-Caveat Lector-


Begin forwarded message:

From: [EMAIL PROTECTED]
Date: April 26, 2007 12:50:40 PM PDT
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: The People vs The Secret State

Secrecy, Lies, and the Covert War on the Constitution

by Scott Horton
Harpers,  April 25, 2007
http://harpers.org/archive/2007/04/horton-20070425lwyh

In an interview yesterday Senator Jay Rockefeller discussed one of the great untold truths of the last six years. The Bush Administration has blocked Congressional oversight of its intelligence operations through a series of lies, tricks and misrepresentations. But its principal tool has been simple: it withholds information.

As Rockefeller said:
"Don't you understand the way intelligence works? Do you think that because I'm chairman of the Intelligence Committee, that I just say I want it, and they give it to me? They control it. All of it. All of it. All of the time. I only get, and my committee only gets, what they want to give me. "

What Rockefeller is describing is a matter of tremendous moment — the blinding of Congress. It has some important historical precedents, the contemplation of which can only lead to still greater concern about the Bush Administration's attitudes towards secrecy.

In one of his most important works in the years immediately following the Great War, Max Weber took a close look at state secrets and the role they play in a democratic society — first in a series of speeches, then in the chapter “Bureaucracy” in one of his principal works, Economy and Society (Wirtschaft und Gesellschaft).

Weber articulated a number of indisputable truths, starting with the fact that by classifying information as “secret,” it is immunized from public discussion and verification. “Secret” information is for precisely this reason prone to be false, or at least less likely to be correct than data that is tested in the public environment. Indeed, there is a consistent practice over many societies and epochs of using security classifications to shield information which has been consciously fabricated — precisely to protect its falsity (this is one of the possible readings of Franz Kafka's great parable “Before the Law” — the ultimate irony of a secret law — written at the same time that Weber was addressing the subject, and certainly propelled by some of the same historical developments).

But the most important of the many observations that Weber made had to do with the role that security classifications play in the allocation of power within democratic societies. Weber noticed that secrecy was used to empower a bureaucratic elite and to dis- enfranchise elected democratic representatives. Those with access to classified information could claim superior, inside knowledge. They had to be trusted and followed, and it was not possible to engage them in any debate or discourse. Indeed, all debate could be dodged by always falling back on "classified information."

It doesn't take much analysis to understand what Weber was referring to in his essay. Though he uses polite and scientific language, he was outraged over what had transpired in the last years of the Great War. The General Staff and the war administration had wielded security classifications to silence the parliament and exercise increasingly thorough control over the levers of government, until at the end, and certainly by early 1917, Germany was a thinly veiled military dictatorship — its nascent democratic institutions had been strangled.

Weber's observations could, with just a bit of tailoring, have been written about the Bush Administration. It quickly seized upon a cloak of warfare to corrupt the intelligence gathering process and to realize the full anti-democratic potential of security classifications.

But its manipulation of security classifications as tools in a war against the constitutional order is if anything far more clever and more pernicious than anything that was attempted by the German General Staff and the aligned Beamtentum.

A key aspect of that operation has been the abusive wielding of national security classifications — they have been used to: *cloak deceit and misinformation from public scrutiny, as in claims that the Administration possessed highly classified information supporting the conclusion that there were weapons of mass destruction in Iraq, when this was false and known to be false when uttered; *hide or obscure important policy decisions which are at odds with prior established policy and with law by insuring that the policies themselves are secret; *hide criminal conduct — as in the introduction of torture, cruel, inhuman and degrading conduct producing the most disturbing serial and programmatic war crimes against detainees in the nation's history, the felonious program of extraordinary renditions, a program of unlawful surveillance, and a routine pattern of felonious violations of the Posse Comitatus Act by agencies of the Department of Defense; *protect political figures from embarrassment — usually by concealing the fact that they have knowingly made false statements for purposes of misleading the public; *launch false or misleading attacks on political opponents — as was revealed in United States v. Libby, in which we learned that Karl Rove, Dick Cheney and George W. Bush conspired to declassify top secret information on a piecemeal basis so it could be used to smear a political adversary; and *frustrate Congressional oversight and decision-making and erode Congress' ability to exercise independent judgment to hold the executive in check.

These practices are not uncommon in the world. They are characteristic of authoritarian and totalitarian regimes everywhere. These practices, collectively, constitute a dagger pointed at the throat of American democracy—and indeed, they have been used by the Bush-Cheney government as part of a scheme to subvert the democratic order envisioned in the Constitution. It's hard to say which of these offenses is the gravest.

But the aspect that probably requires the most immediate action is the conscious subversion of Congressional oversight. For the last four years, the administration has illegally evaded oversight of its intelligence programs, and particularly of its extensive palette of extra-legal activities, by Congressional committees.

It has done so openly, and its actions went shamefully unchallenged by the last Congress — probably the most corrupt in the nation's history.

Vice President Cheney was the ringmaster of this project, and he has attempted a public justification of it on several occasions — usually citing leaks which seem suspiciously close to his office or to congressional figures close to him. In the current administration, Cheney has been the leaker-in-chief, regularly disclosing classified information of even the highest sensitivity when he felt it would meet his political interests to do so. The most striking example of this came with the outing of a covert CIA agent, Valerie Plame, as an act of political retaliation. The Libby trial afforded a deep insight into how Cheney's mind works in this regard. He spent a period of at least three weeks completely obsessed with the project of leaking, scheming with staffers and aides as to how to carry it out, and ultimately even involving President Bush. His intent was criminal and reflected actual malice. As several jurors noted when they emerged following the Libby conviction, they could not understand why they were deprived of the opportunity of passing on Cheney's criminality. Indeed, there's not much question what the verdict would have been.

There is no more urgent agenda before Congress today than reasserting its oversight function, and using all the tools at its disposal —including subpoenas, hearings and the power of the purse— to regain a check on a regime of secrecy which is reeling dangerously in the direction of a police state.

It could yet make a difference.

AOL now offers free email to everyone. Find out more about what's free from AOL at AOL.com.

www.ctrl.org
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!   These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:

http://www.mail-archive.com/ctrl@listserv.aol.com/
<A HREF="http://www.mail-archive.com/ctrl@listserv.aol.com/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to