Hillary Clinton, The “Insider Threat”47jh.,b43
PART 1 OF 2
This week we released a U.S. Department of the Army OpSec (Operational Security) PowerPoint presentation that depicts Clinton as an example of “insider threats. ” The presentation, produced as part of a lecture on cybersecurity, also includes General David Petraeus, terrorist Nidal Hassan, Bradley (Chelsea) Manning, Edward Snowden, and Washington Navy Yard shooter Aaron Alexis.
The presentation warns against “Critical Information Compromises” involving material such as the “itineraries of … senior executive service (SES)” and “very important persons (VIPs),” any of which can result in “Attack, Kidnapping, Publicity.” It also cites “unsecure email” as an error that can lead to an enemy being able to “Kill, Counter, Clone.” Judicial Watch’s investigations into Clinton’s email practices while she was secretary of state repeatedly produced examples of Clinton aide Huma Abedin sharing the schedule and travel plans of Clinton on an unsecure email system.
Clinton and Petraeus are cited as examples of “Careless or disgruntled employees.” Former Secretary Clinton conducted official government business using a non-state.gov email account, which was hosted on a server in her home in Chappaqua, New York. JW’s extensive FOIA litigation pried loose Clinton email records, which proved she sent and received classified information on an unsecure server while serving as secretary of state.
No wonder it took a lawsuit to extract this damning Pentagon analysis, which recognizes Hillary Clinton as an “insider threat” to national security. The Trump Justice Department should take note and proceed with an appropriate investigation.
Hillary Clinton may be the poster child of skullduggerous email practices, but she wasn’t the only one in the Obama administration to put sensitive matters at risk on unsecured email accounts.
We have obtained 215 pages of documents containing official, sensitive emails of Jeh Johnson, former head of the Department of Homeland Security (DHS), and three other top department officials sent through private, unsecured, webmail-based email accounts.
The documents include emails discussing high-level meetings Johnson was to have with the Kuwaiti ambassador and Saudi Arabian Interior Ministry officials, as well as a West African $4.5 million online consumer fraud scam.
Homeland Security Secretary Jeh Johnson and three other top Homeland Security officials that used “non-‘.gov’” email addresses (Judicial Watch, Inc., v. United States Department of Homeland Security (No. l:l6-cv-00967)).
This is the first batch of emails sent through private, web-based email accounts of Johnson, Deputy Secretary Alejandro Mayorkas, Chief of Staff Christian Marrone and General Counsel Stevan Bunnell that were also sent to government email accounts. The emails released reveal that:
- The Kuwaiti ambassador to the US sent an email to Johnson’s unsecure email account attempting to set up a meeting for him with Kuwait’s Interior Ministry and discussing Kuwait’s Interior Minister’s having meetings with the heads of CIA, FBI and DNI.
- The US Ambassador to Saudi Arabia emailed to Johnson’s unsecure email account, discussing Johnson’s upcoming meetings at the Saudi Interior Ministry in Jeddah.
- DHS Chief of Staff Marrone held sensitive discussions with an unidentified individual regarding the earnings of Lockheed Martin and a space vehicle launch consortium between Lockheed and Boeing, which the sender said to “use wisely.” Marrone also received procurement documents related to launch vehicles and their “Launch Infrastructure Capability.”
- Johnson gave a “Progress Report” speech in which he cited the Homeland Security Department’s “strides in cybersecurity.”
- An unidentified individual spoofed Johnson’s name and email account in a phishing scam, telling recipients that they could get money from “an abandoned fund worth U.S.D. 4.5 million in West Africa” if they would send back their personal details.
Prior to the Obama administration’s leaving office, a federal court ordered the Department of Homeland Security to preserve email records sought by Judicial Watch. In petitioning the court for the preservation order, we argued:
A court order requiring preservation of these emails is particularly necessary now as DHS has suggested that these officials may have been acting without authorization by sending emails from these accounts … As such, there is no assurance that these officials will abide by a “request” by the agency to preserve these emails, particularly after their employment ends.
Judicial Watch previously uncovered documents revealing that Secretary Jeh Johnson and 28 other agency officials used government computers to access personal web-based email accounts despite an agency-wide ban due to heightened security concerns. The documents also reveal that Homeland Security officials misled Rep. Scott Perry (R-PA) when Perry specifically asked whether personal accounts were being used for official government business.
It is ironic and disconcerting that Secretary Johnson and his aides touted Homeland Security’s great “strides in cybersecurity” while using unsecured, private, web-based email accounts that the Department had officially prohibited.
The fact that the documents found in these email accounts were so heavily redacted and that Johnson’s name and email account were spoofed in a phishing scam is indicative of just how lax communications security was inside Homeland Security during the Obama administration.
We will continue to try to obtain these emails and were in federal court today on the issue. I’m still waiting for the Trump administration to begin enforcing the rule of law on transparency as we see repeated instances of Obama-type legal defenses from the Trump Justice Department of illegal Obama administration secrecy.
Top Obama Official Admitted Benghazi Had Nothing to Do With Protests
The Clinton/Obama Benghazi scandal is not over. Not by a long shot.
This week we released 54 pages of State Department documents, including a transcript of a September 12, 2012, telephone conference call with congressional staffers in which then-Under Secretary of State for Management Patrick Kennedy admitted that the deadly terrorist assault on the Benghazi Consulate was not “under cover of protest,” but was, in fact, “a direct breaching attack.”
- All records of security waivers issued for the Special Mission compound in Benghazi, Libya under the Secure Embassy Construction and Counterterrorism Act (SECCA);
- All records concerning, regarding, or related to the Special Mission compound in Benghazi, Libya being “excepted from office facility standards and accountability” under SECCA as noted by the Benghazi Accountability Review Board.
Subject: Write up of U/S Kennedy Call with Hill re Libya
The call ended up starting around 6:30. Here are the raw notes
Rob Carter – was this an attack under the cover of a protest?
- No, this was a direct breaching attack.
- Do we have any ideas of who launched? Leads?
- Some claims from someone who has never made threat before, but everyone is looking at this closely.
- Do we believe coordinated w/Cairo?
- Attack in Cairo was a demonstration. There were no weapons shown or used. A few cans of spray paint.
The call also notes that Amb. Stevens got of the compound, but “collapsed” and was taken to the hospital. Kennedy also said that it was his personal opinion that the attack “was semi-complex.”
When asked why no Americans troops were inserted, Kennedy responded that, “the entire thing lasted approximately 4.5 hours. No US forces within time to get there.” (This was absolutely false, troops were available and could have arrived in time to provide support during the second attack on the CIA annex, which according to Kennedy, was assaulted by 100 attackers.)
The documents also include a September 13, 2012, email in which an unidentified sender reveals that as early as December 2011, the State Department confirmed the necessity for making a wide variety of “physical security upgrades.” Those upgrades included:
- Concrete, jersey-type barriers installed curbside and on the villa ground to block unused vehicle gates.
- Four steel, manual drop-arms (vehicle barriers) for access control and anti-ram protection.
- Compound lighting increased for LGP observation.
- Barbed wire installed on top of the existing perimeter wall to raise height.
- Installation of barbed wire on top of the interior chain link fence to create a secondary barrier.
- Installation of several LGP platforms for property and street surveillance.
- Construction of four guard booths.
- Installation of steel grill work on all windows not already treated with this protection.
- Erecting sandbag emplacements for internal defense purposes.
- Hardening villas with safe rooms with a steel door.
- source–opsec, ses, dhs, alejandro mayorkas, general counsel stevan bunnell, jeh johson, julie bulgrin, secca, ospb, oleta mitchell, hans von spakovsky, meese center, robert popper, jesse richman, pew,