Old is New Again, the Terror Alert System

Jeh Johnson admits the NTAS has never been used but now, we need it?

Wonder when it will be launched and how:

Action Center

National Terrorism Advisory System Public Guide

NTAS Public GuideThe National Terrorism Advisory System, or NTAS, replaces the color-coded Homeland Security Advisory System (HSAS). This new system will more effectively communicate information about terrorist threats by providing timely, detailed information to the public, government agencies, first responders, airports and other transportation hubs, and the private sector.

It recognizes that Americans all share responsibility for the nation’s security, and should always be aware of the heightened risk of terrorist attack in the United States and what they should do.

US To Roll Out New Terror Alert System

SkyNews: The announcement comes after President Obama tells the American people that a new phase of terror threats has emerged.

The United States will launch a new terror alert system aimed at better informing Americans about the nation’s security posture, Homeland chief Jeh Johnson has said.

Details about the new system – the country’s third since the September 11, 2001 terrorist attacks – will be announced soon, Mr Johnson said at a Defense One magazine forum on Monday.

Colour-coded US threat advisory system

The much maligned colour-coded system was replaced in 2011

The Homeland Security boss did not provide specifics, but said the changes will keep the public better informed.

His comments come on the heels of President Barack Obama telling Americans that the US is witnessing a “new phase” of terror threats.

President Obama

In a rare address from the Oval Office on Sunday night, Mr Obama explained how the threat that terrorism posed to the US had changed from the “multi-faceted” attacks of 9/11, to simpler methods such as mass shootings.

Mr. Johnson echoed the President’s words on Monday, telling the forum that terrorist threats to the US have evolved and terrorist-inspired threats are a growing concern.

Since 2011 the US has used the National Threat Advisory System (NTAS), which replaced the much maligned colour-coded system put in place after 9/11.

THAT Terror Watch List Includes TSA Employees

People are nominated due to certain conditions and points to go on the terror watch list. The report is here.  .

Obama’s solution to terror was to expand the stipulations to be on the list, keeping the country safe?

72 DHS Employees on Terrorist Watch List

FreeBeacon: At least 72 employees at the Department of Homeland Security are listed on the U.S. terrorist watch list, according to a Democratic lawmaker.

Rep. Stephen Lynch (D., Mass.) disclosed that a congressional investigation recently found that at least 72 people working at DHS also “were on the terrorist watch list.”

“Back in August, we did an investigation—the inspector general did—of the Department of Homeland Security, and they had 72 individuals that were on the terrorist watch list that were actually working at the Department of Homeland Security,” Lynch told Boston Public Radio.

“The [former DHS] director had to resign because of that,” he said.

DHS continues to fail inspections aimed at determining the efficiency of its internal safety mechanisms, as well as its efforts to protect the nation.

Lynch referred to a recent report that found the Transportation Security Administration, which is overseen by DHS, failed to stop 95 percent of those who attempted to bring restricted items past airport security.

“We had staffers go into eight different airports to test the department of homeland security screening process at major airports. They had a 95 percent failure rate,” Lynch said. “We had folks—this was a testing exercise, so we had folks going in there with guns on their ankles, and other weapons on their persons, and there was a 95 percent failure rate.”

Lynch said he has “very low confidence” in DHS based on its many failures over the years. For this reason, he voted in favor of recent legislation that will tighten the vetting process for any Syrian refugees applying for asylum in the United States.

“I have very low confidence based on empirical data that we’ve got on the Department of Homeland Security. I think we desperately need another set of eyeballs looking at the vetting process,” he said. “That’s vetting that’s being done at major airports where we have a stationary person coming through a facility, and we’re failing 95 percent of the time.”

“I have even lower confidence that they can conduct the vetting process in places like Jordan, or Belize or on the Syrian border, or in Cairo, or Beirut in any better fashion, especially given the huge volume of applicants we’ve had seeking refugee status,” Lynch said.

*** There are more details:

TheIntercept: Nearly half of the people on the U.S. government’s widely shared database of terrorist suspects are not connected to any known terrorist group, according to classified government documents obtained by The Intercept.

Of the 680,000 people caught up in the government’s Terrorist Screening Database—a watchlist of “known or suspected terrorists” that is shared with local law enforcement agencies, private contractors, and foreign governments—more than 40 percent are described by the government as having “no recognized terrorist group affiliation.” That category—280,000 people—dwarfs the number of watchlisted people suspected of ties to al Qaeda, Hamas, and Hezbollah combined.

The documents, obtained from a source in the intelligence community, also reveal that the Obama Administration has presided over an unprecedented expansion of the terrorist screening system. Since taking office, Obama has boosted the number of people on the no fly list more than ten-fold, to an all-time high of 47,000—surpassing the number of people barred from flying under George W. Bush.

“If everything is terrorism, then nothing is terrorism,” says David Gomez, a former senior FBI special agent. The watchlisting system, he adds, is “revving out of control.”

What Should you Know About Wilson Fish….

The Wilson-Fish (WF) program is an alternative to traditional state administered refugee resettlement programs for providing assistance (cash and medical) and social services to refugees.

  Minneapolis

  Vermont

  Twin Falls, Idaho

The full government program description is here, from the Health and Human Services website which manages the Refugee Resettlement Program.

The purposes of the WF program are to:

  • Increase refugee prospects for early employment and self-sufficiency
  • Promote coordination among voluntary resettlement agencies and service providers
  • Ensure that refugee assistance programs exist in every state where refugees are resettled

http://app.na.readspeaker.com/cgi-bin/rsent?customerid=7596&lang=en_us&readid=main&url=http%3A%2F%2Fwww.acf.hhs.gov%2Fprograms%2Forr%2Fprograms%2Fwilson-fish

I. INTRODUCTION

II. ELIGIBLITY

III. PROGRAM DESCRIPTION

IV. PROGRAM SERVICES
A. Refugee Cash Assistance
B. Refugee Medical Assistance/Refugee Medical Screening
C. Intensive Case Management
D. Employment/Employability Services
E. English Language Training
F. Translation and Interpretation Services
G. Refugee Social Services – Key Requirements

V. PROGRAM ADMINISTRATION
A. Statewide Coordination
B. RCA/RMA Administration

VI. PROCEDURES AND DEFINITIONS
A. Procurement of Services
B. Sanctioning and Fair Hearing Process
C. Definition of Terms
D. Procedure for a WF Program to Revert to a State Administered RCA or PPP Model

VII. REPORTING

VIII. Application
A. Substantial Involvement Under the Cooperative Agreement
B. Contents of the WF Application

I. INTRODUCTION

These guidelines are provided to grantees under the Wilson/Fish (WF) alternative program to assist them in their delivery of services and assistance to eligible populations. The purpose of the WF program is to establish an alternative to the traditional state administered refugee assistance program through the provision of integrated assistance (cash and medical) and services (employment, case-management, English as a Second Language (ESL) and other social services) to refugees in order to increase early employment and self-sufficiency prospects. In addition, the WF program enables refugee assistance programs to exist in every State where refugees are resettled.

The statutory authority for the WF program was granted in October, 1984, when Congress amended the Immigration and Nationality Act (INA) to provide authority for the Secretary of Health and Human Services to implement alternative projects for refugees. This provision, known as the Wilson/Fish Amendment, Pub.L. 98-473, 8 U.S.C. 1522(e)(7), provided:

“(7)(A) The Secretary shall develop and implement alternative projects for refugees who have been in the United States less than thirty-six months, under which refugees are provided interim support, medical services,1 support services, and case management, as needed, in a manner that encourages self-sufficiency, reduces welfare dependency, and fosters greater coordination among the resettlement agencies and service providers…

(B) Refugees covered under such alternative projects shall be precluded from receiving cash or medical assistance under any other paragraph of this subsection or under title XIX or part A of Title IV of the Social Security Act.

(C) “…”

(D) To the extent that the use of such funds is consistent with the purposes of such provisions, funds appropriated under section 414(a) of this Act, part A of Title IV of the Social Security Act, or Title XIX of such Act, may be used for the purpose of implementing and evaluating alternative projects under this paragraph.”

The WF Program is also referenced in the Office of  Refugee Resettlement (ORR)  regulations under the heading Alternative RCA Programs at 45 C.F.R. § 400.69:

“A state that determines that a public/private RCA program or publicly-administered program modeled after its TANF program is not the best approach for the State, may choose instead to establish an alternative approach under the Wilson/Fish program, authorized by INA section 412(e)(7).”

The ORR regulations at 45 C.F.R. §400.301 also provide authority to the ORR Director to select a replacement to respond to the needs of the state’s refugee population if a state withdraws from the refugee program:”…when a State withdraws from all or part of the refugee program, the Director may authorize a replacement designee or designees to administer the provision of assistance and services, as appropriate, to refugees in that State” (see page 14 – “Statewide Coordination”).

Neither the statute nor regulations mandate a competitive review process for determining a WF grantee.  However, the statute does require as follows:

No grant or contract may be awarded under this section unless an appropriate proposal and application (including a description of the agency’s ability to perform the services specified in the proposal) are submitted to, and approved by, the appropriate administering official. Grants and contracts under this section shall be made to those agencies which the appropriate administering official determines can best perform the services 8 U.S.C. § 1522(a)(4)(A).

ORR with the Administration for Children and Families (ACF) concurrence has concluded a competitive review process is not cost effective, not in the best interest of the government, and not a practical fit for the WF program.   ORR also, in accordance with the law cited above, will require that appropriate proposals and applications are submitted and that a determination is made that the grantees are the ones that can “best perform” the services.  Therefore funding under this program is open only to those agencies that currently administer a WF program. The WF program has the regulatory authority as cited above to expand sites in the future as necessary if a state withdraws from the refugee program or if a state proposes to switch its current RCA model to the WF model.

WF grantees which include States, voluntary resettlement agencies (local and national), and a private non-profit agency that oversees a local voluntary resettlement agency administer 12 state-wide WF programs in the following States: Alabama, Alaska, Colorado, Idaho, Kentucky, Louisiana, Massachusetts, Nevada, North Dakota, South Dakota, Tennessee and Vermont, plus one county-wide program in San Diego County, California. The WF programs in these locations are currently administered by the following agencies:

Alabama: USCCB – Catholic Social Services
Alaska: USCCB – Catholic Social Services
Colorado: Colorado Department of Human Services
Idaho: Janus Inc. (formerly Mountain States Group), Idaho Office for Refugees
Kentucky: USCCB – Catholic Charities of Louisville, Kentucky Office for Refugees
Louisiana: USCCB – Catholic Charities Diocese of Baton Rouge, Louisiana Office for Refugees
Massachusetts: Office for Refugees and Immigrants
Nevada: USCCB – Catholic Charities of Southern Nevada
North Dakota: LIRS – Lutheran Social Services of North Dakota
San Diego County, CA: USCCB – Catholic Charities Diocese of San Diego
South Dakota: LIRS – Lutheran Social Services of South Dakota
Tennessee: USCCB – Catholic Charities of Tennessee, Tennessee Office for Refugees
Vermont: USCRI – Vermont Refugee Resettlement Program

II. ELIGIBILITY

ORR Eligible Client Population

To be eligible for WF funded programs and services, grantees must ensure refugees2 meet all requirements of 45 C.F.R. 400.43, “Requirements for documentation of refugee status”. Eligibility for refugee program services and assistance also includes: Asylees3, Cuban Haitian Entrants4; Certain Amerasians5 from Vietnam; Victims of Severe Forms of Trafficking6; Special Immigrant Visa Holders7.

All eligible individuals will be referred to as “refugees” or “clients” in these guidelines, unless the context indicates otherwise. For more details on documentary proof of the above statuses and all other ORR eligible populations, including statutory and regulatory authorities, visit the ORR website.

III. PROGRAM DESCRIPTION

Under the WF program guidelines, the grantee will provide interim financial assistance, medical assistance (if applicable), employment services, case management and other social services to refugees in a manner that encourages self-sufficiency, and fosters greater coordination among voluntary agencies and other community-based service providers. An integrated system of assistance and services is an essential characteristic of a WF program. Services and assistance under this program are intended to help refugees attain self-sufficiency within the period of support defined by 45 CFR 400.211.8 This period is currently eight months from date of arrival in the U.S. (for refugees and SIVs); the date of adjustment of status if applying for Special Immigrant Status within the U.S (SIVs); the date of final grant of asylum (for asylees); the date a Cuban/Haitian becomes an entrant9; the date of certification or eligibility letter for Victims of Severe Forms of Trafficking.

WF programs provide assistance and services to refugees for the purpose of enhancing refugee self-sufficiency. Some examples include: (1) where assistance and services for refugees receiving RCA and those receiving Temporary Assistance for Needy Families  (TANF) could be provided in a better coordinated, effective, and efficient manner;  (2) where the  payment rate for RCA and TANF is well below the ORR payment rates listed in the ORR regulations at 45 C.F.R. section 400.60;  (3) where TANF-eligible refugees may not have access to timely, culturally and linguistically compatible services in the provision of employment and training programs; (4) where existing options for delivery of services and assistance to refugees do not present the most effective resettlement in that location, and where resettlement could be made more effective through the implementation of an alternative project; (5) where the continuity of services from the time of arrival until the attainment of self-sufficiency needs to be strengthened; or (6) where it is in the best interest of refugees to receive assistance and services outside the traditional TANF system.

WF programs have the flexibility to design programs tailored to the refugees’ needs, assets, and environment of the resettlement community.

There are seven main elements of WF programs that allow them to be distinguished from the traditional10 state -administered refugee resettlement programs:

a. They may serve TANF eligible clients in addition to RCA clients.
b. The provision of cash assistance, case management and employment services are integrated and administered generally under a single agency employing a “one stop shop “ model  that is culturally and linguistically equipped to work with refugees.
c. The cash assistance element may be administered and/or delivered by the state or a private entity.
d. Monthly RCA payment levels may exceed state TANF payment levels (up to the PPP levels outlined under 45 C.F.R. §400.60).
e. WF programs utilize innovative strategies for the provision of cash assistance, through incentives, bonuses and income disregards which are tied directly to the achievement of employment goals outlined in the client self-sufficiency plan.
f. Refugee Medical Assistance (RMA) may be administered by a private entity.
g. WF programs provide intensive case management to refugees who are determined to have special needs.

Funding for the WF program is made available under the Transitional Assistance and Medical Services (TAMS) and Social Services line items.  Under TAMS, WF grantees receive WF-Cash and Medical Assistance (WF-CMA) discretionary funds which are awarded through cooperative agreements to cover RCA, RMA (if privately administered), intensive case management, statewide coordination and RCA/RMA administration costs. WF-CMA discretionary grants are awarded based on a budget of estimated costs for providing up to eight months of RCA and RMA (if applicable) to eligible refugees and up to one year of intensive case management, as well as for the identifiable and reasonable administrative costs associated with providing RCA and RMA and statewide coordination. WF-CMA is a cost reimbursement grant. Any unobligated balances will be used as an offset to the following year’s award for this grant.

Back at the Border(s), Bigger Issues ~ Chilling Report

Breitbart: MATAMOROS, Tamaulipas— The lack of security conditions in this border city fuel the terror that its citizens live under and led to the U.S. Consulate in Matamoros being the latest target for a bomb threat.

According to information released by the Tamaulipas Command Control and Computing Center (C-4 similar to a police communication center), authorities received a call about an explosive device at the consular office on Thursday afternoon. The alert raised the security levels in the Jardin neighborhood, which is just yards away from two international bridges that connect this border city with Brownsville, Texas.

Mexican soldiers and federal police officers rushed to the neighborhood and sealed off the area for several hours. One of the security blockades was placed near the intersection of First and Azaleas streets in Jardin neighborhood.

As part of the security protocol, the U.S. Consulate was fortified by Mexican troops who surrounded the building while special teams went into the building to search for the explosive devices. Mexican authorities used police dogs to search the area and after a careful search of the building were able to determine that the threat was false.

The threat to the U.S. Consulate Office in Matamoros is just one of many daily occurrences in this city. Earlier this week, the HEB shopping center had to be evacuated after a similar bomb threat was called in.

As Breitbart Texas previously reported, two congressmen wrote a letter to U.S. Secretary of State John Kerry demanding answers for the lack of security in the consular offices in Mexico.

The U.S. Consulate Office in this border city has previously been the victim of other bomb threats and also the theft of thousands of U.S. crossing cards that were stolen by the Gulf Cartel out of a delivery truck, Breitbart Texas previously reported.

So, what does the Congress know and have to say? They got the report:

Massive Senate report: Mexican AND Canadian borders are ‘significant’ terrorist pathways

The U.S.-Canada border is the likely path for terrorists to invade the country, according to top national security experts and Congress’ most comprehensive review of America’s 19,000 miles of coasts and land borders.

“The nexus between known or suspected terrorists in eastern Canada and the northern parts of the U.S. represent [sic] a significant national security threat,” said a new report from the Senate Homeland Security and Governmental Affairs Committee, a conclusion reached as Canada decided to settle 25,000 Syrian refugees by March.

“The border is not secure,” Sen. Ron Johnson, the Wisconsin Republican who is chairman of the committee, told Secrets. He included the southern border, where he said that drug cartels are teaming with “potentially Islamic terror organizations.”

He raised concerns about the rushed refugee plans of new Canadian Prime Minister Justin Trudeau. “It is a concern with the new prime minister, Trudeau, opening up his border to refugees. They can come into America, so I would say that increases our risk,” Johnson said.

His panel’s new 100-page report, show in pdf form at the end of this story, is based on dozens of hearings, interviews and trips, cites terror arrests in Canada and U.S. border states of Islamic State threats and quotes several experts raising concerns about how easy it is for illegal immigrants and terrorists to cross in from Canada.

“Security observers have argued that Canada represents a substantial vulnerability, because it provides immigrant visas to individuals who pose a significant threat,” said the report, “The State of America’s Border Security.”

“Witnesses testified before the committee that if someone gets into Canada, they will most likely be able to enter the U.S.”

And for thousands of miles of border, for most there is only a shallow ditch and forestlands to stop them. “There is currently no fencing on the northern border. Instead, the demarcation line between the two countries is often marked by a ditch, approximately six inches deep,” says the report.

It offers several details of terrorist attempts and also charts how the U.S. and Canada are working to fight it. Consider this entry about terrorism from page 42:

The nexus between known or suspected terrorists in eastern Canada and the northern parts of the U.S. represent a significant national security threat. Communities in Minnesota and New York, which are adjacent to Ontario and Quebec, have recently experienced apprehensions of individuals on terrorist charges. For example, on November 26, 2014, two men in Minneapolis, Minnesota were charged with recruiting and conspiring to provide support to ISIL. Similarly, on September 17, 2014, a man in Rochester, New York was arrested on similar charges after the FBI provided evidence showing that he attempted to recruit fighters and funds for ISIL.

And it’s not just a northern border problem. Johnson said the highly trafficked U.S. border with Mexico is also a pathway for Islamic terrorists, especially as they team up with drug cartels that have carte blanche on their side of the line.

Those cartels “are also combining with transnational criminal organizations, potentially Islamic terror organizations,” he said.

Johnson in his report steers clear of the heated presidential campaign rhetoric on how to handle the border and notes that “it’s not a war zone.”

Solutions for the southern border include development of a guest worker system, a new campaign against drugs, and more efforts to secure the border. He also talked favorably of a recent Bush-era campaign to send those caught at the border home immediately, an effort that led to a drop in illegal border crossings.

Up north, he wants a “threat analysis” to see what more can be done to stop terrorists from slipping in. “Start now,” he said.

THE STATE OF AMERICA’S BORDER SECURITY

Senator Ron Johnson, Chairman

Committee on Homeland Security and Governmental Affairs

United States Senate

More Hillary Emails, Benghazi and Bob Bergdahl

Judicial Watch: New State Department Emails Reveal Hillary Clinton Slept Past Staff Efforts to Set Up Intelligence Briefing

Clinton Advisor Sidney Blumenthal Attacks Mitt Romney as “Contemptible,” a “Mixture of Greedy Ambition and Hollowness” 

(Washington, DC) – Judicial Watch today released a new batch of emails of former Secretary of State Hillary Clinton connected to the Benghazi attack. Included is an email chain showing that Clinton slept late the Saturday after the Benghazi attack and missed a meeting that her staff had been trying to set up about sensitive intelligence issues, including the Presidential Daily Brief, on a day she was to make a slew of phone calls to foreign leaders.

Also included in the documents is an email from Clinton advisor Sidney Blumenthal, sent three days after the attack, describing then-Republican presidential nominee Mitt Romney as “contemptible on a level not seen in past contemptible political figures” and a “mixture of greedy ambition and hollowness.”

The documents contain an email passed to Clinton in the days following the Benghazi attack in which the father of alleged Army deserter Bowe Bergdahl anguishes over the “‘Crusade’ paradigm” which he says “will never be forgotten in this part of the world.”

An email from former Ambassador Joe Wilson to Clinton expresses his concern about “Christian Dominionists who seek to turn [the military] into an instrument of their religious zealotry.”

Other emails show approval of an effort to blame an Internet video on the Benghazi attack that aired on the Al Jazeera network.

The new emails were obtained by Judicial Watch as a result of several court orders in two separate Judicial Watch Freedom of Information Act (FOIA) lawsuits for Clinton Benghazi material.  (The court orders are dated July 31, 2015, October 9, 2015, and October 20, 2015.)  The documents have been made public only because Judicial Watch’s litigation has forced the State Department to conduct additional searches.

The new Benghazi documents include email traffic showing that on the Saturday two days after the Benghazi terrorist attack Hillary Clinton slept past staff efforts to set up an intelligence briefing:

From: Hanley, Monica
Sent: Saturday, September 15, 2012 09:17 AM
To: ‘[email protected]’ <[email protected]>
Cc: ‘[email protected]’ <[email protected]>
Subject: PDB

Dan will be at Whitehaven with the PDB at 9:30am this morning.

He has some sensitive items that he would like to personally show you when he arrives.

***

From: H [mailto:[email protected]]
Sent: Saturday, September 15, 2012 10:43 AM
To: Hanley, Monica R
Subject: Re: PDB

I just woke up so I missed Dan. Could he come back after I finish my calls? But I don’t have the call schedule yet so I don’t know when that would be. Do you?

From: Hanley, Monica R [mailto:[email protected]]
Sent: Saturday, September 15, 2012 10:51 AM
To: H
Subject: Re: PDB

A pouch with all of your call sheets and the schedule in en route to you. Here it is below as well.

Also in the pouch are a few read items, and an action memo authorizing the War Powers resolution for Tunisia that the office would like you to approve today. Ops can send a courier over to pick up the action memo later today.

12:00 UK FM Hague
12:15 Egyptian FM Amr
12:30 Israeli PM Netanyahu
1:15 French FM Fabius
1:30 Saudi FM Saud al-Faisal
2:00 Somali Former Transitional President Sharif
2:15 Libyan PM-elect Abu-Shakour
2:30 Turkish FM Davutoglu
3:00 Somali President Mohamoud (T)

-Moroccan King is still pending.

-NEW CALL: King Juan Carlos of Spain called today and offered anytime today or tomorrow. His office relayed that it is a personal call inquiring after the status of the Embassies in the Middle East. We are working on a call sheet.

The State Department’s records include a September 14, 2012, email from Clinton advisor Sidney Blumenthal to Clinton in which Blumenthal passes along a controversial article by his son Max and attacks then-Republican presidential candidate Mitt Romney:

From: Sidney Blumenthal
Sent: Friday, September 14, 2012 10:48 AM
To: H
Subject: Re: m.guardian.co.uk

Max knows how to do this and fearless. Hope it’s useful and gets around, especially in the Middle East.

Keep speaking and clarifying. Your statements have been strong. Once through this phase, you might clarify history of US policy on Arab Spring, what has been accomplished, US interests at stake, varying relations with Libya & Egypt, etc.

Romney, of course, is contemptible, but contemptible on a level not seen in past contemptible political figures. His menace comes from his emptiness. His greed is not limited simply to mere filthy lucre. The mixture of greedy ambition and hollowness is combustible. He will do and say anything to get ahead, and while usually self-immolating he is also destructive. Behind his blandness lies boundless ignorance, ignited by consistently wretched judgment. His recent statements are of a piece with everything he has done from naming Ryan to his welfare ads, etc.

Keep speaking…

xo

Sid

The Blumenthal email includes a link to an article by his son Max Blumenthal that suggests that American conservatives, Zionists and the Israel government were behind the Internet video that was falsely linked by Clinton and Barack Obama to the Benghazi attack.  Clinton responded with an approving, “Your Max is a Mitzvah.” Another email shows that Mrs. Clinton wanted three copies of the Max Blumenthal Benghazi video article printed out.  (Max Blumenthal is a leftist journalist known for his attacks on Israel and American foreign policy.  In January, 2015, he is quoted calling American Sniper hero Chris Kyle an “unrepentant, sadistic killer.”)

In addition to Blumenthal’s attack on Romney, the newly released documents also include an email chain forwarded to Clinton from her former State Department deputy chief of staff Jacob Sullivan in which Robert Bergdahl, the father of alleged Army deserter Bowe Bergdahl, relates the death of U.S. ambassador Chris Stevens to what the senior Bergdahl calls the “‘Crusade’ paradigm:”

Please convey our abiding condolences to everyone in the Foreign Service. Your service is most notable and almost invisible. Our Nation is stumbling through a very volatile world. The “Crusade” paradigm will never be forgotten in this part of the world and we force our Diplomats to carry a lot of baggage around while walking on eggshells.

Be very careful my friend!

I’m very sorry,

bob

After receiving the email from Mr. Bergdahl, Mrs. Clinton orders a response (which is not disclosed) be prepared.

The new documents also contain an email from former Ambassador Joe Wilson to Clinton concerning the Benghazi attack, in which he suggests the military is being compromised “Christian Dominionists” in the U.S. military:

From: Joe Wilson
Sent: Saturday, September 15, 2012 10:27 AM
To: H
Subject: From Joe Wilson

Dear Hillary, …

Glen Doherty [CIA contractor killed in the Benghazi attack] was a fellow member of the Military Religious Freedom Advisory Board, which fights to ensure that our military is not further compromised by the Christian Dominionists who seek to turn it into an instrument of their religious zealotry, an army for Christ rather than for the defense of our nation. He was invaluable in helping us uncover several cases where religious indoctrination was taking place under the guise of military training….

“These new Benghazi emails are disturbing and show why Hillary Clinton and the Obama administration had to be forced to disclose them,” said Judicial Watch President Tom Fitton. “Hillary Clinton, despite knowing that terrorists were responsible for the attack, allowed her spokesman to go to the Arab world and blame an Internet film.  Hillary Clinton trafficked in fantastical conspiracy theories that suggested both American conservatives and Israel were to blame for the Benghazi attack and jihadist violence in the Muslim world.  And the crazed email from Sidney Blumenthal shows that she was taking direction on her Benghazi spin based upon attack-style presidential campaign politics.  Finally, the ‘I just got up’ email shows that, smack dab in the middle of the Benghazi crisis, Hillary Clinton fell behind and may have not been fully briefed as she began an intense round of phone calls to foreign leaders.”

Judicial Watch’s FOIA lawsuits filed in 2014 and 2015 forced the release of these records.

The first lawsuit, filed on September 4, 2014, (Judicial Watch v. U.S. Department of State (No. 1:14-cv-01511)), sought:

  • All records concerning notes, updates, or reports created in response to the September 11, 2012, attack on the U.S. Consulate in Benghazi, Libya. This request includes, but is not limited to, notes taken by then Secretary of State Hillary Rodham Clinton or employees of the Office of the Secretary of State during the attack and its immediate aftermath.

The second FOIA lawsuit, filed on May 6, 2015, (Judicial Watch v. U.S. Department of State (No. 1:15-cv-00692), sought:

  • All emails of former Secretary of State Hillary Rodham Clinton regarding the September 11, 2012, attack on the U.S. Consulate in Benghazi, Libya. The timeframe for this request is September 11, 2012 to January 31, 2013.

As Judicial Watch chief investigator reporter Micah Morrison detailed last month, Sidney Blumenthal advised Clinton on Libya (and may have had business interests there).  The JW report also disclosed how Hillary Clinton emailed classified information to Blumenthal in response to his lobbying for Amb. Wilson’s efforts to secure taxpayer financing for an energy project in Africa. Hillary Clinton’s contacts with Blumenthal, who was also a highly paid employee of the Clinton Foundation, should have been subject to State Department ethics reviews for conflicts of interest, as promised by Mrs. Clinton.  For example, in January 2009, Hillary Clinton promised President Obama and United States Senate considering her confirmation that:

If confirmed as Secretary of State, I will not participate personally and substantially in any particular matter that has a direct and predictable effect upon this foundation, unless I first obtain a written waiver or qualify for a regulatory exemption.

###