An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation
Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.
Base of Operation:Mountain territory near Benghazi and al-Akhdar aside the Libyan northeast coasts. The Libyan Islamic Fighting Group began formation from return Libyan Afghans from the war against the soviets ending in 1989; however, was not officially established as a group until the year of 1995. Between then and the present, the group has gone through several mischievous movements of acting out against the government. Per the United Nations under the direction of the U.S. State Department during the Bush administration:
LIFG is believed to have several hundred members or supporters, mostly in the Middle East and Europe. Since the late 1990s, many LIFG members have fled from Libya to various Asian, Arabian Gulf, African, and European countries, particularly the United Kingdom. It is likely that LIFG has maintained a presence in eastern Libya and has facilitated the transfer of foreign fighters to Iraq.
Related listed individuals and entities:
Al-Itihaad al-Islamiya / AIAI (QDe.002), listed on 6 October 2001
Al-Qaida (QDe.004), listed on 6 October 2001
Moroccan Islamic Combatant Group (QDe.089), listed on 10 October 2002
The Tunisian Combatant Group (QDe.090), listed on 10 October 2002
Aiman Muhammed Rabi al-Zawahiri (QDi.006), listed on 25 January 2001
Zayn al-Abidin Muhammad Hussein (QDi.010), listed on 25 January 2001
Hassan Dahir Aweys (QDi.042), listed on 9 November 2001
Ibrahim Ali Abu Bakr Tantoush (QDi.057), listed on 11 January 2002
Merai Zoghbai (QDi.223), listed on 2 August 2006
Aly Soliman Massoud Abdul Sayed (QDi.229), listed on 8 June 2007
Salem Nor Eldin Amohamed al-Dabski (QDi.231), listed on 8 June 2007
Adil Muhammad Mahmud Abd Al-Khaliq (QDi.255), listed on 10 October 2008
Hillary Clinton Knew She Was Helping Islamists Move Into Power In Libya
Howley/DC: Hillary Clinton received intelligence that her effort to bring down Libyan president Muammar Gaddafi was leading to the rise of al-Qaeda militants and the Muslim Brotherhood in the country, according to emails released by WikiLeaks.
More than a year before the Benghazi attack, Clinton learned that al-Qaeda terrorists were infiltrating the post-Gadaffi transitional government. Clinton also acknowledged that the Muslim Brotherhood wielded the “real power” in the rebel movement that Clinton was supporting — and that their Brotherhood allies in Egypt were waiting in the wings to move into Libya’s oil sector.
Blumenthal explained that “radical/terrorist” groups were “infiltrating the NLC,” or National Libyan Council, a rebel quasi-government that earned French recognition as Libya’s governing body that very same month. Clinton was warned that al-Qaeda could become major players in the region.
Blumenthal wrote:
“This situation has become increasingly frustrating for French President Nicolas Sarkozy, who, according to knowledgeable individuals, is pressing to have France emerge from this crisis as the principal foreign ally of any new government that takes power. Sarkozy is also concerned about continuing reports that radical/terrorist groups such as the Libyan Fighting Groups and Al Qa’ida in the Islamic Maghreb (AQIM) are infiltrating the NLC and its military command. Accordingly, he asked sociologist who has long established ties to Israel, Syria, and other B6 nations in the Middle East, to use his contacts to determine the level of influence AQIM and other. terrorist groups have inside of the NLC. Sarkozy also asked for reports setting out a clear picture of the role of the Muslim Brotherhood in the rebel leadership…
…(Source Comment: Senior European security officials caution that AQIM is watching developments in Libya, and elements of that organization have been in touch with tribes in the southeastern part of the country. These officials are concerned that in a post-Qaddafi Libya, France and other western European countries must move quickly to ensure that the new government does not allow AQIM and others to set up small, semi- autonomous local entities—or “Caliphates”—in the oil and gas producing regions of southeastern Libya.)”
On May 30, 2011, Hillary aide Jake Sullivan sent the secretary of state a full list of known “Libya emissaries.” By then, the National Libyan Council had given way to the Transitional National Council (TNC), but the “real power” still lay with the Muslim Brotherhood.
Sullivan’s intelligence memo noted:
“The Qadhafi regime has also met with the Libyan Muslim Brotherhood leadership in Egypt. According to Qadhafi chief of staff Fouad Zlitni, the Muslim Brotherhood asserts that TNC may be the political leadership of the opposition, but the real power lies with the Libyan Brotherhood and they are apparently willing to bide their time. The Qadhafi regime also offered to send senior tribal leaders to Benghazi to negotiate with the TNC, but the TNC rejected the proposal.”
Clinton forwarded that email to an aide, acknowledging that she had received it and assessed its contents.
Sidney Blumenthal wrote to Clinton again on July 3, 2012, two months before Benghazi, to talk about the upcoming election. The election, Blumenthal noted, was how the Muslim Brotherhood in Egypt was hoping to use the new Brotherhood party in Libya to get into the Libyan oil game.
Blumenthal wrote:
“Source Comment: In the opinion of a knowledgeable individual, the division of the 200 seats in the GNC lies at the heart of this matter, with 120 seats allotted for the Tripolitania, 60 for Barqa, and 18 for the Fezzan area. At present, the Libyan Muslim Brotherhood (LMB) and its political arm, the Justice and Construction Party (JCP), are attempting to mount a national campaign, receiving discreet advice and technical support from the Egyptian Muslim Brotherhood (EMB). With this assistance, Jalil is convinced that the JCP is the party that operates most effectively throughout the country. Jalil has established ties to the EMB, from whom he has learned that JCP leader Mohamad Sowan and his associates are working with the leadership of the EMB.) 4.According to his sources, Jalil believes that he can work with Sowan and the LMB/JCP; however, he is concerned that Mohammed Morsi, the newly elected EMB President of Egypt, and EMB Supreme Guide Mohammed Badie are focused on developing Egyptian influence in Libya. Jalil has been informed privately that these EMB leaders want to establish a strong position in Libya, particularly in the oil services sector as part of their effort to improve Egypt’s economic situation.
Over in Egypt, Clinton helped spur the uprising that led to the Muslim Brotherhood briefly taking power in that country around the same time. And a young Clinton Foundation employee, Gehad El-Haddad, was already working in Cairo to help the Muslim Brotherhood gain power.
El-Haddad was arrested in 2013, following the brief and disastrous reign of Muslim Brotherhood leader Mohammed Morsi, for inciting violence. He was reportedly one of Morsi’s top advisers. El-Haddad was sentenced to life in prison in 2015.
The Joint Worldwide Intelligence Communications System, is a Top Secret/SCI network run by the United States’ Defense Intelligence Agency and used across the Department of Defense, Department of State, Department of Homeland Security and Department of Justice to transmit especially sensitive classified information.
FNC/EXCLUSIVE: Two State Department contractors, with decades of experience protecting the United States’ most sensitive secrets, are speaking out for the first time about Hillary Clinton’s tenure as secretary of state and how the rules for government security clearance holders did not seem to apply to Clinton and her team.
“The State Department was her oyster and it was great for the [Clinton] foundation and great for the Clintons to be able to have such a great position,” Dave Whitnah told Fox News.
Whitnah said he worked within the State Department’s Office of Security Technology which is responsible for cameras and alarms and sweeping for bugs. Whitnah said everyone understood the secretary of state is the primary target of foreign intelligence services.
“The number one person would be the secretary of state and their communications,” Whitnah explained. “You can think of the Iran negotiations, nuclear negotiation, negotiations with Russia, talks with Russia. You know, anything to do with foreign policy.”
Whitnah emphasized that tens of millions of dollars were spent on technical security for Clinton that apparently was disregarded as her team traveled around the world on official U.S. government business.
“It was unfathomable that [her BlackBerry] would be used for anything other than just unclassified communication,” Whitnah said. Clinton’s devices were not certified as secure by the State Department. As for her use of a non-secure BlackBerry, Whitnah stressed that email can be intercepted and, “Even if turned off, it’s still a listening device so that’s why you take out the batteries.”
As Clinton was sworn in as secretary in January 2009, government contractor Amel Smith said he was also working at the department and: “State Department rules are clear. I helped write those rules.”
Smith says his 30 years of experience includes serving in the U.S. Army’s 82nd Airborne, before becoming a counter-intelligence and counter-espionage investigator at State tracking down breaches of classified materials. He reviewed some of the FBI witness interviews from the Clinton email investigation with Fox News, and questioned those who claimed not to have the proper training in handling sensitive information.
“I hear things like, well, I forgot, um, I don’t know that I was trained, I don’t know this. You know — every single person that had access to that information when it was sent is in violation,” Smith emphasized.
The FBI witness interviews also show secure facilities for classified information — known as SCIFs — were specially built for Clinton in her in Washington, D.C., and Chappaqua, N.Y., homes. Doors that were supposed to be locked were left open.
“If you’ve got an uncleared person in there, it’s automatically a compromise,” Smith said.
Another FBI interview summary said there were personally owned desktop computers in the secure facilities at Clinton’s homes, yet she told the FBI that she did not have a computer of any kind in these facilities.
“If somebody said they’re there, then they probably were there, and you know, the reason you would deny it was because you probably didn’t have approval,” Smith said.
Having unapproved computers in a SCIF would automatically call for a security investigation.
Asked for his reaction to Clinton’s claim that nothing she sent or received was marked classified, Whitnah called that assertion a “misrepresentation.” Fox News was first to report in June that at least one of the emails contained a classified information portion marking for “c” which is confidential. FBI Director James Comey later said in July when he recommended against criminal charges that a handful of Clinton emails contained classified markings.
But more than 2,100 emails with classified information, and at least 22 at the “top secret” level, passed through Clinton’s unsecured private server. Asked how it happened, Smith said, “Personally, there had to have been somebody moving classified information from C-LAN, C-LAN again is Secret, Confidential only, and JWICS. JWICS is where all top secret information is.”
After new emails were found in the Anthony Weiner sexting case belonging to his estranged wife Clinton aide Huma Abedin, the FBI reopened the Clinton email investigation. On Sunday, Comey said the emails did not change his recommendation against criminal charges because his investigators did not find intent to move classified materials outside secure government channels
“Whether it’s the private email server, whether it’s this private laptop. If there’s classified — one document on there — that’s classified, it’s a violation. Somebody violated [the] law,” Smith said. “Throw all the politics out the window, what we’re talking about is the defense of this nation.”
Asked about Smith and Whitnah, who filed a complaint against the State Department, a department spokesman said they were not direct hires — adding that the head of diplomatic security told the FBI that Clinton was “very responsive to security issues.”
****
And her State Department approved that security team in Benghazi
Benghazi guards turned on US diplomats in 2012 attack, sources say
Expand / Contract
Stevens, shown in rear wearing black, with several of the guards sources say turned on him. (Special to Fox News)
FNC: An obscure private firm hired by the State Department over internal objections to protect U.S. diplomats in Benghazi just months before the American ambassador and three others were killed was staffed with hastily recruited locals with terror ties who helped carry out the attack, multiple sources told Fox News.
The explosive charge against Wales-based Blue Mountain Group comes from several sources, including an independent security specialist who has implemented training programs at U.S. Consulates around the world, including in Benghazi, where he trained a local militia that preceded Blue Mountain. The source, who spoke on condition of anonymity, said Blue Mountain used local newspaper ads to assemble a team of 20 guards, many of whom had terror ties, after securing a $9.2 million annual contract.
“The guards who were hired were locals who were part of the Ansar al-Sharia and Al Qaeda groups operating in Benghazi,” said the source, whose assignment in Benghazi had ended in November 2011. “Whoever approved contracts at the State Department hired Blue Mountain Group and then allowed Blue Mountain Group to hire local Libyans who were not vetted.”
Many were members of the Libyan government-financed February 17th Martyrs Brigade, an Islamist militia that had previously guarded Americans before being replaced by Blue Mountain.
John “Tig” Tiegen, one of the CIA contractors that responded to the Sept. 11, 2012 attack and co-author of “13 Hours: The Inside Account of What Really Happened in Benghazi,” confirmed to Fox News that the local Libyans who attacked the consulate that night included guards working for Blue Mountain.
“Many of the local Libyans who attacked the consulate on the night of Sept. 11, 2012, were the actual guards that the State Department under Hillary Clinton hired to protect the Consulate in Benghazi,” Tiegen told Fox News. “The guards were unvetted and were locals with basically no background at all in providing security. Most of them never had held a job in security in the past.
“Blue Mountain Libya, at the time of being awarded the contract by our State Department, had no employees so they quickly had to find people to work, regardless of their backgrounds,” he said.
One former guard who witnessed the attack, Weeam Mohamed, confirmed in an email sent to the Citizens Commission on Benghazi and obtained by Fox News, that at least four of the guards hired by Blue Mountain took part in the attack after opening doors to allow their confederates in.
“In the U.S. Mission, there were four people [who] belonged to the battalion February 17,” Mohamed wrote to the Commission, an independent body formed with Accuracy in Media to investigate the attack and the administration’s handling of it.
“Always armed. And they are free to move anywhere inside a building mission.
“And therefore, they had a chance to do an attack on the mission’s headquarters. They have all the details about the place. At the same time they have given the United States a painful blow,” Mohamed wrote.
Blue Mountain officials did not return multiple requests for comment. The State Department acknowledged in internal emails obtained by FoxNews.com the local recruits fell short of their duty, but discounted the claim any took an active role in the attack that resulted in the deaths of Ambassador Christopher Stevens, Foreign Service Information Officer Sean Smith and CIA contractors and former Navy SEALs Tyrone Woods and Glen Doherty.
“While the Accountability Review Board report and other reports were critical of our local guards’ performance, we are not aware of any evidence that they participated in the attacks themselves,” said State Department spokesman John Kirby.
Blue Mountain was hired in February 2012, following an uprising that ended Col. Muammar Gaddafi’s 42-year rule and plunged Libya into violent chaos. Congressional testimony in the wake of the attack on a consular office in Benghazi revealed that Stevens and his staff had made hundreds of requests for security upgrades but had been ignored by officials in Washington.
“We kept asking for additional support, including a 50-caliber mounted machine gun, but the State Department would not give it to us, because they said it would upset the locals,” the source told Fox News. “Instead, the State Department hired a company that doesn’t have employees, which then hired terrorists.”
Clare Lopez, a member of Citizens’ Commission on Benghazi, said the Clinton State Department bears blame for the security situation.
“Think about it: Hillary Clinton’s State Department actually hired the very people who, along with their jihadist allies in Benghazi, attacked us and killed U.S. Ambassador Chris Stevens and Sean Smith as well as CIA contractors Glen Doherty and Ty Woods,” Lopez said.
According to government records obtained by the Washington-based Judicial Watch, the State Department was in a “rush” to hire Blue Mountain UK, and its affiliate, Blue Mountain Libya, which together formed The Blue Mountain Group to secure the Benghazi contract.
“I understand there was a tremendous rush to get the original contract awarded, and the Service level agreement was most likely overlooked in the rush,” wrote State Department contracting officer Jan Visintainer, in a June 6, 2012, email. Emails obtained from [missing word] after the attack showed Visintainer urged Blue Mountain officials not to talk to the media.
Blue Mountain UK was formed in 2008 by David Nigel Thomas, a former Special Air Service official. Charles Tiefer, a commissioner at the Commission on Wartime Contracting, told Reuters the company was not well known.
“Blue Mountain was virtually unknown to the circles that studied private security contractors working for the United States, before the events in Benghazi,” Tiefer said.
Despite the size of the operation, and having no staff or track record with the State Department, Blue Mountain Group landed the $767,767-per-month contract to protect the Benghazi consular office, beginning on Feb. 17, 2012.
The company solicited applications in local newspapers and on websites, and very little, if any, screening of guards was done, the security specialist told Fox News. The lack of vetting led to several potentially dangerous hires beginning in March of 2012, he said.
“One of those guards hired by Blue Mountain was the younger brother of the leader of Al Qaeda of Benghazi,” he said.
In an email obtained by Judicial Watch, Jairo Saravia of the Regional Security office for the U.S. Embassy in Tripoli, told his superiors in Washington that Blue Mountain had held and lost security contracts in Tripoli, with the Corinthian Hotel and Palm City complex.
“The latest information is Blue Mountain is not licensed by the GOL (Government of Libya) to provide security services in Libya,” Saravia wrote. “I would advise not to use their services to provide security for any of our annexes and/or offices due to the sensitivity this issue has with the current GOL.”
Prior to Blue Mountain, security for Americans in Benghazi had been provided by the February 17th Martyrs Brigade under a direct agreement with the State Department. Despite its Islamist orientation, the militia included dozens of locals who had been carefully cultivated and trained by the U.S., according to the source. The majority of the February 17 Militia guards were fired without warning when Blue Mountain was hired, leading some members to turn against the Americans, he said. The State Department kept on at least three February 17 employees for patrol.
Eric Nordstrom, the regional security officer in Libya who has vast, first-hand knowledge of some 600 security requests denied to the U.S. diplomatic mission in Libya, testified on May 8, 2013, before the Congressional Committee On Oversight & Government Reform that he was aware that employees with both February 17 Martyrs Brigade and Blue Mountain had ties to Islamist terrorists.
“I had met with some of my agents and then also with some annex personnel. We discussed that,” Nordstrom told lawmakers.
Nordstrom testified that the “ferocity and intensity” of the 13-hour, four-phase attack, on the 11th anniversary of 9/11, was nothing that they had seen in Libya, or that he had seen in his time in the Diplomatic Security Service, with as many as 60 attackers in the consulate.
“I am stunned that the State Department was relying on [locals] with extremist ties to protect American diplomats,” U.S. Rep. Blake Farenthold, R-Texas, told Fox News. “That doesn’t make any sense. How does that happen?”
Fox News was able to verify through a former Libyan guard the identities of several February 17 employees hired despite terrorist ties, who he said participated in the attack. While their identities have been provided to federal authorizes, none have been prosecuted.
Robby and John Strikes me as a big problem that the NYT is having selected emails leaked to them and I I think we should do a call to discuss the proper way to handle. On Tue, Mar 17, 2015 at 3:39 PM, Philippe Reines <[email protected]<mailto:[email protected]>> wrote: There’s a lot to respond to here, but first and foremost the premise is wrong. There is nothing wrong with anyone having personal email addresses or her emailing someone’s private account or vice versa. Maybe she was wishing Jake a happy birthday. Or I was sending her a note about her mom. Or she asking Monica about Oscar disappearing. We’re allowed to have personal lives. Second, it was her practice, as well as ours, to conduct work on the .gov system. In those cases we didn’t, which could have been for any reason, including State.gov<http://State.gov> being down. In those cases the onus is on us to make sure that anything that should have ended up in the right place did. Now, depending on what they are looking at, you can’t easily determine if that happened. They are looking at HER email, not ours. They don’t know what next step we took. The most important thing to ascertain from State is whether they are looking at specific email from the “300” – because in those cases Heather and I went one by one to determine if a) it needed to end up on .gov, and b) it did indeed end up there. Since there are less than a dozen instances of this in the 300 it was easy. One is me sending her a clip, no commentary. Another is her emailing me & Huma about something that I subsequently followed up on my .gov account. We did that for each and could share that if need be. If they’ve somehow seen some of the other 55k, we’d need to see each to determine what they were. Lastly, we should warn Monica. Huma, unless you want to Nick or I can.
From: Nick Merrill Sent: Tuesday, March 17, 2015 3:13 PM
To: Jennifer Palmieri; Cheryl Mills; Philippe Reines; Heather Samuelson; Huma Abedin; Jacob Sullivan
Subject: NYT | Email Content Here is the story that I mentioned hearing from State about over the weekend. Specific questions are below. Jen when we talked over the weekend you noted that it was fairly irresponsible for them to cherry pick leaked emails and write it up as representative. And some of the questions below are a little ridiculous to say the least. I’ll call State now and see what they know and report back. I also asked what their deadline was. Nick
Date: Tuesday, March 17, 2015 at 2:53 PM To: NSM <[email protected]<mailto:[email protected]>> Subject: emails Nick, We’re preparing a story on how Mrs. Clinton’s top advisers at the State Department used their private email accounts for some of their email correspondences with her. We’ve learned that Huma Abedin, Cheryl Mills, Philippe Reines, Jake Sullivan and Monica Hanley, used personal email accounts to correspond with her on her personal account. She also corresponded with Sidney Blumenthal about inside information he had about Libya. We have the following questions for our article: Why did the advisers use private email accounts – instead of government ones – to correspond with Mrs. Clinton? Was this the normal practice? Why did Mrs. Clinton suggest that her emails were being captured in the State Department system when she was corresponding at times with her aides on their personal accounts? Were Mrs. Clinton’s advisers given legal advice about whether it was appropriate for them to correspond with her using their personal accounts? Why did Mrs. Clinton rely on the advice of Sidney Blumenthal? — Marissa E. Astor [email protected]<http://[email protected]> (301) 613–3675
**** Then we have Dallas, Texas:
Observer: In Washington, D.C., many things start with words printed on congressional letterhead. Earlier this year, 64 GOP members of Congress asked the IRS to investigate why the foundation can keep its nonprofit status. The letter includes “media reports” claiming pay-to-play relationships between former President Bill Clinton, who received large speaking fees, and decisions made by Hillary Clinton to approve choices that benefited foundation donors. The sources of these reports range from The New York Times to hit-piece investigative books.
In July, the IRS sent letters back to the Congress informing members the review had begun. The letter also noted that the Tax Exempt and Government Entities Division (TE/GE) office in Dallas would be conducting the review.
IRS spokespeople in Dallas and Washington won’t say why the review is being conducted in Dallas. Spokespeople claim even this information would violate rules — Code 6103, staff make sure to cite — that stop them from discussing ongoing examinations. IRS officials declined to provide details about the Dallas office, including its size, or comment on the TE/GE work in general.
Stoltz says the complexity of the Clinton Foundation’s work means such an examination would take months. The IRS said it began the review in July.
Staff with Texas Congressman Pete Sessions, who signed the letter, tell the Observer that they have not heard back from the IRS with any updates or an estimate of when their examination will be complete. No one expects a decision before Nov. 8.
The case against the Clinton Foundation is multifaceted. One common attack is that the foundation has overextended its original mandate. “The Foundation’s original application to the IRS in 1997 advised that it was formed to construct a library, maintain a historical site with records, and engage in study and research,” said Tennessee Republican Rep. Marsha Blackburn in an email to the Observer. “It did not indicate an intent to conduct activities outside of the United States, which was on one of the codes included in the IRS ‘Application for Recognition for Exemption’ in effect at the time. This would appear to prohibit much of the overseas work the Foundation has performed.” Read more here from the Dallas Observer.
NEW DIRECTION: John Brennan at a Senate Intelligence Committee hearing on his nomination to be the director of the CIA in 2013. Brennan has restructured the agency to REUTERS/Jason Reed
The CIA director has put the U.S. spy agency through a historic restructuring to cope with the era of digital warfare. Many in the agency are unhappy with the shake-up. In a series of interviews, Brennan outlines his strategy. “I think CIA really needs to up its game.”
ReutersInvestigates:WASHINGTON – When America goes to the polls on Nov. 8, according to current and former U.S. intelligence officials, it will likely experience the culmination of a new form of information war.
A months-long campaign backed by the Russian government to undermine the credibility of the U.S. presidential election – through hacking, cyber attacks and disinformation campaigns – is likely to peak on voting day, the officials said.
Russian officials deny any such effort. But current and former U.S. officials warn that hackers could post fictional evidence online of widespread voter fraud, slow the Internet to a crawl through cyber attacks and release a final tranche of hacked emails, including some that could be doctored.
“Don’t underestimate what they can do or will do. We have to be prepared,” said Leon Panetta, who served as CIA director and defense secretary in President Barack Obama’s first term. “In some ways, they are succeeding at disrupting our process. Until they pay a price, they will keep doing it.”
John Brennan, the current CIA director, declined to comment on the Russian efforts. But he said Russian intelligence operatives have a long history of marrying traditional espionage with advances in technology. More broadly, Brennan said, the digital age creates enormous opportunities for espionage. But it also creates vulnerabilities.
Citing an array of new cyber, conventional and terrorist threats, Brennan announced the most sweeping reforms of the CIA in its 69-year history 18 months ago.
Weakening the role of the Directorate of Operations, the agency’s long-dominant arm responsible for gathering intelligence and conducting covert operations, Brennan created 10 new “mission centers” where CIA spies, analysts and hackers work together in teams focused on specific regions and issues. He also created a new Directorate for Digital Innovation to maximize the agency’s use of technology, data analytics and online spying.
The information age “has totally transformed the way we are able to operate and need to operate,” Brennan told Reuters in a series of interviews. “Most human interactions take place in that digital domain. So the intelligence profession needs to flourish in that domain. It cannot avoid it.”
When a new American diplomat arrives for duty at the U.S. embassy in Moscow or Beijing, CIA official say, Russian and Chinese intelligence operatives run data analytics programs that check the “digital dust” associated with his or her name. If the newcomer’s footprint in that dust – social media posts, cell phone calls, debit card payments – is too small, the “diplomat” is flagged as an undercover CIA officer.
The Russian-backed campaign to discredit the U.S. election is not isolated. Hackers believed to have links to Chinese intelligence began stealing the personal information of 22 million federal employees and job applicants in 2014, the worst known data breach in U.S. government history. Islamic State’s online propagandists continue to inspire lone wolf attacks in the United States even as the group loses territory.
A senior official from the Directorate of Operations, who backs the shake-up, said the agency is experiencing its greatest test in decades.
“The amount of threats and challenges that are facing this organization and this nation are greater than at any time in the last 30 years,” said the official, who declined to be named. “The days of a black passport, a fistful of dollars and a Browning pistol are over.”
INNER CIRCLE: President Barack Obama with Brennan and Chief of Staff Denis McDonough at the White House in 2013. The president and the CIA chief are criticized by some former agents for being overly cautious in Syria, Russia and elsewhere. Courtesy Pete Souza/The White House/Handout via REUTERS
“Most human interactions take place in that digital domain. So the intelligence profession needs to flourish in that domain. It cannot avoid it.”
James Clapper, the Director of National Intelligence, praised Brennan and his efforts to retool the CIA for a new era in an interview. So did Lisa Monaco, Brennan’s successor as the President Obama’s Homeland Security and Counterterrorism adviser.
But some current and former officials question Brennan’s strategy, arguing his reforms are too digitally focused and will create a more cautious, top-heavy spy agency. At a time when the agency needs to refocus its efforts on human espionage, they say, the concentration of power in the new mission centers weakens the ability of the Directorate of Operations to produce a new generation of elite American spies.
The reforms have hurt morale, created confusion and consumed time and attention at a time of myriad threats, according to interviews with ten former officials.
Glenn Carle, a former CIA covert officer, supports Brennan and his reforms but said they have sparked a mixed reaction among directorate of operations officials who believe human intelligence is getting short shrift.
“The value the CIA can fundamentally add is to steal secrets, and the ultimate secret is intention,” the often inscrutable aims of foreign leaders, Carle said. “Obtaining that is a human endeavor.”
At the same time, Brennan has stirred a different sort of criticism – that he has defied Congressional oversight. Liberal Democrats and libertarian Republicans in Congress say the Brennan-Obama tenure has been tarnished by a lack of transparency with congressional oversight committees and the public regarding surveillance, drone strikes and the agency’s use of torture against terrorism suspects during the administration of George W. Bush.
“While I think John’s overall legacy will be as a reformer, that legacy will suffer from his refusal to come to grips with the CIA’s troubled torture program,” said Senator Dianne Feinstein, D-Calif, vice chair of the Senate’s intelligence committee. “I think the new president’s CIA director must prioritize a high level of trust between the CIA and Congress to insure proper oversight is conducted.”
It’s unclear how closely the country’s next president will hew to Brennan’s strategy.
The front-runner, Democrat Hillary Clinton, has an incentive to beef up American cyber-espionage: U.S. intelligence officials blame the continuing leak of emails from her campaign on Russian-backed hacking. Clinton also expressed support for covert action in a transcript of a 2013 speech she gave to Goldman Sachs that was recently released by Wikileaks.
Republican Donald Trump, meanwhile, pledged to make cybersecurity a top priority in his administration in an October 3 speech. “For non-state terror actors, the United States must develop the ability – no matter how difficult – to track down and incapacitate those responsible and do it rapidly,” Trump said. “We should turn cyber warfare into one of our greatest weapons against the terrorists.”
In interviews at agency headquarters in Langley, Virginia, Brennan declined to comment on either candidate or discuss operational details of the CIA. But he and eight other senior CIA officials gave the most detailed description yet of their rationale for the most radical revamp of the agency since its founding in 1947.
“I look out at the next 10, 20, 30 years, and I look at technology, I look at complexity, I look at the global environment,” Brennan said. “I think CIA really needs to up its game.”
JUST-WAR THEORIST
Brennan, a 61-year-old native of north New Jersey, looks like a linebacker but talks like a technocrat. He speaks excitedly about how the CIA and other government bureaucracies can be configured in “a way to ensure optimal outcomes.”
The son of devout-Catholic Irish immigrants, Brennan speaks reverently of CIA officers as public servants who risk their lives without public accolades. He joined the agency in 1980, at the age of 24, after receiving a Master’s Degree in government with a concentration in Middle Eastern studies from the University of Texas.
“The value the CIA can fundamentally add is to steal secrets, and the ultimate secret is intention. Obtaining that is a human endeavor.”
Educated in various Catholic schools, including Fordham University, Brennan says he is an adherent of just war theory – a centuries-old Christian theological argument that war is justified when it is waged in self defense, as a last resort and minimizes civilian casualties. Those beliefs, he says, have guided him in one of the most controversial aspects of his tenure in the Obama administration.
As Obama’s White House counter-terrorism adviser and CIA director, Brennan played a central role in carrying out 473 U.S. airstrikes outside conventional war zones between 2009 and 2015, primarily by drone. U.S. officials estimate the attacks have killed 2,372 to 2,581 people, including 64 to 116 civilians. Human rights groups say the totals are vastly higher. Last year, for instance, a U.S. drone strike in Pakistan accidentally killed American aid worker Warren Weinstein and Italian aid worker Giovanni Lo Porto, who were both being held captive by al Qaeda.
Brennan declined to comment on specific strikes, but said, “I still can look myself in the mirror everyday and believe that I have tried to do what is morally right, what is necessary, and what is important to keep this country safe.” He also acknowledged mistakes.
“You question yourself. You beat yourself up. You try to learn from it,” Brennan said, in a rare display of emotions. “But you also recognize that if you’re not prepared to make the tough decisions in the jobs that have been entrusted to you, you shouldn’t be in those jobs.”
Today, Brennan says the United States faces the most complex array of threats he has seen since joining the agency 36 years ago. As a CIA analyst, operative and executive, he has lived through the Cold War espionage duels of the 1980s; the disintegration of nation-states after the 1989 fall of the Berlin Wall; the rise of non-state terrorist groups since 2001; and the current digital disruption. Now, he says, all four dynamics are converging at once.
BOLD AND INNOVATIVE RIVALS
CIA officials say their greatest state competitors are the Russian and Chinese intelligence services. While smaller countries or terrorist groups may want to strike at the United States, Russia and China are the only two adversaries with the combination of skills, resources and motivation needed to challenge Washington.
In recent years, Moscow’s Federal Security Service, or FSB, has become adept at waging “gray zone” conflicts in Ukraine, Crimea and Syria, the officials said. In all three countries, Russian intelligence operatives have deftly shrouded protagonists, objectives and war crimes in ambiguity.
GREAT RIVALS: U.S. President Barack Obama with his Chinese and Russian counterparts, Xi Jinping and Vladimir Putin, in Beijing in 2014. Washington has faced barrages of digital threats from Beijing and Moscow; CIA insiders say the two nations remain the biggest challenge for the United States. REUTERS/Pablo Martinez Monsivais
“You beat yourself up…. But you also recognize that if you’re not prepared to make the tough decisions in the jobs that have been entrusted to you, you shouldn’t be in those jobs.”
One target is America’s increasingly politically polarized democracy. As Russian-backed hacking unfolded this summer, the Obama White House’s response fueled frustration among law enforcement and intelligence officials, according to current and former officials. The administration, they said, seemed to have no clear policy for how to respond to a new form of information warfare with no rules, norms or, it seemed, limits.
White House officials said the administration is still considering various methods of responding, but the responses won’t necessarily be made public.
China presents another challenge. Chinese businessmen and students continue trying to scoop up American state and economic secrets. In one bright spot, Beijing appears to be abiding by a 2015 pact signed by Obama and Chinese leader Xi Jinping that the two governments would not conduct economic espionage against one another. Chinese hacking appears to have slowed from the voracious rate of the past, which included hacking into the computers of the 2008 presidential campaigns of John McCain and Barack Obama but not releasing what was found.
“The question is whether or not it is due to greater care in terms of covering one’s tracks,” Brennan said of the apparent change. “Or whether or not they realize that they’re brand is being tarnished by this very rapacious appetite for vacuuming up things.”
Regional powers are also increasing their digital espionage efforts.
In 2014, the Obama administration blamed North Korea for the hacking of Sony Pictures’ computer system. This spring, U.S. prosecutors indicted seven Iranian hackers for allegedly trying to shut down a New York dam and conducting a cyber attack on dozens of U.S. banks. They also indicted three Syrian members of the “Syrian Electronic Army,” a pro-Syrian government group, who hacked into the websites of U.S. government agencies, corporations and news organizations.
In a 2015 case that U.S. officials said marks a worrying new trend, federal prosecutors indicted a 20-year-old hacker from Kosovo. With the help of a criminal hacker, Ardit Ferizi stole the home addresses of 1,300 members of the U.S. military, providing the information to Islamic State and posting it online, and calling for attacks on the individuals. Ferizi was arrested in Malaysia, where he was studying computer science. In September, he pleaded guilty in a U.S. federal court and was sentenced to 20 years in prison.
“This blend of the criminal actor, the nation-state actor and the terrorist actor, that’s going to be the trend over the next five years,” said John Carlin, who recently stepped down as head of the Justice Department division that monitors foreign espionage in the United States.
But some active clandestine officers argue that the intelligence community has grown too reliant on technology, a trend they trace back four decades to the directorship of Stansfield Turner. Satellite photography, remote sensors and communications intercepts have become more sophisticated, but so have encryption techniques and anti-satellite weapons.
More important, they argue, is that technology is no substitute for “penetrations” – planting or recruiting human spies in foreign halls of power. The CIA missed India’s 1998 nuclear tests and misjudged Saddam Hussein’s arsenal in 2003 because it lacked spies in the right places.
Today, these current and former CIA officials contend, American policymakers have little insight into the thinking of Vladimir Putin’s inner circle. Presidents, kings and dictators often don’t share their true intentions electronically, putting this valuable information largely beyond the scope of digital spying. The best sources are still people, and these officials believe the agency is not mounting the kind of bold human spying operations it did in the past.
Brennan and other CIA officials flatly denied downplaying human intelligence. They said aggressive, high-risk human spying is under way but they cannot go into operational detail.
One of Brennan’s predecessors, Michael Hayden, former CIA chief under President George W. Bush, says the agency strayed from its core mission during the Bush years. After the Al Qaeda attacks of Sept. 11, 2001, Hayden said, the CIA had to shift to become a paramilitary organization that devoted its most talented officers to tracking and killing terrorists. It now needs to reverse that trend by focusing on espionage against rival nations, he said.
“The constant combat of the last 15 years has pushed the expertise of the case officer in the direction of the battlefield and in the direction of collecting intelligence to create physical effects,” said Hayden, using an intelligence euphemism for killing. “At the expense of what the old guys called long-range, country-on-country intelligence gathering.”
‘OPTIMIZING CAPABILITIES’
Brennan and the eight other senior CIA officials made the case that their modernization effort will address the needs and threats described by Hayden and others. Technological advances, they said, have leveled the intelligence playing field. The web’s low cost of entry, creativity and speed benefits governments, hackers and terrorists alike.
A veteran covert operative who runs a new CIA mission center compared Brennan’s reforms to the Goldwater-Nichols Act. The landmark 1986 legislation reorganized the U.S. military into a half dozen regional commands where the Army, Navy, Air Force and Marines work together. It was a response to inter-service rivalries that bedeviled the American military in Vietnam.
The CIA equivalent involves having the agency’s five main directorates – Operations (covert spies), Analysis (trends and prediction), Science and Technology (listening devices and other gadgetry) and Digital Innovation (online sleuthing) and Support (logistics) – provide the personnel needed by each regional mission center.
CORE MISSION: Former CIA Director Michael Hayden says the agency went deeply into anti-terrorist operations during the Bush years and needs to return to its traditional mission of spying. REUTERS/Brendan McDermid
Andrew Hallman, director of the new Directorate for Digital Innovation, said the CIA has embraced cloud computing as a way to better share intelligence. In a move that shocked insiders and outsiders, the CIA awarded an $600 million contract to Amazon in 2013 to build a secure cloud computing system where multiple CIA databases can be quickly accessed.
For decades, different directorates maintained their own separate databases as a security measure, said Hallman. Some of the applications the agency used were so old – up to 30 years – that the manufacturer was no longer in business.
Turning to Amazon was designed to immediately put private-sector computing advances at the fingertips of CIA operatives. It was also an admission that it was easier for the agency to buy innovation from the private sector than try to create it internally.
Several former CIA officials criticized the new team-focused system, saying it dilutes the cultures that made each agency directorate strong. The best analysts are deeply skeptical and need to be separated from covert operatives to avoid group-think, they said. And the best covert operatives are famously arrogant, a trait needed to carry out the extraordinarily difficult task of convincing foreigners to spy for America.
Richard Blee, a former CIA clandestine officer, said the agency needed reform but highlighted a separate problem created by technological change. Instant secure communications between CIA headquarters and officers in the field has centralized decision-making in Washington, Blee said. And regardless of administration, senior officials in Washington are less willing to take a risk than field officers – virtually all of whom complain about headquarters’ excessive caution.
“The mentality across the board in Washington is to take the lowest common denominator, the easiest option, the risk-free option,” Blee said. “The Chinese are taking tough decisions, the Russians are taking tough decisions and we are taking risk-averse decisions. And we are going to pay a price for that down the road.”
Brennan says his reforms will empower CIA officers: The integrated teams in each new mission center will improve speed, adaptability and effectiveness.
“To me, that’s going to be the secret of success in the future, not just for CIA but for other organizational structures,” Brennan said. “Taking full advantage of the tools, capabilities, people and expertise that you have.”
The old ways of spycraft, Brennan argues, are no longer tenable. Asked what worries him most, he gave a technocratic answer: Twentieth century American government management practices are being rendered obsolete in the digital age.
“U.S. decision making processes need to be streamlined and accelerated,” he said. “Because the problems are not going to wait for traditional discussions.”
THE LONG VIEW: CIA headquarters in Langley, Virginia. “I look out at the next 10, 20, 30 years, and I look at technology, I look at complexity, I look at the global environment,” Brennan says. “I think CIA really needs to up its game.” REUTERS/Jason Reed
SEPARATION OF POWERS: Brennan at his Senate Intelligence Committee confirmation hearing with Senator Dianne Feinstein (D-CA). The two later crossed swords over the Senate’s probe into the Bush era CIA’s use of torture. REUTERS/Gary Cameron
Supporters hail CIA director John Brennan as a devoted public servant with a strong moral core and a tenacious work ethic. He has increased the recruitment of minority intelligence officers and promoted women to senior posts. He wears a lanyard around his neck every day that celebrates LGBT diversity at the CIA.
But some former covert operatives say Brennan is too cautious and political. Liberals accuse Brennan of protecting the CIA instead of forcing it to become more accountable to Congress. In particular, they blame Brennan for convincing President Barack Obama to oppose the release of the full 6,000-page U.S. Senate report detailing torture by the CIA during the presidency of George W. Bush. In private hearings, they said, Brennan bristled at questions from senators regarding the report.
After CIA officials searched the computer of a Senate staffer investigating torture, an outraged Sen. Dianne Feinstein accused Brennan’s CIA of provoking a “constitutional crisis” by thwarting Congress’ ability to perform its mandated right to oversee the executive-branch agency. Two other Democratic Senators called for Brennan’s resignation. Obama and White House Chief of Staff Denis McDonough aggressively defended Brennan, who eventually apologized to Feinstein.
“The exhaustive 6,000-page Senate Intelligence Committee report fully documented the program,” Feinstein told Reuters, “but the CIA under John’s leadership has had difficulty confronting this dark chapter and learning from its mistakes.”
Leon Panetta, who served as President Obama’s first CIA director, said he understood Brennan’s desire to protect CIA officers who carried out interrogation methods deemed legal at the time by the Bush administration. But he said it was important to also be open with Congress and the public.
“I think you can do both,” Panetta said. “You can protect people there [at the CIA]. And be honest with the American people.”
Brennan and his aides vehemently defend his reforms, his transparency and his response to the Senate torture investigation, which they say exaggerated the scale of CIA abuse. They say Brennan, who opposes waterboarding, successfully struck a middle course – ending torture while protecting the identities of CIA operatives.
“He did more to stand up for human rights than any other official in the administration,” said Harold Hongju Koh, a Yale Law School professor who served as Hillary Clinton’s top legal adviser in the State Department.
In the interview, Brennan said the actions of CIA officials who exceeded the Bush-era interrogation guidelines were “reprehensible.” But he said the Senate report exaggerated the scale of abuse. Brennan contended that the vast majority of CIA officers followed the Bush-era guidelines and were being unfairly “maligned by individuals who have political agendas.”
“When we do things that are within our authorized mandate, things that we are directed to do by our presidents, things that are deemed lawful by our Department of Justice,” Brennan said, “for us to be dragged through the coals on that, I find that reprehensible as well.”
Friends say Brennan say he has privately expressed frustration with the White House’s cautious response to the war in Syria and growing Russian assertiveness. But, they add, he is in many ways similar to Obama himself, questioning America’s ability to unilaterally change the world.
Brennan declined to comment on his own policy views. But he said, “I really feel as though my moral compass is pretty similar” to Obama’s. And he echoed a central tenet of Obama’s worldview.
The U.S. should act as the “world’s organizer of support to countries that are in desperate need,” Brennan said, but “recognize that our influence and power over the course of events is limited.”
—————
Digitizing the CIA
By David Rohde
Additional reporting by John Walcott and Jonathan Landay
LWJ: As activity in the Red Sea has heated up this month, debate rages on in Washington about Tehran’s role in attacks against US forces there. The Pentagon confirmed this month that the Iranian-backed Houthi rebels in Yemen were responsible for launching cruise missiles at the USS Mason on Oct. 9 and 12, while it still investigates a potential third attack on Oct. 15. The confirmed attacks, which prompted US strikes against Houthi installations on the coast, were reportedly in retaliation for US backing of the Saudi-led coalition aimed at expelling them from the capital.
It is not definitively known whether Iran supplied the missiles, but the motives are clear as to why they would have supported the attack.
Iran’s Islamic Revolutionary Guard Corps (IRGC) and Hezbollah have provided the Houthis with money, training, advising, and sophisticated weaponry for more than a decade, according to the State Department’s Country Reports on Terrorism 2012 (though that language was dropped in 2015). The Guard is believed to have transferred rocket and missile capabilities, as well. The US and its allies have intercepted five shipments from Iran to the Houthis since April 2015 that have included coastal defense systems, according to a senior U.S. official who spoke with NBC News. Tehran has stepped up its assistance since May 2016, sending anti-ship missiles, explosives, and personnel through Oman, according to Reuters, who spoke with Western and Iranian intelligence officials.
Some senior US defense officials say the missile system used against US forces may have been supplied by Iran, identified as the Chinese-made C-802, which was supplied to Iran and not to Yemen. Other senior military officials, however, say that the missiles could have been models that the Houthi forces already possessed. Yemeni military units under the command of former President Ali Abdullah Saleh that defected to the Houthis had access to the C-801, which was supplied by China to Yemen in 1995, and unsuccessfully launched several at Saudi-led coalition between Oct. and Dec. 2015, according to Tom Cooper in War is Boring.
Analysts who spoke with The Long War Journal believe the Houthi-Saleh forces may have used C-801 or C-802 against the US Navy, and that the C-801 was likely fired at the United Arab Emirates-operated vessel on Oct. 1, based on video footage posted by the Houthis. Iranian and Hezbollah media publicized a drill held by the Houthi-Saleh Yemeni coast on Oct. 4 in reaction to the US Navy dispatch of the Mason, Nitze, and Ponce, warning “the enemies” and “invading Saudi coalition” that any ship approaching Yemen’s waters “without permission” would be targeted.
Although there is no conclusive evidence yet on the weapons system used against US forces, Tehran’s political posturing following the Oct. 8 bombing in Sanaa foreshadowed its support for the missile launches against U.S. forces. On Oct. 9, the IRGC released a statement holding “America, the Zionist regime, and the House of Saud” responsible for the bombing in Sanaa. Top IRGC officials also held the US directly responsible for the attack and for selling weapons to Saudi Arabia. Ali Shamkhani, the secretary of Iran’s Supreme National Security Council, slammed the bombing, and claimed that the attack against the UAE ship was a “legitimate defense” of Yemen’s territory.
Then, on Oct. 13, the IRGC-affiliated agency Tasnim announced that a conventional Iranian Navy group had earlier departed for the Gulf of Aden and the Bab el-Mandeb on Oct. 5 in response to the US dispatch of Navy warships. Iran’s 44th flotilla, comprised of the Alvand frigate and Bushehr support vessel, reportedly intends to “protect shipping lines under attack by pirates” in that area. The deployment, however, was also intended to reinforce Tehran’s commitment to the Houthis, as well as signal Iran’s reach into the Gulf of Aden. Read more here from LWJ.
America paid Iran $1.7 billion in cash—funds that by law were not to be released unless and until Iran paid what it owed to American victims of its terrorism.
Mosaic: On the morning of January 17, 2016, President Obama declared that this was “a good day, because, once again, we’re seeing what’s possible with strong American diplomacy.”
The Iran nuclear deal had been implemented the day before—an example, the President said, of his “smart, patient, and disciplined approach to the world.” Now Iran was releasing five American hostages, the result of the administration’s “tireless” efforts. “On the sidelines of the nuclear negotiations,” the president explained, “our diplomats at the highest level, including Secretary [of State John] Kerry, used every meeting to push Iran to release our Americans.” In return for that gesture, the president continued, he was making a “reciprocal humanitarian gesture”: namely, clemency for seven Iranians imprisoned or awaiting trial for criminal violations of American sanctions. Later it was announced that the U.S. had also dropped outstanding warrants against another fourteen Iranians.
The president then added something else: with the nuclear deal implemented, and the hostages released, “the time was right” for “resolving a financial dispute that dated back more than three decades.” That dispute involved an Iranian claim regarding money advanced by the government of the Shah for military equipment that Washington did not deliver after the 1979 revolution. Now, the president asserted, we were returning Iran’s “own funds,” including “appropriate interest,” but “much less than the amount Iran sought.” The savings, he said, came potentially to “billions”—a figure quantified by his press secretary as “up to $6 billion or $7 billion” in a “very good deal for taxpayers.” In other words, now that the larger issues had been resolved, the U.S. was simply issuing a long-delayed refund to Iran, and in the process saving Americans a significant amount of money.
The president’s statement, however, omitted a great deal of relevant information. The president was returning $400 million in Iran’s “Foreign Military Sales” (FMS) account with the Pentagon, plus $1.3 billion in interest, but he failed to mention that in 1981, when Iran filed its claim before the Claims Tribunal at The Hague, the U.S. had responded with a counterclaim for $817 million for Iran’s violations of its obligations under the FMS program. In 2016, with both the claim and the counterclaim still pending, it was possible that Iran owed billions of dollars to the U.S., not the reverse.
Nor did the president mention the Victims of Trafficking and Violence Protection Act, signed by President Bill Clinton in 2000 and stipulating that Iran’s FMS account could not be refunded until court judgments held by the U.S. government against Iran for damages from terrorist acts against American citizens were resolved to America’s satisfaction. Those judgments, including interest accumulated between 2001 and 2016, totaled about $1 billion. The president did not explain how, under the 2000 law, with those judgments still outstanding, he could pay Iran anything at all.
Nor did the president mention that his “refund” to Iran was being paid in untraceable European cash, a fact discovered by reporters seven months later. He would then contend that, in light of the sanctions on banking transactions with Iran, “we had to give them cash.” But the sanction regulations expressly authorize bank payments to settle Iran’s claims at The Hague, as Michael Mukasey, the former U.S. attorney general, later testified to Congress, adding that there was “no legitimate reason why [Iran] should want cash other than to pursue terrorism.” Indeed, the Hizballah International Financing Prevention Act, passed by Congress in December 2015, had resulted in Tehran’s needing significantly more cash to continue funding its terrorist organization in Lebanon, Syria, and elsewhere.
In a February 3 letter, Ed Royce, the chairman of the House Foreign Affairs Committee, asked the administration to provide the legal basis for paying Iran’s claim, as well as a specific computation of the interest paid. He repeated the request in a June 1 letter, adding that according to information provided to him by the Congressional Research Service, the Hague tribunal paid 10-percent simple interest on such claims. Computed at that rate, and before considering the U.S. counterclaim under the FMS and the terror judgments still outstanding, Iran’s total claim on the FMS account was virtually identical to the $1.7 billion the administration paid, with no “billions” in savings.
To date, the administration has released no legal analysis to support its payment, no evaluation of the U.S. counterclaim, no text of the settlement agreement, no computation of the interest, no credible explanation for issuing the payment in cash, and no document showing the approval of the attorney general as required for issuing such a payment. For months, the administration hid important facts—including how the settlement was paid—even in response to direct congressional inquiries.
The $1.7-billion payment thus appears to have been a ransom, just as an Iranian general claimed it was at the time—a huge cash payment to accompany the lopsided exchange of 21 Iranians, duly charged or convicted under American law, for five American hostages who had been seized by Iran and held on fabricated charges in secret proceedings.
As for the outstanding claims against Tehran for the terror judgments, the administration has asserted that these were satisfied “by securing a favorable resolution on the interest owed to Iran.” What favorable resolution? In effect, the settlement cost the United States $2.7 billion—the $1.7 billion in cash plus about $1 billion in forgiven court judgments—to pay a claim that was not yet due, may not in fact have been owed, and may have been more than offset by the U.S. counterclaim that exceeded Iran’s own claim.
And therein lies the most troubling aspect of President Obama’s settlement, which is neither its amount nor its appearance as ransom but the fact that Iran succeeded in having U.S. taxpayers bear the cost of the damages owed by Iran for committing despicable acts of terrorism against them. To understand the magnitude of what the President did on January 17, some background is necessary.
In April 1995, Alisa Flatow, a twenty-year-old Brandeis University honors student spending her junior year abroad in Israel, boarded a bus in Jerusalem bound for a popular resort area in Gaza. It was the height of the “peace process,” celebrated the year before with Nobel Peace prizes. As the bus entered Gaza, a van filled with explosives slammed into it. Eight people, including Alisa, were killed, and more than 40 others were injured. The attack was carried out by a faction of Islamic Jihad controlled, financed, and directed by the highest levels of Iran’s government.
Alisa’s father, Stephen M. Flatow, filed suit in U.S. federal court against Iran, pursuant to legislation Congress had enacted permitting such suits against state sponsors of terrorist attacks on American citizens. A federal district court issued a 35-page opinion, Flatow v. Islamic Republic of Iran (1998), awarding a total of $20 million in compensatory damages as well as punitive damages, with both types of damages specifically authorized by the U.S. Congress. The court noted that expert testimony had “detailed an annual expenditure [by Iran] of approximately $75 million for terrorist activities” and that Iran “is so brazen in its sponsorship of terrorist activities that it carries a line item in its national budget for this purpose.” Accordingly, the court awarded punitive damages of $225 million—three times Iran’s publicly-disclosed annual terrorist budget. It was the minimum amount the expert had testified was necessary to have a significant deterrent effect, which was what Congress had intended to achieve in its authorizing legislation.
Over the next four years, a series of cases held Iran liable for similarly horrific terror operations. Cicippio v. Islamic Republic of Iran (1998) involved Joseph Cicippio (comptroller of the American University of Beirut), David Jacobsen (CEO of the medical center there), and Frank Reed (who operated two private schools in Beirut)—all abducted by Hizballah, an entity the court found was “sponsored, financed, and controlled by Iran.” Jacobsen had been chained and blindfolded for eighteen months; Reed had been held blindfolded or in darkness for more than three-and-a-half years; Cicippio had been held for over five years, chained in scorpion-infested cells and randomly beaten throughout his captivity. The court awarded them a total of $65 million in compensatory damages.
Anderson v. Islamic Republic of Iran (2000) involved Terry Anderson, chief Middle East correspondent for the Associated Press, who was kidnapped in Beirut by Hizballah and held shackled in filthy conditions for nearly seven years, fed only bread and water. The court again found Iran responsible, and awarded $41.2 million in compensatory damages and $300 million in punitive damages.
Eisenfeld v. Islamic Republic of Iran (2000) was brought by Leonard Eisenfeld for the death of his son Matthew, a twenty-five-year-old Yale graduate studying at the Jewish Theological Seminary in Israel, and by Arline Duker for the death of her twenty-year-old daughter, Sara, a Barnard College graduate enrolled in a program at the Hebrew University. They had been on an Israeli bus, en route to visit the archeological site at Petra, Jordan, when a passenger—acting under directions from a Hamas official funded and trained by Iran—detonated a bomb that destroyed the bus and killed them and others. The court awarded $22.5 million in compensatory damages and $300 million in punitive damages.
In still other cases, Iran was held legally responsible for the kidnapping, torture, and death of CIA station chief William Buckley in Beirut; the kidnapping of Father Lawrence Jenco, the director of Catholic Relief Services in Beirut, held for 564 days in conditions described by the court as “little better than [for] a caged animal”; the kidnapping of Thomas M. Sutherland, the dean of Agricultural and Food Sciences at the American University of Beirut, tortured for more than six years; the murder of Petty Officer Raymond Wagner in the 1983 car bombing of the American embassy in Beirut; the murder of Petty Officer Robert Stethem, beaten during the hijacking of TWA Flight 847, his body dumped on the tarmac, and the holding of nine other American hostages on that flight; and many other hostage-takings, with one court noting that Tehran “virtually directed the terms and conditions under which hostages would be held or released.”
In all, sixteen cases were decided against Iran by courts in the United States between 1998 and 2004, with awards of compensatory damages totaling some $400 million and punitive damages totaling $3.5 billion.
Of course, the problem faced by each victorious plaintiff was collecting the judgment. Stephen Flatow, after unsuccessfully seeking to have the damages paid out of various Iranian assets held in the United States, learned of the $400 million in the FMS fund. The Clinton administration had supported the legislation that allowed suits such as Flatow’s, but then strenuously opposed any effort to have the judgments satisfied from that fund. In its 1999 brief in federal court, the administration stated that the U.S. had a $817-million counterclaim against Iran, that the “current cash balance in Iran’s FMS program account [was] about $400 million,” and that “It is unknown how much, if any, of that amount will be owed to Iran by the United States until the claims before the [Hague] Tribunal are resolved” (emphasis added).
The court rejected Flatow’s contention that the FMS funds were the property of Iran, which could satisfy his judgment, on the grounds that “the United States does not share [his] characterization of these U.S. Treasury funds as ‘Iranian property.’” The court held instead that the FMS fund was U.S. property.
With Flatow’s subsequent appeal pending, Congress and the Clinton administration agreed on legislation directing the U.S. Treasury to pay the American holders of terror judgments against Iran for the amount of their compensatory damages plus 10 percent of their punitive damages, up to the amount in the FMS fund. The law subrogated the United States—meaning that the terror judgments became direct U.S. government claims against Iran to the extent the Treasury had paid them. Finally, the law included a provision to ensure that Iran would ultimately have to bear the cost of those payments: “no funds shall be paid to Iran . . . from the [FMS] fund until such subrogated claims have been dealt with to the satisfaction of the United States.”
Sixteen years later, with the $400 million still held by the U.S. government, and with no payments by Iran of a single cent of any of the sixteen court judgments against it, President Obama nevertheless gave the $400 million in the FMS account to Iran, plus interest. His statement that he was merely refunding Iran’s “own funds” directly contradicts the court’s determination in 1999. Indeed, since he made no mention of “resolving” the unpaid terror judgments in his January 17 statement, it is reasonable to conclude that the president simply ignored the 2000 statute as well.
January 17, 2016, was thus very far from “a good day . . . [for] strong American diplomacy.” It was a day of extraordinary diplomatic deception, practiced not against Iran—which knew exactly what the administration was doing—but against the American people, who were intentionally kept in the dark by the administration about critical aspects of the deal. President Obama paid Iran $1.7 billion that may not have been owed; paid it in cash—the currency of international terror; did not tell the American people he had relieved Iran from longstanding court judgments; did not add the cost of those judgments to the $1.7 billion payment that he announced; and did not faithfully execute the 2000 law—all the while congratulating himself on his accomplishment and claiming he had saved the U.S. billions.
The president’s actions with respect to the lawsuits won by American victims of Iranian terror, after years of litigation, stand in stark contrast to the resolution of the court cases concerning Libya’s terrorism, including the 1988 Pan Am 103 bombing over Lockerbie, Scotland. In 2008, Libya sought to re-establish relations with the United States, but Congress and the State Department blocked action until Libya satisfied the terror claims of American citizens against it. Libya agreed to pay and did pay the U.S. $1.5 billion to resolve those claims. Nothing of the sort accompanied the seemingly endless negotiations with Iran over the nuclear deal, as the administration made concession after concession to obtain it.
January 17, 2016 was in fact a shameful day in the history of American diplomacy. The only question is which aspect was most shameful: the craven abandonment of American claims against the Islamic Republic of Iran for past terrorism, the provision of a huge amount of cash enabling it to engage in future terrorism, the systematic mendacity about the process and the willful failure to inform the American people of everything that had been done, or the underlying policy of appeasing Iran that precipitated both the process and its cover-up.
What happened on January 17, 2016 was much worse than paying ransom.