Passenger Aircraft Emergency Landing with Major Blast

Plane Forced to Land After Apparent Blast Causes Hole in Aircraft

 

A photo taken inside a Daallo Airlines Airbus 321 that made an emergency landing after takeoff from Mogadishu, Somalia on Feb. 2, 2016.

 

ABCNews: A passenger plane bound for Djibouti was forced to make an emergency landing today, minutes after taking off from Mogadishu, due to a hole opening up in the plane after an apparent explosion, according to aviation experts.

On its Facebook page, Daallo Airlines, the national airline of Somalia, said in a statement that an Airbus 321 had “experienced an incident shortly after takeoff” from the airport in Mogadishu, Somalia.

View image on Twitter

“The aircraft landed safely and all our passengers were evacuated safely,” the statement said. “A thorough investigation is being conducted by Somalia Civil Aviation Authority.”

The hole in the plane’s fuselage reached from the ceiling to the floor, according to photos of the damage. The aircraft was carrying 74 passengers and crew, authorities said. A Somali aviation official said that two passengers had been slightly injured in the incident, according to the Associated Press.

The official, however, wouldn’t provide any other details regarding injuries and did not confirm reports that an explosion may have triggered the fire.

 

Passengers aboard the Airbus 321 said they heard a loud bang and then saw smoke. As the cabin depressurized, oxygen masks deployed. Some of the 74 passengers were forced to move to the back of the jetliner as the plane descended, according to the AP.

“I don’t know if it was a bomb or an electric shock — but we heard a bang inside the plane,” said passenger Mohamed Ali, according to the AP.

“The thing that’s most interesting to me is that if you look at the outside of the airplane, some force from within the airplane pushed the sides of the aircraft open. You can see how it’s peeled back and you can actually see the streaking from soot down the back side, which would suggest quite definitively that this was a bomb of some kind, probably something about a hand-grenade size that would have made this hole in the side of the airplane,” said ABC News aviation consultant ret. Col. Steve Ganyard.

In 2015: not necessarily related but in country:

Al-Shabaab Is a Known Terror Group

al-Shabaab, Somalia, Mogadishu

Heavy, in part: Al-Qaeda linked al-Shabaab recruits walk down a street on March 5, 2012 in the Deniile district of Somalian capital, Mogadishu, following their graduation. (Mohamed Abdiwahab/AFP/Getty Images)

Heavy, in part: Al-Shabaab has been identified as a terrorist group, and has claimed responsibility for several attacks since the Somali Council of Islamic Courts took over most of southern Somalia in 2006.

According to the National Counter Terrorism Center:

The group was likely responsible for a wave of five coordinated suicide car bombings in October 2008 that simultaneously hit targets in two cities in northern Somalia, killing at least 26 people.

The group also claimed credit for the 2013 attack on a Kenyan mall that killed 68 over the course of a two-day hostage crisis. Read more here.

A Private Computer System at State for Hillary?

Okay, it is coming out at a furious speed, so Bernie Sanders will enjoy this or will it be Biden or Bloomberg that are dancing? Where is lil’ Debbie Wasserman Schultz these days? Oh how about Barack, Huma, Cheryl, or Sid viscous or Cody? Tyler Drumheller is dead….but the Hillary clandestine network had huge discussions at the State Department to the point of issuing her own system. The problem is Hillary did not know how to use a computer, so that flippant statement about wiping a server with a cloth as I have said before was in fact innocent, she has no clue. Calling Brian Pagliano, call holding on line 3. What about all those mobile devices? What about all the hardcopies that Hillary asked to have digital communications printed for her?

Plans For Hidden IT Network To Help Clinton Skirt Rules Uncovered by Judicial Watch

‘We should … set up a stand-alone PC in the Secretary’s office, connected to the internet (but not through our system) to enable her to check her emails from her desk’

(Washington, DC) – Judicial Watch announced today that it recently received records from the Department of State disclosing plans by senior State Department officials to set up a “stand-alone PC” so that Clinton could  check her emails in an office “across the hall” through a separate, non-State Department computer network system. Referencing the special Clinton computer system, Under Secretary for Management Patrick F. Kennedy, writes Clinton Chief of Staff Cheryl Mills, “The stand-alone separate network PC is a great idea.”  The emails are from January 23-24, 2009, a few days after Clinton was sworn in as Secretary of State.

The new emails were obtained by Judicial Watch in response a court order in a Freedom of Information Act (FOIA) lawsuit for State Department records about Hillary Clinton’s separate email system  (Judicial Watch, Inc. v. U.S. Department of State (No. 1:15-cv-00689)).

In the email chain, Lewis Lukens, former deputy assistant secretary of state and executive director of the secretariat, responds to a request from Mills by informing her, top Clinton aide Huma Abedin, and Kennedy that the new personal computer “in the secretary’s office” would be “connected to the internet (but not through our system).” Abedin responds, “We are hoping for that if possible.”

The email exchange discussing plans to provide Clinton a separate computer to skirt the internal State Department computer network begins with a message from Mills to Lukens in which she requests Clinton being able to access her emails through “a non-DOS computer.” The email discusses how the stand-alone computer can be set up and why it is “a great idea’ and “the best solution:”

From: Cheryl Mills
Sent: Friday, January 23, 2009 6:45 AM
To: Lukens, Lewis A
Subject: Re: Series of questions

Lew – who can I talk to about:

  1. Can our email be accessed remotely through the web using a non-DOS computer like my laptop?
  2. I am traveling to the M-E – will my DOS bb work there and is there a cell phone attached?
  3. Spoke to Dan [Daniel B. Smith, former DOS executive secretary] re: bb for HRC (and reports that POTUS is able to use a super encrypted one which)
  4. Spoke to Dan re: setting up Counselor office for HRC so she can go across hall regularly to check her email

***

From: Lukens, Lewis A
To: cmills [REDACTED]
Cc: Habedin [REDACTED]; Kennedy, Patrick F; Smith, Daniel B
Sent: Saturday, Jan. 24, 19:10:33 2009
Subject: Re: series of questions

We have already started checking into the NSA bb. Will set up the office across the hall as requested. Also, I think we should go ahead (but will await your green light) and set up a stand-alone PC in the Secretary’s office, connect to the internet (but not through our system) to enable her to check her emails from her desk. Lew.

From: Kennedy, Patrick F [email protected]
To: Lukens, Lewis A <[email protected]>; Cheryl Mills
Cc: Huma Abedin; Smith, Daniel B <[email protected]>
Sent: Sat, Jan 24 19:48:25 2009
Subject: Re: Series of questions

Cheryl

The stand-alone separate network PC is [a] great idea

Regards

Pat

From: Huma Abedin
To: Kennedy, Patrick F; Lukens, Lewis A; Cheryl Mills
Cc: Huma Abedin; Smith, Daniel B
Sent: Sat Jan 24 19:48:27 2009
Subject: Re: Series of questions

Yes we were hoping for that if possible so she can check her email in her office.

***

From: Lukens, Lewis A
Sent: Saturday, January 24, 2009 8:26 PM
To: Kennedy, Patrick F
Subject: Re: Series of questions

I talked to Cheryl about this. She says a problem is hrc does not know how to use a computer to do email – only bb [Blackberry]. But, I said would not take much training to get her up to speed.

In separate litigation, the State Department told Judicial Watch and federal courts that Hillary Clinton was never issued secure State Department computing devices.

“These emails are shocking.  They show the Obama State Department’s plan to set up non-government computers and a computer network for Hillary Clinton to bypass the State Department network,” said Judicial Watch President Tom Fitton. “That these records were withheld from the American people until now is scandalous and shows the criminal probe of Hillary Clinton’s email system should include current and former officials of the Obama administration.”

Judicial Watch filed these new emails with U.S. District Court Judge Emmett Sullivan, who is now considering whether to grant discovery in a lawsuit seeking information on the “special government employee” status of Abedin. In its filing, Judicial Watch states:

[Judicial Watch] just recently received additional evidence that demonstrates that senior management at the State Department was well aware that Mrs. Clinton was using a “non-state.gov” system to conduct official government business. This evidence also shows that the senior management at the State Department knowingly aided Mrs. Clinton in establishing and using a “non-state.gov” system.

***

[T]his newly discovered email demonstrates that there is at least a “reasonable suspicion” that the State Department and Mrs. Clinton deliberately thwarted FOIA by creating, using, and concealing the “clintonemail.com” record system for six years.

Govt Employees Concerned About Cyber Intrusions, Hillary?

Not nearly enough when every government employee is not fretting over cyber espionage most of all those at the State Department.

Nearly 9 in 10 Government Employees Concerned about Cyber Breaches in Their Organization

 

The public sector experienced nearly 50 times more cyber incidents than any other industry in 2014, and government agencies consistently cite implementing robust, agile cybersecurity measures as a top priority. As threats continue to evolve in both scale and capacity, it is increasingly essential that organizations devise and implement robust, agile measures to continuously detect, monitor, and address both external and internal vulnerabilities.

In an effort to learn more about the perspective of public sector employees on cybersecurity, Government Business Council conducted a flash poll on the following question:

GBC received responses from 160 federal, state, and local government employees. Nearly 90% stated that they were concerned or very concerned about the impact of cyber attacks; only 5% were not very concerned or not at all concerned about potential breaches. The results also reveal cybersecurity to be a more pressing concern for state and local organizations than for their federal counterparts: 96% of state and local respondents were concerned or very concerned about breaches, a 13-point difference from the percentage of federal employees expressing a similar level of concern.

Lack of resources might make cybersecurity a more pressing issue for state organizations — according to a 2015 survey of state CIOs, 64% cited insufficient funding as a major barrier against addressing cyber threats, and 62% cited inadequate availability of security professionals. There is also a disconnect between perception of state cybersecurity capabilities and reality: while 60% of state officials had a high level of confidence in the ability of states to defend against attacks, only a quarter of state CISOs responded likewise.

Moving forward, state and federal agencies should continue to invest in developing a cohesive cybersecurity strategy, recruiting and retaining personnel with the relevant skill set, and sharing threat information and best practices across organization. As federal CIO Tony Scott puts it, “Cyber threats cannot be eliminated entirely, but they can be managed much more effectively. And we can best do this by aligning and focusing our efforts, by properly funding necessary cyber investments, by building strong partnerships across government and industry, and by drawing on the best ideas and talent from across the country to tackle this quintessential problem of the 21st century.” GBC will revisit this topic in future research posts.

‘This was all planned’: Former IG says Hillary, State Dept. are lying

NYPost: The State Department is lying when it says it didn’t know until it was too late that Hillary Clinton was improperly using personal emails and a private server to conduct official business — because it never set up an agency email address for her in the first place, the department’s former top watchdog says.

“This was all planned in advance” to skirt rules governing federal records management, said Howard J. Krongard, who served as the agency’s inspector general from 2005 to 2008.

The Harvard-educated lawyer points out that, from Day One, Clinton was never assigned and never used a state.gov email address like previous secretaries.

“That’s a change in the standard. It tells me that this was premeditated. And this eliminates claims by the State Department that they were unaware of her private email server until later,” Krongard said in an exclusive interview. “How else was she supposed to do business without email?”

He also points to the unusual absence of a permanent inspector general during Clinton’s entire 2009-2013 term at the department. He said the 5½-year vacancy was unprecedented. Much more to Sperry’s summary is here.

What do the former military special forces have to say on the matter of Hillary and even some betrayal within their own ranks?

Sofrep: A source within the State Department confirmed with SOFREP back in 2012 that Hillary’s top aid within the department pre-interviewed people regarding Benghazi before they were interviewed by the State Department’s own internal Benghazi Accountability Review Board.

The problem with the State Department investigating itself is that the investigation produced no significant change in the dysfunctional leadership, nor did it hold people accountable for clear negligence (the top three at fault being Hillary Clinton, Charlene Lamb, and Patrick Kennedy). The organization continues to rot from the top down.

Hillary, in particular, shares something in common with former Navy SEAL Team 6 member Matt Bissonette: They both potentially disclosed top secret government information, a clear violation of her non-disclosure agreement and oath. They also share pending legal problems with the feds.

The federal government continues to aggressively pursue Bissonette and anyone associated with him for disclosures in his book “No Easy Day” and for new information found on his personal computer that Bissonette turned over to federal investigators. SOFREP knows of at least one additional active-duty member forced to retire early as a result of information found on Bissonette’s laptop. Will the same measure of justice and accountability be applied to the political celebrity and former Secretary of State Clinton?

In a recent New York Times article, the editorial board endorsed Hillary Clinton as an experienced presidential candidate.

As secretary of state, Mrs. Clinton worked tirelessly, and with important successes, for the nation’s benefit. She was the secretary President Obama needed and wanted: someone who knew leaders around the world, who brought star power as well as expertise to the table. The combination of a new president who talked about inclusiveness and a chief diplomat who had been his rival but shared his vision allowed the United States to repair relations around the world that had been completely trashed by the previous administration. -NY Times editorial board 

Hillary leveraged her political star power to secure her position as secretary of state, a clear Democrat concession prize for losing to Obama last time around. It was likely her strategic plan to further build her resume, and wait things out until 2016. She did little to promote American diplomacy or secure global stability abroad (two pillars of the department’s mission statement).

This is a woman that will do and say anything to get what she wants. I have very little respect for her. I know what she said to me and she can say all day long that she didn’t say it. That’s her cross to bear. She knows that she knew what happened that day, and she wasn’t truthful, and that has come out in the last hearings — that she told her family one thing and was telling the public another thing. —Sister of fallen hero Glen Doherty, Kate Quigley  Full article and video is here.

 

DHS Fleecing and Iffy Bookkeeping

DHS Reports Spending Only 1 Percent of its $1.4B Training Budget

Though Congress provides more than $1 billion in funds to train personnel at the Department of Homeland Security, DHS spends a small fraction of that on workforce training—at least according to its bookkeepers.

jehjohnsonmain.jpg

As an example of the iffy bookkeeping, auditors found that in fiscal 2014, Congress provided $1.4 billion for training, but the department reported spending only $1.9 million to the Office of Personnel Management. And as of August 2015, the DHS Office of the Chief Financial Officer could account for only $267 million in training expenditures in the prior year. Such lack of oversight on data quality, the Homeland Security inspector general found, meant the department reported only 1 percent of its training expenditures that year.

“DHS lacks reliable training cost information and data needed to make effective and efficient management decisions,” the IG concluded in a report released Wednesday. “It does not have an effective governance structure for its training oversight, including clearly defined roles, responsibilities, and delegated authorities” to oversee training programs, the watchdog wrote.

The difficulty the massive department would have in tracking training funds was predicted as far back as 2003, when the Government Accountability Office named human capital management as a high-risk area for the fledgling new department merging 22 agencies.

But DHS has failed to fully implement as many as 29 recommendations for improving training efficiencies made by several working groups, the new report said.

Among other problems, the IG found that the Transportation Security Administration did not report any training costs for January 2015, but after being questioned by IG staff, that agency reported $23 million in training expenditures.

DHS also lacks an oversight structure to monitor training after it transferred authority in 2012 to the Office of the Chief Financial Officer and to departmental components. Such oversight is supposed to be supervised by the undersecretary for management, through the chief financial officer.

Inspector General John Roth recommended that DHS establish a better process for tracking training funds, set up an oversight structure and implement the remaining past efficiency recommendations.

Departmental managers agreed with the recommendations, with corrective actions underway for completion this year.

The actual Inspector General report is here.

Here is a previous interview with DHS Secretary Jeh Johnson, where he gives clues that he is in way above his head.

Hillary’s Email Contained Operational Intel/Detail

Official: Withheld Clinton emails contain ‘operational’ intel, put lives at risk

Herridge/FNC: EXCLUSIVE: Highly classified Hillary Clinton emails that the intelligence community and State Department recently deemed too damaging to national security to release contain “operational intelligence” – and their presence on the unsecure, personal email system jeopardized “sources, methods and lives,” a U.S. government official who has reviewed the documents told Fox News.

 From Observer: (  CIA Officers names (including NOCs) in Hillary emails. Discussions with Intelligence Community officials have revealed that Ms. Clinton’s “unclassified” emails included Holy Grail items of American espionage such as the true names of Central Intelligence Agency intelligence officers serving overseas under cover. Worse, some of those exposed are serving under non-official cover. NOCs (see this for an explanation of their important role in espionage) are the pointy end of the CIA spear and they are always at risk of exposure – which is what Ms. Clinton’s emails have done.Not only have these spies had their lives put in serious risk by this, it’s a clear violation of Federal law. The Intelligence Identities Protection Act of 1982, enacted due to the murder of the CIA’s station chief in Athens after his cover was blown by the left-wing media, makes it a Federal crime to divulge the true identity of any covert operative serving U.S. intelligence if that person has not previous been publicly acknowledged to be working for our spy agencies.)

The official, who was not authorized to speak on the record and was limited in discussing the contents because of their highly classified nature, was referring to the 22 “TOP SECRET” emails that the State Department announced Friday it could not release in any form, even with entire sections redacted.

The announcement fueled criticism of Clinton’s handling of highly sensitive information while secretary of state, even as the Clinton campaign continued to downplay the matter as the product of an interagency dispute over classification. But the U.S. government official’s description provides confirmation that the emails contained closely held government secrets. “Operational intelligence” can be real-time information about intelligence collection, sources and the movement of assets.

The official emphasized that the “TOP SECRET” documents were sent over an extended period of time — from shortly after the server’s 2009 installation until early 2013 when Clinton stepped down as secretary of state.

Separately, Rep. Mike Pompeo, R-Kan., who sits on the House intelligence committee, said the former secretary of state, senator, and Yale-trained lawyer had to know what she was dealing with.

“There is no way that someone, a senior government official who has been handling classified information for a good chunk of their adult life, could not have known that this information ought to be classified, whether it was marked or not,” he said. “Anyone with the capacity to read and an understanding of American national security, an 8th grade reading level or above, would understand that the release of this information or the potential breach of a non-secure system presented risk to American national security.”

Pompeo also suggested the military and intelligence communities have had to change operations, because the Clinton server could have been compromised by a third party.

“Anytime our national security team determines that there’s a potential breach, that is information that might potentially have fallen into the hands of the Iranians, or the Russians, or the Chinese, or just hackers, that they begin to operate in a manner that assumes that information has in fact gotten out,” Pompeo said.

On ABC’s “This Week” on Sunday, one day before the Iowa caucuses, Clinton claimed ignorance on the sensitivity of the materials and stressed that they weren’t marked.

“There is no classified marked information on those emails sent or received by me,” she said.

Clinton was pressed in the same ABC interview on her signed 2009 non-disclosure agreement which acknowledged that markings are irrelevant, undercutting her central explanation. The agreement states “classified information is marked or unmarked … including oral communications.”

Clinton pointed to her aides, saying: “When you receive information, of course, there has to be some markings, some indication that someone down the chain had thought that this was classified and that was not the case.”

But according to national security legal experts, security clearance holders are required to speak up when classified information is not in secure channels.

“Everybody who has a security clearance has an individual obligation to protect the information,” said national security attorney Edward MacMahon Jr., who represented former CIA officer Jeffrey Sterling in the high-profile leak investigation regarding a New York Times reporter. “Just because somebody sends it to you … you can’t just turn a blind eye and pretend it never happened and pretend it’s unclassified information.”

These rules, known as the Code of Federal Regulations, apply to U.S. government employees with security clearances and state there is an obligation to report any possible breach by both the sender and the receiver of the information. The rules state: “Any person who has knowledge that classified information has been or may have been lost, possibly compromised or disclosed to an unauthorized person shall immediately report the circumstances to an official designated for this purpose.”

The Clinton campaign is now calling for the 22 “TOP SECRET” emails to be released, but this is not entirely the State Department’s call since the intelligence came from other agencies, which have final say on classification and handling.

“The State Department has no authority to release those emails and I do think that Secretary Clinton most assuredly knows that,” Pompeo said.

Meanwhile, the release of other emails has revealed more about the high-level exchange of classified information on personal accounts. Among the latest batch of emails released by the State Department is an exchange between Clinton and then-Sen. John Kerry, now secretary of state. Sections are fully redacted, citing classified information – and both Kerry and Clinton were using unsecured, personal accounts.

Further, a 2009 email released to Judicial Watch after a federal lawsuit — and first reported by Fox News — suggests the State Department ‘s senior manager Patrick Kennedy was trying to make it easier for Clinton to check her personal email at work, writing to Clinton aide Cheryl Mills a “stand-alone separate network PC is … [one] great idea.”

“The emails show that the top administrator at the State Department, Patrick Kennedy, who is still there overseeing the response to all the inquiries about Hillary Clinton, was in on Hillary Clinton’s separate email network and system from the get-go,”  Judicial Watch President Tom Fitton said.

Kennedy is expected to testify this month before the Republican-led Benghazi Select Committee.

*** What is additionally terrifying is John Kerry not only emailed Hillary on his unprotected iPad but Kerry further admits that foreign espionage and intelligence services also likely hack and or found a way to intrude on Hillary’s server and emails along with any of those inside the State Department. Even Germany tapped John Kerry’s cell phone.