A New Front in Obama’s War on Whistleblowers

Fired Pentagon assistant inspector general John Crane is going public with allegations senior officials retaliated against whistleblowers, destroyed permanent records and altered audits under political pressure.

A cashiered senior official in the Pentagon’s inspector general office ended years of anonymous complaints this weekend, giving interviews about his former employer’s handling of whistleblowers in key national security controversies, including the Edward Snowden and Thomas Drake cases.

John Crane, 60, who spent 25 years in government before he was fired as an assistant Defense Department inspector general in 2013, went public with a series of accusations that key officials in the watchdog’s office retaliated against whistleblowers, destroyed permanent records and altered audits under political pressure.

He has filed those charges with the Office of Special Counsel, which so far has referred one to the Justice Department for detailed investigation, though others may soon follow.

Crane’s name and case appear in a new book, Bravehearts: Whistle-Blowing in the Age of Snowden (Hot Books, 2016), by Mark Hertsgaard, excerpted in the British newspaper The Guardian and the German magazine Der Spiegel.

In an interview with Government Executive recently, Crane challenged the criticism by many top US officials who say Edward Snowden, the former Booz Allen Hamilton employee who worked as a National Security Agency contractor, could have taken his complaint through official channels. In 2013, Snowden flew to Hong Kong, leaked classified documents exposing U.S. surveillance programs and ultimately took refuge in Russia.

“Edward Snowden and his decision not to go through the whistleblower process indicate a larger failure within DoD IG,” Crane said. “Snowden did not go through the IG because he saw what had happened to Thomas Drake,” he added.

The Drake case, also a hallmark in the whistleblower community, involved the Justice Department’s prosecution of an NSA senior executive in 2010 under the Espionage Act for speaking to the Baltimore Sun about wasteful NSA programs going back a decade. The government eventually dropped the case after public outcry and skepticism from a federal judge, and Drake pleaded guilty to a lesser charge.

Crane, in the meantime, thought he had witnessed retaliation against Drake by DoD IG officials Lynne Halbrooks (now a private attorney) and General Counsel Henry C. Shelley Jr., along with the destruction of documents relevant to the case more than a decade ago when Crane was handling Drake’s disclosures to the IG’s office. Crane reported that to the Office of Special Counsel, which in March referred the case to Justice for possible prosecution.

Crane is now a stay-at-home father living in McLean, Va., while fighting to get his job back. He continues to meet with the Office of Special Counsel as it reviews several other complaints against the DoD IG.

Crane and his attorney have spent hours testifying to lawmakers, one result being language in the pending National Defense Authorization Act that would clarify whistleblower protections against retaliation and require a Government Accountability Office review of the Defense IG’s conduct.

The Senate version, said Tom Devine, the legal director of the Government Accountability Project who is representing Crane, calls for GAO to perform “a systematic review of the Pentagon IG’s whistleblower program.” That’s based in part on “Crane’s disclosures of contradictory approaches to law enforcement by Obama administration leaders,” Devine said. “Mr. Crane blew the whistle because he perceived a systematic mission breakdown in the Pentagon OIG system.”

The Senate bill calls for a “systematic makeover of the military whistleblower protection act for members of the armed services,” Divine said. “It is landmark free speech legislation if it survives the [House-Senate] conference.” The House version contains a more limited provision, he added, that would modernize legal burdens of proof to give soldiers the same whistleblower rights as civilian employees.

Other disclosures Crane has filed with OSC include allegations Halbooks and Shelley made “false statements under oath, using a fictional narrative to have me removed,” he said. Halbrooks is also accused of softening a report on the Pentagon IG’s handling of arrangements in the investigation of whether then-CIA Director Leon Panetta and Defense Undersecretary for Intelligence Michael Vickers broke classification rules by revealing the name of the Navy Seal Team 6 leader to Hollywood filmmakers making the movie “Zero Dark Thirty.”

Among the other charges being considered by the OSC is whether Crane was thwarted by superiors during an investigation related to the 2010 disclosures by Col. Mark Fassl of patient neglect at a US-funded military hospital in Afghanistan, which became the subject of Capitol Hill hearings.

Staff serving under current acting Defense IG Glenn Fine have been meeting with the OSC on Crane’s issues. “We are reviewing the language and directives in” the Senate NDAA bill, Kathie Scarrah, director of legislative affairs and communications at DoD IG, told Government Executive. As for Crane’s allegations, her office has asked the Justice Department’s Office of Inspector General “to initiate‎ an independent investigation into the allegations. [The IG’s office] will cooperate fully and looks forward to the results of that investigation.”

Former acting DoD IG Halbrooks, now a partner at the law firm of Holland & Knight, told Government Executive in an email, “During my time at DoD OIG I strongly supported the rights of whistleblowers throughout the Department of Defense. I welcome the opportunity to cooperate with any government investigation into these false allegations.”

What are Crane’s goals in continuing these disclosures? “The whistleblower program that I set up at DoD IG has been characterized as the gold standard for the federal government,” he said. “But in light of GAO investigations, in light of the current language in the NDAA, that is no longer the case. Outside advocacy groups and Congress recognized serious problems at DoD IG,” Crane added. “Should Mr. Fine want to return it to the gold standard, I would be willing to help him.”

DefenseOne: http://bit.ly/20RkuZn

« Google Implements Neural Network Computing For Machine Learning
Growing Skepticism Over Drone Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

FireEye

FireEye

FireEye delivers unmatched detection, protection and response technology through an extensible and flexible cloud-based XDR platform.

Ripjar

Ripjar

Ripjar is a global company of talented technologists, data scientists and analysts designing products that will change the way criminal activities are detected and prevented.

Cloud53

Cloud53

Cloud53 specialise in improving operational IT through strategic use of Cloud technologies and services.

SlashNext

SlashNext

The SlashNext Internet Access Protection System (IAPS) provides Zero-Day protection against all internet access threats including Social Engineering & Phishing, Malware, Exploits and Callback Attacks.

Cybersecurity Competence Center (C3)

Cybersecurity Competence Center (C3)

The Cybersecurity Competence Center was created to further strengthen the Luxembourg economy in the field of cybersecurity.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions creates enterprise mobility and file sharing solutions for companies, teams and freelancers.

Corvid

Corvid

Corvid is an experienced team of cyber security experts who are passionate about delivering innovative, robust and extensive defence systems to help protect businesses against cyber threats.

CyberSat Summit

CyberSat Summit

CyberSat is dedicated to fostering the necessary discussions to flesh out and develop solutions to cyber threats in the satellite industry.

R3I Ventures - House of DeepTech

R3I Ventures - House of DeepTech

The House of DeepTech is an incubator for deeptech entrepreneurs that are transforming global industries. Areas of interest include cybersecurity.

ActZero

ActZero

ActZero’s security platform leverages proprietary AI-based systems and full-stack visibility to detect, analyze, contain, and disrupt threats.

xMatters

xMatters

xMatters is a digital service availability platform that helps enterprises prevent, manage, and resolve IT incidents before they can become business problems.

Atlant Security

Atlant Security

Atlant Security is a cyber and IT security company offering consulting and implementation services.

Hubify

Hubify

Hubify is an experienced, service-driven technology company specialising in business connectivity across mobile, data, voice, cloud, & cyber security solutions.

D.med Software

D.med Software

D.med Software is a company with a focus on cybersecurity for embedded software and cloud applications for the medical industry.

Binarii Labs

Binarii Labs

Binarii are focused on helping enterprises to design and deploy SaaS solutions that utilise DLT (Digital Ledger Technology) effectively, efficiently and sensibly.

OxCyber

OxCyber

OxCyber's mission is to ignite and encourage cybersecurity and technology growth in the Thames Valley through meetings, webinars, in person events, workshops and mentorship programs.