Ooops, Now Failed Policy on Venezuela

When the Venezuelan leader Hugo Chavez died, Barack Obama dispatched a delegation to the funeral as his representatives. 22 heads of state from 54 countries attended the funeral in Caracas. Yet there was more going on before the death of Chavez.

In March, before the death of Chavez:  The administration tried last year to cultivate Chavez’s designated heir, Vice President Nicolas Maduro, holding several phone calls and meetings with him and other top Venezuelans. But at a time when Chavez’s illness was paralyzing the government in Caracas, the Americans stopped getting any response to their inquiries, the U.S. official said.

“We had not gotten very far and were not sure that the government of Venezuela wanted to continue down that road, when [Chavez’s death] occurred,” the official said.

Michael Shifter, president of the Inter-American Dialogue think tank in Washington, said he believed Maduro — considered by many to be the front-runner in the coming presidential election — may be open to a limited thaw in the relationship.

Maduro may, for example, agree to establishing regular communication between the two governments and exchanging ambassadors, Shifter said. He also may be open to cooperation on energy, because Venezuela’s oil industry, which is the source of most of its national income, needs technical help and new investment.

But Shifter noted that the next leader would not want to go too far in a thaw because “if he’s seen as embracing the U.S., it would be fatal with some sectors of Chavism.”]

Things did not work out well for the White House and their outreach plan with Venezuela. Seems Venezuela has turned their loyalty to China.

China has been generously co-signing financial transactions with the Venezuelan government including the borrowing of billions of dollars in exchange for future trade advantages. Since 2007, China has loaned Venezuela a total of $48 billion USD. But China’s help does not stop there. China’s generosity has reinforced the movement towards Latin America integration, fortified regional promotion of a multi-polar world, and it also has diminished somewhat the economic leverage of the United States in the region.

In January 2015, after a trip to Beijing and a meeting with Chinese President Xi Jinping, Venezuelan President Nicolas Maduro announced that Venezuela will receive $20 billion USD in Chinese investments. Maduro also announced that this investment will be used on housing, technology, energy, and infrastructure projects. However the President did not provide further details on whether or not Venezuela will use this investment to import goods or pay old debts.2 Beijing’s financial help has been arousing controversies in the United States and the European Union, since Venezuela has been routinely accused of wanton human rights violations by corporation-funded but heavily biased western media.

The questions raised by western media have mainly focused on the alleged irrationality behind China’s loans to Venezuela. At times they expressed concern that Venezuela will not be able to pay back the nearly $50 billion USD due to falling global oil prices. The reality is that Venezuela already has paid back $24 billion USD, making the Chinese government confident that Caracas will pay back its debt. Due to the country’s heavy dependence on its oil production, when international oil prices plunged last summer, Venezuela’s economy suffered a serious setback. According to OPEC’s statistics, last September’s oil basket prices first dropped below $100, and then continued on a downward slope. As of January, 2015 oil WTI prices have plunged to $44.38. It was not until February, 2015 that oil basket prices first saw a minor recovery.3Real wages in Venezuela also are dropping along with oil production, while inflation rates skyrocket across the country. To add on to Venezuela’s economic misery, its oil production rate is also losing ground. Petróleos de Venezuela, S.A.(PDVSA), state-owned oil company of Venezuela, is now pumping 2.7 million barrels of crude oil per day, 4 compared to 2006 when Venezuela was producing 3.2 million barrels per day.5

Statement by the Press Secretary on Venezuela

Today President Obama issued a new Executive Order to implement and expand upon the Venezuela Defense of Human Rights and Civil Society Act of 2014.  Venezuelan officials past and present who violate the human rights of Venezuelan citizens and engage in acts of public corruption will not be welcome here, and we now have the tools to block their assets and their use of U.S. financial systems.

We are deeply concerned by the Venezuelan government’s efforts to escalate intimidation of its political opponents.  Venezuela’s problems cannot be solved by criminalizing dissent.  We have consistently called on the Venezuelan government to release those it has unjustly jailed as well as to improve the climate of respect for human rights and fundamental freedoms, such as the freedoms of expression and peaceful assembly.  These are essential to a functioning democracy, and the Venezuelan government has an obligation to protect these fundamental freedoms.  The Venezuelan government should release all political prisoners, including dozens of students, opposition leader Leopoldo Lopez and Mayors Daniel Ceballos and Antonio Ledezma.

The only way to solve Venezuela’s problems is through real dialogue – not detaining opponents and attempting to silence critics.  The Venezuelan people deserve a government that lives up to its commitment to democracy, as articulated in the OAS Charter, the Inter American Democratic Charter, and other fundamental instruments related to democracy and human rights.

We’ve seen many times that the Venezuelan government tries to distract from its own actions by blaming the United States or other members of the international community for events inside Venezuela.  These efforts reflect a lack of seriousness on the part of the Venezuelan government to deal with the grave situation it faces.

It is unfortunate that during a time when we have opened up engagement with every nation in the Americas, Venezuela has opted to go in the opposite direction.  Despite the difficulties in our official relationship, the United States remains committed to maintaining our strong and lasting ties with the people of Venezuela and is open to improving our relationship with the Venezuelan government.

Move Turkey to a State Sponsor of Terror

Turkey is a NATO country, which then begs the question at this point….why?

As noted here:

Article 5 of the Washington Treaty:

The Parties agree that an armed attack against one or more of them in Europe or North America shall be considered an attack against them all and consequently they agree that, if such an armed attack occurs, each of them, in exercise of the right of individual or collective self-defence recognised by Article 51 of the Charter of the United Nations, will assist the Party or Parties so attacked by taking forthwith, individually and in concert with the other Parties, such action as it deems necessary, including the use of armed force, to restore and maintain the security of the North Atlantic area.

Any such armed attack and all measures taken as a result thereof shall immediately be reported to the Security Council. Such measures shall be terminated when the Security Council has taken the measures necessary to restore and maintain international peace and security.

Hamas, the terrorist group perpetually at odds with Israel, has found a willing patron in Turkey, say critics, who allege the NATO member has rolled out the red carpet for the Jewish state’s longtime nemesis, whose official headquarters are now in Istanbul.

Kicked out of Damascus in Syria amid deteriorating relations with the Assad regime, Hamas’ top leadership has established a new office in Istanbul called the ‘West Bank and Jerusalem Headquarters.” With the approval of the Turkish authorities, Salah Al-Arouri, one of the founders of the Al Qassam Brigade (Hamas’ military wing), and who served 15 years in jail in Israel for terrorist offenses, has been directing Hamas’ efforts in the West Bank to overthrow the Palestinian Authority and attack Israel at the same time.

“Turkey has become a Hamas hotbed, and members of the organization’s military wing are undergoing military training on Turkish soil, with the knowledge, support, and assistance of the local authorities,” leading Israeli daily Yediot Aharonot reported last week. “The U.S. administration has appealed in recent months to the Turkish government to prevent Hamas military activity in its territory, arguing that Turkey is a member of NATO and that Hamas is viewed by most NATO members as a terrorist organization. The appeals have gone unanswered.”  ***

2 senior Hamas figures operating from Turkey are notable:
1) Musa al-Akari, the brother of Ibrahim al-Akari, carried out the vehicular attack at the light railway station in Jerusalem on November 5, 2014. He belonged to the terrorist squad that abducted and murdered Israeli Border Policeman Nissim Toledano on December 13, 1992. He was captured and sentenced to three terms of life imprisonment, released in the Gilad Shalit prisoner exchange deal and deported to Turkey.
2) Hussam Badran (Abu Imad), a Hamas terrorist also released in the Gilad Shalit exchange deal, often visits Turkey. In 2004 he was sentenced to 17 years in prison for involvement in a suicide bombing attack during the second intifada. Upon release (October 2011) he was deported from Israel. He relocated in Doha, Qatar, but also spends time in Turkey. In December 2013 he was appointed Hamas’ official external spokesman (Wafa.ps, December 25, 2013). In effect, his role of also directing Hamas’ terrorist network in the Hebron region (March- February 2013) was exposed.Information from the Israel Security Agency about the terrorist networks exposed (November 27, 2014):
1) Recruiting operatives – Most of the operatives recruited are Palestinians studying at the universities in Jordan. The students were approached on the basis of personal acquaintance. Those found suitable, both personally and ideologically, were recruited and became the responsibility of operatives in headquarters who arranged for their training
2) Military training – Military training: The recruits’ training was carried out in coordination with and under the supervision of Hamas military-terrorist operatives at locations in the Gaza Strip and abroad, including Jordan, Turkey and Syria. To reach the Gaza Strip the recruits went to the Sinai Peninsula and were smuggled in through the tunnels. In the Gaza Strip Hamas military-terrorist operatives trained them in using explosives, operating weapons, terrain analysis and navigation. They also learned about securing information. In Turkey they were briefed on planning military activity, including how to attack targets in Israeli, Judea and Samaria and abroad. In Jordan they were trained in the use of weapons, in sabotage and covert activity, and were given security briefings. After training they were assigned various missions by senior Hamas figures in Turkey and Jordan.
3) Military activity – After completing their training they were sent back to their homes in Judea and Samaria. When they had settled they were given various missions, such as attacking Israeli targets, coordinating and transporting weapons and funds, training local squads, and locating sites suitable for creating home laboratories and operational houses
4) Objectives of the terrorist attacks – The recruits were instructed to carry out a number of terrorist attacks, the most prominent of which were attacks on the Teddy [soccer] Stadium and the light railway, both in Jerusalem. They were also instructed to carry out shooting attacks and to place IEDs along the roads in Judea and Samaria, prepare car bombs, infiltrate Jewish towns and villages, and abduct Israelis in Judea and Samaria and abroad. In effect, on 196-14 11
August 31, 2014, one of the squads placed IEDs at the Rehalim and Jat junctions in Samaria.

Hillary was Hacked, Data Virgin Islands/Ukraine

EmailGate courtesy of Hillary Clinton’s home server has taken on a life of its own.

From the Blaze:

Clinton Email Domain Hosted by a Company That Was Hacked in 2010 and Had Data Redirected to Ukraine — and IP Address Reveals Link to British Virgin Islands

As news of Hillary Clinton using a private email during her tenure as Secretary of State continues to emerge, TheBlaze has learned that the email domain was hosted by a “consumer grade” company whose data was hacked in 2010, with information being sent to Ukraine. Additionally, data reveals that the domain was hosted at one point in the British Virgin Islands. This, experts say, is a big security no-no.

Domain history data reveals Clintonemail.com was registered in 2009 with Network Solutions, shortly after Clinton was appointed as the nation’s top diplomat. But the decision to host the domain for such a high-profile person on a consumer registrar like Network Solutions is questionable to security experts.

Bill Sweetman, a domain registration expert based in Canada who describes himself as part of the “left-leaning camp,” told TheBlaze Friday that the whole Clinton email controversy has struck him as “naive on the part of the players.”

Image source: DomainTools.com
.

“If you’re someone that is concerned about security of your data, you don’t go and register your domain name with a consumer-oriented registrar like Network Solutions or GoDaddy,” Sweetman said.

Image source: DomainTools.com

“You would work either with a corporate domain registrar like MarkMonitor or CVSC, or you would talk to your employer – in this case the government – about their internal solutions that would protect the domain name and would protect the data associated with it.”

Sweetman isn’t alone in thinking this.

Rod Rasmussen, a leading expert on the abuse of domain name systems, wrote in a 2013 column for the trade publication Security Week, that any domain managers using a consumer-grade registrar for a “major enterprise” should lose their jobs. Rasmussen wrote the piece after Network Solutions was hacked in 2010, resulting in thousands of domains being transferred to Confluence Networks, a domain registrar traced to the British Virgin Islands.

“When it comes to Internet security, there is absolutely no way major corporations would use consumer grade anti-malware and anti-phishing solutions as a one-stop security solution. So why would major organizations – we’re talking major Fortune 500 companies, government agencies, financial services and critical infrastructure organizations – put their domains in the hands of consumer grade registrars?” Rasmussen wrote.

Among the companies whose domains were moved offshore at the time of Rasmussen’s column were organizations like LinkedIn, Fidelity, Craigslist, Yelp and the U.S. Postal Service

“We have received reports that Network Solutions customers are seeing malicious code added to their websites, and we are really sorry for this experience,” company spokesman Shashi Bellamkonda wrote in a company blog post at the time. Aside from that admission, Rasmussen wrote that Network Solutions has been “tight-lipped” about the details, only adding that the websites of a “small number” of customers were “inadvertently affected for up to several hours.”

Computer World reported in 2010 that throughout the course of the attack, users of up to 50 domains hosted by Network Solutions were redirected to a Ukrainian attack server.  Historical domain data associated with Clintonemail.com reveals the last recorded change to a Clintonemail.com IP address occurred Dec. 22, 2011. A simple lookup of that particular IP address shows it is hosted in Road Town, British Virgin Islands, although its unclear whether the offshore IP address is a direct result of the Network Solutions hack.

What’s also unclear is whether Clintonemail.com was one of the domains directly involved in the same attack that redirected to a Ukrainian attack server. What is evident, however, is that the security threat posed by Hillary Clinton using a “consumer-grade registrar” for her private email domain, potentially containing classified information, was greater than the threat that could have been posed had she decided to use the State.gov domain.

Since the New York Times broke the story, questions surrounding Clinton’s use of private email have circulated throughout the media and even some members of her own party. Republicans, especially those who are expected to be considering a 2016 presidential run, have also pounced on the issue. After days of silence, Clinton finally tweeted a response to the controversy Thursday.

Clinton’s successor, Secretary of State John Kerry, told the press during a visit to Saudi Arabia that the review would be conducted “as rapidly as possible,” Reuters reported.

But the review of the nearly 55,000 emails Clinton sent from her private email could take some time, as one State Department official acknowledged: ”The review is likely to take several months given the sheer volume of the document set.”   ***    SIX YEARS

Hillary Clinton was in violation of State Department rules governing the use of non-governmental email accounts during her entire tenure as secretary of state and for nearly two years after she left the job, ABC News has learned.

A senior State Department official tells ABC News that under rules in place while Clinton was secretary of state, employees could only use private email accounts for official business if they turned those emails over to be entered into government computers. They were also forbidden from including sensitive but unclassified information on private email, except under some very narrow exceptions.

This policy is still in place, according to the Department. Until any private emails are entered into government computers, the official says, an employee is in violation of the rules.

Clinton used a private email account for her entire tenure as secretary — and did not even have a government-issued email. She only turned over some 55,000 pages of emails to be entered into government computer systems late last year, nearly two years after she stepped down from the State Department.

 

 

2006, GW Bush Spoke About the Coming Caliphate

Before the Military Officers Association, President GW Bush introduced the word ‘caliphate’ in reference to Osama bin Ladin’s terror plans. It was a clarion call to the immediate future. Already war weary and due to the cost of war and unpredictable conditions with a growing enemy, opponents of the Bush Doctrine on the war on terror were fiercely removing support for continued military aggressions.

In the five years since our nation was attacked, we’ve also learned a great deal about the enemy we face in this war. We’ve learned about them through videos and audio recordings and letters and statements they’ve posted on Web sites. We’ve learned about them from captured enemy documents that the terrorists have never meant for us to see.

Together, these documents and statements have given us clear insight into the mind of our enemies, their ideology, their ambitions and their strategy to defeat us.

BUSH: We know what the terrorists intend to do because they’ve told us. And we need to take their words seriously. So today I’m going to describe in the terrorist’s own words what they believe, what they hope to accomplish, and how they intend to accomplish it.

I’ll discuss how the enemy has adapted in the wake of our sustained offensive against them and the threat posed by different strains of violent Islamic radicalism.

Bush had it right yet who is carrying the baton now as that militant future is here upon the Middle East and the West. I’ll explain the strategy we’re pursuing to protect America by defeating the terrorists on the battlefield and defeating their hateful ideology in the battle of ideas.

The terrorists who attacked us on September the 11th, 2001, are men without conscience, but they’re not madmen. They kill in the name of a clear and focused ideology, a set of beliefs that are evil but not insane.

These Al Qaida terrorists and those who share their ideology are violent Sunni extremists. They are driven by a radical and perverted vision of Islam that rejects tolerance, crushes all dissent, and justifies the murder of innocent men, women and children in the pursuit of political power.

They hope to establish a violent political utopia across the Middle East, which they call caliphate, where all would be ruled according to their hateful ideology.

Osama bin Laden has called the 9/11 attacks, in his words, “a great step towards the unity of Muslims and establishing the righteous caliphate.”

BUSH: This caliphate would be a totalitarian Islamic empire encompassing all current and former Muslim lands, stretching from Europe to North Africa, the Middle East and Southeast Asia.

We know this because Al Qaida has told us.

About two months ago, the terrorist Zawahiri — he’s Al Qaida’s second in command — declared that Al Qaida intends to impose its rule in every land that was a home for Islam, from Spain to Iraq. He went on to say, “The whole world is an open field for us.”

We know what this radical empire would look like in practice, because we saw how the radicals imposed their ideology on the people of Afghanistan.

Under the rule of the Taliban and Al Qaida, Afghanistan was a totalitarian nightmare, a land where women were imprisoned in their homes, men were beaten for missing prayer meetings, girls could not go to school, and children were forbidden the smallest pleasures, like flying kites.

Religious police roamed the streets, beating and detaining civilians for perceived offenses. Women were publicly whipped. Summary executions were held in Kabul’s soccer stadium in front of cheering mobs. And Afghanistan was turned into a launching pad for horrific attacks against America and other parts of the civilized world, including many Muslim nations.

BUSH: The goal of these Sunni extremists is to remake the entire Muslim world in their radical image. In pursuit of their imperial aims these extremists say there can be no compromise or dialogue with those they call infidels, a category that includes America, the world’s free nations, Jews, and all Muslims who reject their extreme vision of Islam. They reject the possibility of peaceful coexistence with the free world.

Again, here are the words of Osama bin Laden earlier this year: “Death is better than living on this Earth with the unbelievers among us.”

So, going forward to May of 2011, the raid and killing of Osama bin Ladin at his Abbottabad compound in Pakistan, over 1 million documents were seized speaking to exactly the continued terror plans of al Qaeda. Only 17 documents have been released publically, which begs the question why? Barack Obama took the war on terror to a new lie, al Qaeda has been decimated and is on the run. Just in recent weeks, this has proven to be false. Obama’s tame war strategy has led to leaders falling from power, countries being seized by al Qaeda and other sympathetic factions and death and destruction of epic proportions. Not to be ignored either at this time, Iran had and still does major operations in Afghanistan and continues to have the same in Iraq.
Barack Obama and his inner circle was and is so bent on terminating military actions globally, his team chose to keep bin Ladin’s cache of operations from the very teams that needed and demanded it. An example is this: One of bin Ladin’s top commanders, al Rahman, wrote a letter to bin Ladin asking for permission to order the Libya Islamic Fighting Group whose members had just been released from prison to take advantage of the Arab Spring and being terror operations in Libya, Syria and Yemen. Permission was granted by Osama bin Ladin.
The Weekly Standard below spells it out.

The United States had gotten its hands on al Qaeda’s playbook—its recent history, its current operations, its future plans. An interagency team led by the Central Intelligence Agency got the first look at the cache. They performed a hasty scrub—a “triage”—on a small sliver of the document collection, looking for actionable intelligence. According to Director of National Intelligence James Clapper, the team produced more than 400 separate reports based on information in the documents.

But it is what happened next that is truly stunning: nothing. The analysis of the materials—the “document exploitation,” in the parlance of intelligence professionals—came to an abrupt stop. According to five senior U.S. intelligence officials, the documents sat largely untouched for months—perhaps as long as a year.

In spring 2012, a year after the raid that killed bin Laden and six months before the 2012 presidential election, the Obama administration launched a concerted campaign to persuade the American people that the long war with al Qaeda was ending. In a speech commemorating the anniversary of the raid, John Brennan , Mr. Obama’s top counterterrorism adviser and later his CIA director, predicted the imminent demise of al Qaeda. The next day, on May 1, 2012, Mr. Obama made a bold claim: “The goal that I set—to defeat al Qaeda and deny it a chance to rebuild—is now within our reach.”

The White House provided 17 handpicked documents to the Combatting Terror Center at the West Point military academy, where a team of analysts reached the conclusion the Obama administration wanted. Bin Laden, they found, had been isolated and relatively powerless, a sad and lonely man sitting atop a crumbling terror network.

It was a reassuring portrayal. It was also wrong. And those responsible for winning the war—as opposed to an election—couldn’t afford to engage in such dangerous self-delusion.

“The leadership down at Central Command wanted to know what were we learning from these documents,” says Lt. Gen. Mike Flynn, the former director of the Defense Intelligence Agency, according to the transcript of an interview with Fox News anchor Bret Baier for a coming Fox News Reporting special. “We were still facing a growing al Qaeda threat. And it was not just Pakistan and Afghanistan and Iraq. But we saw it growing in Yemen. We clearly saw it growing still in East Africa.” The threat “wasn’t going away,” he adds, “and we wanted to know: What can we learn from these documents?”

After a pitched bureaucratic battle, a small team of analysts from the Defense Intelligence Agency and Centcom was given time-limited, read-only access to the documents. The DIA team began producing analyses reflecting what they were seeing in the documents.

At precisely the time Mr. Obama was campaigning on the imminent death of al Qaeda, those with access to the bin Laden documents were seeing, in bin Laden’s own words, that the opposite was true. Says Lt. Gen. Flynn: “By that time, they probably had grown by about—I’d say close to doubling by that time. And we knew that.”

This wasn’t what the Obama White House wanted to hear. So the administration cut off DIA access to the documents and instructed DIA officials to stop producing analyses based on them.

Even this limited glimpse into the broader set of documents revealed the problems with the administration’s claims about al Qaeda. Bin Laden had clear control of al Qaeda and was intimately involved in day-to-day management. More important, given the dramatic growth of the terror threat in the years since, the documents showed that bin Laden had expansion plans. Lt. Gen. Flynn says bin Laden was giving direction to “members of the wider al Qaeda leadership team, if you will, that went all the way to places like West Africa where we see a problem today with Boko Haram and [al Qaeda in the Islamic Maghreb], all the way back into the things that were going on in Afghanistan and Pakistan.” Bin Laden advised them on everything from specific operations in Europe to the types of crops his minions should plant in East Africa.

To date, the public has seen only two dozen of the 1.5 million documents captured in Abbottabad. “It’s a thimble-full,” says Derek Harvey, a senior intelligence official who helped lead the DIA analysis of the bin Laden collection.

And while it is impossible to paint a complete picture of al Qaeda based on the small set of documents available to the public, documents we are able to read, including those released last week in a Brooklyn terror trial, reveal stunning new details.

According to one letter, dated July 2010, the brother of Nawaz Sharif, Pakistan’s current prime minister, sought to strike a peace deal with the jihadists. Bin Laden was informed that Shahbaz Sharif, who was then the chief minister of Punjab, wanted to cut a deal with the Pakistani Taliban, whose leadership was close to bin Laden. The government “was ready to reestablish normal relations as long as [the Pakistani Taliban] do not conduct operations in Punjab,” according to the letter from Atiyah Abd al Rahman, one of bin Laden’s top deputies. Attacks elsewhere in Pakistan were apparently acceptable under the terms of the alleged proposal. Al Qaeda intended to guide the Pakistani Taliban throughout the negotiations. The same letter reveals how al Qaeda and its allies used the threat of terrorist attacks as a negotiating tactic in its talks with the Pakistani military.

The letter also shows that Pakistani intelligence was willing to negotiate with al Qaeda. Al Qaeda “leaked” word to the press that “big, earth shaking operations” were planned in Pakistan, the letter says, but bin Laden’s men and their allies would back off if the Pakistani army eased up on its offensive against the jihadists in the north: “In the aftermath” of the al Qaeda leak, “the intelligence people . . . started reaching out to us through some of the Pakistani ‘jihadist’ groups, the ones they approve of.” One of the Pakistani intelligence service’s emissaries was Fazl-ur-Rahman Khalil, a longtime bin Laden ally who leads the Harakat-ul-Mujahideen. Khalil was an early booster of bin Laden’s war against the West, having signed the al Qaeda master’s infamous 1998 fatwa declaring jihad “against the Jews and the Crusaders.” Another government intermediary was Hamid Gul, the one-time head of Pakistan’s Inter-Services Intelligence agency.

Al Qaeda’s network in Iran is also described in bin Laden’s letters. The Iranian regime held some senior al Qaeda leaders, eventually releasing them. This led to disagreements between the two sides. But the mullahs have also allowed al Qaeda to use Iranian soil as a key transit hub, shuttling fighters and cash to and from South Asia. One letter recounts a plan, devised by Yunis al Mauritani, one of bin Laden’s senior lieutenants, to relocate to Iran. Once there, Mauritani would dispatch terrorists to take part in operations around the world.

Mauritani was tasked by bin Laden with planning Mumbai-style shootings in Europe in 2010. The plot was fortunately thwarted. But all of the terrorists selected to take part transited Iran, according to court proceedings in Germany, taking advantage of the Iranian regime’s agreement with al Qaeda.

During the Arab uprisings in 2011, Obama administration officials argued that al Qaeda had been “sidelined” by the peaceful protests. Just weeks before he was killed, however, bin Laden’s men dispatched operatives to Libya and elsewhere to take advantage of the upheaval. “There has been an active Jihadist Islamic renaissance under way in Eastern Libya (Benghazi, Derna, Bayda and that area) for some time, just waiting for this kind of opportunity,” Atiyah Abd al Rahman wrote in early April 2011. Rahman thought there was much “good” in the so-called Arab Spring. And bin Laden believed that the upheaval presented al Qaeda with “unprecedented opportunities” to spread its radical ideology.

The fight over the bin Laden documents continues. Mr. Harvey, the senior DIA official, believes that the documents should be declassified and released to the public as soon as possible, after taking precautions to avoid compromising sources or methods. Rep. Devin Nunes, chairman of the House Intelligence Committee, inserted language in the 2014 intelligence authorization bill requiring just that.

Making the documents public is long overdue. The information in them is directly relevant to many of the challenges we face today—from a nuclear deal with an Iranian regime that supports al Qaeda to the rise of al Qaeda in the Arabian Peninsula and Islamic State in Iraq and Syria; from confidence-building measures meant to please the Afghan Taliban to the trustworthiness of senior Pakistani officials.

Choosing ignorance shouldn’t be an option.

Hillary’s Emails, no Encryption and False Names

There was also stolen White House furniture and then Wall Street. The makings of a Hollywood movie in the text below:

Is the Mysterious ‘Eric Hoteham’ Actually Longtime Clinton Aide Eric Hothem? 

The name of the mysterious individual who registered the servers for Hillary Clinton’s private email address used at the State Department bears a striking resemblance to a longtime Clinton aide.

Clinton and her top aides in the State Department were using email addresses on a private server registered to the Clinton’s home in Chappaqua, New York, according to Internet records reviewed by the Associated Press.

The customer listed in records registering the Internet address to the Chappaqua home was “Eric Hoteham.” The AP, however, was unable to identify an “Eric Hoteham,” stating that the “name does not appear in public records databases, campaign contribution records, or Internet background searches.”

But the name is similar to that of Eric Hothem, who worked as a staff assistant for Clinton during her time as First Lady.

Hothem was involved in multiple personal matters during his service to Clinton and played a role in the controversy surrounding the pardon given to former President Bill Clinton’s half-brother Roger Clinton.

A congressional investigation into Clinton’s clemency decisions found that as Roger Clinton refused to testify to the committee in March 2001, he received a $15,000 wire transfer from a Citibank account in the care of Hothem.

The name of the account was “E.C. 934(A) c/o Eric Hothem.” Lawyers told the committee that “the account is a personal Citibank account of former President and Senator Clinton” and that the money was a loan for Roger Clinton to obtain legal counsel for the investigation.

The congressional report points out that the “payment occurred at the height of public outcry and investigative activity regarding the pardons and at a time when Roger Clinton was deciding whether to provide testimony.”

According to accounts of the final days of the Clinton administration, Hothem told chief White House usher Gary Walters that multiple items of furniture were “the Clintons’ personal property” even though they were not.

The Clintons would later have to return or pay for more than $100,000 in furnishings stolen from the White House.

Hothem also received a special acknowledgement in Hillary Clinton’s book Living History.

Hothem went to work for Citigroup, then moved to JP Morgan Chase in 2013, according to public disclosure reports accessed through the Securities and Exchange Commission.

The documents indicate that Hothem began his financial career in 2002, just a year after his last documented work as an aide to Clinton.

Members of Hothem’s JP Morgan office in Washington, D.C., said on Wednesday that they had “no comment” to any questions regarding Hothem and directed the Washington Free Beacon to the company’s media relations department.

Inquiries made to media relations were not answered by press time. An email sent to an account believed to be Hothem’s was also not returned.

An analysis of Clinton’s personal financial disclosure forms shows she maintained accounts worth millions of dollars at Citibank throughout her years in the Senate. She moved her largest accounts to JP Morgan in 2009.

Her most recent available public financial disclosure in 2012 shows that she holds up to $25 million worth of assets in a JP Morgan account. Hothem did not make the switch to JP Morgan until Clinton was out of federal office in May 2013.

Hothem has maintained ties to Democratic campaigns. His wife, Sue Hothem, has “raised millions of dollars in political contributions,” and helped found a political action committee worth nearly $1 million. She was also the director of development Democratic Leadership Council and the Progressive Policy Institute.

The Clinton Foundation did not respond to a request for comment by press time.

***    

Clinton’s E-Mail System Built For Privacy Though Not Security

No Encryption or protections and once the emails are gone…well they ARE gone?

A week before becoming Secretary of State, Hillary Clinton set up a private e-mail system that gave her a high level of control over communications, including the ability to erase messages completely, according to security experts who have examined Internet records.

“You erase it and everything’s gone,” Matt Devost, a security expert who has had his own private e-mail for years. Commercial services like those from Google Inc. and Yahoo! Inc. retain copies even after users erase them from their in-box.

Although Clinton worked hard to secure the private system, her consultants appear to have set it up with a misconfigured encryption system, something that left it vulnerable to hacking, said Alex McGeorge, head of threat intelligence at Immunity Inc., a Miami Beach-based digital security firm.

The e-mail flap has political significance because Clinton is preparing to announce a bid for the Democratic nomination for president as soon as April. It also reminds voters of allegations of secrecy that surrounded Bill Clinton’s White House. In those years, First Lady Hillary Clinton fought efforts by some White House advisers to turn over information to Whitewater investigators and, later, sought to keep secret records of her task force on health-care reform.

Representative Trey Gowdy, a South Carolina Republican who leads a special committee looking into the events surrounding the 2012 terrorist attack at a U.S. diplomatic facility in Benghazi, Libya, said he will subpoena Clinton’s e-mails.

“We’re going to use every bit of legal recourse at our disposal,” Gowdy said Wednesday during an interview on CNN.

Private Service

The committee also said Wednesday that it has discovered two e-mail addresses used by Clinton while secretary of state.

Nick Merrill, a Clinton spokesman, didn’t immediately respond to a request for comment, though he said in a statement Tuesday that her practices followed “both the letter and spirit of the rules.”

Setting up a private e-mail service was once onerous and rare. Now, it’s relatively easy, said Devost, president of FusionX LLC, based in Arlington, Virginia.

“There are tons of disadvantages of not having teams of government people to make sure that mail server isn’t compromised,” McGeorge said. “It’s just inherently less secure.”

Former Florida Governor and likely 2016 Republican presidential candidate Jeb Bush and used a personal e-mail while he was governor and has done so since, according to his spokeswoman, Kristy Campbell. He kept a server he owned in his state office and didn’t have a private server at home, Campbell said in a phone interview.

Bush E-Mails

Bush differed from Clinton in that it was known he was using a personal e-mail, his aides had regular access to the server and “his office consistently throughout his term complied with Florida’s public records laws,” Campbell said.

In order to ensure her e-mails were private, Clinton’s system appeared to use a commercial encryption product from Fortinet — a good step, McGeorge said.

However, when McGeorge examined the set-up this week he found it used a default encryption “certificate,” instead of one purchased specifically for Clinton’s service. Encryption certificates are like digital security badges, which websites use to signal to incoming browsers that they are legitimate.

“It’s bewildering to me,” he said. “We should have a much better standard of security for the secretary of state.”

Confirmation Hearing

Clinton’s private e-mail — [email protected] — was on a domain set up Jan. 13, 2009, the same day a Senate committee held her confirmation hearing. She was confirmed and sworn in on Jan. 21 as President Barack Obama’s first Secretary of State.

It’s entirely possible that Clinton had a private e-mail system set up at her home as a way to maintain administrative and legal control over her communications, said Tim “T.K.” Keanini, chief technology officer for network security company Lancope Inc. based in Atlanta.

“What we know is that she cared about that communication channel so much that she went out of her way,” and likely hired an expert to configure it for her, Keanini said in a phone interview.

Even so, there’s no guarantee she had complete control over what happened to the e-mails, Keanini said.

Keanini searched Internet records to determine that the computer server supporting Clinton’s e-mail was located in her hometown of Chappaqua, New York. An exact physical address could not be determined. The Internet Protocol address for the server was registered to a person by the name of Eric Hoteham, according to the records.

Kerry’s E-Mail

Supporters note that e-mails sent to State Department employees would have been retained on the government’s system.

However, the e-mail system was also used by at least some close staff, including Huma Abedin, Clinton’s deputy chief of staff at the State Department.

Clinton has yet to speak publicly about her motivation for setting up the system or what discussions she had with her advisers at the time.

Secretary of State John Kerry is the first in his position to rely primarily on a state.gov e-mail account, Deputy Press Secretary Marie Harf said. Harf said that the State Department has “no indication that Secretary Clinton used her personal e-mail account for anything but unclassified purposes.”

While Clinton didn’t have a classified e-mail system, she had multiple ways of communicating in a classified manner, including assistants printing documents for her, secure phone calls and secure video conferences.

Top Aide

Clinton’s top aide during that period, Cheryl Mills, is a respected scandal-defense lawyer. As a member of the White House counsel’s office, Mills helped guide President Bill Clinton through a series of investigations in the 1990s and won praise for her performance in successfully defending him when the Senate voted not to remove him from office in 1999.

Mills would go on to combine two of the most powerful posts at the State Department — chief of staff and counselor — under Hillary Clinton. In that job, she spoke for Clinton on management matters within the department.

Mills didn’t reply to an e-mail seeking comment.

Not long after resigning as secretary of state, Clinton’s private e-mail service was transferred to a commercial provider, MX Logic, Devost said.

“The timing makes sense,” Devost said. “When she left office and was no longer worried as much about control over her e-mails, she moved to a system that was easier to administer.”

Encrypted Connection

It took less than a day for researchers to find potential problems with the Clinton’s system.

Using a scanning tool called Fierce that he developed, Robert Hansen, a web-application security specialist, found what he said were the addresses for Microsoft Outlook Web access server used by Clinton’s e-mail service, and the virtual private network used to download e-mail over an encrypted connection. If hackers located those links, they could search for weaknesses and intercept traffic, according to security experts.

Using those addresses, McGeorge discovered that the certificate appearing on the site Tuesday appeared to be the factory default for the security appliance, made by Fortinet Inc., running the service.

Those defaults would normally be replaced by a unique certificate purchased for a few hundred dollars. By not taking that step, the system was vulnerable to hacking.

Fortinet Statement

It’s unclear whether the site’s settings were the same before news of the private e-mail account emerged this week.

Fortinet issued a statement saying it wasn’t aware the company’s technologies were used by Clinton.

“If they were, our recommendation is to replace provided self-signed certificates with valid digital certificates for the protected domains,” said Andrea Cousens, a Fortinet spokeswoman.

“It may have fallen in the realm of acceptable risk,” Devost said. “They wanted to make sure that when she was in Egypt all of the traffic from her phone to the mail server was encrypted and that was their priority.”