On the Ropes at Leyte Gulf

October 26, 2016–I’d intended to post yesterday but it proved too busy. Having missed the crucial day of Leyte Gulf I’ll come around anyway. There are interesting things we can still say from the standpoint of October 26, 1944, seventy-two years ago today. Some of the analysis underlying the points I’ll make here resides in my book Storm Over Leyte, in which you’ll find lots more material on a pile of related subjects.

Today would be the moment that Bull Halsey’s vaunted battleship fleet, Task Force 34, would have arrived off the San Bernardino Strait. A couple of its fastest warships (of the Iowa class) could have made it. But four of the six battlewagons in Task Force 34 were rated at only 28 knots and could not have made it from the position where Halsey’s fleet was located when the battleships were pulled out of their screen positions around his aircraft carriers and instructed to form up. There is an argument in history that Admiral Halsey ought to have ordered the creation of Task Force 34 the previous night, and there was some scout information to support such a decision–see Storm Over Leyte for that– but even then the American vessels could not have arrived before the Japanese fleet had retreated through the straits. As it was some U.S. cruisers and destroyers, making their best speed, arrived in time to fire at Japanese destroyers that had stayed behind to save sailors from heavy cruisers that had sunk in the battle.

Admiral Halsey’s general situation had also become problematical. His entire Third Fleet had been steaming around for days, with high speed burning up fuel. The long chase action just carried out, known to history as the Battle of Cape Engano, used up much of what was left. Halsey had no alternative for October 26, 1944, except to order his carrier fleet to refuel at sea. The high speed deployment to San Bernardino expended his battleships’ fuel in the same way.

Storm Over Leyte relates the stories of a number of Japanese vessels for the day after the great surface action. The most remarkable aspect of their experience is that most American bombers which struck that day came from the self-same jeep aircraft carriers that the Japanese fleet had shelled only twenty-four hours before. Halsey’s ships were under orders to top off their oil tanks and then use their planes to defend U.S. ground positions on the island of Leyte. It’s ironic that the Imperial Navy’s behemoth, battleship Yamato, suffered more casualties on October 26 than on the day of battle.

At 11:34 AM on October 26 the headquarters of the Combined Fleet, the Japanese naval high command, ordered heavily damaged warships to return to the Home Islands, with more moderate repairs to be made at Hong Kong or in Singapore. It marked the effective end of what had been the proudest navy in the Pacific on the day of Pearl Harbor.

The Clinton Emails (3)–Games WERE Played

October 19, 2016–Games were played with the Clinton emails, just not the ones you think. Or perhaps, just the ones you thought. From the beginning of the Clinton email saga you read in this space that this was a scam about secrecy, and new evidence for the bankruptcy of the secrecy system. Now we have the proof. The FBI has released texts of interviews it conducted during its investigation of the email scandal. In combination with the Bureau’s own final report, and the parallel inquiries of journalists, we can now assemble a picture of the handling of one of Hillary’s typical emails.

Under instructions to release material handled on Mrs. Clinton’s private email server the State Department reviewed swathes of these for opening to the public. As part of the government’s standard approach in matters of secrecy, the messages were circulated to other agencies for their say. The government calls this “equity,” as if agencies can own information–which they cannot, by law. Nevertheless the “equity” arrangement has been used as a major tool to manipulate declassification and secrecy, as it was here.

The State Department had simply intended to release the emails. The Federal Bureau of Investigation objected. It considered that some of these emails ought to be secret. (The first problem with this set up–you’ll also have seen that here before–is that we have FBI deciding after the fact that something should have been secret before, and then claiming the breach of regulations designed to protect secrecy at the inception of a document.)

A senior State Department official, Patrick Kennedy, in charge of the email release project, phoned the FBI, where he spoke to Brian McCauley. This was May 2015 and McCauley was the Bureau official responsible for its foreign operations. The FBI had just lost two slots on the staff of the U.S. embassy in Baghdad–and here is where the story gets muddled. McCauley adverts that he initially asked State to reinstate the Baghdad field agents and offered at his end to help get FBI to back down on its secrecy demand enabling State to move forward. Once he learned the message concerned Benghazi, McCauley relates, all bets were off. On the State Department’s side, Patrick Kennedy has loyally said he thought the message was not secret, though certain redactions might be required for other reasons, and that he knew nothing of any FBI offer of a trade.

The way this story was first reported alleged that it was the State Department that had begged for a trade–with the implication it sought in that way to shield Hillary Clinton.

So is the game played. Secrecy is not wielded simply for the protection of national security, it is used as bludgeon to obtain all manner of interagency “cooperation.” The losers are the American people, who are not only robbed of the true record of their government’s actions, but are subjected to the arbitrary measures of a system in which policy is forged partly by barter.

You have already read here (for example, “Hillary’s Emails: Bursting the Secrecy Bubble,” August 22, 2015) that the email controversy really shows the need to reform the laws governing secret information, which have made it impossible to function as a senior official without breaking them. Here’s a good illustration of why–an act taken in the open at time x is suddenly recast as secret at time y–and then the charge of breach of secrecy is used to extract some other action. Add to this the fact that investigation of the breach is in the purview of the FBI and you have the makings of a completely vicious circle.

It is tragic that this whole “Hillary Emails” thing has been made into an election issue in a campaign for the presidency of the United States. The emails controversy has been manipulated from beginning to end, is based on a very ephemeral set of acts pumped up by persons with other agendas, and has even been exploited by foreign governments to meddle in American politics. Do not make an issue of the emails without carefully considering the full issue.