If it wasn't clear up to now, it was made crystal clear last week. The co-defendent in the Bradley Manning trial is the Internet itself.
In one of the case's most disturbing pre-trial hearings, Judge Col. Denise Lind ruled last week that prosecutors can offer as evidence files seized from Osama Bin Laden's computer as well as the testimony of a Navy Seal, part of the Bin Laden assasination team, who found them. His identity will not be revealed and the defense can cross-examine him only from a very specific and limited list of court-approved questions.
The ruling is important not only because it shows the almost unimaginable absurdity of the Manning case but because it reveals the true intent of the Obama Administration in pursuing it.
The hearing was about the "standard of proof" necessary to prove two charges: espionage and aiding the enemy. It also took up what kinds of evidence would be permitted in the trial to support those charges.
According to the prosecutors, Manning committed espionage and aided the enemy by giving them important intelligence and he did that by putting it on the Internet. That's it; that's the crime. His real intent is irrelevant. The government is arguing that, if you put something on the Internet that some nefarious rascal downloads, you are effectively aiding that person materially in any "relevant" crime he or she might commit. It doesn't matter if there's no evidence that the person read it and no need to prove that you intended for him or her to retrieve it. Effectively, it makes the use of the Internet a potential crime.
~ from Bradley Manning Update: How to Commit Espionage Without Trying! by Alfredo Lopez ~
Since I often write on political themes and I share what the government might consider to be subversive links, this post may be evidence of a crime! If you read it and then set about to commit some sort of nefarious act, I could be in deep doo doo! So please, only read what I write IF you plan to be a model citizen. If you happen to be a malcontent no-good, go read Glenn Beck's blog.