Welcome!

News Feed Item

U.S. Navy Court Filing: Information Detailing bin Laden Burial Must Be Kept Secret Because It Might Offend Terrorists Abroad

Judicial Watch Lawsuit Seeks bin Laden Burial Information

WASHINGTON, DC -- (Marketwire) -- 01/24/13 -- Judicial Watch announced today that on January 15, 2013, the United States Navy filed a motion for summary judgment on Judicial Watch's July 18, 2012, Freedom of Information Act (FOIA) lawsuit seeking access to the details regarding the burial of terrorist mastermind Osama bin Laden (Judicial Watch, Inc. v. Department of the Navy (No. 1:12-cv-01182)). The Obama administration argued that information related to the burial should be kept secret because it might offend terrorists abroad.

Following the May 2, 2011, Navy SEAL raid that led to bin Laden's capture and killing, the al Qaeda leader was reportedly transported by the USS Carl Vinson and buried at sea in accordance with Muslim law. Judicial Watch's FOIA lawsuit seeks "any funeral ceremony, rite, or ritual" confirming that slain terrorist Osama bin Laden was given full Islamic burial honors.

In its Motion for Summary Judgment, which, if granted by the Court, would end the lawsuit, the Navy cited a sworn declaration from Lieutenant General Curtis M. Scaparrotti, Director of the Joint Staff, who repeated the narrative that details related to the bin Laden burial could inflame tensions among terrorists:

Notwithstanding the fact that proper burial procedures were followed during bin Laden's burial at sea, al-Qa'ida would almost assuredly question the propriety of those procedures, thereby inflaming tensions among overseas populations that include al-Qa'ida members or sympathizers, encouraging propaganda by various terrorist groups or other entities hostile to the United States, and potentially leading to retaliatory attacks against the United States and its citizens both at home and abroad.

"There is simply no exemption in FOIA law that allows the government to withhold records from the American people because terrorists might be offended," said Judicial Watch President Tom Fitton. "First, we're told that we can't see videos or photos of the burial, now we're told we can't see written information about the burial. This attempt to rewrite FOIA law to include a 'let's not offend the terrorists' exemption is another example of the Obama administration thinking it is the law unto itself."

Judicial Watch previously uncovered 31 pages of heavily redacted emails concerning the burial, including a paragraph with previously unknown details of the bin Laden interment at sea: "Traditional procedures for Islamic burial was [sic] followed. The deceased body was washed (ablution) then placed in a white sheet. The body was placed in a weighted bag. A military officer read prepared religious remarks, which were translated into Arabic by a native speaker. After words were complete, the body was placed on a prepared flatboard, tipped up, whereupon the deceased's body slid into the sea."

The documents did not include the "prepared religious remarks" read at bin Laden's burial as specified in the Judicial Watch FOIA request. If Navy regulations were followed, the remarks likely included the exculpatory Muslim prayer, "O Allah, forgive him, have mercy on him, pardon him, grant him security, provide him a nice place and spacious lodging, wash him (off from his sins) with water, snow, and ice, purify him ... make him enter paradise and save him from the trials of grave and the punishment of hell." The emails indicated that "less than a dozen" members of military leadership were informed of the burial and that "No sailors watched."

The Navy informed Judicial Watch that they only had limited information related to the bin Laden burial due to "operational security." The Navy also stated that they were not able to locate a copy of the remarks.

Judicial Watch has contrasted the Obama administration's heavy reliance on FOIA exemptions to withhold information from the American people with its open embrace of filmmakers producing a bin Laden assault film praising the President's role in the affair. The Obama administration has admitted in separate Judicial Watch litigation that leaks of sensitive information to the producers of the film Zero Dark Thirty could cause "unnecessary security and counterintelligence risk." Disclosures forced by Judicial Watch litigation also suggest that John Brennan, President Obama's pick to head the CIA, was involved in the bin Laden raid leaks.

In a separate lawsuit against the CIA, bin Laden post-mortem photos and videos were withheld citing national security concerns.

Add to Digg Bookmark with del.icio.us Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the traditional approach, and how enterprises need to ensure that their needs are properly being met.
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of D...
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, John Jelinek IV, a web developer at Linux Academy, will discuss why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal ...
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
DevOps and microservices are permeating software engineering teams broadly, whether these teams are in pure software shops but happen to run a business, such Uber and Airbnb, or in companies that rely heavily on software to run more traditional business, such as financial firms or high-end manufacturers. Microservices and DevOps have created software development and therefore business speed and agility benefits, but they have also created problems; specifically, they have created software securi...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
"There is a huge interest in Kubernetes. People are now starting to use Kubernetes and implement it," stated Sebastian Scheele, co-founder of Loodse, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Providing secure, mobile access to sensitive data sets is a critical element in realizing the full potential of cloud computing. However, large data caches remain inaccessible to edge devices for reasons of security, size, format or limited viewing capabilities. Medical imaging, computer aided design and seismic interpretation are just a few examples of industries facing this challenge. Rather than fighting for incremental gains by pulling these datasets to edge devices, we need to embrace the i...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walked through how Octob...