J u m p t o c o n t e n t
M a i n m e n u
M a i n m e n u
N a v i g a t i o n
● M a i n p a g e
● C o n t e n t s
● C u r r e n t e v e n t s
● R a n d o m a r t i c l e
● A b o u t W i k i p e d i a
● C o n t a c t u s
● D o n a t e
C o n t r i b u t e
● H e l p
● L e a r n t o e d i t
● C o m m u n i t y p o r t a l
● R e c e n t c h a n g e s
● U p l o a d f i l e
S e a r c h
Search
A p p e a r a n c e
● C r e a t e a c c o u n t
● L o g i n
P e r s o n a l t o o l s
● C r e a t e a c c o u n t
● L o g i n
P a g e s f o r l o g g e d o u t e d i t o r s l e a r n m o r e
● C o n t r i b u t i o n s
● T a l k
( T o p )
1
C h a r g e s
T o g g l e C h a r g e s s u b s e c t i o n
1 . 1
B y c o d e v i o l a t i o n
1 . 2
L i s t e d b y d o c u m e n t
1 . 3
L i s t e d i n t h e o r d e r g i v e n o n t h e c h a r g e s h e e t s
1 . 3 . 1
F i r s t s e t o f c h a r g e s ( 2 0 1 0 )
1 . 3 . 1 . 1
C h a r g e 1 : V i o l a t i o n o f U C M J A r t i c l e 9 2 ( F a i l u r e t o o b e y a l a w f u l o r d e r o r r e g u l a t i o n )
1 . 3 . 1 . 2
C h a r g e 2 : V i o l a t i o n o f U C M J A r t i c l e 1 3 4 ( G e n e r a l a r t i c l e )
1 . 3 . 2
S e c o n d s e t o f c h a r g e s ( 2 0 1 1 )
1 . 3 . 2 . 1
A d d i t i o n a l C h a r g e 1 : V i o l a t i o n o f U C M J A r t i c l e 1 0 4 ( A i d i n g t h e e n e m y )
1 . 3 . 2 . 2
A d d i t i o n a l C h a r g e 2 : V i o l a t i o n o f U C M J A r t i c l e 1 3 4 ( G e n e r a l a r t i c l e )
1 . 3 . 2 . 3
A d d i t i o n a l C h a r g e 3 : V i o l a t i o n o f U C M J A r t i c l e 9 2 ( F a i l u r e t o o b e y a l a w f u l o r d e r o r r e g u l a t i o n )
2
S e e a l s o
3
R e f e r e n c e s
4
E x t e r n a l l i n k s
T o g g l e t h e t a b l e o f c o n t e n t s
L i s t o f c h a r g e s i n U n i t e d S t a t e s v . M a n n i n g
A d d l a n g u a g e s
A d d l i n k s
● A r t i c l e
● T a l k
E n g l i s h
● R e a d
● E d i t
● V i e w h i s t o r y
T o o l s
T o o l s
A c t i o n s
● R e a d
● E d i t
● V i e w h i s t o r y
G e n e r a l
● W h a t l i n k s h e r e
● R e l a t e d c h a n g e s
● U p l o a d f i l e
● S p e c i a l p a g e s
● P e r m a n e n t l i n k
● P a g e i n f o r m a t i o n
● C i t e t h i s p a g e
● G e t s h o r t e n e d U R L
● D o w n l o a d Q R c o d e
● W i k i d a t a i t e m
P r i n t / e x p o r t
● D o w n l o a d a s P D F
● P r i n t a b l e v e r s i o n
P r i n t / e x p o r t
A p p e a r a n c e
F r o m W i k i p e d i a , t h e f r e e e n c y c l o p e d i a
T h i s i s a n o l d r e v i s i o n o f t h i s p a g e , a s e d i t e d b y S h u s h u g a h ( t a l k | c o n t r i b s ) at 1 0 : 2 5 , 2 7 S e p t e m b e r 2 0 2 3 . T h e p r e s e n t a d d r e s s ( U R L ) i s a p e r m a n e n t l i n k t o t h i s r e v i s i o n , w h i c h m a y d i f f e r s i g n i f i c a n t l y f r o m t h e c u r r e n t r e v i s i o n .
( d i f f ) ← P r e v i o u s r e v i s i o n | L a t e s t r e v i s i o n ( d i f f ) | N e w e r r e v i s i o n → ( d i f f )
United States v. Manning is the court-martial case involving United States Army Private First Class Bradley Manning (now known as Chelsea Manning ), who delivered U.S. government documents to persons not authorized to receive them in 2009 and 2010. Media reports said that the receiver was Julian Assange of WikiLeaks . Manning was arrested in May 2010 and a court-martial was held in June–August 2013.[1] The charges were related to events which occurred "at or near" Contingency Operating Station Hammer, Iraq, in 2009 and 2010.
Charges
By code violation
The charges were:
UCMJ 104 (Aiding the enemy): 1 count
UCMJ 92 (Failure to obey a lawful order or regulation): 9 counts. Mostly related to computers[2] [3]
Army Regulation 25-2, para. 4-5(a )(3 ): Modifying or installing unauthorized software to a system, using it for 'unintended' purposes
Army Regulation 25-2, para. 4-5(a )(4 ): Circumventing security mechanisms
Army Regulation 25-2, para. 4-6(k ): Forbids transferring classified or sensitive information to non-secure systems
Army Regulation 380-5: Improper storage of classified information
UCMJ 134 (General article ): 24 counts. These counts incorporate statutes from the United States Code :
18 U.S.C. § 641 : Embezzlement and Theft of Public Money, Property or Records. The government said the records that Manning transferred were 'things of value'.
18 U.S.C. § 793(e ) : This is part of the Espionage Act . The law forbids 'unauthorized persons' from taking 'national defense' information and either 'retaining' it or delivering it to 'persons not entitled to receive it'.[4] [5]
18 U.S.C. § 1030(a ) 1 and 2: These are from the Computer Fraud and Abuse Act of 1986. Section 1030(a )(1 ) is sometimes called the 'Computer Espionage' law as it borrows from the Espionage Act .[6]
Total: 34
Listed by document
Most of the charges are related to the transfer of documents to another party. These documents are:
According to news reports, many of the documents are the same as documents published by WikiLeaks , including:
Listed in the order given on the charge sheets
First set of charges (2010)
The first set of charges came on July 5, 2010. The Specifications (Spec.) are listed below in the same order as given on the charge sheets. To the right of each specification is a description of the related documents or actions.[10]
Charge 1: Violation of UCMJ Article 92 (Failure to obey a lawful order or regulation)
Spec. 1: Army Reg. 25-2, para. 4-6(k ): The 2007 July 12 Baghdad video
Spec. 2: Army Reg. 25-2, para. 4-6(k ): 50 classified US Dept of State cables
Spec. 3: Army Reg. 25-2, para. 4-6(k ): A classified Microsoft Office PowerPoint presentation
Spec. 4: Army Reg. 25-2, para. 4-5(a )(3 ): Adding unauthorized software to SIPRNet
Charge 2: Violation of UCMJ Article 134 (General article)
Second set of charges (2011)
A second set of charges was presented on March 1, 2011, and are as follows:[11]
Additional Charge 1: Violation of UCMJ Article 104 (Aiding the enemy)
Spec. 1: Knowingly giving intelligence to the enemy through indirect means
Additional Charge 2: Violation of UCMJ Article 134 (General article)
Spec. 1: (statute not given): Causing intelligence to be published, knowing that it is accessible to the enemy
Spec. 2: 18 U.S.C. § 793(e ) : A file named "12 JUL 07 CZ ENGAGEMENT ZONE 30 GC Anyone.avi"
Spec. 3: 18 U.S.C. § 793(e ) : Memorandi from a US intelligence agency
Spec. 4: 18 U.S.C. § 641 : 380,000 records from the CIDNEI database
Spec. 5: 18 U.S.C. § 793(e ) : >20 records from the CIDNEI database
Spec. 6: 18 U.S.C. § 641 : >90,000 records from the CIDNEA database
Spec. 7: 18 U.S.C. § 793(e ) : >20 records from the CIDNEA database
Spec. 8: 18 U.S.C. § 641 : >700 records from a US Southern Command database
Spec. 9: 18 U.S.C. § 793(e ) : >3 records from a US Southern Command database
Spec. 10: 18 U.S.C. § 793(e ) : >5 records relating to an operation in Farah Province, Afghanistan
Spec. 11: 18 U.S.C. § 793(e ) : The files "BE22 PAX.zip" and "BE22 PAX.wmv"
Spec. 12: 18 U.S.C. § 641 : 250,000 records from the State Dept Net-Centric Diplomacy database
Spec. 13: 18 U.S.C. § 1030(a )(1 ) : >75 US State Dept cables
Spec. 14: 18 U.S.C. § 1030(a )(1 ) : The State Dept cable named "Reykjavik-13"
Spec. 15: 18 U.S.C. § 793(e ) : A record of a US Army Intelligence organization
Spec. 16: 18 U.S.C. § 641 : The US Forces – Iraq Microsoft Outlook / SharePoint Exchange Server global address list
Additional Charge 3: Violation of UCMJ Article 92 (Failure to obey a lawful order or regulation)
Spec. 1: Army Reg. 25-2, para. 4-5(a )(4 ): Bypassing security mechanisms
Spec. 2: Army Reg. 25-2, para. 4-5(a )(3 ): Adding unauthorized software to a SIPRNet computer
Spec. 3: Army Reg. 25-2, para. 4-5(a )(3 ): Adding unauthorized software to a SIPRNet computer
Spec. 4: Army Reg. 25-2, para. 4-5(a )(3 ): Using an information system for other than its intended purpose
Spec. 5: Army Reg. 380-5, para. 7-4: Wrongfully storing classified information
See also
References
^
US Army (2009). "Army Regulation 2-25" (PDF) . Retrieved 2011-04-13 .
^
Harold Edgar & Benno C. Schmidt, Jr. (May 1973). "The Espionage Statutes and Publication of Defense Information" (PDF) . Columbia Law Review . 73 (5 ): 937. Retrieved 2011-04-11 . from the Federation of American Scientists website
^
Jennifer K. Elsea (2010-01-10). "Criminal Prohibitions on the Publication of Classified Defense Information" (PDF) . Retrieved 2011-04-13 . from the Federation of American Scientists website
^
US DOJ, Computer Crime & Intellectual Property Section, Scott Eltringham, ed. (Feb 2007). "Prosecuting Computer Crimes" . Archived from the original on 2010-08-01. Retrieved 2011-04-16 . CS1 maint: multiple names: authors list (link ) Chapter 1, Computer Fraud and Abuse Act, pg 14
^ a b
How Manning Stole The Cables Archived 2012-03-15 at the Wayback Machine by Nick Dubaz on November 30, 2010, conflicthealth.com (website of Christopher Albon ) retr Sep 2011
^
A Narrative Chronology of Bradley Manning’s Alleged Leaks , March 5, 2011, Marcy Wheeler
^
Video Captures Bradley Manning With Hacker Pals at Time of First Leaks Kim Zetter, Wired.com, May 20, 2011
^
US Army HHC, 2d BCT, 10th MTN Div (LI ) (2010-07-05). "Charge Sheet of Bradley E. Manning" (PDF) . Federation of Atomic Scientists. Retrieved 2015-10-03 . {{cite web }}
: CS1 maint: multiple names: authors list (link ) CS1 maint: numeric names: authors list (link )
^
US Army, MDW, OSJA, HQ CMD BN, USA (2011-03-02). "Charge Sheet of Bradley E. Manning (Additional)" (PDF) . The New York Times . Retrieved 2015-10-03 . {{cite news }}
: CS1 maint: multiple names: authors list (link )
External links
R e t r i e v e d f r o m " https://en.wikipedia.org/w/index.php?title=List_of_charges_in_United_States_v._Manning&oldid=1177375060 "
C a t e g o r i e s :
● 2 1 s t c e n t u r y - r e l a t e d l i s t s
● I r a q W a r - r e l a t e d l i s t s
● I r a q W a r a n d t h e m e d i a
● L e g a l c a s e s i n v o l v i n g W i k i L e a k s
● U n i t e d S t a t e s m i l i t a r y l a w
● W a r i n A f g h a n i s t a n ( 2 0 0 1 – 2 0 2 1 ) - r e l a t e d l i s t s
● W a r i n A f g h a n i s t a n ( 2 0 0 1 – 2 0 2 1 ) a n d t h e m e d i a
● C h e l s e a M a n n i n g
H i d d e n c a t e g o r i e s :
● C S 1 e r r o r s : e x t e r n a l l i n k s
● C S 1 e r r o r s : g e n e r i c n a m e
● C S 1 m a i n t : m u l t i p l e n a m e s : a u t h o r s l i s t
● W e b a r c h i v e t e m p l a t e w a y b a c k l i n k s
● C S 1 m a i n t : n u m e r i c n a m e s : a u t h o r s l i s t
● A r t i c l e s w i t h s h o r t d e s c r i p t i o n
● S h o r t d e s c r i p t i o n i s d i f f e r e n t f r o m W i k i d a t a
● W i k i p e d i a a r t i c l e s n e e d i n g c l a r i f i c a t i o n f r o m A p r i l 2 0 1 2
● T h i s p a g e w a s l a s t e d i t e d o n 2 7 S e p t e m b e r 2 0 2 3 , a t 1 0 : 2 5 ( U T C ) .
● T h i s v e r s i o n o f t h e p a g e h a s b e e n r e v i s e d . B e s i d e s n o r m a l e d i t i n g , t h e r e a s o n f o r r e v i s i o n m a y h a v e b e e n t h a t t h i s v e r s i o n c o n t a i n s f a c t u a l i n a c c u r a c i e s , v a n d a l i s m , o r m a t e r i a l n o t c o m p a t i b l e w i t h t h e C r e a t i v e C o m m o n s A t t r i b u t i o n - S h a r e A l i k e L i c e n s e .
● P r i v a c y p o l i c y
● A b o u t W i k i p e d i a
● D i s c l a i m e r s
● C o n t a c t W i k i p e d i a
● C o d e o f C o n d u c t
● D e v e l o p e r s
● S t a t i s t i c s
● C o o k i e s t a t e m e n t
● M o b i l e v i e w