members of the British army were killed, including 250,000 from countries which were then part of the Empire.

Six state occasions, school trips to battlefields, new exhibitions and fresh academic debate about the causes of the war will be fundamental to the centenary. But the minister in charge of overseeing the commemorations said he believed football had an important part to play because of the way British and German troops came together between the trenches on Christmas Eve and Christmas Day in 1914. Children from the UK and Germany may be involved in any match, or tournament, staged next year.

Andrew Murrison told the Guardian: “I think football has a particular part to play because of the totemic significance of the Christmas truce in 1914.

“We have been in touch with Football Association and the National Children’s Football [Alliance] to see how this can be done. I know they are enthused and have already clocked the fact that other countries are thinking along similar lines.”

The minister said that staging a football match in Belgium on the battlefields where soldiers had briefly put down their weapons was “a no-brainer in terms of an event that is going to reach part of the community that perhaps might not get terribly entrenched into this”.

He added: “It is clear the Christmas truce is going to be commemorated in a very significant way. It had no real relevance to the outcome of the war but at that deeply, intensely, personal level, it is something that people really do latch on to.”

Murrison said planning was at an early stage and “discussions are ongoing”.

Some of the £50m set aside by the government for the commemorations will be used to send pupils from every state secondary school to places such as Flanders in northern France, where much of the fighting took place. “We want two pupil ambassadors plus a teacher from every secondary school to go to Flanders and Belgium,” said the minister. “Going to battlefields, seeing names on tombstones, that is very powerful. I have been to these sites when kids go and you see them come out and it has really made a big impact on them.”

Murrison added that “it would be remarkable if the Great war was woven into practically everything that goes on” between next year and 2018; from exhibitions to questions in school exams, from programmes on TV to academic debate.

The Imperial War Museum, which was established in 1917 – will have a pivotal role. It is setting up a digital archive that it promises will be the most comprehensive collection of documents and memorabilia of the first world war ever assembled.

The museum in London will also open new galleries, and is developing a film about the battle of the Somme in 1916, was one of the bloodiest in history with more than 1 million casualties on both sides.

Unusually, the UK will commemorate the start of the war – 4 August 1914 – with a national service that is expected to include a delegation from Germany.

Focusing the world’s attention on a conflict that was supposed to have ended all wars may not pass off without controversy. But in a sign the government wants to avoid being dragged into arguments about whether the UK should have gone to war, Murrison said he believed the focus of public interest will “be personal and parochial”, adding: “Frankly, most people aren’t really interested in the grand strategy of this time. If you can engage them in things like the Christmas truce then I think that you do offer them something that is of relevance and use and of interest to them.”

But some experts believe the government should not avoid such issues – there is understood to have been heated argument among members of a Great war committee set up by David Cameron.

The author Sebastian Faulks, the historians Prof Michael Burleigh and Sir Hew Strachan, and former military grandees Lord Stirrup and Lord Guthrie, both former chiefs of the defence staff, are among those advising ministers about the commemorations.

In a foretaste of potential arguments to come, Guthrie told the Guardian: “It was a totally unnecessary war. We slid into it unnecessarily. There were horrifying casualties. It was not the soldiers’ fault, it was the politicians’.”

The way Europe was “carved up” in the treaty of Versailles at end of war was “disgraceful”, he added.

Background:

Films:

All Quiet on the Western Front (1/10) Movie CLIP – Before the Storm (1930) HD

http://www.youtube.com/watch?v=99odqGVYe4g

all movies: