Americans for Limited Government President Rick Manning condemned the Deep State surveillance followed by leaks that forced the resignation of Michael Flynn.
It is absurd that in todayâ€™s world, Gen. Flynn having an honest conversation with one of his foreign counterparts in preparation of the incoming administration in December was ever a firestorm in the first place. What is particularly disturbing and unacceptable is that the Obama administration engaged in surveillance of Flynn, who did nothing wrong or illegal by having the conversation, and then had it leaked to the press on Jan. 13, a week before President Trump took office, all with the purpose of actively undermining Trump and his proposed policies. And then after Trump was sworn in, the deep state bureaucratic establishment, our permanent government, decided it was necessary to leak the contents of the conversation to inflict more damage.
â€œThese are police state tactics. Flynn, being an honorable man of unimpeachable character, took the political fall. But this must not stand.
â€œEvery single person responsible for illegally surveilling the Trump campaign and then the transition and now the administration if itâ€™s still going on should be prosecuted and/or fired. Every single person responsible for illegally leaking said surveillance to the press should be prosecuted and/or fired. This witch hunt turned bureaucratic coup that cost Flynn his job cannot be allowed to stand, because it is only the latest instance of apparent sabotage by career government employees. They will not stop.
â€œThis should be immediate cause for Congress to address real civil service reform that will give the president discretion to remove government employees in every department and agency that actively undermine an administration. No career employees in the executive branch are entitled to their jobs, and it is time they learned that it is the president who makes policy, not them.â€
On July 8, 2016, 27 year-old Democratic staffer Seth Conrad Rich was murdered in Washington DC. The killer or killers took nothing from their victim, leaving behind his wallet, watch and phone.
Shortly after the killing, Redditors and social media users were pursuing a â€œleadâ€ saying that Rich was en route to the FBI the morning of his murder, apparently intending to speak to special agents about an â€œongoing court caseâ€ possibly involving the Clinton family.
Seth Richâ€™s father Joel told reporters, â€œIf it was a robbery â€” it failed because he still has his watch, he still has his money â€” he still has his credit cards, still had his phone so it was a wasted effort except we lost a life.â€ …
On Tuesday Wikileaks offered a $20,000 reward for information on the murder of DNC staffer Seth rich.
Julian Assange suggested on Tuesday that Seth Rich was a Wikileaks informant.
Anti-Hillary Wikileaks DNC emails: 19,252 emails and 8,034 attachments from the top of the US Democratic National Committee. The leaks come from the accounts of seven key figures in the DNC: Communications Director Luis Miranda (10770 emails), National Finance Director Jordon Kaplan (3797 emails), Finance Chief of Staff Scott Comer (3095 emails), Finanace Director of Data & Strategic Initiatives Daniel Parrish (1472 emails), Finance Director Allen Zachary (1611 emails), Senior Advisor Andrew Wright (938 emails) and Northern California Finance Director Robert (Erik) Stowe (751 emails). The emails cover the period from January last year until 25 May this year.
Just weeks after she started preparing opposition research files on Donald Trumpâ€™s campaign chairman Paul Manafort last spring, Democratic National Committee consultant Alexandra Chalupa got an alarming message when she logged into her personal Yahoo email account.
â€œImportant action required,â€ read a pop-up box from a Yahoo security team that is informally known as â€œthe Paranoids.â€ â€œWe strongly suspect that your account has been the target of state-sponsored actors.â€
Chalupa â€” who had been drafting memos and writing emails about Manafortâ€™s connection to pro-Russian political leaders in Ukraine â€” quickly alerted top DNC officials. â€œSince I started digging into Manafort, these messages have been a daily ocÂÂÂÂcurrence on my Yahoo account despite changing my pÂÂaÂssword often,â€ she wrote in a May 3 email to Luis Miranda, the DNCâ€™s communications director, which included an attached screengrab of the image of the Yahoo security warning.
â€œI was freaked out,â€ Chalupa, who serves as director of â€œethnic engagementâ€ for the DNC, told Yahoo News in an interview, noting that she had been in close touch with sources in Kiev, Ukraine, including a number of investigative journalists, who had been providing her with information about Manafortâ€™s political and business dealings in that country and Russia.
â€œThis is really scary,â€ she said.
Chalupaâ€™s message is among nearly 20,000 hacked internal DNC emails that were posted over the weekend by WikiLeaks as the Democratic Party gathered for its national convention in Philadelphia. Those emails have already provoked a convulsion in Democratic Party ranks, leading to the resignation of DNC Chair Debbie Wasserman Schultz in the wake of posted messages in which she and other top DNC officials privately derided Bernie Sanders and plotted to undercut his insurgent campaign against Hillary Clinton.
But Chalupaâ€™s message, which had not been previously reported, stands out: It is the first indication that the reach of the hackers who penetrated the DNC has extended beyond the official email accounts of committee officials to include their private email and potentially the content on their smartphones. After Chalupa sent the email to Miranda (which mentions that she had invited this reporter to a meeting with Ukrainian journalists in Washington), it triggered high-level concerns within the DNC, given the sensitive nature of her work. â€œThatâ€™s when we knew it was the Russians,â€ said a Democratic Party source who has knowledge of the internal probe into the hacked emails. In order to stem the damage, the source said, â€œwe told her to stop her research.â€ …
In mid-June, Democratic Party suspicions about the hackers seemed to be confirmed when CrowdStrike, an outside security firm retained by the DNC, reported that it traced the hackers to two separate units linked to Russiaâ€™s security services: the FSB, Russiaâ€™s equivalent of the FBI, and GRU, the countryâ€™s military intelligence agency. The company noted strong similarities between the attack on the DNC by the suspected GRU hackers and previous cyberintrusions of unclassified systems at the White House, the State Department and the offices of the Joint Chiefs of Staff. (After discovering the data breach, a DNC security source said its cyberexperts noted that the hackersâ€™ exfiltration of files took place â€œ9 to 5, Moscow time.â€)
Considerable evidence shows that the Wikileaks dump was an orchestrated act by the Russian government, working through proxies, to undermine Hillary Clintonâ€™s presidential campaign.
â€œThis has all the hallmarks of tradecraft. The only rationale to release such data from the Russian bulletproof host was to empower one candidate against another. The Cold War is alive and well,â€ Tom Kellermann, the CEO of Strategic Cyber Ventures said.
Hereâ€™s the timeline: On June 14, the cybersecurity company CrowdStrike, under contract with the DNC, announced in a blog post that two separate Russian intelligence groups had gained access to the DNC network. One group, FANCY BEAR or APT 28, gained access in April. The other, COZY BEAR, (also called Cozy Duke and APT 29) first breached the network in the summer of 2015.
The cybersecurity company FireEye first discovered APT 29 in 2014 and was quick to point out a clear Kremlin connection. â€œWe suspect the Russian government sponsors the group because of the organizations it targets and the data it steals. Additionally, APT29 appeared to cease operations on Russian holidays, and their work hours seem to align with the UTC +3 time zone, which contains cities such as Moscow and St. Petersburg,â€ they wrote in their report on the group. Other U.S. officials have said that the group looks like it has sponsorship from the Russian government due in large part to the level of sophistication behind the groupâ€™s attacks.
Evidence suggests that a Russian intelligence group was the source of the most recent Wikileaks intel dump, which was aimed to influence the U.S. election.
Close your eyes and imagine that a hacking group backed by Russian President Vladimir Putin broke into the email system of a major U.S. political party. The group stole thousands of sensitive messages and then published them through an obliging third party in a way that was strategically timed to influence the United States presidential election. Now open your eyes, because thatâ€™s what just happened.
On Friday, Wikileaks published 20,000 emails stolen from the Democratic National Committee. They reveal, among other things, thuggish infighting, a push by a top DNC official to use Bernie Sandersâ€™ religious convictions against him in the South, and attempts to strong-arm media outlets. In other words, they reveal the Washington campaign monster for what it is.
But leave aside the purported content of the Wikileaks data dump (to which numerous other outlets have devoted considerable attention) and consider the source. Considerable evidence shows that the Wikileaks dump was an orchestrated act by the Russian government, working through proxies, to undermine Hillary Clintonâ€™s Presidential campaign.
â€œThis has all the hallmarks of tradecraft. The only rationale to release such data from the Russian bulletproof host was to empower one candidate against another. The Cold War is alive and well,â€ Tom Kellermann, the CEO of Strategic Cyber Ventures told Defense One.
Hereâ€™s the timeline: On June 14, cybersecurity company CrowdStrike, under contract with the DNC, announced in a blog post that two separate Russian intelligence groups had gained access to the DNC network. One group, FANCY BEAR or APT 28, gained access in April. The other, COZY BEAR, (also called Cozy Duke and APT 29) first breached the network in the summer of 2015.
Cybersecurity company FireEye first discovered APT 29 in 2014 and was quick to point out a clear Kremlin connection. â€œWe suspect the Russian government sponsors the group because of the organizations it targets and the data it steals. Additionally, APT 29 appeared to cease operations on Russian holidays, and their work hours seem to align with the UTC +3 time zone, which contains cities such as Moscow and St. Petersburg,â€ they wrote in their report on the group. Other U.S. officials have said that the group looks like it has sponsorship from the Russian government due in large part to the level of sophistication behind the groupâ€™s attacks.
Bing West identifies the Obama Administration’s standard methodology for burying a scandal.
The following is a lead story about Benghazi from the Washington Post on November 2:
U.S. intelligence officials said they decided to offer a detailed account of the CIAâ€™s role to rebut media reports that have suggested that agency leaders delayed sending help. . . . The decision to give a comprehensive account of the attack five days before the election is likely to be regarded with suspicion, particularly among Republicans who have accused the Obama administration of misleading the public.
Suspicion? The accurate word is confirmation.
Identical stories appeared in the Wall Street Journal and the New York Times. The Times explained that, â€œThe account, given by the senior officials who did not want to be identified, provided the most detailed description to date of the C.I.A.â€™s role.â€
So whatâ€™s going on here? The national-security staff in the Obama White House has a standard operating procedure. If a military action, such as killing bin Laden, succeeds, then immediately leak selected details to shape the narrative to the political advantage of Mr. Obama. If the action is botched, as in Benghazi, then say nothing and tell the quiescent press that there is no story worth pursuing. If questions persist, the second line of defense is an investigation that wlll drag on for months. For instance, bureaucrats in the Justice Department are still investigating the leaks last spring about the U.S. cooperation with Israel in the software sabotage â€” cyber warfare â€” of Iranian centrifuges.
If pesky Fox News persists in asking questions, then the third line of defense is to give the nod to the CIA to leak a diversionary story to favored news outlets and reporters. Thus the leaks to the Washington Post and New York Times showing that CIA operatives did try to rescue their comrades. Then authorize the CIA to go public with the same timeline, further throwing the press off the trail. The New York Times, the recipient of record for White House leaks, published on November 3 a diversionary story on its front page, fixating upon the CIA director, General Petraeus. This implied that the main issue about Benghazi centered around CIA secrecy â€” a tautology irrelevant to the real cover-up.
The intent is to cause the press and the public to lose interest in a story that seems exhaustively repetitive, while the key issues are never addressed.
Just days before the presidential election, U.S. officials are striking back at allegations they failed to respond quickly or efficiently against the deadly attack on the U.S. Consulate in Benghazi, Libya, detailing for the first time a broad CIA rescue effort.
Senior U.S. intelligence officials said Thursday that CIA security officers went to the aid of State Department staff less than 25 minutes after they got the first call for help from the consulate, which was less than a mile from a CIA annex. The detailed timeline provides the first in-depth look at how deeply the CIA was involved in the rescue attempt, and it comes amid persistent questions about whether the Obama administration responded as quickly and effectively as it could to the siege. …
The intelligence officials told reporters Thursday that when the CIA annex received a call about the assault, about a half dozen members of a CIA security team tried to get heavy weapons and other assistance from the Libyans. But when the Libyans failed to respond, the security team, which routinely carries small arms, went ahead with the rescue attempt. At no point was the team told to wait, the officials said.
Instead, they said the often outmanned and outgunned team members made all the key decisions on the ground, with no second-guessing from senior officials monitoring the situation from afar.
The officials spoke on condition of anonymity because they were not authorized to provide intelligence information publicly. …
The officials’ description Thursday of the attack provided details about a second CIA security team in Tripoli that quickly chartered a plane and flew to Benghazi but got stuck at the airport. By then, however, the first team had gotten the State Department staff out of the consulate and back to the CIA annex.
As the events were unfolding, the Pentagon began to move special operations forces from Europe to Sigonella Naval Air Station in Sicily. U.S. aircraft routinely fly in and out of Sigonella and there are also fighter jets based in Aviano, Italy. But while the U.S. military was at a heightened state of alert because of 9/11, there were no American forces poised and ready to move immediately into Benghazi when the attack began.
The Pentagon would not send forces or aircraft into Libya — a sovereign nation — without a request from the State Department and the knowledge or consent of the host country. And Defense Secretary Leon Panetta has said the information coming in was too jumbled to risk U.S. troops.
According to the detailed timeline senior officials laid out Thursday, the first call to the CIA base came in at about 9:40 p.m., and less than 25 minutes later about the team headed to the consulate. En route they tried to get additional assistance, including some heavier weapons, but were unable to get much aid from the Libyan militias.
The team finally got to the consulate, which was engulfed in heavy diesel smoke and flames, and they went in to get the consulate staff out. By 11:30 p.m., all of the U.S. personnel, except Stevens, left and drove back to the annex, with some taking fire from militants along the way.
By that time, one of the Defense Department’s unarmed Predator drones had arrived to provide overhead surveillance.
At the CIA base, militants continued the attack, firing guns and rocket-propelled grenades. The Americans returned fire, and after about 90 minutes, or around 1 a.m., it subsided.
Around that time, the second CIA team, which numbered about six and included two military members, arrived at the airport, where they tried to figure out where Stevens was and get transportation and added security to find him.
Intelligence officials said that after several hours, the team was finally able to get Libyan vehicles and armed escorts, but by then had learned that the ambassador was probably dead and the security situation at the hospital was troublesome. The State Department has said a department computer expert, Sean Smith, also was killed.
The second CIA team headed to the annex, and arrived after 5 a.m., just before the base came under attack again.
According to officials, militants fired mortar rounds at the building, killing two of the security officers who were returning fire. The mortar attack lasted just 11 minutes.
And less than an hour later, a heavily armed Libyan military unit arrived and was able to take the U.S. personnel to the airport.
The LA Times version makes it clear that today’s unofficial release was intended specifically to contradict Fox News’ reporting of events.
At every level in the chain of command, from the senior officers in Libya to the most senior officials in Washington, everyone was fully engaged in trying to provide whatever help they could,” a senior intelligence official said in a statement. “There were no orders to anybody to stand down in providing support.” …
Fox News asserted in a story last week that CIA managers had ordered agency security officers to “stand down” and remain in their own facility, known as the Annex, when the attack on the diplomatic compound began about 9:40 p.m. and that there was an hour delay before officers disobeyed orders and went to help repel the attack that killed Ambassador J. Christopher Stevens and State Department officer Sean Smith.
Among those who rushed to help was Tyrone Woods, a former Navy SEAL who was part of the CIA security team and who later died in the attacks.
The Fox story also asserted that the CIA “chain of command” refused to pass along requests from its officers for military aid and that special operations forces in nearby Sicily could have been sent to help but were not. Intelligence and Pentagon officials strenuously denied that Thursday.
They insisted there was no viable military option to disrupt what amounted to a series of sporadic attacks in a crowded city full of people sympathetic to the U.S. There were no armed drones in the region and airstrikes were not called for, officials said.
“Let’s say we were able to get an aircraft there. Do you go in and start strafing a populated area without knowing where friend or foe is?” a senior Defense official asked. “If you did that, you could kill the very people you are trying to help.”
A special operations team was sent to Naval Air Station Sigonella in Sicily, but the team arrived after the attack ended, said the senior Defense official, who would not be quoted by name discussing potentially classified information.
Defense Secretary Leon E. Panetta learned of the attack shortly after it began, about 4:30 p.m Eastern time, Defense officials said, and discussed it in a previously scheduled meeting with the president. Obama ordered him to pursue whatever options were feasible, a Defense official said.
Panetta “ordered all appropriate forces to respond to the unfolding events in Benghazi, but the attack was over before those forces could be employed,” Pentagon spokesman George Little said.
Shortly after 11 p.m. a surveillance drone had arrived from elsewhere in Libya â€” about an hour after it was requested, officials said. But the video feed was not seen by the president, contrary to some news reports. And the feed did not offer analysts a clear understanding of what was happening on the ground, officials said.
After the CIA team arrived at the compound, “over the next 25 minutes, team members approach the compound, attempt to secure heavy weapons [from Libyans], and make their way onto the compound itself in the face of enemy fire,” the senior U.S. intelligence official said.
The senior intelligence official disclosed that the CIA also sent a second six-member team from Tripoli on a chartered plane to help repel the attack. The team included Glen Doherty, another former SEAL, who was later killed when attackers fired mortar rounds at the CIA Annex.
The team arrived around midnight but got bogged down at the airport. Ultimately, it learned that “the ambassador was almost certainly dead” and headed to the agency facility “to assist with the evacuation,” the official said.
It arrived with Libyan support at the Annex at 5:15 a.m., just before mortar rounds began to strike. Woods and Doherty were killed as they fired on militants from the roof. The mortar attack lasted 11 minutes, the official said.
The drone overhead was not armed. Even if it had been, there were no viable targets, officials said.
The British Independent today delivered the inside story on the attack on the US consulate in Benghazi and the murder of Ambassador Stevens.
According to senior diplomatic sources, the US State Department had credible information 48 hours before mobs charged the consulate in Benghazi, and the embassy in Cairo, that American missions may be targeted, but no warnings were given for diplomats to go on high alert and “lockdown”, under which movement is severely restricted. …
Eight Americans, some from the military, were wounded in the attack which claimed the lives of Mr Stevens, Sean Smith, an information officer, and two US Marines. …
Senior officials are increasingly convinced, however, that the ferocious nature of the Benghazi attack, in which rocket-propelled grenades were used, indicated it was not the result of spontaneous anger due to the video, called Innocence of Muslims. Patrick Kennedy, Under-Secretary at the State Department, said he was convinced the assault was planned due to its extensive nature and the proliferation of weapons.
There is growing belief that the attack was in revenge for the killing in a drone strike in Pakistan of Mohammed Hassan Qaed, an al-Qa’ida operative who was, as his nom-de-guerre Abu Yahya al-Libi suggests, from Libya, and timed for the anniversary of the 11 September attacks. …
According to security sources the consulate had been given a “health check” in preparation for any violence connected to the 9/11 anniversary. In the event, the perimeter was breached within 15 minutes of an angry crowd starting to attack it at around 10pm on Tuesday night. There was, according to witnesses, little defence put up by the 30 or more local guards meant to protect the staff. Ali Fetori, a 59-year-old accountant who lives near by, said: “The security people just all ran away and the people in charge were the young men with guns and bombs.”
Wissam Buhmeid, the commander of the Tripoli government-sanctioned Libya’s Shield Brigade, effectively a police force for Benghazi, maintained that it was anger over the Mohamed video which made the guards abandon their post. “There were definitely people from the security forces who let the attack happen because they were themselves offended by the film; they would absolutely put their loyalty to the Prophet over the consulate. The deaths are all nothing compared to insulting the Prophet.”
Mr Stevens, it is believed, was left in the building by the rest of the staff after they failed to find him in dense smoke caused by a blaze which had engulfed the building. He was discovered lying unconscious by local people and taken to a hospital, the Benghazi Medical Centre, where, according to a doctor, Ziad Abu Ziad, he died from smoke inhalation.
An eight-strong American rescue team was sent from Tripoli and taken by troops under Captain Fathi al- Obeidi, of the February 17 Brigade, to the secret safe house to extract around 40 US staff. The building then came under fire from heavy weapons. “I don’t know how they found the place to carry out the attack. It was planned, the accuracy with which the mortars hit us was too good for any ordinary revolutionaries,” said Captain Obeidi. “It began to rain down on us, about six mortars fell directly on the path to the villa.”
Libyan reinforcements eventually arrived, and the attack ended. News had arrived of Mr Stevens, and his body was picked up from the hospital and taken back to Tripoli with the other dead and the survivors.
Debkafileâ€™s counter-terror sources report exclusively that far from being a spontaneous raid by angry Islamists, it was a professionally executed terrorist operation by a professional Al Qaeda assassination team, whose 20 members acted under the orders of their leader Ayman al Zawahri after special training. They were all Libyans, freed last year from prisons where they were serving sentences for terrorism passed during the late Muammar Qaddafiâ€™s rule.
In a video tape released a few hours before the attack, Zawahri called on the faithful to take revenge on the United States for liquidating one of the organizationâ€™s top operatives, Libyan-born Abu Yahya al-Libi in June by a US drone in northwestern Pakistan.
Its release was the â€œgoâ€ signal for the hit team to attack the US diplomats in Benghazi. …
The operation is rated by terror experts as the most ambitious outrage al Qaeda has pulled off in the last decade. According to our sources, the gunmen split into two groups of 10 each and struck in two stages:
1. They first fired rockets at the consulate building on the assumption that the ambassadorâ€™s bodyguards would grab him, race him out of the building and drive him to a safe place under the protection of the US secret service;
2. The second group was able to identify the getaway vehicle and the ambassadorâ€™s armed escort and lay in wait to ambush them. The gunmen then closed in and killed the ambassador and his bodyguards at point blank range.
Debkafileâ€™s intelligence sources report that the investigation launched by US counter-terror and clandestine services is focusing on finding out why no clue was picked up of the coming attack by any intelligence body and how al Qaedaâ€™s preparations for the attack which took place inside Libya went unnoticed by any surveillance authority.
Eleven years after 9/11, al Qaeda clearly retains the ability to plan and execute international operations striking at American citizens and officials.
The success of the attack on the consulate in Benghazi, and the obviously coordinated embassy attacks in Cairo and Yemen, do seem to confirm the validity of complaints from critics of the Obama Administration that the administration’s rush to cash in on the PR results of the success of the raid that killed Osama bin Ladin wasted priceless opportunities to exploit captured intelligence, and leaks from somewhere in the Obama Administration really did do serious harm to American interests.
Now we also learn that, despite specific known threats and with the anniversary date of 9/11 looming, the Obama Administration and its State Department failed to warn Ambassador Stevens and failed to take steps to protect embassies and American diplomatic personnel.
In this political ad, a variety of retired military and intelligence officers and special forces operatives go after Barack Obama and the Obama Administration for leaking sensitive national security information for political gain.
John O. Brennan, Deputy National Security Advisor for Homeland Security and Counterterrorism, and Assistant to the President
Michael A. Walsh, in the New York Post, spills the beans on the damaging leak which has seriously compromised relations between British and American intelligence services.
So that â€œCIA coupâ€ in Yemen against another al Qaeda underwear bomber turns out to actually have been a joint Saudi-British intelligence operation â€” which apparently was prematurely terminated thanks to flapping lips on this side of the Atlantic.
So the leak didnâ€™t just blow our chances to nail the notorious bomb designer behind the plot, Ibrahim al-Asiri, and put the life of the double agent in mortal danger for no reason.
It also seriously damaged Langleyâ€™s relationship with its foreign counterparts, who now understand that operational security and the lives of their operatives mean nothing to us (not in an election year, anyway).
Which makes it even more important to find out: Who leaked?
The betting starts with former CIA official John Brennan, the White Houseâ€™s deputy nationalsecurity adviser for counterterrorism. Shortly after details about the operation leaked to the Associated Press via unnamed â€œofficials,â€ Brennan took to the airwaves to crow publicly about how the wedgie bomber was â€œno longer a threat to the American people.â€
And the AP admitted it cleared its story with the feds in advance.
The uncharitable immediately saw this naked self-aggrandizement as a blatant attempt by the Obama administration to take political credit for something it had almost nothing to do with.
President Barack Obama and Vice President Joe Biden, along with members of the national security team, receive an update on the mission against Osama bin Laden in the Situation Room of the White House, May 1, 2011. Seated, from left, are: Brigadier General Marshall B. â€œBradâ€ Webb, Assistant Commanding General, Joint Special Operations Command; Deputy National Security Advisor Denis McDonough; Secretary of State Hillary Rodham Clinton; and Secretary of Defense Robert Gates. Standing, from left, are: Admiral Mike Mullen, Chairman of the Joint Chiefs of Staff; National Security Advisor Tom Donilon; Chief of Staff Bill Daley; Tony Binken, National Security Advisor to the Vice President; Audrey Tomason Director for Counterterrorism; John Brennan, Assistant to the President for Homeland Security and Counterterrorism; and Director of National Intelligence James Clapper. (click for full-sized image)
Looking at the Times’s photograph (by Pete Souza) of the White House National Security team once again, I am struck by how much Barack Obama appears to be a passive outsider on the sidelines, while the group sitting and standing on the right side of the picture, including Defense Secretary Robert Gates and Secretary of State Hillary Clinton, seems to be in command and in charge.
It’s just an impression I got looking at the photograph, and it may not mean anything, but I then came upon what purports to be a leak from a knowledgeable insider.
This alleged witness claims that Barack Obama was taken in hand by his senior military and intelligence staff and steamrollered into permitting the mission to go ahead.
[There was a s]ignificant push to take [bin Laden] out months ago. Senior WH staff resisted. This was cause of much strain between HC and Obama/Jarrett. HC and LP were in constant communication over matter â€“ both attempted to convince administration to act. Administration feared failure and resulting negative impact on president. Intel disgusted over politics over national security. Staff resigned/left. Check timeline to corroborate.
Now Intel already leaking to media facts surrounding how info obtained. Namely from enhanced interrogation efforts via GITMO prisoners. Obama administration placed in corner on this. Some media aware of danger to president RE this and attempting protection. Others looking for further investigation. We are pushing for them to follow through and already meeting with some access.
Point of determination made FOR Obama not BY Obama. Will clarify as details become more clear. Very clear divide between Military and WH. Jarrett marginalized 100% on decision to take out OBL. She played no part. BD worked with LP and HC to form coalition to force CoC to engage.
IMPORTANT SPECIFIC: When 48 hour go order issued, CoC was told, not requested. Administration scrambled to abort. That order was overruled. This order did not originate from CoC. Repeat â€“ this order did not originate from CoC. He complied, but did not originate.
There is no way to know if there is any truth in all this. If so, I expect we will hear more along these lines.
If the report is false, I would say that it was dastardly and outrageous to fabricate such a thing libeling a president who has just made a courageous decision.
I was persuaded to pass it along because the source is right: anti-Obama Intel leaks are popping out all over, identifying the crucial roles played by enhanced interrogations and renditions in making the operation that killed Osama bin Laden possible. I would still file it in the “Interesting, But Not Known to Be True” category.
Reuters is reporting a leak disclosing that President Obama signed a finding “within the last two or three weeks” authorizing the covert arming of rebel forces seeking to oust Muamar Qaddafi.
We certainly wouldn’t want weapons we supplied winding up in the wrong hands.
Members of Congress have expressed anxiety about U.S. government activities in Libya. Some have recalled that weapons provided by the U.S. and Saudis to mujahedeen fighting Soviet occupation forces in Afghanistan in the 1980s later ended up in the hands of anti-American militants.
There are fears that the same thing could happen in Libya unless the U.S. is sure who it is dealing with. The chairman of the House intelligence committee, Rep. Mike Rogers, said on Wednesday he opposed supplying arms to the Libyan rebels fighting Gaddafi “at this time.”
“We need to understand more about the opposition before I would support passing out guns and advanced weapons to them,” Rogers said in a statement.
Well, first of all, I think it’s important to note that — the people that we’ve met with have been fully vetted. So, we have — a clear sense of who they are. And so far, they’re saying the right things. And most of them are professionals, lawyers, doctors — people who appear to be credible.
According to the New York Times, Julian Assange’s disgruntled former collaborators objected to his self promotion and flamboyant left-wing politics.
As the WikiLeaks founder Julian Assange fights extradition to Sweden to face allegations of sexual wrongdoing, a dozen of his former colleagues are creating an alternative Web site for leaks to be governed by what they characterize as a revised vision of radical transparency.
The new organization, OpenLeaks, will begin work in earnest this summer, said Herbert Snorrason, an Icelandic programmer who is involved. It aims, he said, to avoid the â€œinfluence of a single figureheadâ€ by refusing to handle documents itself. Instead, it will act as a neutral conduit to connect leakers with media and human rights organizations.
OpenLeaks emerges from the ashes of a struggle between Mr. Assange and many of his closest associates last September. About a dozen members of WikiLeaks left that month, accusing Mr. Assange of imperious behavior and of jeopardizing the project by conflating the allegations of sexual wrongdoing, which he denies, with the siteâ€™s work. The defectors, Mr. Snorrason said, decided to start their own project.
â€œItâ€™s no secret that we had disagreements with how WikiLeaks was being managed,â€ he said, â€œand a large part of what we hope to accomplish with OpenLeaks is to avoid those problems.â€ …
Though those behind OpenLeaks are at pains not to criticize Mr. Assange, and have repeatedly made it clear that they do not see themselves as his competitors, their aims address many of the barbs leveled at him, the man who has defined a new era of online mass leaks.
It is partly run by Daniel Domscheit-Berg, a precise programmer from Berlin who was once Mr. Assangeâ€™s deputy. Since he left WikiLeaks in September, he has been working on a book which he promises will reveal â€œthe evolution, finances and inner tensionsâ€ inside WikiLeaks.
At a recent gathering of the Chaos Computer Club, a hacker community in Berlin, Mr. Domscheit-Berg said OpenLeaks would be neutral and would not rely on secrecy as WikiLeaks does. Those who seek transparency, he said, should â€œstand in the sunlight ourselves and enjoy that we are creating a more transparent society, not create a transparent society while sneaking around in the shadows.â€
The new site must not, he added, â€œcontain any politics and personal preferences or personal dislikes about whatever youâ€™re going to publish or what you must not publish.â€
It is not obvious at all why a world that has the New York Times, the Washington Post, Spiegel, and the Guardian needs another venue for leaking official secrets. It also seems likely that any non-establishment media leaking venue would be highly likely to face criminal prosecution by Western governments. If genuinely neutral, the leakers would also be compromising state secrets from non-liberal Western governments, like Russia’s, which would not necessarily restrict negative responses to legal processes. Lots of luck with that, guys.