More Lawsuits Filed Against Obama

Legislation has been introduced to fix the stonewalling of FOIA requests by the Obama administration. That text is found here.

Introduced in House (02/02/2015)

FOIA Oversight and Implementation Act of 2015 or the FOIA Act

This bill makes changes to the Freedom of Information Act (FOIA) to provide the public with greater access to information disclosable under such Act.

The bill requires agencies, in administering FOIA, to: (1) make information disclosable under such Act available to the public in an electronic, publicly accessible format; and (2) make available to the public records of general interest that inform the public of the operations and activities of the government or that have been requested three or more times.

The Office of Management and Budget is directed to ensure the operation of an online request portal that allows a member of the public to submit a FOIA request for records to any agency from a single website.

The bill establishes a presumption of openness by prohibiting an agency from withholding information otherwise disclosable under FOIA unless: (1) the agency reasonably foresees that disclosure would cause specific identifiable harm to an interest protected by an exemption to FOIA, or (2) disclosure is prohibited by law.

The duties of the Office of Government Information Services (OGIS) are expanded to require: (1) mediation services to resolve disputes between agencies and persons making FOIA requests; (2) annual reports on the activities of OGIS that are available in an electronic, publicly accessible format; and (3) annual public meetings on the review of agencies’ FOIA policies, procedures, and compliance.

The bill requires annual agency FOIA reports and the annual reports on FOIA of the Attorney General and the Director of the Office of Information Policy (OIP) to be made available in an electronic, publicly accessible format.

Agencies are prohibited from assessing search or duplication fees if they have failed to comply with a statutory deadline for a FOIA response and did not submit a written notice to the requestor justifying the fees requested.

The role of the Chief FOIA Officer at each agency is expanded to require officers to serve as the primary agency liaison between OGIS and OIP and to complete annual compliance determinations that review agency regulations, fee assessments, use of exemptions, dispute resolution services, and the timely processing of FOIA requests.

The bill establishes a Chief FOIA Officers Council for developing recommendations for increasing compliance and efficiency, disseminating information about agency experiences, identifying initiatives to increase transparency and compliance, and promoting performance measures to ensure agency compliance with FOIA requirements.

The Inspector General of each agency is required to: (1) periodically review compliance with FOIA requirements, including the timely processing of requests, assessment of fees and fee waivers, and the use of FOIA exemptions, and (2) make recommendations to the agency head, including recommendations for disciplinary action.

Record Number of FOIA Lawsuits Filed Against Obama

DailyCaller: Freedom of Information Act (FOIA) complaints filed in federal court have skyrocketed under President Barack Obama despite his promise to have “the most transparent administration ever,” according to a comprehensive analysis by a Syracuse University research unit.

A total of 498 FOIA lawsuits were filed in 2015, the highest number since 2001, the Transactional Records Access Clearinghouse study made public Wednesday. The 421 suits filed in 2014 previously held the highest annual total.

The most recent two-year total represents a 54 percent increase over the total of 595 FOIA lawsuits filed in 2009 and 2010. See the accompanying chart below.

 

FOIA Lawsuits by TRAC

The FOIA requires federal departments and agencies to make available requests of all official documents, not covered by a handful of exemptions such as for law enforcement, privacy and protection of commercial secrets. When requested documents aren’t made available as required by law, requestors often go to federal court seeking a judicial order to compel production.

“The 919 FOIA cases filed in the period fiscal year 2014 – 2015 also far outnumber those filed during the last two years of the previous Bush administration. There were only 562 such matters filed during fiscal year 2007 – 2008, yielding a 64 percent increase for the most recent period,” TRAC said announcing the results of its analysis.

The Syracuse University research unit was founded by former New York Times investigative reporter David Burnham in 1989.

A total of 2,609 FOIA lawsuits were filed during Obama’s administration from 2009 to 2015, compared to 2,091 filed during the Bush administration from 2002 through 2008. The highest annual total of the Bush years was 387 in 2005.

“This is the most transparent administration in history,” Obama said in 2013 during a Google Plus Fireside Chat. “I can document that this is the case. Every visitor that comes into the White House is now part of the public record. Every law we pass and every rule we implement we put online for everyone to see.”

Obama did begin posting information to the Internet about White House visitors but only after a lawsuit was filed by the nonprofit government watchdog Judicial Watch.

Critics have frequently reminded Obama of his transparency claim, a fact TRAC noted, “the administration’s record has been a contentious matter ever since President Obama’s first days in office, when both he and Attorney General Eric Holder made sweeping claims about the ambitious FOIA policies they would follow in the years ahead.”

“In a short memorandum to the heads of all Executive Branch departments and agencies, the president said the Freedom of Information Act ‘should be administered with a clear presumption: in the face of doubt, openness prevails.’”

TRAC also cautioned, however, that an increase in the number of FOIA lawsuits being filed isn’t necessarily an indicator of less government transparency during a particular presidential administration.

“Because of possible changes in public attitudes about the public’s right to obtain government records, its willingness to challenge government’s failure to provide transparency, as well as changes in the Freedom of Information law and case law, the increase in federal FOIA court filings does not necessarily mean that the current administration is more or less secretive than those of the past,” TRAC said.

“But the rising counts well may indicate that this administration has not lived up to the ambitious open government promises made when President Obama first came to the White House,” TRAC said.

 

 

Your Threat Score, Yup, Yours

The new way police are surveilling you: Calculating your threat ‘score’

While officers raced to a recent 911 call about a man threatening his ex-girlfriend, a police operator in headquarters consulted software that scored the suspect’s potential for violence the way a bank might run a credit report.

The program scoured billions of data points, including arrest reports, property records, commercial databases, deep Web searches and the man’s social- media postings. It calculated his threat level as the highest of three color-coded scores: a bright red warning.

The man had a firearm conviction and gang associations, so out of caution police called a negotiator. The suspect surrendered, and police said the intelligence helped them make the right call — it turned out he had a gun.

As a national debate has played out over mass surveillance by the National Security Agency, a new generation of technology such as the Beware software being used in Fresno has given local law enforcement officers unprecedented power to peer into the lives of citizens.

Police officials say such tools can provide critical information that can help uncover terrorists or thwart mass shootings, ensure the safety of officers and the public, find suspects, and crack open cases. They say that last year’s attacks in Paris and San Bernardino, Calif., have only underscored the need for such measures.

But the powerful systems also have become flash points for civil libertarians and activists, who say they represent a troubling intrusion on privacy, have been deployed with little public oversight and have potential for abuse or error. Some say laws are needed to protect the public.

In many instances, people have been unaware that the police around them are sweeping up information, and that has spawned controversy. Planes outfitted with cameras filmed protests and unrest in Baltimore and Ferguson, Mo. For years, dozens of departments used devices that can hoover up all cellphone data in an area without search warrants. Authorities in Oregon are facing a federal probe after using social media-monitoring software to keep tabs on Black Lives Matter hashtags.

“This is something that’s been building since September 11,” said Jennifer Lynch, a senior staff attorney at the Electronic Frontier Foundation. “First funding went to the military to develop this technology, and now it has come back to domestic law enforcement. It’s the perfect storm of cheaper and easier-to-use technologies and money from state and federal governments to purchase it.”

Few departments will discuss how — or sometimes if — they are using these tools, but the Fresno police offered a rare glimpse inside a cutting-edge $600,000 nerve center, even as a debate raged in the city over its technology.

An arsenal of high-tech tools

Fresno’s Real Time Crime Center is the type of facility that has become the model for high-tech policing nationwide. Similar centers have opened in New York, Houston and Seattle over the past decade.

Fresno’s futuristic control room, which operates around the clock, sits deep in its headquarters and brings together a handful of technologies that allow the department to see, analyze and respond to incidents as they unfold across this city of more than 500,000 in the San Joaquin Valley.

On a recent Monday afternoon, the center was a hive of activity. The police radio crackled over loudspeakers — “subject armed with steel rod” — as five operators sat behind banks of screens dialing up a wealth of information to help units respond to the more than 1,200 911 calls the department receives every day.

On 57 monitors that cover the walls of the center, operators zoomed and panned an array of roughly 200 police cameras perched across the city. They could dial up 800 more feeds from the city’s schools and traffic cameras, and they soon hope to add 400 more streams from cameras worn on officers’ bodies and from thousands from local businesses that have surveillance systems.

The cameras were only one tool at the ready. Officers could trawl a private database that has recorded more than 2 billion scans of vehicle licenses plates and locations nationwide. If gunshots were fired, a system called ShotSpotter could triangulate the location using microphones strung around the city. Another program, called Media Sonar, crawled social media looking for illicit activity. Police used it to monitor individuals, threats to schools and hashtags related to gangs.

Fresno police said having the ability to access all that information in real time is crucial to solving crimes.

They recently used the cameras to track a robbery suspect as he fled a business and then jumped into a canal to hide. He was quickly apprehended.

The license plate database was instrumental in solving a September murder case, in which police had a description of a suspect’s vehicle and three numbers from the license plate.

But perhaps the most controversial and revealing technology is the threat-scoring software Beware. Fresno is one of the first departments in the nation to test the program.

As officers respond to calls, Beware automatically runs the address. The searches return the names of residents and scans them against a range of publicly available data to generate a color-coded threat level for each person or address: green, yellow or red.

Exactly how Beware calculates threat scores is something that its maker, Intrado, considers a trade secret, so it is unclear how much weight is given to a misdemeanor, felony or threatening comment on Facebook. However, the program flags issues and provides a report to the user.

In promotional materials, Intrado writes that Beware could reveal that the resident of a particular address was a war veteran suffering from post-traumatic stress disorder, had criminal convictions for assault and had posted worrisome messages about his battle experiences on social media. The “big data” that has transformed marketing and other industries has now come to law enforcement.

Fresno Police Chief Jerry Dyer said officers are often working on scant or even inaccurate information when they respond to calls, so Beware and the Real Time Crime Center give them a sense of what may be behind the next door.

“Our officers are expected to know the unknown and see the unseen,” Dyer said. “They are making split-second decisions based on limited facts. The more you can provide in terms of intelligence and video, the more safely you can respond to calls.”

But some in Fresno say the power and the sheer concentration of surveillance in the Real Time Crime Center is troubling. The concerns have been raised elsewhere as well — last year, Oakland city officials scaled back plans for such a center after residents protested, citing privacy concerns.

Rob Nabarro, a Fresno civil rights lawyer, said he is particularly concerned about Beware. He said outsourcing decisions about the threat posed by an individual to software is a problem waiting to happen.

Nabarro said the fact that only Intrado — not the police or the public — knows how Beware tallies its scores is disconcerting. He also worries that the system might mistakenly increase someone’s threat level by misinterpreting innocuous activity on social media, like criticizing the police, and trigger a heavier response by officers.

“It’s a very unrefined, gross technique,” Nabarro said of Beware’s color-coded levels. “A police call is something that can be very dangerous for a citizen.”

Dyer said such concerns are overblown, saying the scores don’t trigger a particular police response. He said operators use them as guides to delve more deeply into someone’s background, looking for information that might be relevant to an officer on scene. He said officers on the street never see the scores.

Still, Nabarro is not the only one worried.

The Fresno City Council called a hearing on Beware in November after constituents raised concerns. Once council member referred to a local media report saying that a woman’s threat level was elevated because she was tweeting about a card game titled “Rage,” which could be a keyword in Beware’s assessment of social media.

Councilman Clinton J. Olivier, a libertarian-leaning Republican, said Beware was like something out of a dystopian science fiction novel and asked Dyer a simple question: “Could you run my threat level now?”

Dyer agreed. The scan returned Olivier as a green, but his home came back as a yellow, possibly because of someone who previously lived at his address, a police official said.

“Even though it’s not me that’s the yellow guy, your officers are going to treat whoever comes out of that house in his boxer shorts as the yellow guy,” Olivier said. “That may not be fair to me.”

He added later: “[Beware] has failed right here with a council member as the example.”

An Intrado representative responded to an interview request seeking more information about how Beware works by sending a short statement. It read in part: “Beware works to quickly provide [officers] with commercially available, public information that may be relevant to the situation and may give them a greater level of awareness.”

Calls for ‘meaningful debate’

Similar debates over police surveillance have been playing out across the country, as new technologies have proliferated and law enforcement use has exploded.

The number of local police departments that employ some type of technological surveillance increased from 20 percent in 1997 to more than 90 percent in 2013, according to the latest information from the Bureau of Justice Statistics. The most common forms of surveillance are cameras and automated license plate readers, but the use of handheld biometric scanners, social media monitoring software, devices that collect cellphone data and drones is increasing.

Locally, the American Civil Liberties Union reports that police in the District, Baltimore, and Montgomery and Fairfax counties have cellphone-data collectors, called cell site simulators or StingRays. D.C. police are also using ShotSpotter and license plate readers.

The surveillance creates vast amounts of data, which is increasingly pooled in local, regional and national databases. The largest such project is the FBI’s $1 billion Next Generation Identification project, which is creating a trove of fingerprints, iris scans, data from facial recognition software and other sources that aid local departments in identifying suspects.

Law enforcement officials say such tools allow them to do more with less, and they have credited the technology with providing breaks in many cases. Virginia State Police found the man who killed a TV news crew during a live broadcast last year after his license plate was captured by a reader.

Cell site simulators, which mimic a cellphone tower and scoop up data on all cellphones in an area, have been instrumental in finding kidnappers, fugitives and people who are suicidal, law enforcement officials said.

But those benefits have sometimes come with a cost to privacy. Law enforcement used cell site simulators for years without getting a judge’s explicit consent. But following criticism by the ACLU and other groups, the Justice Department announced last September that it would require all federal agencies to get a search warrant.

The fact that public discussion of surveillance technologies is occurring after they are in use is backward, said Matt Cagle, an attorney for the ACLU of Northern California.

“We think that whenever these surveillance technologies are on the table, there needs to be a meaningful debate,” Cagle said. “There needs to be safeguards and oversight.”

After the contentious hearing before the Fresno City Council on Beware, Dyer said he now wants to make changes to address residents’ concerns. The police chief said he is working with Intrado to turn off Beware’s color-coded rating system and possibly the social media monitoring.

“There’s a balancing act,” Dyer said.

One More Transferred from Gitmo, Bigger Implications

The Department of Defense announces transfer of a Guantanamo detainee to Saudi Arabia. Leaves 103 detainees left at Gitmo. This transfer was approved in October.

General John Kelly, commander of U.S. Southern Command announced 150 Islamic militants in the Caribbean. A big issue that Gitmo does monitor but…..

Obama to make good on Guantanamo pledge: White House chief of staff

Reuters: President Barack Obama will make good on a promise to close the U.S. naval prison in Guantanamo Bay, Cuba, his chief of staff Denis McDonough said on “Fox News Sunday.”

Obama will first present a long-awaited plan to Congress about how to close the facility, and seek its approval, McDonough said in an interview. If Congress fails to act, the White House will determine what steps to take, he said.

“He feels an obligation to the next president. He will fix this so that they don’t have to be confronted with the same set of challenges,” McDonough said.

Obama pledged during the 2008 presidential election campaign that he would close the military prison, which housed foreign terrorism suspects after the Sept. 11, 2001, attacks on the United States.

That pledge, still unfilled, has been a feature of his annual State of the Union addresses to the nation ever since.

Obama has said the facility has been used as a recruiting tool in propaganda from groups like al Qaeda, and also is far too costly to maintain. There are 104 detainees left at the prison.

Where possible, his administration has transferred detainees to other countries. But there is a small number of detainees who the administration says it would like to detain in a U.S. facility for national security reasons.

Congress has explicitly banned the transfer of detainees to the United States.

McDonough declined to say whether Obama would close the prison using his own executive powers if Congress rejects his plan.

“I’m not an if-then guy,” he said.

NYT: Mohammad al Rahman al Shumrani is a 40-year-old citizen of Saudi Arabia. As of January 2010, the Guantánamo Review Task Force had recommended him for continued detention. A parole-like Periodic Review Board later recommended him for transfer. As of Jan. 11, 2016, he has been held at Guantánamo for 14 years.

JTF-GTMO Assessment 12 pages 

So what are the options for Barack Obama on those Gitmo detainees that no country will take in a transfer? Enough money and politics will force any country being strong-armed by the White House to take the worst of the worst. If not, there are other options. Obama can use his pen and force a Federal prison in the U.S. to take the remaining detainees or he can transfer the jihadis to another U.S. held prison facility/detention center in a foreign country.
Could they be transferred to the control of the United Nations and be placed in a U.N. prison facility?
If he is successful in closing the detention facility what will happen to it? Could Obama cancel the lease with Cuba? Yes. Could the facility be transferred to Cuba and then handed over to Iran, Russia or China? Yes.
What is worse, Obama is bent on taking robust action on Gitmo such that the next administration cannot restore it after it is closed. This leaves few options for the next president or does it?
At issue is fundamentally, Naval Station Guantanamo Bay is a full service military base that provides regional security to the Caribbean and monitors activity in Central and South America. It also provides the Department of Homeland Security with assistance in migrant operations.

The base hosts numerous tenant commands including the Southern Command Joint Task Force-Guantanamo, Joint Task Force Guantanamo, US Naval Hospital and Branch Dental Clinic.

Other detachments located at the base are: Personnel Support Activity, Naval Atlantic Meteorology and Oceanography Command, Naval Media Center, Naval Communications Station, Department of Defense Dependent Schools, Navy Brig, and Fleet and Industrial Supply Center.

NAVSTA GTMO garrison facilities

The bay area is divided into two parts known as the outer and inner harbours. The inner harbour includes commercial ports while the outer harbour accommodates naval station and the main anchorage space. Pier and wharf facilities are located at the small inlets located between Corinaso Point and Deer Point.

Air facilities

NAVSTA GTMO had two airfields namely Leeward Point Field and McCalla Airfield. The operations at McCalla Airfield were ceased in 1976. The Leeward Point Field is the only active military airfield in the base. It has a single runway (10/28) measuring 2,438m x 61m and surfaced with asphalt.

Other base facilities and services

The naval station has four wind turbines generating 3,800kW electricity, enough to fulfil 25% its power requirements. A desalination plant capable of producing 2.25 million gallons of fresh water a day is attached to the base. The plant also produces a combined 15,000kw of electricity through its two turbine generators.

Guantanamo has had operations that includes air fields with aircraft including F8U Crusaders and A4D Skyhawks. It was also an anti-submarine center and a training center. It can handle and has handled 50 warships.
Further, the Haitian crisis , the Balkan crisis and the famous Cuban missile crisis.
Imagine a foreign government in control of U.S. naval infrastructure and technology. Just imagine.

Sid and Hillary’s Personal Spy Network, ServerGate

There are only a handful of results of the FBI investigation into Hillary. 1. The DoJ’s Loretta Lynch will give Hillary as pass if there is a criminal referral. 2. Barack Obama will give Hillary full protection under ‘Executive Privilege’ under the excuse of national security. 3. There will be a full blown revolt by the whole intelligence community. 4. Leaks will come out forcing a criminal referral of Hillary Clinton and we could see a Bernie Sanders/Elizabeth Warren ticket.

Read more here on the FBI’s closely held Hillary investigation.

Hillary’s EmailGate Goes Nuclear

Does the latest release of Hillary’s State Department emails include highly classified U.S. intelligence?

Schlinder: Back in October I told you that Hillary Clinton’s email troubles were anything but over, and that the scandal over her misuse of communications while she was Secretary of State was sure to get worse. Sure enough, EmailGate continues to be a thorn in the side of Hillary’s presidential campaign and may have just entered a new, potentially explosive phase with grave ramifications, both political and legal.

The latest court-ordered dump of her email, just placed online by the State Department, brings more troubles for Team Hillary. This release of over 3,000 pages includes 66 “Unclassified” messages that the State Department subsequently determined actually were classified; however, all but one of those 66 were deemed Confidential, the lowest classification level, while one was found to be Secret, bringing the total of Secret messages discovered so far to seven. In all, 1,340 Hillary emails at State have been reassessed as classified.

Screen Shot 2016-01-09 at 5.06.46 PM

There are gems here. It’s hard to miss the irony of Hillary expressing surprise about a State Department staffer using personal email for work, which the Secretary of State noted in her own personal email. More consequential was Hillary’s ordering a staffer to send classified talking points for a coming meeting via a non-secure fax machine, stripped of their classification markings. This appears to be a clear violation of Federal law and the sort of thing that is a career-ender, or worse, for normals. The chairman of the Senate Judiciary Committee termed that July 2011 incident “disturbing,” and so it is to anyone acquainted with U.S. Government laws and regulations regarding the handling of classified material.

Screen Shot 2016-01-09 at 5.10.07 PM

Part 1

But the biggest problem may be in a just-released email that has gotten little attention here, but plenty on the other side of the world. An email to Hillary from a close Clinton confidant late on June 8, 2011 about Sudan turns out to have explosive material in it. This message includes a detailed intelligence report from Sid Blumenthal, Hillary’s close friend, confidant, and factotum, who regularly supplied her with information from his private intelligence service. His usual source was Tyler Drumheller, a former CIA senior official and veteran spy-gadfly, who conveniently died just before EmailGate became a serious problem for Hillary’s campaign.

Screen Shot 2016-01-09 at 5.11.03 PM

Part 2

However, the uncredited June 8 memo, which Mr. Blumenthal labeled as “Confidential” – his personal classification system, apparently – but which the State Department has labeled Unclassified, doesn’t appear to be from Drumheller, whose assessments were written just like CIA intelligence reports. This is not.

Screen Shot 2016-01-09 at 5.11.57 PM

Part 3

Remarkably, the report emailed to Hillary by “sbwhoeop,” which was Mr. Blumenthal’s email handle, explains how Sudan’s government devised a clandestine plan, in coordination with two rebel generals, to secure control of oil reserves in the disputed region of Abyei. This is juicy, front-page stuff, straight out of an action movie, about a region of Africa that’s of high interest to the American and many other governments, and the report is astonishingly detailed.

Screen Shot 2016-01-09 at 5.12.59 PM

Part 4

Its information comes from a high-ranking source with direct access to Sudan’s top military and intelligence officials, and Mr. Blumenthal’s write-up repeatedly states the sources – there turn out to be more than one – are well-placed and credible, with excellent access. It’s the usual spytalk boilerplate when you want the reader to understand this is golden information, not just gossip or rumors circulating on the street, what professionals dismiss as “RUMINT.” Needless to add, this is generating a lot of talk in Sudan, where the media is asking about this shady affair – and how Sid Blumenthal, who’s not exactly an old Africa hand, knew all about it.

Screen Shot 2016-01-09 at 5.13.46 PM

Part 5

But the most interesting part is that the report describes a conversation “in confidence” that happened on the evening of June 7, just one day before Mr. Blumenthal sent the report to Secretary Clinton. It beggars the imagination to think that Sid’s private intelligence operation, which was just a handful of people, had operators who were well placed in Sudan, with top-level spy access, able to get this secret information, place it in a decently written assessment with proper espionage verbiage, and pass it all back to Washington, DC, inside 24 hours. That would be a feat even for the CIA, which has stations and officers all over Africa.

In fact, the June 8, 2011 Blumenthal report doesn’t read like CIA material at all, in other words human intelligence or HUMINT, but very much like signals intelligence or SIGINT. (For the differences see here). I know what SIGINT reports look like, because I used to write them for the National Security Agency, America’s biggest source of intelligence. SIGINT reports, which I’ve read thousands of, have a very distinct style and flavor to them and Blumenthal’s write-up matches it, right down to the “Source Comments,” which smack very much of NSA reporting and its “house rules.”

But is this an NSA assessment? If so, it would have to be classified at least Secret/Sensitive Compartmented Information, a handling caveat that applies to most SIGINT, and quite possibly Top Secret/SCI, the highest normal classification we have. In that case, it was about as far from Unclassified as it’s possible for an email to be.

No surprise, NSA is aflutter this weekend over this strange matter. One Agency official expressed to me “at least 90 percent confidence” that Mr. Blumenthal’s June 8 report was derived from NSA reports, and the Agency ought to be investigating the matter right now.

There are many questions here. How did Sid Blumenthal, who had no position in the U.S. Government in 2011, and hasn’t since Bill Clinton left the White House fifteen years ago, possibly get his hands on such highly classified NSA reporting? Why did he place it an open, non-secure email to Hillary, who after all had plenty of legitimate access, as Secretary of State, to intelligence assessments from all our spy agencies? Moreover, how did the State Department think this was Unclassified and why did it release it to the public?

It’s possible this Blumenthal report did not come from NSA, but perhaps from another, non-American intelligence agency – but whose? If Sid was really able to get top-level intelligence like this for Hillary, using just his shoestring operation, and get it into her hands a day later, with precise information about the high-level conspiracy that was just discussed over in Sudan, the Intelligence Community needs to get him on our payroll stat. He’s a pro at the spy business.

*******

Hillary Clinton was battered with questions by CBS host John Dickerson on Sunday about new revelations from her private email server.

Appearing on Face The Nation, Clinton was asked about ordering an aide to send information through “nonsecure” channels and her hypocritical surprise that another State Department employee was not using a government account at the time.

The Free Beacon reported:

In the June 2011 email exchange, Jake Sullivan, then-Secretary Clinton’s deputy chief of staff, discussed forthcoming “TPs,” appearing to refer to talking points, that Clinton was waiting to receive.

“They say they’ve had issues sending secure fax. They’re working on it,” Sullivan wrote of the forthcoming information in an email dated June 17, 2011.

“If they can’t, turn it into nonpaper [with] no identifying heading and send nonsecure,” Clinton wrote Sullivan in response the same day.

“Aren’t you ordering him to violate the laws on handling classified material there?” Dickerson asked.

“No, not all, and as the State Department said just this week, that did not happen, and it never would have happened, because that’s just not the way I treated classified information,” Clinton said. “Headings are not classification notices, and so, oftentimes, we are trying to get the best information we can, and obviously what I’m asking for is whatever can be transmitted, if it doesn’t come through secure, to be transmitted on the unclassified systems. So, no, there is nothing to that, like so much else has been talked about in the last year.”

Dickerson said the email was “striking” because it suggested she knew how to get around restrictions for sending classified information.

“You’re saying there was never an instance, any other instance, in which you did that?” Dickerson asked.

“No, and it wasn’t sent,” Clinton said. “This is another instance where what is common practice, namely, I need information. I had some points I had to make, and I was waiting for a secure fax that could get me the whole picture, but oftentimes there’s a lot of information that isn’t at all classified, so whatever information can be appropriately transmitted, unclassified, often was. That’s true for every agency in the government and everybody who does business with the government.”

Clinton said the “important point” was she had “great confidence“ she wasn’t in breach of government regulations on classification.

“In fact, as the State Department has said, there was no transmission of any classified information, so it’s another effort by people looking for something to throw against the wall … to see what sticks, but there’s no ‘there’ there,” she said.

Dickerson wasn’t finished, though, pointing to a 2011 email showing Clinton expressing surprise that another State Department staffer wasn’t using a government account, even while she was flouting rules by using a private email to do business.

That was “what you were doing,” Dickerson said, so “why was that a surprise to you?”

“Well, I emailed two people on their government accounts, because I knew that all of that would be part of the government system, and indeed, the vast majority of all my emails are in the government systems, so that’s how I conducted the business,” she said. “I was very clear about emailing anything having to do with business to people on their government accounts.”

In other words, Clinton did not answer the question about her fairly blatant hypocrisy.

ISIS in the Caribbean and Michelle’s SOTU Guest, Sigh

Top US General Offers Warning on IS Fighters in Caribbean

VoA: A top U.S. general is concerned that a small number of motivated Islamic State fighters could commit acts of terror in Caribbean nations.

General John Kelly, commander of the U.S. Southern Command, told reporters Friday at the Pentagon that about 150 Islamic extremists left the Caribbean region to join Islamic State fighters in the Middle East last year, about 50 more than in the previous year.

However, he said, the biggest threat might not be the extremists who leave to train and fight with the Islamic State, but the ones who stay behind.

Kelly said Islamic extremist groups seem to have a new message for would-be jihadists.

“And that [message] is, ‘Rather than coming here to Syria, why don’t you just stay at home and do San Bernardino or do Boston or do Fort Hood?’ ” the general said, referring to attacks in the U.S. perpetrated by Muslims sympathetic to extremist groups. As recently as Thursday, a gunman claiming allegiance to the Islamic State ambushed a police officer as he sat in his car in Philadelphia.

“They [Caribbean nations] don’t have an FBI, they don’t have law enforcement like we do,” Kelly said, adding that the U.S. military provides as much information as it can to agencies in those countries.

Iraq, Afghanistan

When asked about the wars in Iraq and Afghanistan, Kelly praised recent comments made to USA Today by General John Campbell, commander of the NATO-led Resolute Support Mission, that the president should delay the drawdown of U.S. troops and maintain the current force of 9,800 because of the volatile security situation in Afghanistan.

He also appeared to pointedly disagree with the U.S. decision to withdraw all troops in Iraq by the end of 2011, telling a reporter there were “other ways to have done it.”

“I believe this war stuff is hard, and it’s not for the untrained and the unadvised,” he said.

Kelly, who served in Iraq’s Anbar province, said the removal of U.S. troops took away vital mentors the Iraqi army needed as it continued to develop.

“The equipment is important, but it doesn’t come close to having people who are just with them,” he said.

Kelly, a Marine, said there would eventually be “pressure” to lower standards for women so more of them could advance in combat roles, such as the Marine infantry and the Army Rangers.

Last year, the Marine Corps asked that certain combat jobs remain closed to women, but Defense Secretary Ash Carter overruled the request.

Pentagon officials have vowed that standards for those jobs will not be lowered.

***

Meanwhile, who will be Michelle Obama’s guest at the State of the Union address? Whoa….

Syrian refugee among first lady’s guests for State of Union

WASHINGTON (AP) — A Syrian scientist stricken with cancer and seeking a new start for his family in Michigan will represent Syrian refugees as a guest of first lady Michelle Obama for the president’s final State of the Union address.

President Barack Obama has committed to accepting an additional 10,000 Syrian refugees, but some Republican lawmakers and presidential candidates are critical of the expansion. Republican presidential candidate Ted Cruz, for example, noted the recent arrest of two Iraqi refugees. During an interview with CNN that aired Sunday, Cruz emphasized that they came to the United States “using the same vetting that President Obama wants us to trust with Syrian refugees.”

Refaai Hamo, his son and three daughters landed at Detroit Metropolitan Airport in December, anxious to rebuild their lives. Hamo fled to Turkey from Syria after a missile attack killed his wife and one other daughter. Hamo was profiled on the popular photo blog Humans of New York and identified as “The Scientist.”

The White House said Sunday that Hamo will be among about 20 guests who will sit near the first lady on Tuesday. The guests include several veterans and service members, including one of the three Americans who thwarted a terrorist attack aboard a Paris-bound train.

Those on the guest list will highlight issues that Obama has attempted to prioritize during his tenure, such as expanded health insurance coverage, and issues that he hopes to work on during his final year, such as criminal justice reform. The guest list includes a California man whose partner was killed in the San Bernardino attack, the first female Army Reserve officer to graduate from the Army’s elite Ranger School and a plaintiff in the landmark Supreme Court case that found same-sex couples have a constitutional right to marry. One seat will be empty, to represent the victims of gun violence.

Obama read about Hamo’s story last month. His cancer had gone untreated because he lacked health insurance. The actor, Ed Norton, set up for the Hamo family an online fundraising campaign that raised more than $450,000. The White House described Hamo as living the kind of life in Syria that is associated with the American dream. He married his college sweetheart, and they built a life together before a missile tore through the complex he helped design and where his family lived.

Obama told Hamo through a Facebook posting that, “Yes, you can still make a difference in the world, and we’re proud that you’ll pursue your dreams here. Welcome to your new home. You’re part of what makes America great.”

Other guests include:

— Staff Sgt. Spencer Stone of Sacramento, California, who, along with Anthony Sadler and U.S. Army Specialist Alex Skarlatos, stopped a man from opening fire on passengers aboard a crowded Paris-bound train.

— Oscar Vazquez of Fort Worth, Texas, a veteran who came to the U.S. as a child from Mexico, and now works as a business analyst and advocate for Latino students.

— Sue Ellen Allen of Scottsdale Arizona, co-founder of a nonprofit that helps former prisoners re-enter society.