THE Smoking Gun Email on Benghazi

Some things speak for themselves, this is one of them and timing is everything. It is now a proven fact, the natural order of business by Barack Obama, his inner circle and the same with Hillary Clinton is to lie and obstruct investigations and justice. Now, the consequence? That is up to us…..we have demands to make here in retribution for death and dishonesty. What say you?

Embedded image permalink

JudicialWatch-obtained email: DoD had forces ready on 9/11/12 “assuming principals agree.” Guess they didn’t.

New Benghazi Email Shows DOD Offered State Department “Forces that Could Move to Benghazi” Immediately – Specifics Blacked Out in New Document

“They are spinning up as we speak.” U.S. Department of Defense Chief of Staff Jeremy Bash Tuesday, September 11, 2012, 7:19 PM

(Washington, DC) – Judicial Watch today released a new Benghazi email from then-Department of Defense Chief of Staff Jeremy Bash to State Department leadership immediately offering “forces that could move to Benghazi” during the terrorist attack on the U.S. Special Mission Compound in Benghazi, Libya on September 11, 2012. In an email sent to top Department of State officials, at 7:19 p.m. ET, only hours after the attack had begun, Bash says, “we have identified the forces that could move to Benghazi. They are spinning up as we speak.” The Obama administration redacted the details of the military forces available, oddly citing a Freedom of Information Act (FOIA) exemption that allows the withholding of “deliberative process” information.

Bash’s email seems to directly contradict testimony given by then-Secretary of Defense Leon Panetta before the Senate Armed Services Committee in February 2013. Defending the Obama administration’s lack of military response to the nearly six-hour-long attack on the U.S. Consulate in Benghazi, Panetta claimed that “time, distance, the lack of an adequate warning, events that moved very quickly on the ground prevented a more immediate response.”

The first assault occurred at the main compound at about 9:40 pm local time – 3:40 p.m. ET in Washington, DC.  The second attack on a CIA annex 1.2 miles away began three hours later, at about 12 am local time the following morning – 6 p.m. ET.

The newly released email reads:

From: Bash, Jeremy CIV SD [REDACTED]
Sent: Tuesday, September 11, 2012 7:19 PM
To: Sullivan, Jacob J; Sherman, Wendy R; Nides, Thomas R
Cc: Miller, James HON OSD POLICY; Wienefeld, James A ADM JSC VCJCS; Kelly, John LtGen SD; martin, dempsey [REDACTED]
Subject: Libya

State colleagues:

I just tried you on the phone but you were all in with S [apparent reference to then-Secretary of State Hillary Clinton].

After consulting with General Dempsey, General Ham and the Joint Staff, we have identified the forces that could move to Benghazi. They are spinning up as we speak. They include a [REDACTED].

Assuming Principals agree to deploy these elements, we will ask State to procure the approval from host nation. Please advise how you wish to convey that approval to us [REDACTED].

Jeremy

Jacob Sullivan was Deputy Chief of Staff to Secretary of State Hillary Clinton at the time of the terrorist attack at Benghazi.  Wendy Sherman was Under Secretary of State for Political Affairs, the fourth-ranking official in the U.S. Department of State. Thomas Nides was the Deputy Secretary of State for Management and Resources.

The timing of the Bash email is particularly significant based upon testimony given to members of Congress by Gregory Hicks, Deputy Chief of Mission of the U.S. embassy in Tripoli at the time of the Benghazi terrorist attack. According to Hicks’ 2013 testimony, a show of force by the U.S. military during the siege could have prevented much of the carnage. Said Hicks, “if we had been able to scramble a fighter or aircraft or two over Benghazi as quickly as possible after the attack commenced, I believe there would not have been a mortar attack on the annex in the morning because I believe the Libyans would have split. They would have been scared to death that we would have gotten a laser on them and killed them.”

Ultimately, Special Operations forces on their own initiative traveled from Tripoli to Benghazi to provide support during the attack.  Other military assets were only used to recover the dead and wounded, and to evacuate U.S. personnel from Libya.  In fact, other documents released in October by Judicial Watch show that only one U.S. plane was available to evacuate Americans from Benghazi to Tripoli and raise questions about whether a delay of military support led to additional deaths in Benghazi.

The new email came as a result of a Judicial Watch Freedom of Information Act (FOIA) lawsuit filed on September 4, 2014 (Judicial Watch v. U.S. Department of State (No. 1:14-cv-01511)), seeking:

  • Records related to notes, updates, or reports created in response to the September 11, 2012 attack on the U.S. Consulate in Benghazi, Libya. This request includes, but is not limited to, notes taken by then Secretary of State Hillary Rodham Clinton or employees of the Office of the Secretary of State during the attack and its immediate aftermath.

“The Obama administration and Clinton officials hid this compelling Benghazi email for years,” said Judicial Watch President Tom Fitton. “The email makes readily apparent that the military was prepared to launch immediate assistance that could have made a difference, at least at the CIA Annex.  The fact that the Obama Administration withheld this email for so long only worsens the scandal of Benghazi.”

###

Confirmed, Terror Related People Exploiting Refugee Program

Today, December 7, Josh Earnest just declared we are at war because Islamic State has declared war on the West. Wonder if this was approved by Barack Obama himself.

ISIS has targeted refugee program to enter US, Homeland Security chairman says

TheHill: Intelligence officials have determined that Islamic extremists have explored using the refugee program to enter the United States, the head of the House Homeland Security Committee said on Monday.

Rep. Michael McCaul (R-Texas) declined to go into detail about the determination, which the Obama administration has not announced publicly.

Yet the disclosure could add ammunition to critics of the White House’s refugee plans who have warned that the program is vulnerable to infiltration by adherents of the Islamic State in Iraq and Syria (ISIS).

“ISIS members in Syria have attempted to exploit it to get into the United States,” McCaul said during a speech at the National Defense University.

“The U.S. government has information to indicate that individuals tied to terrorist groups in Syria have already attempted to gain access to our country through the U.S. refugee program.”

McCaul would not say specifically who informed him and other lawmakers about the revelation, only describing the sources as “elements of the intelligence community.” More here.

Congressman, Mike McCaul of Texas, Chairman of the Homeland Security Committee is working diligently to stop the abuse of the refugee program to stop terror connected people from entering the United States.

We must listen to the words of our enemies. ISIS has vowed in their words to ‘exploit the refugee process, to sneak operatives, to infiltrate the West.’ They appear to have already done that to attack our allies. Last week the streets of Paris could have just as easily been the streets of New York, or Chicago, or Houston, or Los Angeles.

Rep. McCaul: ‘Make No Mistake:  We Are a Nation at War’

FBI investigating 1,000 ‘homegrown terror cases’

The chair of the House Homeland Security Committee warned the nation Monday during a wide-ranging address on national security matters, “We are a nation at war.”

Rep. Michael McCaul (R., Texas), in a State of Homeland Security address delivered at the National War College, flatly said: “Make no mistake: We are a nation at war.”

McCaul’s comments come on the heels of a major terror attack in San Bernardino, California that was allegedly committed by followers of the Islamic State (also known as ISIS or ISIL) terror group.

“Our own city streets are now the front lines,” McCaul said. “Indeed, San Bernardino was not an isolated event. Terrorists are on the offensive, working to deploy operatives to our shores and to radicalize our citizens to commit acts of violence.”

McCaul said that the U.S. homeland is experiencing the “highest threat environment since 9/11” and that the FBI is investigating “nearly 1,000 homegrown terror cases” across all 50 states, most of which are related to the Islamic State.

“Already, federal authorities have arrested over 70 ISIS supporters in our country,” he said.

In the wake of San Bernardino, Islamic State affiliates have been connected to 19 “terrorist plots or attacks here at home,” McCaul said. 

“These include plans to murder tourists on Florida beaches, to set off pipe bombs on Capitol Hill, to detonate explosives at New York City landmarks, and to live-stream an attack at an American college campus,” he said.

This year has been the “single most active year for homegrown terror we have ever tracked,” according to McCaul, who said “there were more homegrown terror cases in the first six months of 2015 than any full year since 9/11.”

McCaul went on to blast the Obama administration for failing to take concrete steps to battle the Islamic State and prevent further attacks on the United States.

“I was disappointed last night when the president failed to lay out any new steps to fight this menace,” he said. “Instead, he doubled down on a strategy of hesitancy and half-measures.”

He said the mass shooting in San Bernardino should serve as a “wake-up call” to Americans and U.S. lawmakers.

“This attack should not just be a wake-up call. It should be a call to action. For far too long, we have allowed extremists to reclaim their momentum, surging from terrorist cells into full-fledged terrorist armies,” McCaul said.

“As a result, I believe the state of our homeland is increasingly not secure, and I believe 2015 will be seen as a watershed year in this long war—the year when our enemies gained an upper hand and when the spread of terror once again awoke the West.”

McCaul lambasted some of his congressional colleagues for denying that the United States is under attack by terrorist forces.

“We are not acting early enough to keep terrorist groups from spreading, and there are some in Washington who are in denial about the threat we face,” he said.

The Obama administration has repeatedly said the United States is immune from attacks, despite a series of incidents fueled by extremist ideology.

“I have had enough,” McCaul said. “We cannot be blind to the threat before us. ISIS is not contained—it is expanding at great cost to the free world. In November, the group managed to conduct three major terrorist attacks on three separate continents in just three weeks.”

The Islamic State “is now more dangerous than al Qaeda ever was under Osama bin Laden,” McCaul said, adding that the terror group’s extremist ideology has “spread into the West, including into the United States.”

Old is New Again, the Terror Alert System

Jeh Johnson admits the NTAS has never been used but now, we need it?

Wonder when it will be launched and how:

Action Center

National Terrorism Advisory System Public Guide

NTAS Public GuideThe National Terrorism Advisory System, or NTAS, replaces the color-coded Homeland Security Advisory System (HSAS). This new system will more effectively communicate information about terrorist threats by providing timely, detailed information to the public, government agencies, first responders, airports and other transportation hubs, and the private sector.

It recognizes that Americans all share responsibility for the nation’s security, and should always be aware of the heightened risk of terrorist attack in the United States and what they should do.

US To Roll Out New Terror Alert System

SkyNews: The announcement comes after President Obama tells the American people that a new phase of terror threats has emerged.

The United States will launch a new terror alert system aimed at better informing Americans about the nation’s security posture, Homeland chief Jeh Johnson has said.

Details about the new system – the country’s third since the September 11, 2001 terrorist attacks – will be announced soon, Mr Johnson said at a Defense One magazine forum on Monday.

Colour-coded US threat advisory system

The much maligned colour-coded system was replaced in 2011

The Homeland Security boss did not provide specifics, but said the changes will keep the public better informed.

His comments come on the heels of President Barack Obama telling Americans that the US is witnessing a “new phase” of terror threats.

President Obama

In a rare address from the Oval Office on Sunday night, Mr Obama explained how the threat that terrorism posed to the US had changed from the “multi-faceted” attacks of 9/11, to simpler methods such as mass shootings.

Mr. Johnson echoed the President’s words on Monday, telling the forum that terrorist threats to the US have evolved and terrorist-inspired threats are a growing concern.

Since 2011 the US has used the National Threat Advisory System (NTAS), which replaced the much maligned colour-coded system put in place after 9/11.

THAT Terror Watch List Includes TSA Employees

People are nominated due to certain conditions and points to go on the terror watch list. The report is here.  .

Obama’s solution to terror was to expand the stipulations to be on the list, keeping the country safe?

72 DHS Employees on Terrorist Watch List

FreeBeacon: At least 72 employees at the Department of Homeland Security are listed on the U.S. terrorist watch list, according to a Democratic lawmaker.

Rep. Stephen Lynch (D., Mass.) disclosed that a congressional investigation recently found that at least 72 people working at DHS also “were on the terrorist watch list.”

“Back in August, we did an investigation—the inspector general did—of the Department of Homeland Security, and they had 72 individuals that were on the terrorist watch list that were actually working at the Department of Homeland Security,” Lynch told Boston Public Radio.

“The [former DHS] director had to resign because of that,” he said.

DHS continues to fail inspections aimed at determining the efficiency of its internal safety mechanisms, as well as its efforts to protect the nation.

Lynch referred to a recent report that found the Transportation Security Administration, which is overseen by DHS, failed to stop 95 percent of those who attempted to bring restricted items past airport security.

“We had staffers go into eight different airports to test the department of homeland security screening process at major airports. They had a 95 percent failure rate,” Lynch said. “We had folks—this was a testing exercise, so we had folks going in there with guns on their ankles, and other weapons on their persons, and there was a 95 percent failure rate.”

Lynch said he has “very low confidence” in DHS based on its many failures over the years. For this reason, he voted in favor of recent legislation that will tighten the vetting process for any Syrian refugees applying for asylum in the United States.

“I have very low confidence based on empirical data that we’ve got on the Department of Homeland Security. I think we desperately need another set of eyeballs looking at the vetting process,” he said. “That’s vetting that’s being done at major airports where we have a stationary person coming through a facility, and we’re failing 95 percent of the time.”

“I have even lower confidence that they can conduct the vetting process in places like Jordan, or Belize or on the Syrian border, or in Cairo, or Beirut in any better fashion, especially given the huge volume of applicants we’ve had seeking refugee status,” Lynch said.

*** There are more details:

TheIntercept: Nearly half of the people on the U.S. government’s widely shared database of terrorist suspects are not connected to any known terrorist group, according to classified government documents obtained by The Intercept.

Of the 680,000 people caught up in the government’s Terrorist Screening Database—a watchlist of “known or suspected terrorists” that is shared with local law enforcement agencies, private contractors, and foreign governments—more than 40 percent are described by the government as having “no recognized terrorist group affiliation.” That category—280,000 people—dwarfs the number of watchlisted people suspected of ties to al Qaeda, Hamas, and Hezbollah combined.

The documents, obtained from a source in the intelligence community, also reveal that the Obama Administration has presided over an unprecedented expansion of the terrorist screening system. Since taking office, Obama has boosted the number of people on the no fly list more than ten-fold, to an all-time high of 47,000—surpassing the number of people barred from flying under George W. Bush.

“If everything is terrorism, then nothing is terrorism,” says David Gomez, a former senior FBI special agent. The watchlisting system, he adds, is “revving out of control.”

DHS Secret Databases Not Secure, Violations

In part from the report: Recognizing the importance of information security to the economic and national security interests of the United States, the Congress enacted Title III of the E-Government Act of 2002 (Public Law 107-347, Sections 301-305) to improve security within the Federal Government. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Title III of the E-Government Act, as amended, entitled Federal Information Security Management Act of 2002, provides a comprehensive framework to ensure the effectiveness of security controls over information resources that support Federal operations and assets.

Components are not consistently following DHS’ policies and procedures to update the system inventory and plan of action and milestones in the Department’s enterprise management systems. Further, Components continue to operate systems without the proper authority. We also identified a significant deficiency in the Department’s information security program as the United States Secret Service (USSS) did not provide the Chief Information Security Officer (CISO) with the continuous monitoring data required by the Office of Management and Budget (OMB) during Fiscal Year (FY) 2014. Without this information, CISO was significantly restricted from performing continuous monitoring on the Department’s information systems, managing DHS’ information security program, or ensuring compliance with the President’s cybersecurity priorities. Subsequent to the completion of our fieldwork, USSS established an agreement with the DHS Chief Information Officer (CIO) to provide the required data beginning in FY 2015.

Evaluation of DHS Information Security Program for Fiscal Year 2015 revealed the existence of dozens of top-secret unpatched databases.
SecurityAffairs: The story I’m about to tell you is staggering, the US Department of Homeland Security is running dozens of unpatched and vulnerable databases, a number of them contained information rated as “secret” and even “top secret.”
The discovery emerged from the “Evaluation of DHS’ Information Security Program for Fiscal Year 2015” conducted on the department’s IT infrastructure by the US Government.
The audit of the DHS Information Security found serious security issues in the Government systems, including 136 systems that had expired “authorities to operate,” a circumstance that implies the stop of maintenance activities. The principal problem discovered by the inspectors is that a number of systems, despite are still operative and under maintenance have no up-to-date security patches, leaving them open to cyber attacks.


Of the 136 systems, 17 were containing information classified as “secret” or “top secret.”
Giving a deep look at the report on the DHS Information Security Program, it is possible to note that the Coast Guard runs 26 vulnerable databases, followed by FEMA with 25, Customs and Border Protection with 14, and the DHS’ headquarters with 11.

Although Secret Services have only two vulnerable databases, they have failed other targets.
It implemented proper security checks just for 75 percent of its secret or top secret databases, and just 58 per cent of its non-secret databases. The DHS targets are 100 per cent and 75 per cent respectively. The experts discovered several security issues affecting the majority of assessed systems, including PCs, databases and also browsers.
The assessments conducted to evaluate the DHS Information Security Program, revealed several deficiencies in the systems analyzed, for example, Windows 8.1 and Windows 7 workstations which were missing security patches for the principal software.
“We found additional vulnerabilities regarding Adobe Acrobat, Adobe Reader, and Oracle Java software on the Windows 7 workstations,” the department’s inspector general noted in a 66-page report. “If exploited, these vulnerabilities could allow unauthorized access to DHS data.”
The inspectors have found many other security issues in the DHS Information Security Program, including weak passwords, websites susceptible to cross-site and/or cross-frame vulnerabilities and poor security settings.
The Government environments suffer bureaucratic obstacles in bug fixing and patch management, it could take more than a year to fix a leak from the moment it is reported.


The results of the evaluation confirm that improvements have been made but there are a lot of serious issues that have to be urgently addressed.
“While improvements have been made, the Department must ensure compliance with information security requirements in other areas. For example, DHS does not include its classified system information as part of its monthly information security scorecard or its FISMA submission to OMB. In addition, USCG is not reporting its PIV data to the Department, which is a contradiction to the Under Secretary for Management’s guidance that requires Components to submit this information to the Department.5 In addition, we identified deficiencies with DHS’ enterprise management systems, including inaccurate or incomplete data.”
The report also provides a set of recommendations to solve the security issued emerged after the assessment.
The DHS has 90 days to fix the issues, two of which have been already solved.
Pierluigi Paganini