Hillary Violated Mahogany Row Rules

From the beginning with names and evidence, the arrogance and machinery. A big question still remains, exactly where did Hillary access top secret SAP communications, or did she ever bother? It appears she left the ‘detail’s to others.

How Clinton’s email scandal took root

WaPo: Hillary Clinton’s email problems began in her first days as secretary of state. She insisted on using her personal BlackBerry for all her email communications, but she wasn’t allowed to take the device into her seventh-floor suite of offices, a secure space known as Mahogany Row.

For Clinton, this was frustrating. As a political heavyweight and chief of the nation’s diplomatic corps, she needed to manage a torrent of email to stay connected to colleagues, friends and supporters. She hated having to put her BlackBerry into a lockbox before going into her own office.

Her aides and senior officials pushed to find a way to enable her to use the device in the secure area. But their efforts unsettled the diplomatic security bureau, which was worried that foreign intelligence services could hack her BlackBerry and transform it into a listening device.

On Feb. 17, 2009, less than a month into Clinton’s tenure, the issue came to a head. Department security, intelligence and technology specialists, along with five officials from the National Security Agency, gathered in a Mahogany Row conference room. They explained the risks to Cheryl Mills, Clinton’s chief of staff, while also seeking “mitigation options” that would accommodate Clinton’s wishes.

“The issue here is one of personal comfort,” one of the participants in that meeting, Donald Reid, the department’s senior coordinator for security infrastructure, wrote afterward in an email that described Clinton’s inner circle of advisers as “dedicated [BlackBerry] addicts.”

Clinton used her BlackBerry as the group continued looking for a solution. But unknown to diplomatic security and technology officials at the department, there was another looming communications vulnerability: Clinton’s Black­Berry was digitally tethered to a private email server in the basement of her family home, some 260 miles to the north in Chappaqua, N.Y., documents and interviews show.

Those officials took no steps to protect the server against intruders and spies, because they apparently were not told about it.

The vulnerability of Clinton’s basement server is one of the key unanswered questions at the heart of a scandal that has dogged her campaign for the Democratic presidential nomination.

Since Clinton’s private email account was brought to light a year ago in a New York Times report — followed by an Associated Press report revealing the existence of the server — the matter has been a source of nonstop national news. Private groups have filed lawsuits under the Freedom of Information Act. Investigations were begun by congressional committees and inspector general’s offices in the State Department and the U.S. Intelligence Community, which referred the case to the FBI in July for “counterintelligence purposes” after determining that the server carried classified material.

The FBI is now trying to determine whether a crime was committed in the handling of that classified material. It is also examining whether the server was hacked.

One hundred forty-seven FBI agents have been deployed to run down leads, according to a lawmaker briefed by FBI Director James B. Comey. The FBI has accelerated the investigation because officials want to avoid the possibility of announcing any action too close to the election.

The Washington Post reviewed hundreds of documents and interviewed more than a dozen knowledgeable government officials to understand the decisions and the implications of Clinton’s actions. The resulting scandal revolves around questions about classified information, the preservation of government records and the security of her email communication.

From the earliest days, Clinton aides and senior officials focused intently on accommodating the secretary’s desire to use her private email account, documents and interviews show.

Throughout, they paid insufficient attention to laws and regulations governing the handling of classified material and the preservation of government records, interviews and documents show. They also neglected repeated warnings about the security of the BlackBerry while Clinton and her closest aides took obvious security risks in using the basement server.

Senior officials who helped Clinton with her BlackBerry claim they did not know details of the basement server, the State Department said, even though they received emails from her private account. One email written by a senior official mentioned the server.

The scandal has pitted those who say Clinton was innocently trying to find the easiest way to communicate against those who say she placed herself above the law in a quest for control of her records. She and her campaign have been accused of confusing matters with contradictory and evolving statements that minimized the consequences of her actions.

Clinton, 68, declined to be interviewed. She has said repeatedly that her use of the private server was benign and that there is no evidence of any intrusion.

In a news conference last March, she said: “I opted for convenience to use my personal email account, which was allowed by the State Department, because I thought it would be easier to carry just one device for my work and for my personal emails instead of two.”

During a Democratic debate on March 9, she acknowledged using poor judgment but maintained she was permitted to use her own server: “It wasn’t the best choice. I made a mistake. It was not prohibited. It was not in any way dis­allowed.”

The unfolding story of Clinton’s basement server has outraged advocates of government transparency and mystified political supporters and adversaries alike. Judge Emmet G. Sullivan of the U.S. District Court in Washington, D.C., who is presiding over one of the FOIA lawsuits, has expressed puzzlement over the affair. He noted that Clinton put the State Department in the position of having to ask her to return thousands of government records — her work email.

“Am I missing something?” Sullivan asked during a Feb. 23 hearing. “How in the world could this happen?”

Hillary Clinton began preparing to use the private basement server after President Obama picked her to be his secretary of state in November 2008. The system was already in place. It had been set up for former president Bill Clinton, who used it for personal and Clinton Foundation business.

On Jan. 13, 2009, a longtime aide to Bill Clinton registered a private email domain for Hillary Clinton, clintonemail.com, that would allow her to send and receive email through the server.

Eight days later, she was sworn in as secretary of state. Among the multitude of challenges she faced was how to integrate email into her State Department routines. Because Clinton did not use desktop computers, she relied on her personal BlackBerry, which she had started using three years earlier.

For years, employees across the government had used official and private email accounts.

The new president was making broad promises about government transparency that had a bearing on Clinton’s communication choices. In memos to his agency chiefs, Obama said his administration would promote accountability through the disclosure of a wide array of information, one part of a “profound national commitment to ensuring an open government.” That included work emails.

One year earlier, during her own presidential campaign, Clinton had said that if elected, “we will adopt a presumption of openness and Freedom of Information Act requests and urge agencies to release information quickly.”

But in those first few days, Clinton’s senior advisers were already taking steps that would help her circumvent those high-flown words, according to a chain of internal State Department emails released to Judicial Watch, a conservative nonprofit organization suing the government over Clinton’s emails.

Leading that effort was Mills, Clinton’s chief of staff. She was joined by Clinton adviser Huma Abedin, Undersecretary Patrick Kennedy and Lewis Lukens, a senior career official who served as Clinton’s logistics chief. Their focus was on accommodating Clinton.

Mills wondered whether the department could get her an encrypted device like the one from the NSA that Obama used.

“If so, how can we get her one?” Mills wrote the group on Saturday evening, Jan. 24.

Lukens responded that same evening, saying he could help set up “a stand alone PC in the Secretary’s office, connected to the internet (but not through our system) to enable her to check her emails from her desk.”

Kennedy wrote that a “stand-alone separate network PC” was a “great idea.”

Abedin and Mills declined to comment for this article, according to Clinton spokesman Brian Fallon. Lukens also declined to comment, according to the State Department.

As undersecretary for management, Kennedy occupies a central role in Clinton’s email saga. The department acknowledged that Kennedy, as part of his normal duties, helped Clinton with her BlackBerry. But in a statement, the department said: “Under Secretary Kennedy maintains that he was unaware of the email server. Completely separate from that issue, Under Secretary Kennedy was aware that at the beginning of her tenure, Secretary Clinton’s staff was interested in setting up a computer at the Department so she could email her family during the work day.

“As we have previously made clear — no such computer was ever set up. Furthermore, Under Secretary Kennedy had very little insight into Secretary Clinton’s email practices including how ­frequently or infrequently then-Secretary Clinton used email.”

As it happened, Clinton would never have a government BlackBerry, personal computer or email account. A request for a secure device from the NSA was rebuffed at the outset: “The current state of the art is not too user friendly, has no infrastructure at State, and is very expensive,” Reid, the security official, wrote in an email on Feb. 13, adding that “each time we asked the question ‘What was the solution for POTUS?’ we were politely told to shut up and color.”

Clinton would continue to use her BlackBerry for virtually all of her government communication, but not on Mahogany Row.

Her first known BlackBerry communication through the basement server came on Jan. 28, 2009, when Clinton exchanged notes with Army Gen. David H. Petraeus, then chief of the U.S. Central Command, according to a State Department spokeswoman. It has not been released.

Few knew the details behind the new clintonemail.com address. But news about her choice to use her own BlackBerry spread quickly among the department’s diplomatic security and “intelligence countermeasures” specialists.

Their fears focused on the seventh floor, which a decade earlier had been the target of Russian spies who managed to plant a listening device inside a decorative chair-rail molding not far from Mahogany Row. In more recent years, in a series of widely publicized cyberattacks, hackers breached computers at the department along with those at other federal agencies and several major corporations.

The State Department security officials were distressed about the possibility that Clinton’s BlackBerry could be compromised and used for eavesdropping, documents and interviews show.

After the meeting on Feb. 17 with Mills, security officials in the department crafted a memo about the risks. And among themselves, they expressed concern that other department employees would follow the “bad example” and seek to use insecure BlackBerrys themselves, emails show.

As they worked on the memo, they were aware of a speech delivered by Joel F. Brenner, then chief of counterintelligence at the Office of the Director of National Intelligence, on Feb. 24 at a hotel in Vienna, Va., a State Department document shows. Brenner urged his audience to consider what could have happened to them during a visit to the recent Beijing Olympics.

“Your phone or BlackBerry could have been tagged, tracked, monitored and exploited between your disembarking the airplane and reaching the taxi stand at the airport,” Brenner said. “And when you emailed back home, some or all of the malware may have migrated to your home server. This is not hypothetical.”

At the time, Clinton had just returned from an official trip that took her to China and elsewhere in Asia. She was embarking on another foray to the Middle East and Europe. She took her BlackBerry with her.

In early March, Assistant Secretary for Diplomatic Security Eric Boswell delivered a memo with the subject line “Use of Blackberries in Mahogany Row.”

“Our review reaffirms our belief that the vulnerabilities and risks associated with the use of Blackberries in the Mahogany Row [redacted] considerably outweigh the convenience their use can add,” the memo said.

He emphasized: “Any unclassified Blackberry is highly vulnerable in any setting to remotely and covertly monitoring conversations, retrieving e-mails, and exploiting calendars.”

Nine days later, Clinton told Boswell that she had read his memo and “gets it,” according to an email sent by a senior diplomatic security official. “Her attention was drawn to the sentence that indicates (Diplomatic Security) have intelligence concerning this vulnerability during her recent trip to Asia,” the email said.

But Clinton kept using her private BlackBerry — and the basement server.

The server was nothing remarkable, the kind of system often used by small businesses, according to people familiar with its configuration at the end of her tenure. It consisted of two off-the-shelf server computers. Both were equipped with antivirus software. They were linked by cable to a local Internet service provider. A firewall was used as protection against hackers.

Few could have known it, but the email system operated in those first two months without the standard encryption generally used on the Internet to protect communication, according to an independent analysis that Venafi Inc., a cybersecurity firm that specializes in the encryption process, took upon itself to publish on its website after the scandal broke.

Not until March 29, 2009 — two months after Clinton began using it — did the server receive a “digital certificate” that protected communication over the Internet through encryption, according to Venafi’s analysis.

It is unknown whether the system had some other way to encrypt the email traffic at the time. Without encryption — a process that scrambles communication for anyone without the correct key — email, attachments and passwords are transmitted in plain text.

“That means that anyone could have accessed it. Anyone,” Kevin Bocek, vice president of threat intelligence at Venafi, told The Post.

The system had other features that made it vulnerable to talented hackers, including a software program that enabled users to log on directly from the World Wide Web.

Four computer-security specialists interviewed by The Post said that such a system could be made reasonably secure but that it would need constant monitoring by people trained to look for irregularities in the server’s logs.

“For data of this sensitivity . . . we would need at a minimum a small team to do monitoring and hardening,” said Jason Fossen, a computer-security specialist at the SANS Institute, which provides cybersecurity training around the world.

The man Clinton has said maintained and monitored her server was Bryan Pagliano, who had worked as the technology chief for her political action committee and her presidential campaign. It is not clear whether he had any help. Pagliano had also provided computer services to the Clinton family. In 2008, he received more than $5,000 for that work, according to financial disclosure statements he filed with the government.

In May 2009, with Kennedy’s help, Pagliano landed a job as a political employee in the State Department’s IT division, documents and interviews show. It was an unusual arrangement.

At the same time, Pagliano apparently agreed to maintain the basement server. Officials in the IT division have told investigators they could not recall previously hiring a political appointee. Three of Pagliano’s supervisors also told investigators they had no idea that Clinton used the basement server or that Pagliano was moonlighting on it.

Through an attorney, Pagliano declined a request from The Post for an interview. He also refused a request from the Senate Judiciary and Homeland Security and Governmental Affairs committees to discuss his role. On Sept. 1, 2015, his attorney told the committees that he would invoke his Fifth Amendment rights if any attempt was made to compel his testimony. He was later given immunity by the Justice Department in exchange for his cooperation, according to articles in the New York Times and The Post.

In a statement, Clinton’s campaign said the server was protected but declined to provide technical details. Clinton officials have said that server logs given to authorities show no signs of hacking.

“The security and integrity of her family’s electronic communications was taken seriously from the onset when it was first set up for President Clinton’s team,” the statement said. “Suffice it to say, robust protections were put in place and additional upgrades and techniques employed over time as they became available, including consulting and employing third party experts.”

The statement added that “there is no evidence there was ever a breach.”

The number of emails moving through the basement system increased quickly as Hillary Clinton dove into the endless details of her globetrotting job. There were 62,320 in all, an average of 296 a week, nearly 1,300 a month, according to numbers Clinton later reported to the State Department. About half of them were work-related.

Her most frequent correspondent was Mills, her chief of staff, who sent thousands of notes. Next came Abedin, the deputy chief of staff, and Jacob Sullivan, also a deputy chief of staff, according to a tally by The Post.

The majority went to two dif­ferent addresses that Clinton sometimes used interchangeably on a single chain of email, [email protected] and [email protected], making it immediately apparent that the emails were not coming from or going to a government address.

Most of her emails were routine, including those sent to friends. Some involved the coordination of efforts to bring aid to Haiti by the State Department and her husband’s New York-based Clinton Foundation — notes that mixed government and family business, the emails show.

Others involved classified matters. State Department and Intelligence Community officials have determined that 2,093 email chains contained classified information. Most of the classified emails have been labeled as “confidential,” the lowest level of classification. Clinton herself authored 104 emails that contained classified material, a Post analysis later found.

Before the server received a digital certificate marking the use of standard encryption, Clinton and her aides exchanged notes touching on North Korea, Mexico, Afghanistan, military advisers, CIA operations and a briefing for Obama.

Clinton adviser Philippe Reines wrote a note to her about Afghanistan President Hamid Karzai. Reines started his note by reminding Clinton that Reines’s “close friend Jeremy Bash is now [CIA Director Leon E.] Panetta’s Chief of Staff.” The rest of the note was redacted before release, under grounds that it was national-security-sensitive.

On Sunday, March 29, 2009, just hours before standard encryption on the server began, Sullivan emailed Clinton a draft of a confidential report she was to make to Obama. “Attached is a draft of your Mexico trip report to POTUS,” Sullivan wrote.

In the high-pressure world of diplomacy, the sharing of such material had been a discreet but common practice for many years. Officials who manage problems around the clock require a never-ending flow of incisive information to make timely decisions.

Not all classified material is equally sensitive. Much of it involves discussions about foreign countries or leaders, not intelligence sources and methods. Working with classified materials can be cumbersome and, in the case of low-level classification, annoying.

On Feb. 10, 2010, in an exchange with Sullivan, Clinton vented her frustration one day when she wanted to read a statement regarding José Miguel Insulza, then secretary general of the Organization of American States. Sullivan wrote that he could not send it to her immediately because the department had put it on the classified network.

“It’s a public statement! Just email it,” Clinton shot back, just moments later.

“Trust me, I share your exasperation,” Sullivan wrote. “But until ops converts it to the unclassified email system, there is no physical way for me to email it. I can’t even access it.”

Early on June 17, 2011, Clinton grew impatient as she waited for “talking points” about a sensitive matter that had to be delivered via a secure line.

“They say they’ve had issues sending secure fax. They’re working on it,” Sullivan wrote his boss.

Clinton told him to take a shortcut.

“If they can’t, turn into nonpaper w no identifying heading and send nonsecure,” she said.

Clinton spokesman Fallon said she was not trying to circumvent the classification system.

“What she was asking was that any information that could be transmitted on the unclassified system be transmitted,” he said. “It is wrong to suggest that she was requesting otherwise. The State Department looked into this and confirmed that no classified material was sent through a non-secure fax or email.”

Security remained a constant concern. On June 28, 2011, in response to reports that Gmail accounts of government workers had been targeted by “online adversaries,” a note went out over Clinton’s name urging department employees to “avoid conducting official Department business from your personal email accounts.”

But she herself ignored the warning and continued using her BlackBerry and the basement server.

In December 2012, near the end of Clinton’s tenure, a nonprofit group called Citizens for Responsibility and Ethics in Washington, or CREW, filed a FOIA request seeking records about her email. CREW received a response in May 2013: “no records responsive to your request were located.”

Other requests for Clinton records met the same fate — until the State Department received a demand from the newly formed House Select Committee on Benghazi in July 2014. The committee wanted Clinton’s email, among other things, to see what she and others knew about the deadly attack in Libya and the response by the U.S. government.

Officials in the department’s congressional affairs office found some Clinton email and saw that she had relied on the private domain, not the department’s system.

Secretary of State John F. Kerry resolved to round up the Clinton emails and deliver them to Congress as quickly as possible. Department officials reached out to Clinton informally in the summer of 2014. On Oct. 28, 2014, the department contacted Clinton and the offices of three other former secretaries — Madeleine K. Albright, Condoleezza Rice and Colin L. Powell — asking if they had any email or other federal records in their possession.

Albright and Rice said they did not use email while at State. Powell, secretary of state from 2001 to 2005, had a private email account through America Online but did not retain copies of his emails. The inspector general for the State Department found that Powell’s personal email account had received two emails from staff that contained “national security information classified at the Secret or Confidential levels.”

Clinton lawyer David Kendall later told the State Department that her “use of personal email was consistent with the practices of other Secretaries of State,” citing Powell in particular, according to a letter he wrote in August.

But Powell’s circumstances also differed from Clinton’s in notable ways. Powell had a phone line installed in his office solely to link to his private account, which he generally used for personal or non-classified communication. At the time, he was pushing the department to embrace the Internet era and wanted to set an example.

“I performed a little test whenever I visited an embassy: I’d dive into the first open office I could find (sometimes it was the ambassador’s office). If the computer was on, I’d try to get into my private email account,” Powell wrote in “It Worked for Me: In Life and Leadership.” “If I could, they passed.”

Powell conducted virtually all of his classified communications on paper or over a State Department computer installed on his desk that was reserved for classified information, according to interviews. Clinton never had such a desktop or a classified email account, according to the State Department.

On Dec. 5, 2014, Clinton lawyers delivered 12 file boxes filled with printed paper containing more than 30,000 emails. Clinton withheld almost 32,000 emails deemed to be of a personal nature.

The department began releasing the emails last May, starting with some 296 emails requested by the Benghazi committee. In reviewing those emails, intelligence officials realized that some contained classified material.

Clinton and her campaign have offered various responses to questions about the classifications. At first, she flat-out denied that her server ever held any. “There is no classified material,” she said at a March 10, 2015, news conference.

Her campaign later released a statement saying she could not have known whether material was classified, because it was not labeled as such. “No information in Clinton’s emails was marked classified at the time she sent or received them,” the statement said.

Clinton has also suggested that many of the emails were classified as a formality only because they were being prepared for release under a FOIA request. Her campaign has said that much of the classified material — in emails sent by more than 300 individuals — came from newspaper accounts and other public sources.

“What you are talking about is retroactive classification,” she said during a recent debate. “And I think what we have got here is a case of overclassification.” Her statement appears to conflict with a report to Congress last year by inspectors general from the State Department and the group of spy agencies known as the Intelligence Community. They made their report after the discovery that four emails, from a sample of 40 that went through her server, contained classified information.

“These emails were not retro­actively classified by the State Department,” the report said. “Rather these emails contained classified information when they were generated and, according to IC classification officials, that information remains classified today. This classified information should never have been transmitted via an unclassified personal system.”

One of those four emails has since been declassified and released publicly by the State Department. The department has questioned the classification of another of those emails.

Twenty-two emails discovered later were deemed so highly classified that they were withheld in their entirety from public release. “They are on their face sensitive and obviously classified,” Rep. Chris Stewart (R-Utah), a member of the House Permanent Select Committee on Intelligence, told The Post. “This information should have been maintained in the most secure, classified, top-secret servers.”

Fallon pointed out that none of those emails originated with Clinton, something that he said Dianne Feinstein (D-Calif.), the Senate Select Intelligence Committee vice chairman, has noted. “We strongly disagree with the decision to withhold these emails in full,” he said.

Under Title 18, Section 1924, of federal law, it is a misdemeanor punishable by fines and imprisonment for a federal employee to knowingly remove classified information “without authority and with the intent to retain such documents or materials at an unauthorized location.”

Previous cases brought under the law have required proof of an intent to mishandle classified information, a high hurdle in the Clinton case.

The basement server also put Clinton at risk of violating laws and regulations aimed at protecting and preserving government records.

In a statement, Clinton’s campaign said she had received “guidance regarding the need to preserve federal records” and followed those rules. “It was her practice to email government employees on their ‘.gov’ email address. That way, work emails would be immediately captured and preserved in government ­record-keeping systems,” the statement said.

Fallon said that “over 90 percent” of the more than 30,000 work-related emails “were to or from government email accounts.”

Specialists interviewed by The Post said her practices fell short of what laws and regulations mandated. Some of those obligations were spelled out a few months before Clinton took office in National Archives and Records Administration Bulletin 2008-05, which said every email system was supposed to “permit easy and timely retrieval” of the records.

The secretary of state’s work emails are supposed to be preserved permanently. In addition, rules also mandated that permanent records are to be sent to the department’s Records Service Center “at the end of the Secretary’s tenure or sooner if necessary” for safekeeping.

Under Title 18, Section 2071, it is a misdemeanor to take federal records without authorization, something that is sometimes referred to as the “alienation” of records. The law is rarely enforced, but a conviction can carry a fine or imprisonment.

Jason R. Baron, a former director of litigation at the National Archives and Records Administration, told the Senate Judiciary Committee last year he believed that Clinton’s server ran afoul of the rules. In a memo to the committee, Baron wrote that “the setting up of and maintaining a private email network as the sole means to conduct official business by email, coupled with the failure to timely return email records into government custody, amounts to actions plainly inconsistent with the federal recordkeeping laws.”

On May 19, 2015, in response to a FOIA lawsuit from the media organization Vice News, U.S. District Judge Rudolph Contreras ordered all the email to be released in stages, with re­dactions.

One notable email was sent in August 2011. Stephen Mull, then serving as the department’s executive secretary, emailed Abedin, Mills and Kennedy about getting a government-issued BlackBerry linked to a government server for Clinton.

“We are working to provide the Secretary per her request a Department issued Blackberry to replace personal unit, which is malfunctioning (possibly because of her personal email server is down.) We will prepare two version for her to use — one with an operating State Department email account (which would mask her identity, but which would also be subject to FOIA requests).”

Abedin responded decisively.

“Steve — let’s discuss the state blackberry. doesn’t make a whole lot of sense.”

Fallon said the email showed that the secretary’s staff “opposed the idea of her identity being masked.”

Last month, in a hearing about a Judicial Watch lawsuit, U.S. District Judge Sullivan cited that email as part of the reason he ordered the State Department produce records related to its initial failures in the FOIA searches for Clinton’s records.

Speaking in open court, Sullivan said legitimate questions have been raised about whether Clinton’s staff was trying to help her to sidestep FOIA.

“We’re talking about a Cabinet-level official who was accommodated by the government for reasons unknown to the public. And I think that’s a fair statement: For reasons heretofore unknown to the public. And all the public can do is speculate,” he said, adding: “This is all about the public’s right to know.”

Clinton Foundation Donor’s Flight

Bombshell: Clinton Foundation Donor’s Flight From Justice Aided by Hillary Allies

Clinton donor smeared a decorated DEA agent and helped crooked Venezuelan friends escape justice

Observer: Recent news reports indicate that the FBI is investigating former Secretary of State Hillary Clinton for granting favors to her family’s foundation donors and for its systematic accounting fraud. In January, the Sunday Times of London cited former Judge Andrew Napolitano, a conservative libertarian and frequent Fox News guest, as saying that the FBI was taking evidence “seriously” and that Hillary “could hear about that soon from the Department of Justice.”

It’s hard to believe that the Obama administration and its hideously politicized Justice Department would ever indict Ms. Clinton, given that President Barack Obama picked her for secretary of state and its clear favoritism toward her in the presidential race. But there is massive evidence that shows financial abuses—including money laundering—at the Clinton Foundation and overwhelming evidence that donors were helped by Ms. Clinton.

To take one of so many examples, there’s the case of Clinton Foundation donor Claudio Osorio—who is now housed at a federal prison serving 12 years for fraud—who in 2010, with Ms. Clinton’s (and Bill Clinton’s) help, won a $10 million loan from the Overseas Private Investment Corporation.

The loan was granted to an Osorio firm called InnoVida, which was supposed to build houses in earthquake-ravaged Haiti. Instead, Osorio pocketed the money and used it to underwrite his lavish lifestyle and to pay off politicians. For political muscle, Osorio—who also had close ties to Jeb Bush, who sat on the board of a bank he owned—paid a lobbyist and major Hillary fundraiser named Jonathan Mantz.

Claudio Osorio's mugshot.

Claudio Osorio’s mugshot. (Wikimedia Commons)

And that leads me to another Clinton Foundation donor Ms. Clinton helped out who happened to use Mr. Mantz (who now runs Ms. Clinton’s presidential campaign Super PAC) and apparently with the same great effect: Gonzalo Tirado, a crooked Venezuelan financier.

Mr. Tirado was president of and ran Venezuelan operations for the famously corrupt Stanford Bank, which was headquartered in Antigua and was named for its American founder, Allen Stanford. He and Mr. Stanford came to be extremely close and “were like father and son,” one well-placed source told me.

Mr. Stanford’s name may ring a bell as he was sentenced to prison for 110 years for committing an $8 billion Ponzi scheme. In 2006, the Hugo Chavez government was asked to investigate Mr. Tirado by scandal-plagued, pro-Wall Street New York Congressman Gregory W. Meeks, a member of the House Committee on Financial Services and a major recipient of cash and perks from jailbird Allen Stanford. Mr. Tirado was charged with tax evasion and theft, The Hill newspaper reported.

As I’ll detail below—and I uncovered this story with help from the National Legal and Policy Center, a Virginia-based watchdog group—Tirado soon fled for Miami to avoid prosecution and petitioned the State Department, through Mr. Mantz, for political asylum. It’s not clear if he won asylum—and he doesn’t seem to merit it as he had no record of political opposition to the Chavez government—but it is clear that he was allowed to remain in the U.S. and live a life of luxury.

(Mr. Tirado, who did not reply to a request for comment, has kept a low profile as of late. His last reported sighting came in 2014, when he unsuccessfully tried to commit suicide, or at least claimed he intended to kill himself.)

Rep. Gregory Meeks (D-NY) announces his endorsement of Hillary Clinton for president.

Rep. Gregory Meeks (D-NY) announces his endorsement of Hillary Clinton for president. (Photo Mark Wilson/Getty Images)

Incredibly, the Obama administration not only failed to help the Chavez government investigate Mr. Tirado, but it also indicted a legendary former DEA agent named Tom Raffanello, a one-time  head of the DEA’s Miami office and the agency’s chief of congressional affairs during Bill Clinton’s first term as president.

Mr. Raffanello’s  subsequent prosecution, which ended in abysmal failure, almost surely was prompted and abetted by Mr. Tirado, a secret FBI informant. Unsurprisingly, the vindicated Mr. Raffanello had few kind words for Mr. Tirado or Ms. Clinton during a recent interview.

“Tirado believed in buying influence,” Mr. Raffanello said of the crooked financier. “He wouldn’t give away 10 cents that he didn’t think he’d get back a dollar on. That was his entire philosophy.”

As for Ms. Clinton, he said that during her years in the Obama administration the “prevailing wisdom in Miami at the time, among people in high profile civil and criminal defense circles, was that giving money to the Clinton Foundation was very helpful. She was secretary of state and a potential future president. I’m sure that’s the same thinking now.”

(Ms. Clinton’s presidential campaign did not reply to a request for comment.)

Up until 2006, life was cushy for pampered, wealthy, jet-setting Gonzalo Tirado, who was running the Stanford Bank’s Venezuela operations. Events took a turn for the worse when an internal Stanford Bank audit discovered that he had fleeced about $5 million from the company.

Mr. Tirado’s actions did not sit well with Stanford, and the Venezuelan beat a hasty exit from his job. He soon opened a bank of his own and lured in a few local investors. His new enterprise went down the tubes, and the defrauded locals, who were very close to the Chavez government, looked to it for help, leading to an investigation of Mr. Tirado.

Former Venezuelan President Hugo Chavez.

Former Venezuelan President Hugo Chavez. (Photo Juan Mabromata/AFP/Getty Images)

At the same time, the Chavez government was investigating Mr. Tirado at the behest of Stanford, through his hand-picked emissary, Congressman Meeks. (See this Wikileaked cable for more on the topic and on Mr. Tirado’s feud with the Venezuelan government.) That led to the filing of criminal charges against Mr. Tirado, as noted above. (The Venezuelan embassy in Washington did not reply to a request for comment.)

Mr. Tirado, apparently a conscienceless paranoid who felt no remorse for his actions, became convinced that Stanford Bank was monitoring his activities and tapping his phone and was the source of all of his troubles. Perhaps sensing he was in deep trouble, he fled Venezuela for Miami.

Mr. Tirado began spending money like a drunken sailor. He purchased at least two luxury estates in the Miami area. He also became a major investor in several companies, including a security firm called Command Consulting Group for which he recruited as a front man W. Ralph Basham, a former senior official with the Department of Homeland Security under Presidents George W. Bush and Barack Obama.

Command Consulting Group, “an international security and intelligence consulting firm that provides advisory services to governments, corporations, and high net worth individuals,” according to its website, and whose top officials include a number of other former senior government terror and security veterans, is currently run out of an office in Washington. (Mr. Basham did not reply to a request for comment.)

As 2009 dawned, life could hardly have been better for the pampered Mr. Tirado. There was just one small problem: He needed to stay in the U.S. to avoid being sent back back to Venezuela, where he was sure to face trial and imprisonment. To stay in the U.S., Mr. Tirado needed the continued indulgence of the U.S. State Department.

Fortunately for Mr. Tirado, the U.S. government had been hostile to Venezuela ever since the South American nation of 31 million moved to the left in 2002, when Chavez was elected to the first of his three terms.

(Note and disclosure: Chavez died in 2013, and the country is now led by his former vice president, Nicolás Maduro. Despite its flaws, the country’s socialist government has made remarkable strides in bettering the lives of Venezuela’s poor majority. In 2004, I met Chavez as a reporter for the Los Angeles Times, and I consider him to be the greatest force for democratic change in modern Latin American history with the possible exception of Che Guevera.)

The George W. Bush administration had regularly conspired with the rancid political opposition, which Chavez displaced from power, and had sought to destabilize and overthrow the Chavez government with the help of local Venezuelan surrogates. Incoming President Barack Obama and his secretary of state, Hillary Clinton, were rabid opponents of Chavez’s as well, but Mr. Tirado didn’t want to count on that alone.

Jonathan Mantz.

Jonathan Mantz. (BGR Group)

Knowing how the corrupt U.S. political system works, he hired an American lobbyist, Jonathan Mantz, to game the asylum process for him while he took it easy and spent his loot in America.

Mantz then worked at BGR, the firm of Republican Haley Barbour, the famously overweight former Mississippi governor and one of the most prominent of all GOP lobby shops. He had previously worked as finance director for the Democratic Congressional Campaign Committee and for the laughably corrupt New Jersey Gov. Jon Corzine.

Mr. Mantz, who had no real qualifications to be a lobbyist other than his ability to raise money—and who did not reply to a request for comment—had drummed up cash for Hillary Clinton’s 2008 presidential campaign. Currently Mr. Mantz chairs Hillary’s 2016 Super PAC, Priorities USA Action. Mr. Tirado paid BGR $350,000.

Now sufficiently motivated, Mantz went to work lobbying Hillary’s State Department to let Tirado stay in Miami. Meanwhile, the crooked Mr. Tirado donated between $5,000 and $10,000 to the Clinton Foundation, according to its website. As is its custom, the foundation does not state when the donation was made and declined to answer questions about the money it took from Mr. Tirado.

Coincidentally or not, Mr. Tirado was one four of Mr. Mantz’ clients who donated to the Clinton Foundation during his brief 16-month career as a lobbyist.

Thomas Raffanealo.

Thomas Raffanello. (LinkedIn Profile)

Now let’s discuss the story of former DEA agent Thomas Raffanello, at which point this story becomes even more outrageous.

Mr. Raffanello worked for the DEA for more than three decades. He left in 2004 and went to work as the head of security for the Stanford Bank. “We set up cameras to prevent bank robberies and generally provided security at bank offices and functions,” Mr. Raffanello told me last weekend during the course of several lengthy phone interviews. “I was based in Miami but had offices in Caracas, Quito, Antigua and a few other places.”

Mr. Raffanello said Allen Stanford “couldn’t balance a checkbook” and described him as “a spoiled billionaire.” When I asked him why he went to work for Stanford in the first place he said, “I did due diligence. I called several associates, including the former head of DEA in Miami before me and several former assistant U.S. attorneys who worked for him. No one ever gave me a bad word; they said he was eccentric but a straight shooter. Madeleine Albright worked for him, and the former president of Switzerland was one of his board members.”

Stanford Bank collapsed and was put into receivership in 2010, at which point Mr. Raffanello left the company. But well before then Mr. Tirado—who, a source told me, had become an FBI informant—had become convinced that Mr. Raffanello was the source for all of his problems with the Chavez government and its investigation into him. Hence, he began a smear campaign against Mr. Raffanello in Venezuela and the United States.

As I mentioned above, it was Congressman Meeks—who currently supports Hillary Clinton’s presidential campaign and who took in more money from Stanford than any single member of Congress other than Charles Rangel and Pete Sessions of Texas—who prompted the Chavez government to look into Mr. Tirado.

But the paranoid Mr. Tirado, certain Mr. Raffanello was to blame, paid Venezuelan writers to place stories saying Mr. Raffanello worked for the CIA, Mr. Raffanello told me. That led to the Chavez government questioning Mr. Raffanello for alleged corruption involving the Stanford bank, though it determined the allegations were groundless and never charged him.

“Venezuela is like Casablanca,” Mr. Raffanello said. “If you tell a story twice it becomes the truth. It became impossible for me to go to Venezuela because I feared I’d get picked up by law enforcement.”

“I thought I was going to get Shanghaied, but you can’t make something out of nothing.” — Thomas Raffanello.

Meanwhile, Mr. Raffanello said, Mr. Tirado told the FBI and the Justice Department that he was trying to arrange Mr. Tirado’s kidnapping and was spying on him. “The guy knows how to play the game, and he played it at a high level because he had plenty of money,” Mr. Raffanello said.

About a year after Mr. Raffanello left Stanford Bank, he was indicted by the Obama Justice Department for allegedly shredding Stanford Bank documents. The case went to trial in Miami in 2010. On February 10 of that year, as the jury was deliberating, Judge Richard Goldberg interrupted its deliberations and unilaterally acquitted Raffanello (and another defendant), saying the evidence against him was “substantially lacking.”

It is highly unusual for a person to escape conviction after being indicted by a federal grand jury, let alone for the government to be humiliated in court as it was in the Raffanello case. Stunned federal prosecutors begged the judge to at least allow the jury to render a verdict because the acquittal would prevent them from appealing a verdict.

The judge dismissed their plea, and Mr. Raffanello’s ordeal was over. “I thought I was going to get Shanghaied, but you can’t make something out of nothing,” he said.

To sum up here, a corrupt Venezuelan banker hired a lobbyist close to Hillary Clinton, made a donation to her family’s foundation and has been allowed to live in the United States without fear of prosecution in his homeland. At a time that Hillary Clinton was secretary of state, the Obama Administration staged what can only be described as a political prosecution of an honest man and long-time government employee.

Mr. Raffanello has concluded this about Hillary Clinton’s campaign: “I learned a lot about her and her family when I was in the government, and how they are put together,” he said. “She is a person who will say and do anything in order to get elected president. I don’t think she’s going to win, but there’s nothing she won’t do while trying.”

Obama, More Iran Concessions Coming

If you thought Obama was done making concessions to Iran — think again

WashingtonExaminer: One of the arguments critics of the Iran deal made during last year’s debate was that beyond the staggering immediate concessions to Iran, the deal paves the way for ongoing and future concessions. The reason is that the reality of the agreement leaves the U.S. hamstrung by fear that Iran can use anything as a pretext to pull out of the deal. We’re now starting to see this play out, as Obama administration officials are signaling that they may provide additional sanctions relief to address Iranian complaints, even though they promised Congress no such relief would ever be provided.

Specifically, the Associated Press reports that the U.S. government could be on the verge of a major capitulation: “The Obama administration is leaving the door open to new sanctions relief for Iran, including possibly long-forbidden access to the U.S. financial market.”

Last summer, as the deal was being debated, administration officials told Congress that this would never happen as a way of reassuring skeptics who feared that the entire sanctions regime against Iran was being unraveled. Plenty of layers of sanctions still remained to pressure Iran, the administration argued.

Treasury Secretary Jack Lew insisted to Congress that under the deal Iran would “be denied access to the world’s largest financial and commercial market.”

Additionally, the head of Treasury’s sanctions division said, “Iran will not be able to open bank accounts with U.S. banks, nor will Iran be able to access the U.S. banking sector.”

When asked if this was still the case, Lew said the U.S. may take future action to “make sure Iran gets relief.” The Treasury Department told the AP, “We will continue to analyze the sanctions lifting and its effects.”

To recap, in addition to $150 billion in sanctions relief, through the nuclear agreement, the administration caved into Iran on uranium enrichment, ballistic missiles, inspections, the duration of the deal’s restrictions and the maintenance of a facility under a bunker.

When the U.S. received nothing from Iran in terms of ending its sponsorship of terrorism or its human rights violations, the excuse from administration officials was always that there was a concerted effort to limit the negotiations to the Iranian nuclear program.

But the latest concession evidently under consideration by the administration would blow a hole in the entire sanctions regime. So it seems that in reality, it was only Iran’s concessions to the U.S. that were limited to the nuclear program — and even those were paltry. In reality, the U.S. will continue to make concessions that will make it easier for Iran to sponsor terrorism and make them a stronger bad actor throughout the Middle East.

As it is, since the deal was signed, the administration has been weak in responding to Iranian ballistic missile tests and it has accepted a prominent role for the radical regime in the Syrian peace process, even though Iran shares a lot of the blame for the situation in Syria.

In other words, the Obama administration’s concessions to Iran did not end in Vienna last summer. They merely started there.

*****

In part AP: Rep. Ed Royce, the House Foreign Affairs Committee chairman, expressed alarm in a letter this week to the president that the U.S. could grant Iranian businesses the ability to conduct transactions in dollars within the United States or through offshore banks. House Majority Leader Kevin McCarthy, R-Calif., said he is “deeply troubled” by the possibility.

The concession would go a long way to meet Iran’s complaints that it hasn’t been sufficiently rewarded by the West for taking thousands of uranium-spinning centrifuges offline, exporting its stockpile of the bomb-making material and disabling a facility that would have been able to produce weapons-grade plutonium.

Asked if such a move was being considered, the Treasury Department told The Associated Press in an emailed statement: “We will continue to analyze the sanctions lifting and its effects.”

The State Department wouldn’t comment.

Treasury Secretary Jack Lew told Congress after the July accord that Iran would still be “denied access to the world’s largest financial and commercial market.”

“Iran will not be able to open bank accounts with U.S. banks, nor will Iran be able to access the U.S. banking sector,” Adam Szubin, the department’s sanctions chief, told a House panel at the time. He said that would hold true even for simple transactions to “dollarize” a foreign payment.

But asked specifically about that commitment earlier this week, Lew allowed for future U.S. action to “make sure Iran gets relief.” More here.

8 Points to Know on Closing Gitmo

8 Key Points on President Obama’s Plan to Close the Terrorist Prison at Guantanamo Bay

Yesterday, the House Foreign Affairs Committee questioned two top administration officials at the Department of State and Department of Defense charged with overseeing the president’s push to empty out the terrorist prison at Guantanamo Bay before he leaves office.

Here are 8 key takeaways from the hearing:

  1. Bringing terrorists held at GITMO to the United States is still against the law.Chairman Royce: Secretary of Defense Carter and Attorney General Lynch have both stated that transfers of Guantanamo detainees to the United States are legally prohibited. Is that your understanding of the law as well?

    Mr. Wolosky: It is my understanding of the law that the statute in its current form prohibits transfers to the United States.

  2. It won’t deter ISIS.Rep. Trott: So if we move the detainees to U.S. soil, that’s not going to be used as a recruitment tool by ISIS? They’re going to go silent now that we’ve ‘done right by our allies?’

    Mr. Lewis: It still will be a tool.

  3. Instead, it would likely result in more threats to the U.S. homeland.Chairman Royce: If you move them to U.S. soil, in fact that will be a magnet for terrorists—the fact that jihadists are being held in the United States.
  4. In its rush to empty out the terrorist prison, the Obama administration is being less than straightforward with foreign countries.Chairman Royce: The top State Department official overseeing Guantanamo at the time wrote to the President of Uruguay that there was no information about these 6 that they were involved in conducting or facilitating terrorist activities against the United States or its partners or allies. No information? They were known to have been hardened al-Qaeda fighters involved in forging documents, trained as suicide bombers, fighting at Tora Bora, committing mayhem, committing murders in Afghanistan.
  5. Making matters worse, the Obama administration is releasing detainees to countries that don’t have the capability or the intent to keep them from returning to the terrorist battlefield.Chairman Royce:But the fact is [Ghana] doesn’t have top-notch intelligence or law enforcement services to deal with this kind of problem. The GDP per capita is like $4,000. It’s 175th in the world. The fact is that their leaders have many, many challenges in Ghana facing them every day.

    “So I’m going to guess that tracking and monitoring former Guantanamo detainees isn’t a priority, just as it wasn’t in other examples that I’ve…laid out for you, like Uruguay.”

  6. And, in some cases, the Obama admin doesn’t know the key foreign officials charged with mitigating threats posed by these terrorists.Rep. Smith: And if a government has a person walking point on a particular issue, like this one, and it happens to be this Minister of Interior, I think we would want to know whether or not he is a person who can be trusted. Particularly with such people who have committed terrorism, and may recommit.

    Mr. Wolosky: Well again, as I’ve said, I have not met him, so I feel uncomfortable offering a personal assessment.

  7. According to the Obama administration’s own figures, more than 30 percent of released detainees have returned to the terrorist battlefield.Chairman Royce:The overall number is in the neighborhood of 31 percent.

    “And if we begin to focus on some of the recent examples of those who did, it is — it is pretty concerning, given Ibrahim al-Qosi — he was one of the high-risk detainees, transferred by this administration. And by 2014, he had joined Al Qaida in the Arabian Peninsula. And now he is in their leadership. And last month, we saw a video urging a takeover in Saudi Arabia.”

  8. Some of these terrorists have returned to killing Americans.Rep. Rohrabacher: How many lives have been lost by those terrorists who went back to their terrorist activities? American lives.

    Mr. Lewis: I can talk about that in a classified setting, but…

    Rep. Rohrabacher: Oh, classified? So, is it over ten?

    Mr. Lewis: Sir, what I can tell you is, unfortunately, there have been Americans that have died because of GITMO detainees.

Operation Hemorrhage

It has been said often, either fight the enemy in a true war theater on the battlefield with real war tactics or fight them at home. Brussels and Paris and in the United States in Boston and San Bernardino to mention a few, the hybrid war gets real expensive. These costs are rarely measured or questioned. We are also not measuring the cost of freedoms are giving up. Add in the cost of the cyber war…..well….going back much earlier than 9-11-01 the costs cannot be calculated.

Operation Hemorrhage: The Terror Plans to Wreck the West’s Economy

DailyBeast: Every European who flies frequently knows the airport in Zaventem, has spent time in the ticketing area that was strewn with blood, limbs, broken glass, battered luggage and other wreckage.

It was another attack on aviation that pulled the United States into the conflict sometimes known as the “global war on terror” in the first place. Since then, airports and airplanes have remained a constant target for Islamic militants, with travelers being encumbered by new batches of security measures after each new attack or attempt.

After the ex-con Richard Reid managed to sneak a bomb aboard a transatlantic flight in December 2001, but failed to detonate the explosives, American passengers were forced to start removing their shoes on their way through security. After British authorities foiled a 2006 plot in which terrorists planned to bring liquid explosives hidden in sport drink bottles aboard multiple transatlantic flights, authorities strictly limited the quantity of liquids passengers were allowed to carry. When Umar Farouk Abdulmutallab snuck explosives hidden in his underwear onto a flight on Christmas Day 2009, he ushered in full-body scans and intrusive pat-downs.

Those are the misses. There have been hits, too. In August 2004, two female Chechen suicide bombers, so-called “black widows,” destroyed two domestic Russian flights. In January 2011, a suicide bomber struck Moscow’s Domodedovo airport in an attack that looked almost identical to the one that rocked the airport in Brussels: the bomber struck just outside the security cordon, where the airport is transformed from a “soft” target to a “hard” one. Just months ago, the self-proclaimed Islamic State (ISIS)—the perpetrator of the Brussels attacks—destroyed a Russian passenger jet flying out of Egypt’s Sinai, killing 224 people.

The targeting of airports and airplanes has been so frequent that in lighter times—back when the terrorists seemed so much worse at what they do—some pundits openly mocked their continuing return to airplanes and airports. In one representative discussion from early 2010, a well-known commentator described jihadists as having a “sort of schoolboy fixation” with aviation.

But the reason for this targeting, of course, is neither mysterious nor quixotic, and it’s one the jihadists have explained for themselves. Following the November Paris attacks, ISIS released an infographic boasting that its slaughter on the streets of Paris would force Belgium “to strengthen its security measures … which will cost them tens of millions of dollars.” Moreover, the group claimed, “the intensified security measures and the general state of unease will cost Europe in general and France in specific tends of billions of dollars due to the resulting decrease in tourism, delayed flights, and restrictions on freedom of movement and travel between European countries.”

And that was before the group successfully attacked the Brussels airport, despite those costly new security measures.

Even before 9/11, jihadists saw bleeding the American economy as the surest path to defeating their “far enemy.” When Osama bin Laden declared war against the “Jews and crusaders” in 1996, he emphasized that jihadist strikes should be coupled with an economic boycott by Saudi women. Otherwise, the Muslims would be sending their enemy money, “which is the foundation of wars and armies.”

Indeed, when bin Laden first had the opportunity to publicly explain what the 9/11 attacks had accomplished, in an October 2001 interview with Al Jazeera journalist Taysir Allouni, he emphasized the costs that the attacks imposed on the United States. “According to their own admissions, the share of the losses on the Wall Street market reached 16 percent,” he said. “The gross amount that is traded in that market reaches $4 trillion. So if we multiply 16 percent with $4 trillion to find out the loss that affected the stocks, it reaches $640 billion of losses.” He told Allouni that the economic effect was even greater due to building and construction losses and missed work, so that the damage inflicted was “no less than $1 trillion by the lowest estimate.”

In his October 2004 address to the American people, dramatically delivered just before that year’s elections, bin Laden noted that the 9/11 attacks cost Al Qaeda only a fraction of the damage inflicted upon the United States. “Al Qaeda spent $500,000 on the event,” he said, “while America in the incident and its aftermath lost—according to the lowest estimates—more than $500 billion, meaning that every dollar of Al Qaeda defeated a million dollars.”

Al Qaeda fit the wars the United States had become embroiled in after 9/11 into its economic schema. In that same video, bin Laden explained how his movement sought to suck the United States and its allies into draining wars in the Muslim world. The mujahedin “bled Russia for ten years, until it went bankrupt,” bin Laden said, and they would now do the same to the United States.

Just prior to 2011, there was a brief period when jihadism appeared to be in decline. Al Qaeda in Iraq, the group that later became ISIS, had all but met with defeat at the hands of the United States and local Sunni uprisings. Successful attacks were few and far between.

People gather at a memorial for victims of attacks in Brussels on Wednesday, March 23, 2016. Belgian authorities were searching Wednesday for a top suspect in the country's deadliest attacks in decades, as the European Union's capital awoke under guard and with limited public transport after scores were killed and injured in bombings on the Brussels airport and a subway station. (AP Photo/Valentin Bianchi)

Valentin Bianchi/AP

Representative of those dark times for jihadists, Al Qaeda in the Arabian Peninsula released a special issue of its online magazine Inspire celebrating a terrorist attack that claimed no victims. In October 2010, jihadists were able to sneak bombs hidden in printer cartridges onto two cargo planes. Due to strong intelligence efforts, authorities disabled both bombs before they were set to explode, but the group drew satisfaction from merely getting them aboard the planes.

“Two Nokia phones, $150 each, two HP printers, $300 each, plus shipping, transportation and other miscellaneous expenses add up to a total bill of $4,200. That is all what Operation Hemorrhage cost us,” the lead article in that special issue of Inspire boasted. “On the other hand this supposedly ‘foiled plot’, as some of our enemies would like to call [it], will without a doubt cost America and other Western countries billions of dollars in new security measures.” The magazine warned that future attacks will be “smaller, but more frequent”—an approach that “some may refer to as the strategy of a thousand cuts.”

The radical cleric Anwar Al Awlaki, writing in Inspire, explained the dilemma that he saw gripping Al Qaeda’s foes. “You either spend billions of dollars to inspect each and every package in the world,” he wrote, “or you do nothing and we keep trying again.”

Even in those days when the terrorist threat loomed so much smaller, the point was not a bad one. Security is expensive, and driving up costs is one way jihadists aim to wear down Western economies.

Unfortunately, Al Qaeda’s envisioned world of smaller but more frequent attacks proved unnecessary for the jihadists. Less than two months after the special issue of Inspire appeared that celebrated an at best half-successful attack, the revolutionary events that we then knew as the “Arab Spring” sent shockwaves through the Middle East and North Africa.

This instability would help jihadism reach the current heights to which it has ascended, where the attacks are not only more frequent but larger. Unfortunately, the United States—blinded at the time by the misguided belief that revolutions in the Arab world would devastate the jihadist movement—pursued policies that hastened the region’s instability. The damages wrought by these policies are still not fully appreciated.

The silver lining to the jihadist economic strategy is that they, too, are economically vulnerable. The damage inflicted on ISIS’s “state” by coalition bombings and other pressures forced the group to slice its fighters’ salaries at the beginning of this year. But as Al Qaeda watches its flashier jihadist rival carry out gruesome attacks on Western targets and get bombarded in return, it discerns further proof of the wisdom of its strategy of attrition.

As it watches these two sets of foes exhaust each other, Al Qaeda believes that its comparative patience will pay off. It believes that its own time will come.