List of charges in United States v. Manning
United States v. Manning is the court-martial case involving United States Army Private First Class Bradley Manning (now known as Chelsea Manning), who delivered U.S. government documents to persons not authorized to receive them in 2009 and 2010. Media reports said that the receiver was Julian Assange of WikiLeaks. Manning was arrested in May 2010 and a court-martial was held in June–August 2013.[1] The charges were related to events which occurred "at or near" Contingency Operating Station Hammer, Iraq, in 2009 and 2010.
Charges
By code violation
The charges were:
- UCMJ 104 (Aiding the enemy): 1 count
- UCMJ 92 (Failure to obey a lawful order or regulation): 9 counts. Mostly related to computers[2][3]
- Army Regulation 25-2, para. 4-5(a)(3): Modifying or installing unauthorized software to a system, using it for 'unintended' purposes
- Army Regulation 25-2, para. 4-5(a)(4): Circumventing security mechanisms
- Army Regulation 25-2, para. 4-6(k): Forbids transferring classified or sensitive information to non-secure systems
- Army Regulation 380-5: Improper storage of classified information
- UCMJ 134 (General article): 24 counts. These counts incorporate statutes from the United States Code:
- : Embezzlement and Theft of Public Money, Property or Records. The government said the records that Manning transferred were 'things of value'.
- Espionage Act. The law forbids 'unauthorized persons' from taking 'national defense' information and either 'retaining' it or delivering it to 'persons not entitled to receive it'.[4][5] : This is part of the
- Computer Fraud and Abuse Act of 1986. Section 1030(a)(1) is sometimes called the 'Computer Espionage' law as it borrows from the Espionage Act.[6] 1 and 2: These are from the
Total: 34
Listed by document
Most of the charges are related to the transfer of documents to another party. These documents are:
- The 2007 July 12 Baghdad airstrike video
- various groups of US State Department cables, unclassified and classified
- The "Reykjavik 13" US State Department cable
- Records from the CIDNEI database
- Records from the CIDNEA database
- A Microsoft PowerPoint presentation
- Records from a US Southern Command database
- Files "BE22 PAX.zip" and "BE22 PAX.wmv"
- United States Forces – Iraq email address list
- a record from United States Army Intelligence and Security Command
- A memorandum from an intelligence agency
According to news reports, many of the documents are the same as documents published by Wikileaks, including:
- The July 12, 2007 Baghdad airstrike ("Collateral Murder") video
- United States diplomatic cables leak
- The Reykjavic 13 cable
- Iraq War documents leak (CIDNEI)[7]
- Afghan War documents leak (CIDNEA)[7]
- Granai airstrike video (BE22 PAX) (alleged by Wired and Marcy Wheeler)[8][9]
Listed in the order given on the charge sheets
First set of charges (2010)
The first set of charges came on July 5, 2010. The Specifications (Spec.) are listed below in the same order as given on the charge sheets. To the right of each specification is a description of the related documents or actions.[10]
Charge 1: Violation of UCMJ Article 92 (Failure to obey a lawful order or regulation)
- Spec. 1: Army Reg. 25-2, para. 4-6(k): The 2007 July 12 Baghdad video
- Spec. 2: Army Reg. 25-2, para. 4-6(k): 50 classified US Dept of State cables
- Spec. 3: Army Reg. 25-2, para. 4-6(k): A classified Microsoft Office PowerPoint presentation
- Spec. 4: Army Reg. 25-2, para. 4-5(a)(3): Adding unauthorized software to SIPRNet
Charge 2: Violation of UCMJ Article 134 (General article)
- Spec. 1: : The 2007 July 12 Baghdad video
- Spec. 2: : The 2007 July 12 Baghdad video
- Spec. 3: US State Dept Cable named "Reykjavik 13" : The classified
- Spec. 4: : 50 classified US State Dept cables
- Spec. 5: : The 2007 July 12 Baghdad video
- Spec. 6: : The classified US State Dept Cable named "Reykjavik 13"
- Spec. 7: : 150,000 diplomatic cables
- Spec. 8: Microsoft Office PowerPoint presentation : A classified
Second set of charges (2011)
A second set of charges was presented on March 1, 2011, and are as follows:[11]
Additional Charge 1: Violation of UCMJ Article 104 (Aiding the enemy)
- Spec. 1: Knowingly giving intelligence to the enemy through indirect means
Additional Charge 2: Violation of UCMJ Article 134 (General article)
- Spec. 1: (statute not given): Causing intelligence to be published, knowing that it is accessible to the enemy
- Spec. 2: : A file named "12 JUL 07 CZ ENGAGEMENT ZONE 30 GC Anyone.avi"
- Spec. 3: : Memorandi from a US intelligence agency
- Spec. 4: : 380,000 records from the CIDNEI database
- Spec. 5: : >20 records from the CIDNEI database
- Spec. 6: : >90,000 records from the CIDNEA database
- Spec. 7: : >20 records from the CIDNEA database
- Spec. 8: : >700 records from a US Southern Command database
- Spec. 9: : >3 records from a US Southern Command database
- Spec. 10: : >5 records relating to an operation in Farah Province, Afghanistan
- Spec. 11: : The files "BE22 PAX.zip" and "BE22 PAX.wmv"
- Spec. 12: : 250,000 records from the State Dept Net-Centric Diplomacy database
- Spec. 13: : >75 US State Dept cables
- Spec. 14: : The State Dept cable named "Reykjavik-13"
- Spec. 15: : A record of a US Army Intelligence organization
- Spec. 16: : The US Forces – Iraq Microsoft Outlook / SharePoint Exchange Server global address list
Additional Charge 3: Violation of UCMJ Article 92 (Failure to obey a lawful order or regulation)
- Spec. 1: Army Reg. 25-2, para. 4-5(a)(4): Bypassing security mechanisms
- Spec. 2: Army Reg. 25-2, para. 4-5(a)(3): Adding unauthorized software to a SIPRNet computer
- Spec. 3: Army Reg. 25-2, para. 4-5(a)(3): Adding unauthorized software to a SIPRNet computer
- Spec. 4: Army Reg. 25-2, para. 4-5(a)(3): Using an information system for other than its intended purpose
- Spec. 5: Army Reg. 380-5, para. 7-4: Wrongfully storing classified information
See also
References
- ↑ The Hague Academic Coalition, DomCLIC Project (2011). "The United States Army v Bradley Manning". Archived from the original on July 26, 2011. Retrieved 2011-04-13.
- ↑ US Army (2000). "Army Regulation 308-5" (PDF). Retrieved 2011-04-13.
- ↑ US Army (2009). "Army Regulation 2-25" (PDF). Retrieved 2011-04-13.
- ↑ Harold Edgar & Benno C. Schmidt, Jr. (May 1973). "The Espionage Statutes and Publication of Defense Information" (PDF). Columbia Law Review. 73 (5): 937. Retrieved 2011-04-11. from the Federation of American Scientists website
- ↑ Jennifer K. Elsea (2010-01-10). "Criminal Prohibitions on the Publication of Classified Defense Information" (PDF). Retrieved 2011-04-13. from the Federation of American Scientists website
- ↑ US DOJ, Computer Crime & Intellectual Property Section , Scott Eltringham, ed. (Feb 2007). "Prosecuting Computer Crimes". Retrieved 2011-04-16. Chapter 1, Computer Fraud and Abuse Act, pg 14
- 1 2 How Manning Stole The Cables by Nick Dubaz on November 30, 2010, conflicthealth.com (website of Christopher Albon) retr Sep 2011
- ↑ A Narrative Chronology of Bradley Manning’s Alleged Leaks, March 5, 2011, Marcy Wheeler
- ↑ Video Captures Bradley Manning With Hacker Pals at Time of First Leaks Kim Zetter, Wired.com, May 20, 2011
- ↑ US Army HHC, 2d BCT, 10th MTN Div (LI) (2010-07-05). "Charge Sheet of Bradley E. Manning" (PDF). FAS. Retrieved 2015-10-03. External link in
|publisher=
(help) - ↑ US Army, MDW, OSJA, HQ CMD BN, USA (2011-03-02). "Charge Sheet of Bradley E. Manning (Additional)" (PDF). New York Times. Retrieved 2015-10-03. External link in
|publisher=
(help)
External links
- Army Wikileaker Manning Faces Possible Death Penalty With New Charges Jason Mick – March 3, 2011, dailytech.com
- Bradley Manning/Wikileaks Timeline, Fire Dog Lake.com