Tuesday, December 25, 2012

The Christmas Truce

Ninety-eight years ago, at various points along the Western Front, a remarkable thing happened. On Christmas Eve, German and British troops put down their guns, sang Christmas carols--both responsively and together--and eventually crawled out of their trenches to meet in no-man's land to share cigarettes and drinks, to play soccer, to celebrate Christmas, and to bury their dead. The truce was spontaneous: no officers or political leaders authorized it and some, in fact, were incensed by it. And yet it happened, and was deeply meaningful to many of the 100,000 or so soldiers who participated in it. (Consider this sampling of recollections of the Christmas Truce drawn from diaries and memoirs.)

What exactly happened on Christmas in 1914? Was it a sign of the disconnect between raison d'etat and the beliefs of those who were forced to fight in the name of the state? Was it a brief breakthrough of humanity in a war that came to demonstrate the most extreme inhumanity? Was it an act of insubordination by common soldiers? And how could those soldiers so easily return to the fight the day after Christmas? How could men sing together "O Come, All Ye Faithful" one day and kill each other the next?

Saturday, December 08, 2012

"Likes" for Pakistani Taliban

The Los Angeles Times reports that Tehreek-i-Taliban (TTP), the group that Pakistani authorities charge with the assassination of former prime minister Benazir Bhutto, now has a Facebook page. The page, with 281 "likes" as of Friday evening, is used for recruiting. It follows a pattern in recent years of Islamic militant organizations using social media to recruit new members.

Progress on Landmines

This week in Geneva at the review conference of the Ottawa Convention (the Convention on the Prohibition of the Use, Stockpiling, Production and Transfer of Anti-Personnel Mines and on their Destruction), six states announced that they have completed demining operations within their borders and are now mine-free. One of the six was Denmark, which in July removed the last of the 1.4 million mines laid by Germany during World War II.

Poland announced that it is prepared to ratify the Ottawa Convention. When it does so, it will become the 161st state party and the last of the European Union's member states to ratify.

The United States, present at the review conference as an observer, stated that it will "soon" complete a review begun in 2009 that was intended to determine whether it should sign the agreement. The United States is the only NATO member state that has not ratified the Ottawa Convention.

Friday, December 07, 2012

Suppressing Dissent in Equatorial Guinea

Human Rights Watch has called for the regime of Teodoro Obiang Nguema to stop harassing members of the political opposition. At least four opposition leaders have been arrested in Equatorial Guinea since November 2011.

The most recent arrest came on Tuesday when Daniel Darío Martínez Ayécaba, leader of the Popular Union party was taken into custody as he was about to leave Malabo for a conference of opposition groups in Madrid. After being questioned in a Malabo jail known as "Guantánamo," Darío was released with orders to report to authorities daily. His passport was confiscated.

The arrests of Darío and, in October, human rights attorney and opposition leader Fabian Nsue Nguema, fit a pattern in Equatorial Guinea of politically motivated arrests in advance of national elections. Equatorial Guinea's legislative elections are expected to take place in January.

Thursday, December 06, 2012

Why Did Thirty-Eight Senators Vote 'No'?

One might be tempted to believe--or at least fervently hope--that the 38 Republican senators who voted against ratification of the Convention on the Rights of Persons with Disabilities on Monday had reasonable objections to the treaty. Even applying a rather generous definition of "reasonable," that was not the case. Thus it is with the opposition party's assault on reason.

As with the opposition to other international agreements, including unratified--at least by the U.S.--human rights treaties such as the Convention on the Elimination of All Forms of Discrimination Against Women and the Convention on the Rights of the Child, Republican concerns focus on how specific provisions of the agreements in question might be interpreted--and thus enforced--by U.S. courts if they were to become part of the "supreme law of the land" as Article VI specifies.

Gail Collins, writing in the New York Times, explains this as well as anyone I've seen so far:
Santorum was upset about a section on children with dis- abilities that said: "The best interests of the child shall be a primary consideration."
"This is a direct assault on us and our family!" he said at a press conference in Washington.
O.K
The hard right has a thing about the United Nations. You may remember that the senator-elect from Texas, Ted Cruz, once railed that a 20-year-old nonbinding United Nations plan for sustainable development posed a clear and present threat to American golf courses.
The theory about the treaty on the disabled is that the bit about "best interests of the child" could be translated into laws prohibiting disabled children from being home-schooled. At his press conference, Santorum acknowledged that wasn’t in the cards. But he theorized that someone might use the treaty in a lawsuit "and through the court system begin to deny parents the right to raise their children in conformity with what they believe."
If I felt you were actually going to worry about this, I would tell you that the Senate committee that approved the treaty included language specifically forbidding its use in court suits. But, instead, I will tell you about own my fears. Every day I take the subway to work, and I use a fare card that says "subject to applicable tariffs and conditions of use." What if one of those conditions is slave labor? Maybe the possibility of me being grabbed at the turnstile and carted off to a salt mine isn’t in the specific law, but what if a bureaucrat somewhere in the Metropolitan Transportation Authority decided to interpret it that way?
It can be difficult trying to explain to those in other countries how 38 percent of the members of one or our two legislative bodies--and the 38 percent with the most fevered imaginations at that--can derail important matters of international law and U.S. foreign poilcy. To say, "That's democracy!" is to give democracy a bad name.

The CRPD Vote

The vote on the Convention on the Rights of Persons with Disabilities on Monday was an embarrassment to the United States and to the Senate itself. Sixty-one senators voted for advice and consent to ratification, but, thanks to the Constitution's anachronistic requirement that treaties garner a two-thirds majority for consent to ratification, that majority was insufficient.

Here are the names of the 38 senators who voted against the Convention on the Rights of Persons with Disabilities:

Lamar Alexander (R-TN)
Roy Blunt (R-MO)
John Boozman (R-AR)
Richard Burr (R-NC)
Saxby Chambliss (R-GA)
Daniel Coats (R-IN)
Tom Coburn (R-OK)
Thad Cochran (R-MS)
Bob Corker (R-TN)
John Cornyn (R-TX)
Mike Crapo (R-IN)
Jim DeMint (R-SC)
Michael Enzi (R-WY)
Lindsey Graham (R-SC)
Chuck Grassley (R-IA)
Orrin Hatch (R-UT)
Dean Heller (R-NV)
John Hoeven (R-ND)
Kay Bailey Hutchison (R-TX)
James Inhofe (R-OK)
Johnny Isakson (R-GA)
Mike Johanns (R-NE)
Ron Johnson (R-WI)
John Kyl (R-AZ)
Mike Lee (R-UT)
Mitch McConnell (R-KY)
Jerry Moran (R-KS)
Rand Paul (R-KY)
Rob Portman (R-OH)
James Risch (R-ID)
Pat Roberts (R-KS)
Marco Rubio (R-FL)
Jeff Sessions (R-AL)
Richard Shelby (R-AL)
John Thune (R-SD)
Patrick Toomey (R-PA)
David Vitter (R-LA)
Roger Wicker (R-MS)

Here are the states whose senators both voted against the treaty: Alabama, Georgia, Idaho, Kansas, Kentucky, Mississippi, Oklahoma, South Carolina, Tennessee, Texas, and Utah.

When Your Computer Threatens You

An article in today's New York Times notes the growing threat posed by "ransomware," the malicious software that disables a computer and demands payment of a "fine" to restore its functionality. (Payment will not fix the problem; never send money to an entity in cyberspace you don't know.)

The Times reports that a computer security expert based in France was able to track the operations of one criminal gang working with ransomware. It infected 18,941 computers in a single day, Owners of those computers paid over $400,000 in ransom payments.

That would explain the appeal of this form of malware to cyber-criminals.

Tuesday, December 04, 2012

The CRPD Fails

Not even the presence of Bob Dole on the Senate floor could persuade more than a handful of Republicans to support the Convention on the Rights of Persons with Disabilities.

A resolution to express the Senate's advice and consent to ratification failed today by five votes (61-38). As Senate majority leader Harry Reid said, "It is a sad day when we cannot pass a treaty that simply brings the world up to the American standard for protecting people with disabilities because the Republican Party is in thrall to extremists and ideologues." Moderate Republicans all supported ratification, but they were greatly outnumbered by those Republican senators who believe that the U.S. will somehow be harmed by agreeing to any international human rights treaty, even one that reflects the principles of the 1990 Americans with Disabilities Act (ADA).

Dole, a former senator and Republican presidential nominee, has been disabled since 1945 when he was hit by German machine gun fire during combat in Italy. He was instrumental in the passage of the ADA and has been a strong supporter of CRPD ratification. Josh Rogin reported that his appearance on the Senate floor today was intended to force Republicans intent on voting against the treaty to walk past him to do so, but the vote occurred after Dole, in a wheelchair, left the floor.

Senator John Kerry's impassioned speech on behalf of ratification is worth watching:



Thursday, November 29, 2012

"Acquisition Malpractice"

Problems with the F-35 Joint Strike Fighter are the subject of a front-page article in today's New York Times. The Times, drawing from a June Government Accountability Office study of the F-35 that focused on "affordability risks," reports that total program costs could reach $396 billion if the Pentagon purchases 2,443 of the planes by the late 2030s as is currently planned. That would make the program the costliest weapons program in history by close to a factor of four. The cost per plane has risen from $69 million in 2001 to $137 million today. Frank Kendall, who has directed the Pentagon's weapons-purchasing operations since May, describes the decision to begin production of the F-35 before flight testing had even started as "acquisition malpractice."

Wednesday, November 28, 2012

Terrestrial Locomotion

Quadrotors have hit the ground running.


Tuesday, November 27, 2012

Considering the CRPD

The United States Senate today voted to proceed to Executive Session in order to consider the Convention on the Rights of Persons with Disabilities. Debate on a resolution of advice and consent to ratification is scheduled to begin tomorrow.

The Convention, which was adopted by the United Nations General Assembly on December 13, 2006, and opened for signature on March 30, 2007, is intended to ensure that states protect the human rights and guarantee the full legal equality of persons with disabilities. It entered into force on May 3, 2008, and currently has 126 parties. Another 28 states, including the United States, have signed but not ratified.

The Senate Foreign Relations Committee reported the CRPD favorably on July 31, 2012, with three reservations, eight understandings, and two declarations. The three reservations pertain to federalism issues (preserving in some instances state laws that would provide less protection for the rights of the disabled than required by the Convention), private conduct (allowing federal law to retain some provisions that allow for discrimination against the disabled as a matter of private conduct), and torture and other cruel, inhumane or degrading treatment (duplicating existing U.S. reservations regarding torture to the 1966 International Covenant on Civil and Political Rights and the 1984 Convention Against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment). The eight understandings are generally intended to ensure that the Convention's terms will be interpreted in a manner consistent with existing U.S. law.

The motion to proceed to Executive Session was passed today by a 61-36 vote. Sixty-seven votes will be necessary to adopt the resolution of advice and consent to ratification if all 100 members of the Senate are present and voting. Senator Rick Santorum (R-PA), who has a disabled daughter, and Senator Mike Lee (R-UT), a Tea Party favorite, appeared together today to announce their opposition to the CRPD. It is unclear whether the Convention can gain the two-thirds majority required to give the Senate's consent to ratification during the current lame-duck session. In September, 36 Republicans--more than a third of the Senate's membership--signed a letter opposing any action on treaties in the session following the election.

Obstructing the majority while alienating whole sectors of the population continues to be the Republicans' strategy in Congress. If successful this time, it will deal another blow to the credibility of U.S. leadership on human rights.

Sovereignty and Atrocity

Human Rights Watch is reporting today that eleven children were killed over the weekend when a Syrian MiG-23 dropped cluster bombs on the town of Deir al-'Assafeer. An indiscriminate attack of any kind on noncombatants violates international humanitarian law, but the focus in HRW's account of what happened is on the use of cluster munitions, and for good reasons.

Cluster bombs, first, are used primarily as antipersonnel weapons. When noncombatants die in an attack employing conventional bombs or artillery shells, a plausible claim can sometimes be made that the deaths were unintended collateral damage incidental to an attack on a legitimate target. On the other hand, when civilians--and only civilians--are killed by cluster bombs, there is a strong case to be made that a war crime has been committed.

Second, cluster munitions tend to leave behind a deadly legacy of what are sometimes rather bureaucratically referred to as explosive remnants of war (ERW). Everywhere they have been employed, unexploded submunitions--bomblets--continue to pose a threat to civilians (poor farmers more often than not) long after the conflict ends. Disposing of unexploded submunitions is very hazardous, requiring both resources and political will that post-conflict societies often find to be in short supply. According to HRW, video footage of the attack on Deir al-'Assafeer and its aftermath shows at least fifty unexploded bomblets around the site.

Human Rights Watch maintains that cluster munitions "are subject to a ban under international law due to the harm they cause to civilians," in the words of Mary Wareham, the organization's arms division advocacy director. The ban to which Wareham refers is articulated in the 2008 Convention on Cluster Munitions, which entered into force on August 1, 2010. The Convention today has 111 signatories, 77 of which have ratified the agreement. Syria is not a party to the agreement, however, which means the ban does not apply to it in the absence of a determination that the ban is part of customary international law (a claim that has not, to my knowledge, been pressed by HRW).

There is no question that the use of cluster munitions to deliberately target noncombatants is illegal. The deaths of eleven children in the bombing of Deir al-'Assafeer should be added to the long list of crimes for which the Assad regime ultimately should be held accountable. But it is not clear--in fact, it is almost certainly wrong to say--that international law makes it illegal for Syria to use cluster munitions under any conditions. While I would prefer to side with Wareham and Human Rights Watch on this issue, the fact that Syria is not a party to the Convention on Cluster Munitions is significant. It has opted out of the obligations imposed on states parties by the Convention, as has the United States. The right to do so, however unfortunate in this particular case, is inherent in the notion of sovereignty. Sovereignty shields states--including bad ones like Syria--from the imposition of law, including laws banning cluster munitions, by outsiders. But only up to a point.

Wareham states that "all governments, including Syria’s allies, should condemn Syria’s continued use of cluster bombs," and there is good reason for this, even if Syria is not legally subject to the ban imposed by the Convention on Cluster Munitions. The condemnation of other governments can erode the protection that sovereignty provides for the use of cluster munitions by states that have not ratified the Convention. While sovereignty ensures that states bear primary responsibility for their own laws and their own actions (at least insofar as their actions are confined to their own territories), international law as a means of limiting the freedom of states pushes back against sovereignty where customary international law and, more importantly, peremptory norms (jus cogens) are involved. If cluster munitions are to be "subject to a ban under international law," it will come from universal ratification of the Convention on Cluster Munitions or, more likely, from a sufficiently widespread acceptance of the Convention and broad-based condemnation of holdouts that, in combination, generates a customary international law norm against possession or use of the weapons. Human Rights Watch may have jumped the gun in suggesting that a ban on cluster munitions currently exists, but it is hastening the day when that will be true by publicizing what the Syrian government is doing with these weapons.

Sunday, November 25, 2012

Passwords and Cybercrime

This recent Wired article--"Kill the Password: Why a String of Characters Can't Protect Us Anymore by Mat Honan--should be required reading for anyone who owns--or even borrows--a computer or mobile device. The bottom line is that a strong password isn't enough to protect your data (including the data you have stored in online accounts) from hackers, some of whom are simply malicious teenagers eager to erase every digital photo you've ever taken just for fun. It's not clear whether kids hacking for the thrill of it are better or worse than the professionals who are in it for the money. According to Honan, "In 2011 Russian-speaking hackers alone took in roughly $4.5 billion from cybercrime."

The Campaign to Ban Autonomous Killer Robots

Last week, Human Rights Watch, joined by the Nobel Women's Initiative, launched a campaign to develop an international ban on autonomous killer robots. A 50-page report, Losing Humanity: The Case Against Killer Robots, published jointly by HRW and Harvard Law School's International Human Rights Clinic, was released on Monday.

According to the report, the U.S. Department of Defense is spending roughly $6 billion per year on unmanned systems, a figure projected to grow quickly given the military's avowed interest in procuring more robotic weapons with expanding capabilities. A number of other countries are also investing in military robotics with increasing degrees of autonomy. The most newsworthy example in recent days has been Israel's Iron Dome missile defense system. At present, the Iron Dome system puts a human operator in the loop, but it is clearly a system for which fully autonomous operations would be possible.

The report opposes the deployment of lethal autonomous robots on three grounds: (1) such robots would not conform to the rules of international humanitarian law as they relate to noncombatant immunity, proportionality, and military necessity; (2) they would not be subject to extra-legal protections for civilians such as those predicated on human compassion and empathy, thus making them suitable for use by repressive governments against their own populations; and (3) they would make it difficult to establish accountability for war crimes given the elimination of direct human agency. The report concludes with a recommendation that those involved in the development of robotic weapons generate a code of conduct governing work that might lead to the creation of fully autonomous systems.

Saturday, November 24, 2012

COP18

On Monday, the 18th Conference of Parties (COP18) to the United Nations Framework Convention on Climate Change and the 8th Meeting of the Parties to the Kyoto Protocol will begin in Doha, Qatar. (The agenda is available here.) COP18 has a number of objectives, but the most important involves negotiations toward a climate change treaty to replace the Kyoto Protocol. Under the Durban Platform agreed to at COP17 in Durban, South Africa last year, a new "legal outcome" is to be developed by 2015.

Nathan Hultman, a Brookings Institution fellow, provides an excellent summary of the road to Doha in this post. And, via Andrew C. Revkin's Dot Earth blog at the New York Times, there's this brief--but insightful--video on twenty years of climate change negotiations.


Monday, November 19, 2012

Aung San Suu Kyi Welcomes President Obama

Sometimes a pictures is worth a thousand words.


Sunday, November 18, 2012

Tanks, Rockets, Tweets, and Hacks

As the conflict between Israel and Hamas escalates with rocket attacks aimed at Jerusalem and Tel Aviv on the one hand and air strikes on government offices in Gaza on the other, various cyber dimensions of the conflict are becoming increasingly noteworthy. On the Israeli side, the Israel Defense Forces (IDF), in an effort to control the conflict's narrative, are using Twitter and Facebook with a level of intensity last seen in the Obama campaign. But reviews of the IDF's social media offensive are mixed at best. Michael Koplow's article for Foreign Policy on the IDF Twitter campaign is titled "How Not to Wage War on the Internet." The ability of visitors to an IDF site to earn badges for viewing pages and sharing them on Facebook or other social media sites has prompted some to question whether Israel is "gamifying" war. (Allison Kaplan Sommer helpfully gathers some of the reaction to Israel's social media campaign in a blog post for Haaretz.)

On the other side (in support of, but not initiated by, Hamas), a campaign of cyber attacks against Israeli websites began on Thursday. The loosely organized Internet group Anonymous initiated its effort to deface or take down both government and private websites in Israel in response to the Israeli government's threat to cut off Internet and other telecommunications links between Gaza and the outside world. The Bank of Jerusalem was forced offline for a while and the Ministry of Foreign Affairs website reportedly was compromised. At one point, Anonymous claimed to have taken down over six hundred websites in Israel.

It would be a mistake to try to press these two stories into the same analytical framework just because the Internet and cyberspace are central to both. They bear roughly the same relationship to one another that the use of radio addresses by Roosevelt and Churchill and the development of radar during World War II did. But we can see, nonetheless, that the two stories are important for their own, independent, reasons.

In the case of Israel's efforts to ensure that its narrative about the conflict with Hamas reaches as wide an audience as possible, we can see the application of what media analysts and political campaign strategists have been telling us for years about the movement from old media to new media. Older people--especially males--still sometimes watch network news on TV; if they miss the evening newscasts, they may read about what they missed in the next morning's newspaper (a print edition, of course). Younger people, however, are more likely to get news in small doses throughout the day (and night) via social media and online news outlets. A press conference with reporters and cameras may be the best way to reach the former group while a tweet or a Facebook post (provided it gets retweeted or reposted) will work better for the latter group. (Richard Parker examines some of these differences and breaks down the way the Obama campaign leveraged social media to its benefit here on the New York Times "Campaign Stops" blog.) Thus it seems that perhaps the so-called "CNN effect" was short-lived. Now we get war news (and revolution news and disaster news, etc., etc.) from the people who are involved--not through the lens of a television camera but through the lens of an iPhone or via tweets and Facebook updates. The army (or police force or government ministry) that wants to control the narrative today can't be content with limiting the access of reporters to a conflict zone or a protest site. It must either impose an Internet blackout--and face the wrath of those affected, other governments, and, apparently, a global community of hacktivists--or attempt to keep pace with citizen reporters by offering its own stream of compelling online information. But the information it provides cannot be too compelling. A video of grief-stricken mothers posted by those on the side of the victims looks very different from the same video posted by those who caused the grief in the first place.

Turning to the Anonymous attacks on Israeli websites, these suggest a future in which the strategic calculus involved in going to war (or suppressing protests) must include the possible responses of unseen third parties. After flexing its muscles--successfully, some might suggest--against Scientologists, opponents of Julian Assange and Wikileaks, and now Israel--Anonymous may find it increasingly attractive to weigh in on geopolitical matters. And, given the enormity of cyberspace, there are likely to be other groups developing in other chat rooms around other causes but with the same desire to influence big events in the world. In addition to the loose associations of hacktivists represented by Anonymous, transnational criminal organizations (TCOs) may find ways to use cyber attacks to profit from violent political conflicts while remaining in the shadows. And if states can use cyber attacks to influence the outcome of a rival state's conflict without revealing their involvement, they almost certainly will do so.

If it continues to be more and more difficult for states to control the narrative in conflict and if states continue to face more and more hidden adversaries when they go to war or move to suppress dissent, then the historical advantage that states--and especially the wealthiest and most powerfully armed states--have wielded in the use of force may be eroded to the point where the calculus that leads to armed conflict may be dramatically altered. And that might be a good thing.

Tuesday, November 13, 2012

Ransomware Rising

It's bad when your computer becomes sluggish because some botmaster in Moldova has installed malware on it that turns it into a zombie sending spam to everyone you've ever emailed. It's worse when your computer crashes because the hackers are more interested in the cyber equivalent of vandalism than in "borrowing" your unused computing capacity. The worst, though, may be having your computer lock up and display a message indicating that the hackers will unlock it after you send them money--in other words, online extortion using what is called "ransomware."

The computer security firm Symantec reports that ransomware is spreading and that cyber criminals are finding new and better ways to profit from it. What began about six years ago as a scam targeting computer users in Russia and Eastern Europe has become more sophisticated and has spread to Western Europe and North America.

The malware works like this: A computer user clicks on an infected site--perhaps an ad--that appears legitimate but actually redirects the browser to a hidden website that downloads malware to the user's computer. When the malicious file runs, it locks up the infected computer by preventing essential programs from executing. It then displays a message on the computer's screen demanding that the user pay a "fine," often by using a prepaid electronic payment system or calling a pay-per-call phone number. In some versions, the displayed message is superimposed on a pornographic image and indicates that the "fine" is for having browsed illegal websites. In other versions, the displayed message appears to be from the FBI or another law enforcement agency; it also includes a message alleging illegal activities.

Symantec estimates that up to 3 percent of victims have paid the "fines" of $200 or more, resulting in a haul for cyber criminals of at least $5 million. Payment, incidentally, does not unlock the computer as promised. It is still necessary to remove the malware by running anti-virus software.

For more on ransomware, see this story in ComputerWorld or this CNET story. (Or watch this three-minute video from Symantec.) And for more on protecting your computer, just make sure your anti-virus software is up to date.

Monday, November 12, 2012

McMahan on Just War Theory

Jeff McMahan examines just war theory today and tomorrow on the New York Times' Opinionator blog. Part I, published today, describes the theory, its origins, and contemporary challenges to it. Part II will consider the revisionist critique of just war theory.

Command and Control

One of the most important principles underlying American democracy is civilian control of the military. This principle has been undercut, however, by our society's growing tendency to defer uncritically to the judgment of military leaders and, worse, to regard any questioning of that judgment as unwise or even unpatriotic. This point is supported by U.S. Naval Academy professor Aaron B. O'Connell's op-ed that I noted last week. It is further bolstered by an op-ed  in today's New York Times by military writer Thomas E. Ricks.

Ricks notes that during "an unnecessary war in Iraq and an unnecessarily long one in Afghanistan," civilian leaders have been criticized but "our uniformed leaders have escaped almost any scrutiny from the public"--even though they "bear much of the blame for the mistakes in the wars." Congress fails to exercise oversight, for fear of being seen as "criticizing our troops," and the military itself seems uninterested in self-examination.

The failure of civilian leaders to subject the American military to serious scrutiny has not only allowed poor military decisions in the Iraq and Afghanistan wars to go unpunished (a point that Ricks makes), it has also resulted in a bloated defense budget at a time when the nation can ill afford it. The fault, of course, lies not just with civilian leaders but with citizens--voters--who seem to believe the military can do no wrong. Perhaps General David Petraeus, as he leaves the CIA, can remind us that even the best and brightest of our military officers can, like the rest of us, suffer lapses of judgment.