Story 1: The Illegal Alien Family That Is Deported Together Stays Together — Let The “Dreamers” Go Back To Their Country of Origin With Families– Enforce All Immigration Laws — Remove and Deport The 30-60 Million Illegal Aliens Who Invaded The United States in Last 20 Years — No DACA Fix Needed — Trump Will Lose Many of His Supporters If He Gives Amnesty or Citizenship To Dreamers — Video —
Story 2: Feral Hog Invasion of America — Hogs Eat Everything — Kill The Hogs — Boar Busters — Videos
Story 1: The Great Outing of Sexual Abusers in Big Lie Media and Congress — The CREEP List Grows Longer and Longer — Abuse of Power — Videos —
Story 2: A Two Charlie Day — Charlie Rose, Should Be Fired By CBS, and Charlie Manson, Dead At 83, Should Have Been Executed By State of California — Videos
Story 1: More on Moore: Roy Moore’s Attorney News Briefing — She Said Vs. He Said — Faulty Memory of Witnesses Leading To Wrongful Conviction — Sexual Abuse — Who Do You Believe? — The Voters of Alabama Must Answer This Question on December 12 — Videos —
Story 2: Will The Senate Pass A Tax Reform Bill?– NO — Tax Cut Bill — Yes — Videos —
Story 3: Who is on the Congressional CREEP List of Sexual Harassers in Congress and Their Staffs ? — Who is next to be outed? — Shout Animal House — Intimacy — Getting To Know You– Dance With Me –Videos
Story 1: He Is Back — Let The Screaming Begin — Videos —
Story 2: Trial Balloon of Having Sessions Return To The Senate By Write In Campaign Shot Down By Attorney General Jeff Sessions — Political Elitist Establishment Trying To Overturn Alabama Voters — Videos —
Story 3: Attorney General Sessions Grilled By House Including Whether There Will Special Counsel For Hillary Clinton Alleged Crimes — Vidoes —
Story 4: Sexual Harassment in The Senate and House — Time To Expose the Exposers — Out Them By Naming Them — Publish The Creep List — Videos
Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 2
Wyden: No to warrantless searches by the FBI through National Security Letters
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
William Binney – The Government is Profiling You (The NSA is Spying on You)
NSA Surveillance and What To Do About It
Taking a Look at the NSA’s Massive Data Center
NSA’s Largest Spy Center Located in Utah (What you need to know)
NSA Whistleblower William Binney: The Future of FREEDOM
‘State of Surveillance’ with Edward Snowden and Shane Smith (FULL EPISODE)
Edward Snowden Full Interview on Trump, Petraeus, & Having ‘No Regrets’
DOCUMENTARY: Edward Snowden – Terminal F (2015)
NSA whistleblower Edward Snowden: ‘I don’t want to live in a society that does these sort of things’
NSA paying US Companies hundreds of millions of dollars for access to data
“You’re Being Watched”: Edward Snowden Emerges as Source Behind Explosive Revelations of NSA Spying
Does the NSA Record Phone Calls? Glenn Greenwald on Warrentless Domestic Surveillance (2007)
Published on Jul 8, 2013
The NSA warrantless surveillance controversy (AKA “Warrantless Wiretapping”) concerns surveillance of persons within the United States during the collection of foreign intelligence by the U.S. National Security Agency (NSA) as part of the war on terror. Under this program, referred to by the Bush administration as the “terrorist surveillance program”, part of the broader President’s Surveillance Program, the NSA was authorized by executive order to monitor, without search warrants, the phone calls, Internet activity (Web, e-mail, etc.), text messaging, and other communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lies within the U.S. Critics, however, claimed that it was in an effort to attempt to silence critics of the Bush Administration and their handling of several hot button issues during its tenure. Under public pressure, the Bush administration ceased the warrantless wiretapping program in January 2007 and returned review of surveillance to the FISA court. Subsequently, in 2008 Congress passed the FISA Amendments Act of 2008, which relaxed some of the original FISA court requirements.
During the Obama Administration, the NSA has officially continued operating under the new FISA guidelines. However, in April 2009 officials at the United States Department of Justice acknowledged that the NSA had engaged in “overcollection” of domestic communications in excess of the FISA court’s authority, but claimed that the acts were unintentional and had since been rectified.
All wiretapping of American citizens by the National Security Agency requires a warrant from a three-judge court set up under the Foreign Intelligence Surveillance Act. After the 9/11 attacks, Congress passed the Patriot Act, which granted the President broad powers to fight a war against terrorism. The George W. Bush administration used these powers to bypass the FISA court and directed the NSA to spy directly on al Qaeda in a new NSA electronic surveillance program. Reports at the time indicate that an “apparently accidental” “glitch” resulted in the interception of communications that were purely domestic in nature.[5] This action was challenged by a number of groups, including Congress, as unconstitutional.
The exact scope of the program is not known, but the NSA is or was provided total, unsupervised access to all fiber-optic communications going between some of the nation’s largest telecommunication companies’ major interconnected locations, including phone conversations, email, web browsing, and corporate private network traffic.[6] Critics said that such “domestic” intercepts required FISC authorization under the Foreign Intelligence Surveillance Act.[7] The Bush administration maintained that the authorized intercepts are not domestic but rather foreign intelligence integral to the conduct of war and that the warrant requirements of FISA were implicitly superseded by the subsequent passage of the Authorization for Use of Military Force Against Terrorists (AUMF).[8] FISA makes it illegal to intentionally engage in electronic surveillance under appearance of an official act or to disclose or use information obtained by electronic surveillance under appearance of an official act knowing that it was not authorized by statute; this is punishable with a fine of up to $10,000 or up to five years in prison, or both.[9] In addition, the Wiretap Act prohibits any person from illegally intercepting, disclosing, using or divulging phone calls or electronic communications; this is punishable with a fine or up to five years in prison, or both.[10]
After an article about the program, (which had been code-named Stellar Wind), was published in The New York Times on December 16, 2005, Attorney General Alberto Gonzales confirmed its existence.[11][12][13] The Times had posted the exclusive story on their website the night before, after learning that the Bush administration was considering seeking a Pentagon-Papers-style court injunction to block its publication.[14] Critics of The Times have alleged that executive editor Bill Keller had withheld the story from publication since before the 2004 Presidential election, and that the story that was ultimately published by The Times was essentially the same as reporters James Risen and Eric Lichtblau had submitted in 2004.[15] In a December 2008 interview with Newsweek, former Justice Department employee Thomas Tamm revealed himself to be the initial whistle-blower to The Times. The FBI began investigating leaks about the program in 2005, with 25 agents and 5 prosecutors on the case.
FBI’s Patriot Act Abuse of National Security Letters and illegal NSA spying
If you think you can handle the truth, well here it is folks
The National Security Agency (NSA) is an intelligence organization of the United States federal government responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare.[8][9] Although many of NSA’s programs rely on “passive” electronic collection, the agency is authorized to accomplish its mission through active clandestine means,[10] among which are physically bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13] Moreover, NSA maintains physical presence in a large number of countries across the globe, where its Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics allegedly encompass “close surveillance, burglary, wiretapping, breaking and entering”.[14][15]
Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, NSA does not unilaterally conduct human-source intelligence gathering, despite often being portrayed so in popular culture. Instead, NSA is entrusted with assistance to and coordination of SIGINT elements at other government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[16] As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.
NSA surveillance has been a matter of political controversy on several occasions, such as its spying on anti-Vietnam-war leaders or economic espionage. In 2013, the extent of some of the NSA’s secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide, many of whom are United States citizens, and tracks the movement of hundreds of millions of people using cellphones. Internationally, research has pointed to the NSA’s ability to surveil the domestic Internet traffic of foreign countries through “boomerang routing”.[18]
Contents
[show]
History
Army predecessor
The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army’s organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy’s cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[19][20]
Black Chamber
Western Union allowed MI-8 to monitor telegraphic communications passing through the company’s wires until 1929.[21]
MI-8 also operated the so-called “Black Chamber“.[22] The Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuaded Western Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the company’s wires.[23]
Other “Black Chambers” were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.[24]
Despite the American Black Chamber’s initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: “Gentlemen do not read each other’s mail”.[21]
World War II and its aftermath
During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers.[25] When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[25]
On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[25]This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[26] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[26] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[26] In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[27]
The agency was formally established by Truman in a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9.[28] Since President Truman’s memo was a classified document,[28] the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as “No Such Agency”.[29]
A secret operation, code-named “MINARET“, was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War.[31] However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal”.[31]
The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during the Vietnam War, with about 30,000 NESTOR sets produced. However a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit intercepted U.S. communications.[32]:Vol I, p.79
In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Sen. Frank Church[33] revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[34] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities.[35] Senator Frank Church uncovered previously unknown activity,[35]such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[36] The investigation also uncovered NSA’s wiretaps on targeted American citizens.[37]
In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided “irrefutable” evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.[38][39]
In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance Technology and Risk of Abuse of Economic Information’.[40] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[41] The memorial is a, “tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology”.[41] NSA employees must be retired for more than fifteen years to qualify for the memorial.[41]
NSA’s infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3 million to get the system running again. (Some incoming traffic was also directed instead to Britain’s GCHQ for the time being.) Director Michael Hayden called the outage a “wake-up call” for the need to invest in the agency’s infrastructure.[42]
War on Terror
After Osama bin Laden moved to Afghanistan in the 1980s, the NSA recorded all of his phone calls via satellite, logging over 2,000 minutes of conversation[43]
In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a “privacy mechanism”; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread’s privacy system.[44]
Trailblazer Project ramped up in 2002. SAIC, Boeing, CSC, IBM, and Litton worked on it. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004. Several whistleblowers were later arrested and charged with violating federal espionage laws.
Turbulence started in 2005. It was developed in small, inexpensive “test” pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[45] It was to be a realization of information processing at higher speeds in cyberspace.[46]
The massive extent of the NSA’s spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor, Edward Snowden.
Scope of surveillance
It was revealed that the NSA intercepts telephone and Internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics[47] and “commercial secrets”.[48] In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted “alert list” from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring.[49][50][51] Eleven percent of these monitored phone lines met the agency’s legal standard for “reasonably articulable suspicion” (RAS).[49][52]
A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[53] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[54][55]
The NSA tracks the locations of hundreds of millions of cellphones per day, allowing it to map people’s movements and relationships in detail.[56]It reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk,[57] and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year.[58] It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.[59][60]
Domestically, the NSA collects and stores metadata records of phone calls,[61] including over 120 million US Verizon subscribers,[62] as well as Internet communications,[57] relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered “relevant” to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism.[63] The NSA supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to “recreate” the investigative trail via parallel construction.[64]
The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed “radical” by the NSA.[65]
Although NSA’s surveillance activities are controversial, government agencies and private enterprises have common needs, and sometimes cooperate at subtle and complex technical levels. Big data is becoming more advantageous, justifying the cost of required computer hardware, and social media lead the trend. The interests of NSA and Silicon Valley began to converge as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data and at the same time the value of the data for use in consumer marketing began to rise. On the other hand, social media sites are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own.[66]
According to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim.[67]
Legal accountability
Despite President Obama’s claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them.[68] Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse;[69] however, the secret FISC court charged with regulating the NSA’s activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.[70] It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions;[71] and that NSA officers have even used data intercepts to spy on love interests.[72] The NSA has “generally disregarded the special rules for disseminating United States person information” by illegally sharing its intercepts with other law enforcement agencies.[73] A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been “so frequently and systemically violated that it can be fairly said that this critical element of the overall … regime has never functioned effectively.”[74][75] In 2011 the same court noted that the “volume and nature” of the NSA’s bulk foreign Internet intercepts was “fundamentally different from what the court had been led to believe”.[73] Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.[58]
Legal opinions on the NSA’s bulk collection program have differed. In mid-December 2013, U.S. District Court Judge Richard Leon ruled that the “almost-Orwellian” program likely violates the Constitution, and wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on ‘that degree of privacy’ that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”[76]
Later that month, U.S. District Judge William Pauley ruled that the NSA’s collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, “a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data” and noted that a similar collection of data prior to 9/11 might have prevented the attack.[77]
An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.[78]
Official responses
On March 20, 2013 the Director of National Intelligence, Lieutenant General James Clapper, testified before Congress that the NSA does not wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and Internet traffic are collected, but no actual message contents.[79] This was corroborated by the NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as “nearly everything a user does on the Internet”. Alexander later admitted that “content” is collected, but stated that it is simply stored and never analyzed or searched unless there is “a nexus to al-Qaida or other terrorist groups”.[69]
Regarding the necessity of these NSA programs, Alexander stated on June 27 that the NSA’s bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist “events”, including 13 in the US, and in all but one of these cases had provided the initial tip to “unravel the threat stream”.[80] On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were “close” to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.[81][82][83]
The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.[84][85] The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country,[86][87] and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.[88]
NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).[89]
Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.
As of the mid-1990s, the National Security Agency was organized into five Directorates:
The Operations Directorate, which was responsible for SIGINT collection and processing.
The Technology and Systems Directorate, which develops new technologies for SIGINT collection and processing.
The Information Systems Security Directorate, which was responsible for NSA’s communications and information security missions.
The Plans, Policy and Programs Directorate, which provided staff support and general direction for the Agency.
The Support Services Directorate, which provided logistical and administrative support activities.[90]
Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided in units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.[91][92]
Structure
As of 2013, NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit.
The main elements of the organizational structure of the NSA are:[93]
F – Directorate only known from unit F6, the Special Collection Service (SCS), which is a joint program created by CIA and NSA in 1978 to facilitate clandestine activities such as bugging computers throughout the world, using the expertise of both agencies.[94]
G – Directorate only known from unit G112, the office that manages the Senior Span platform, attached to the U2 spy planes.[95]
I – Information Assurance Directorate (IAD), which ensures availability, integrity, authentication, confidentiality, and non-repudiation of national security and telecommunications and information systems (national security systems).
J – Directorate only known from unit J2, the Cryptologic Intelligence Unit
L – Installation and Logistics
M – Human Resources
Q – Security and Counterintelligence
R – Research Directorate, which conducts research on signals intelligence and on information assurance for the U.S. Government.[96]
S – Signals Intelligence Directorate (SID), which is responsible for the collection, analysis, production and dissemination of signals intelligence. This directorate is led by a director and a deputy director. The SID consists of the following divisions:
S1 – Customer Relations
S2 – Analysis and Production Centers, with the following so-called Product Lines:
S2A: South Asia, S2B: China and Korea, S2C: International Security, S2E: Middle East/Asia, S2F: International Crime, S2G: Counter-proliferation, S2H: Russia, S2I: Counter-terrorism, S2J: Weapons and Space, S2T: Current Threats
S3 – Data Acquisition, with these divisions for the main collection programs:
S31 – Cryptanalysis and Exploitation Services (CES)
S32 – Tailored Access Operations (TAO), which hacks into foreign computers to conduct cyber-espionage and reportedly is “the largest and arguably the most important component of the NSA’s huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.”[97]
S33 – Global Access Operations (GAO), which is responsible for intercepts from satellites and other international SIGINT platforms.[98] A tool which details and maps the information collected by this unit is code-named Boundless Informant.
S34 – Collections Strategies and Requirements Center
S35 – Special Source Operations (SSO), which is responsible for domestic and compartmented collection programs, like for example the PRISM program.[98] Special Source Operations is also mentioned in connection to the FAIRVIEW collection program.[99]
T – Technical Directorate (TD)
Directorate for Education and Training
Directorate for Corporate Leadership
Foreign Affairs Directorate, which acts as liaison with foreign intelligence services, counter-intelligence centers and the UKUSA-partners.
Acquisitions and Procurement Directorate
Information Sharing Services (ISS), led by a chief and a deputy chief.[100]
In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.[101]
After president George W. Bush initiated the President’s Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[102]
A 2016 proposal would combine the Signals Intelligence Directorate with the Information Assurance Directorate into a Directorate of Operations.[103]
Watch centers
The NSA maintains at least two watch centers:
National Security Operations Center (NSOC), which is the NSA’s current operations center and focal point for time-sensitive SIGINT reporting for the United States SIGINT System (USSS). This center was established in 1968 as the National SIGINT Watch Center (NSWC) and renamed into National SIGINT Operations Center (NSOC) in 1973. This “nerve center of the NSA” got its current name in 1996.[104]
NSA/CSS Threat Operations Center (NTOC), which is the primary NSA/CSS partner for Department of Homeland Security response to cyber incidents. The NTOC establishes real-time network awareness and threat characterization capabilities to forecast, alert, and attribute malicious activity and enable the coordination of Computer Network Operations. The NTOC was established in 2004 as a joint Information Assurance and Signals Intelligence project.[105]
Employees
The number of NSA employees is officially classified[4] but there are several sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA’s budget and workforce were cut by one third, which led to a substantial loss of experience.[106]
In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities.[2] In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is “somewhere between 37,000 and one billion” as a joke,[4] and stated that the agency is “probably the biggest employer of introverts.”[4] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[5] More widely, it has been described as the world’s largest single employer of mathematicians.[107] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.
The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.[109] Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.
The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, “If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired.” David Kahn criticized the NSA’s tactics of concealing its doings as smug and the Congress’ blind faith in the agency’s right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.[109]
Edward Snowden‘s leaking of the existence of PRISM in 2013 caused the NSA to institute a “two-man rule“, where two system administrators are required to be present when one accesses certain sensitive information.[108] Snowden claims he suggested such a rule in 2009.[110]
The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[111] As part of the latter, historically EPQs or “embarrassing personal questions” about sexual behavior had been included in the NSA polygraph.[111] The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive “termination of employment”, according to a 1982 memorandum from the director of the NSA.[112]
NSA-produced video on the polygraph process
There are also “special access examination” polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[112] NSA’s brochure states that the average test length is between two and four hours.[113] A 1983 report of the Office of Technology Assessment stated that “It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions.”[114]Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[111]
In 2010 the NSA produced a video explaining its polygraph process.[115] The video, ten minutes long, is titled “The Truth About the Polygraph” and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays “various applicants, or actors playing them — it’s not clear — describing everything bad they had heard about the test, the implication being that none of it is true.”[116] AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[115] George Maschke, the founder of the Web site, accused the NSA polygraph video of being “Orwellian“.[116]
After Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.[117]
Arbitrary firing
The number of exemptions from legal requirements has been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee,The Washington Post wrote: “This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself.” Yet, the bill was accepted by an overwhelming majority.[109]
Insignia and memorials
The heraldic insignia of NSA consists of an eagle inside a circle, grasping a key in its talons.[118] The eagle represents the agency’s national mission.[118] Its breast features a shield with bands of red and white, taken from the Great Seal of the United States and representing Congress.[118] The key is taken from the emblem of Saint Peter and represents security.[118]
When the NSA was created, the agency had no emblem and used that of the Department of Defense.[119] The agency adopted its first of two emblems in 1963.[119] The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.[120]
The NSA’s flag consists of the agency’s seal on a light blue background.
National Cryptologic Memorial
Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.[121] The USS Liberty incident in 1967 and USS Pueblo incident in 1968 are examples of the losses endured during the Cold War.[121]
The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions.[122] It is made of black granite, and has 171 names carved into it, as of 2013 .[122] It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.[122]
NSANet (NSA’s intranet)
Behind the Green Door – Secure communications room with separate computer terminals for access to SIPRNET, GWAN, NSANET, and JWICS
NSANet stands for National Security Agency Network and is the official NSA intranet.[123] It is a classified network,[124] for information up to the level of TS/SCI[125] to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).[126]
NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency’s systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.[127]
In 1998, NSANet, along with NIPRNET and SIPRNET, had “significant problems with poor search capabilities, unorganized data and old information”.[128] In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems.[129] Some universities that do highly sensitive research are allowed to connect to it.[130]
The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in “a file-sharing location on the NSA’s intranet site” so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations.[131]
National Computer Security Center
The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government.[132] NCSC was part of NSA,[133] and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications.[134] The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.[134]
Facilities
Headquarters
National Security Agency headquarters in Fort Meade, 2013
Headquarters for the National Security Agency is located at 39°6′32″N76°46′17″W in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20 mi (32 km) southwest of Baltimore,[135] and 25 mi (40 km) northeast of Washington, DC.[136] The NSA has its own exit off Maryland Route 295 South labeled “NSA Employees Only”.[137][138] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[139]
NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade.[140] Built on 350 acres (140 ha; 0.55 sq mi)[141] of Ft. Meade’s 5,000 acres (2,000 ha; 7.8 sq mi),[142] the site has 1,300 buildings and an estimated 18,000 parking spaces.[136][143]
NSA headquarters building in Fort Meade (left), NSOC (right)
The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as “a modern boxy structure” that appears similar to “any stylish office building.”[144] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[144] It contains 3,000,000 square feet (280,000 m2), or more than 68 acres (28 ha), of floor space; Bamford said that the U.S. Capitol “could easily fit inside it four times over.”[144]
The facility has over 100 watchposts,[145] one of them being the visitor control center, a two-story area that serves as the entrance.[144] At the entrance, a white pentagonal structure,[146] visitor badges are issued to visitors and security clearances of employees are checked.[147] The visitor center includes a painting of the NSA seal.[146]
The OPS2A building, the tallest building in the NSA complex and the location of much of the agency’s operations directorate, is accessible from the visitor center. Bamford described it as a “dark glass Rubik’s Cube“.[148] The facility’s “red corridor” houses non-security operations such as concessions and the drug store. The name refers to the “red badge” which is worn by someone without a security clearance. The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank.[146] NSA headquarters has its own post office, fire department, and police force.[149][150][151]
Due to massive amounts of data processing, NSA is the largest electricity consumer in Maryland.[140]
Following a major power outage in 2000, in 2003 and in follow-ups through 2007, The Baltimore Sun reported that the NSA was at risk of electrical overload because of insufficient internal electrical infrastructure at Fort Meade to support the amount of equipment being installed. This problem was apparently recognized in the 1990s but not made a priority, and “now the agency’s ability to keep its operations going is threatened.”[153]
Baltimore Gas & Electric (BGE, now Constellation Energy) provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year.[154] In 2011, NSA at Ft. Meade was Maryland’s largest consumer of power.[140] In 2007, as BGE’s largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.[153]
One estimate put the potential for power consumption by the new Utah Data Center at US$40 million per year.[155]
When the agency was established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army‘s cryptographic operations.[156]Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.[157]
Construction of additional buildings began after the agency occupied buildings at Ft. Meade in the late 1950s, which they soon outgrew.[157] In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the “Headquarters Building” and since the NSA management occupied the top floor, workers used “Ninth Floor” to refer to their leaders.[158] COMSEC remained in Washington, D.C., until its new building was completed in 1968.[157] In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan.[159] The four NSA buildings became known as the “Big Four.”[159] The NSA director moved to 2B when it opened.[159]
On March 30, 2015, shortly before 9 am, a stolen sports utility vehicle approached an NSA police vehicle blocking the road near the gate of Fort Meade, after it was told to leave the area. NSA officers fired on the SUV, killing the 27-year-old driver, Ricky Hall (a transgender person also known as Mya), and seriously injuring his 20-year-old male passenger. An NSA officer’s arm was injured when Hall subsequently crashed into his vehicle.[160][161]
The two, dressed in women’s clothing after a night of partying at a motel with the man they’d stolen the SUV from that morning, “attempted to drive a vehicle into the National Security Agency portion of the installation without authorization”, according to an NSA statement.[162] FBI spokeswoman Amy Thoreson said the incident is not believed to be related to terrorism.[163]In June 2015 the FBI closed its investigation into the incident and federal prosecutors have declined to bring charges against anyone involved.[164]
An anonymous police official told The Washington Post, “This was not a deliberate attempt to breach the security of NSA. This was not a planned attack.” The two are believed to have made a wrong turn off the highway, while fleeing from the motel after stealing the vehicle. A small amount of cocaine was found in the SUV. A local CBS reporter initially said a gun was found,[165]but her later revision does not.[166] Dozens of journalists were corralled into a parking lot blocks away from the scene, and were barred from photographing the area.[167]
NSA held a groundbreaking ceremony at Ft. Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016.[169] Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages.[149] It cost $3.2 billion and covers 227 acres (92 ha; 0.355 sq mi).[149] The center is 1,800,000 square feet (17 ha; 0.065 sq mi)[149] and initially uses 60 megawatts of electricity.[170]
Increments II and III are expected to be completed by 2030, and would quadruple the space, covering 5,800,000 square feet (54 ha; 0.21 sq mi) with 60 buildings and 40 parking garages.[149]Defense contractors are also establishing or expanding cybersecurity facilities near the NSA and around the Washington metropolitan area.[149]
On January 6, 2011 a groundbreaking ceremony was held to begin construction on NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center” for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40 km) south of Salt Lake City, and will help support the agency’s National Cyber-security Initiative.[172] It is expected to be operational by September 2013.[155]
In 2009, to protect its assets and to access more electricity, NSA sought to decentralize and expand its existing facilities in Ft. Meade and Menwith Hill,[173] the latter expansion expected to be completed by 2015.[174]
NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world.[182] Planned in 1954, and opened in 1960, the base covered 562 acres (227 ha; 0.878 sq mi) in 1999.[183]
The agency’s European Cryptologic Center (ECC), with 240 employees in 2011, is headquartered at a US military compound in Griesheim, near Frankfurt in Germany. A 2011 NSA report indicates that the ECC is responsible for the “largest analysis and productivity in Europe” and focusses on various priorities, including Africa, Europe, the Middle East and counterterrorism operations.[184]
In 2013, a new Consolidated Intelligence Center, also to be used by NSA, is being built at the headquarters of the United States Army Europe in Wiesbaden, Germany.[185] NSA’s partnership with Bundesnachrichtendienst (BND), the German foreign intelligence service, was confirmed by BND president Gerhard Schindler.[185]
Thailand
Thailand is a “3rd party partner” of the NSA along with nine other nations.[186] These are non-English-speaking countries that have made security agreements for the exchange of SIGINT raw material and end product reports.
Thailand is the site of at least two US SIGINT collection stations. One is at the US Embassy in Bangkok, a joint NSA-CIA Special Collection Service (SCS) unit. It presumably eavesdrops on foreign embassies, governmental communications, and other targets of opportunity.[187]
The second installation is a FORNSAT (foreign satellite interception) station in the Thai city of Khon Kaen. It is codenamed INDRA, but has also been referred to as LEMONWOOD.[187] The station is approximately 40 ha (100 acres) in size and consists of a large 3,700–4,600 m2 (40,000–50,000 ft2) operations building on the west side of the ops compound and four radome-enclosed parabolic antennas. Possibly two of the radome-enclosed antennas are used for SATCOM intercept and two antennas used for relaying the intercepted material back to NSA. There is also a PUSHER-type circularly-disposed antenna array (CDAA) array just north of the ops compound.[188][189]
NSA activated Khon Kaen in October 1979. Its mission was to eavesdrop on the radio traffic of Chinese army and air force units in southern China, especially in and around the city of Kunming in Yunnan Province. Back in the late 1970s the base consisted only of a small CDAA antenna array that was remote-controlled via satellite from the NSA listening post at Kunia, Hawaii, and a small force of civilian contractors from Bendix Field Engineering Corp. whose job it was to keep the antenna array and satellite relay facilities up and running 24/7.[188]
According to the papers of the late General William Odom, the INDRA facility was upgraded in 1986 with a new British-made PUSHER CDAA antenna as part of an overall upgrade of NSA and Thai SIGINT facilities whose objective was to spy on the neighboring communist nations of Vietnam, Laos, and Cambodia.[188]
The base apparently fell into disrepair in the 1990s as China and Vietnam became more friendly towards the US, and by 2002 archived satellite imagery showed that the PUSHER CDAA antenna had been torn down, perhaps indicating that the base had been closed. At some point in the period since 9/11, the Khon Kaen base was reactivated and expanded to include a sizeable SATCOM intercept mission. It is likely that the NSA presence at Khon Kaen is relatively small, and that most of the work is done by civilian contractors.[188]
Mission
NSA’s eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications.[190]
According to the Washington Post, “[e]very day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases.”[191]
Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War II codes and ciphers (see, for instance, Purple, Venona project, and JN-25).
As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008 by President Bush, the NSA became the lead agency to monitor and protect all of the federal government’s computer networks from cyber-terrorism.[9]
Operations
Operations by the National Security Agency can be divided in three types:
Collection overseas, which falls under the responsibility of the Global Access Operations (GAO) division.
Domestic collection, which falls under the responsibility of the Special Source Operations (SSO) division.
Hacking operations, which falls under the responsibility of the Tailored Access Operations (TAO) division.
During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill.[196] Investigative journalist Duncan Campbell reported in 1988 on the ECHELON surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT, and detailed how the eavesdropping operations worked.[197] In November 3, 1999 the BBC reported that they had confirmation from the Australian Government of the existence of a powerful “global spying network” code-named Echelon, that could “eavesdrop on every single phone call, fax or e-mail, anywhere on the planet” with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was “linked directly to the headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland”.[198]
NSA’s United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about “… U.S. persons, entities, corporations or organizations….” without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage, received criticism from countries outside the UKUSA alliance.[199][200]
The NSA is also involved in planning to blackmail people with “SEXINT“, intelligence gained about a potential target’s sexual activity and preferences. Those targeted had not committed any apparent crime nor were charged with one.[201]
In order to support its facial recognition program, the NSA is intercepting “millions of images per day”.[202]
The Real Time Regional Gateway is a data collection program introduced in 2005 in Iraq by NSA during the Iraq War that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.[203] This “collect it all” strategy introduced by NSA director, Keith B. Alexander, is believed by Glenn Greenwald of The Guardian to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013.[204]
BoundlessInformant
Edward Snowden revealed in June 2013 that between February 8 and March 8, 2013, the NSA collected about 124.8 billion telephone data items and 97.1 billion computer data items throughout the world, as was displayed in charts from an internal NSA tool codenamed Boundless Informant. It was reported that some of these data reflected eavesdropping on citizens in countries like Germany, Spain and France.[205]
In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of the Dual_EC_DRBG encryption standard that contained built-in vulnerabilities in 2006 to the United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO).[207][208] This memo appears to give credence to previous speculation by cryptographers at Microsoft Research.[209]Edward Snowden claims that the NSA often bypasses encryption altogether by lifting information before it is encrypted or after it is decrypted.[208]
XKeyscore rules (as specified in a file xkeyscorerules100.txt, sourced by German TV stations NDR and WDR, who claim to have excerpts from its source code) reveal that the NSA tracks users of privacy-enhancing software tools, including Tor; an anonymous email service provided by the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts; and readers of the Linux Journal.[210][211]
NSA’s mission, as set forth in Executive Order 12333 in 1981, is to collect information that constitutes “foreign intelligence or counterintelligence” while not “acquiring information concerning the domestic activities of United States persons”. NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the United States, while confining its own activities within the United States to the embassies and missions of foreign nations.[212] The appearance of a ‘Domestic Surveillance Directorate’ of the NSA was soon exposed as a hoax in 2013.[213][214]
NSA’s domestic surveillance activities are limited by the requirements imposed by the Fourth Amendment to the U.S. Constitution. The Foreign Intelligence Surveillance Court for example held in October 2011, citing multiple Supreme Court precedents, that the Fourth Amendment prohibitions against unreasonable searches and seizures applies to the contents of all communications, whatever the means, because “a person’s private communications are akin to personal papers.”[215] However, these protections do not apply to non-U.S. persons located outside of U.S. borders, so the NSA’s foreign surveillance efforts are subject to far fewer limitations under U.S. law.[216] The specific requirements for domestic surveillance operations are contained in the Foreign Intelligence Surveillance Act of 1978 (FISA), which does not extend protection to non-U.S. citizens located outside of U.S. territory.[216]
George W. Bush administration
George W. Bush, president during the 9/11 terrorist attacks, approved the Patriot Act shortly after the attacks to take anti-terrorist security measures. Title 1, 2, and 9 specifically authorized measures that would be taken by the NSA. These titles granted enhanced domestic security against terrorism, surveillance procedures, and improved intelligence, respectively. On March 10, 2004, there was a debate between President Bush and White House Counsel Alberto Gonzales, Attorney General John Ashcroft, and Acting Attorney General James Comey. The Attorney Generals were unsure if the NSA’s programs could be considered constitutional. They threatened to resign over the matter, but ultimately the NSA’s programs continued.[217] On March 11, 2004, President Bush signed a new authorization for mass surveillance of Internet records, in addition to the surveillance of phone records.This allowed the president to be able to override laws such as the Foreign Intelligence Surveillance Act, which protected civilians from mass surveillance. In addition to this, President Bush also signed that the measures of mass surveillance were also retroactively in place.[218]
One such surveillance program, authorized by the U.S. Signals Intelligence Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U.S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted, along with those of other nations.[220]
Proponents of the surveillance program claim that the President has executive authority to order such action, arguing that laws such as FISA are overridden by the President’s Constitutional powers. In addition, some argued that FISA was implicitly overridden by a subsequent statute, the Authorization for Use of Military Force, although the Supreme Court’s ruling in Hamdan v. Rumsfeld deprecates this view. In the August 2006 case ACLU v. NSA, U.S. District Court Judge Anna Diggs Taylor concluded that NSA’s warrantless surveillance program was both illegal and unconstitutional. On July 6, 2007 the 6th Circuit Court of Appeals vacated the decision on the grounds that the ACLU lacked standing to bring the suit.[221]
On January 17, 2006, the Center for Constitutional Rights filed a lawsuit, CCR v. Bush, against the George W. Bush Presidency. The lawsuit challenged the National Security Agency’s (NSA’s) surveillance of people within the U.S., including the interception of CCR emails without securing a warrant first.[222][223]
As a result of the USA Freedom Act passed by Congress in June 2015, the NSA had to shut down its bulk phone surveillance program on November 29 of the same year. The USA Freedom Act forbids the NSA to collect metadata and content of phone calls unless it has a warrant for terrorism investigation. In that case the agency has to ask the telecom companies for the record, which will only be kept for six months.
In May 2006, Mark Klein, a former AT&T employee, alleged that his company had cooperated with NSA in installing Narus hardware to replace the FBI Carnivore program, to monitor network communications including traffic between American citizens.[227]
Data mining
NSA was reported in 2008 to use its computing capability to analyze “transactional” data that it regularly acquires from other government agencies, which gather it under their own jurisdictional authorities. As part of this effort, NSA now monitors huge volumes of records of domestic email data, web addresses from Internet searches, bank transfers, credit-card transactions, travel records, and telephone data, according to current and former intelligence officials interviewed by The Wall Street Journal. The sender, recipient, and subject line of emails can be included, but the content of the messages or of phone calls are not.[228]
A 2013 advisory group for the Obama administration, seeking to reform NSA spying programs following the revelations of documents released by Edward J. Snowden.[229] mentioned in ‘Recommendation 30’ on page 37, “…that the National Security Council staff should manage an interagency process to review on a regular basis the activities of the US Government regarding attacks that exploit a previously unknown vulnerability in a computer application.” Retired cyber security expert Richard A. Clarke was a group member and stated on April 11 that NSA had no advance knowledge of Heartbleed.[230]
In August 2013 it was revealed that a 2005 IRS training document showed that NSA intelligence intercepts and wiretaps, both foreign and domestic, were being supplied to the Drug Enforcement Administration (DEA) and Internal Revenue Service (IRS) and were illegally used to launch criminal investigations of US citizens. Law enforcement agents were directed to conceal how the investigations began and recreate an apparently legal investigative trail by re-obtaining the same evidence by other means.[231][232]
Barack Obama administration
In the months leading to April 2009, the NSA intercepted the communications of American citizens, including a Congressman, although the Justice Department believed that the interception was unintentional. The Justice Department then took action to correct the issues and bring the program into compliance with existing laws.[233] United States Attorney General Eric Holder resumed the program according to his understanding of the Foreign Intelligence Surveillance Act amendment of 2008, without explaining what had occurred.[234]
Polls conducted in June 2013 found divided results among Americans regarding NSA’s secret data collection.[235]Rasmussen Reports found that 59% of Americans disapprove,[236]Gallup found that 53% disapprove,[237] and Pew found that 56% are in favor of NSA data collection.[238]
Section 215 metadata collection
On April 25, 2013, the NSA obtained a court order requiring Verizon‘s Business Network Services to provide metadata on all calls in its system to the NSA “on an ongoing daily basis” for a three-month period, as reported by The Guardian on June 6, 2013. This information includes “the numbers of both parties on a call … location data, call duration, unique identifiers, and the time and duration of all calls” but not “[t]he contents of the conversation itself”. The order relies on the so-called “business records” provision of the Patriot Act.[239][240]
In August 2013, following the Snowden leaks, new details about the NSA’s data mining activity were revealed. Reportedly, the majority of emails into or out of the United States are captured at “selected communications links” and automatically analyzed for keywords or other “selectors”. Emails that do not match are deleted.[241]
The utility of such a massive metadata collection in preventing terrorist attacks is disputed. Many studies reveal the dragnet like system to be ineffective. One such report, released by the New America Foundation concluded that after an analysis of 225 terrorism cases, the NSA “had no discernible impact on preventing acts of terrorism.”[242]
Defenders of the program say that while metadata alone can’t provide all the information necessary to prevent an attack, it assures the ability to “connect the dots”[243] between suspect foreign numbers and domestic numbers with a speed only the NSA’s software is capable of. One benefit of this is quickly being able to determine the difference between suspicious activity and real threats.[citation needed] As an example, NSA director General Keith Alexander mentioned at the annual Cybersecurity Summit in 2013, that metadata analysis of domestic phone call records after the Boston Marathon bombing helped determine that[clarification needed] another attack in New York was baseless.[243]
In addition to doubts about its effectiveness, many people argue that the collection of metadata is an unconstitutional invasion of privacy. As of 2015, the collection process remains legal and grounded in the ruling from Smith v. Maryland (1979). A prominent opponent of the data collection and its legality is U.S. District Judge Richard J. Leon, who issued a report in 2013[244] in which he stated: “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval…Surely, such a program infringes on ‘that degree of privacy’ that the founders enshrined in the Fourth Amendment”.
Under the PRISM program, which started in 2007,[245][246] NSA gathers Internet communications from foreign targets from nine major U.S. Internet-based communication service providers: Microsoft,[247]Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Data gathered include email, video and voice chat, videos, photos, VoIP chats such as Skype, and file transfers.
In June 2015, Wikileaks published documents, which showed that NSA spied on French companies.[248]
July 2015 – WikiLeaks: Espionage against German federal ministries[edit]
In July 2015, WikiLeaks published documents, which showed that NSA spied on federal German ministries since 1990s.[249][250] Even Germany’s Chancellor Angela Merkel‘s cellphones and phone of her predecessors had been intercepted.[251]
Claims of prevented terrorist attacks
Former NSA director General Keith Alexander claimed that in September 2009 the NSA prevented Najibullah Zazi and his friends from carrying out a terrorist attack.[252] However, this claim has been debunked and no evidence has been presented demonstrating that the NSA has ever been instrumental in preventing a terrorist attack.[253][254][255][256]
Besides the more traditional ways of eavesdropping in order to collect signals intelligence, NSA is also engaged in hacking computers, smartphones and their networks. These operations are conducted by the Tailored Access Operations (TAO) division.
NSA’s China hacking group
According to the Foreign Policy magazine, “… the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People’s Republic of China.”[257][258]
Syrian internet blackout
In an interview with Wired magazine, Edward Snowden said the Tailored Access Operations division accidentally caused Syria‘s internet blackout in 2012.[259]
Suspected responsibility for hacking operations by the Equation Group[edit]
The espionage group named the Equation Group, described by discoverers Kaspersky Labs as one of the most advanced (if not the most advanced) in the world as of 2015,[260]:31 and connected to over 500 malware infections in at least 42 countries over many years, is suspected of being a part of NSA.[261][262] The group’s known espionage methods have been documented to include interdiction (interception of legitimate CDs sent by a scientific conference organizer by mail),[260]:15 and the “unprecedented” ability to infect and be transmitted through the hard drivefirmware of several of the major hard drive manufacturers, and create and use hidden disk areas and virtual disk systems for its purposes, a feat demanding access to the manufacturer’s source code of each to achieve.[260]:16–18 The methods used to deploy the tools demonstrated “surgical precision”, going so far as to exclude specific countries by IP and allow targeting of specific usernames on discussion forums.[260]:23–26 The techniques and knowledge used by the Equation Group are considered in summary to be “out of the reach of most advanced threat groups in the world except [this group].[260]:31
When my oldest son [Linus Torvalds] was asked the same question: “Has he been approached by the NSA about backdoors?” he said “No”, but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer, [but] everybody understood that the NSA had approached him.
— Nils Torvalds, LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens – 11th Hearing, 11 November 2013[265]
IBM Notes was the first widely adopted software product to use public key cryptography for client–server and server–server authentication and for encryption of data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits. In 1997, Lotus negotiated an agreement with the NSA that allowed export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a “workload reduction factor” for the NSA. This strengthened the protection for users of Notes outside the US against private-sector industrial espionage, but not against spying by the US government.[266][267]
Boomerang routing
While it is assumed that foreign transmissions terminating in the U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA’s ability to surveil the domestic Internet traffic of foreign countries.[18] Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang routing of Canadian Internet service providers.[18]
Hardware implanting
Intercepted packages are opened carefully by NSA employees
A “load station” implanting a beacon
A document included in NSA files released with Glenn Greenwald‘s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) and other NSA units gain access to hardware. They intercept routers, servers and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered. This was described by an NSA manager as “some of the most productive operations in TAO because they preposition access points into hard target networks around the world.”[268]
Computers seized by the NSA due to interdiction are often modified with a physical device known as Cottonmouth.[269]Cottonmouth is a device that can be inserted in the USB port of a computer in order to establish remote access to the targeted machine. According to NSA’s Tailored Access Operations (TAO) group implant catalog, after implanting Cottonmouth, the NSA can establish Bridging (networking) “that allows the NSA to load exploit software onto modified computers as well as allowing the NSA to relay commands and data between hardware and software implants.”[270]
Role in scientific research and development[
NSA has been involved in debates about public policy, both indirectly as a behind-the-scenes adviser to other departments, and directly during and after Vice Admiral Bobby Ray Inman‘s directorship. NSA was a major player in the debates of the 1990s regarding the export of cryptography in the United States. Restrictions on export were reduced but not eliminated in 1996.
Its secure government communications work has involved the NSA in numerous technology areas, including the design of specialized communications hardware and software, production of dedicated semiconductors (at the Ft. Meade chip fabrication plant), and advanced cryptography research. For 50 years, NSA designed and built most of its computer equipment in-house, but from the 1990s until about 2003 (when the U.S. Congress curtailed the practice), the agency contracted with the private sector in the fields of research and equipment.[271]
NSA was embroiled in some minor controversy concerning its involvement in the creation of the Data Encryption Standard (DES), a standard and public block cipheralgorithm used by the U.S. government and banking community. During the development of DES by IBM in the 1970s, NSA recommended changes to some details of the design. There was suspicion that these changes had weakened the algorithm sufficiently to enable the agency to eavesdrop if required, including speculation that a critical component—the so-called S-boxes—had been altered to insert a “backdoor” and that the reduction in key length might have made it feasible for NSA to discover DES keys using massive computing power. It has since been observed that the S-boxes in DES are particularly resilient against differential cryptanalysis, a technique which was not publicly discovered until the late 1980s, but which was known to the IBM DES team.
The United States Senate Select Committee on Intelligence reviewed NSA’s involvement, and concluded that while the agency had provided some assistance, it had not tampered with the design.[272][273] In late 2009 NSA declassified information stating that “NSA worked closely with IBM to strengthen the algorithm against all except brute force attacks and to strengthen substitution tables, called S-boxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on a 56-bit key.”[274][275]
The involvement of NSA in the selection of a successor to Data Encryption Standard (DES), the Advanced Encryption Standard (AES), was limited to hardware performance testing (see AES competition).[276] NSA has subsequently certified AES for protection of classified information (for at most two levels, e.g. SECRET information in an unclassified environment[clarification needed]) when used in NSA-approved systems.[277]
The NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset of those previously specified by NIST and are expected to serve for most information protection purposes, while the Suite A algorithms are secret and are intended for especially high levels of protection.[277]
SHA
The widely used SHA-1 and SHA-2 hash functions were designed by NSA. SHA-1 is a slight modification of the weaker SHA-0 algorithm, also designed by NSA in 1993. This small modification was suggested by NSA two years later, with no justification other than the fact that it provides additional security. An attack for SHA-0 that does not apply to the revised algorithm was indeed found between 1998 and 2005 by academic cryptographers. Because of weaknesses and key length restrictions in SHA-1, NIST deprecates its use for digital signatures, and approves only the newer SHA-2 algorithms for such applications from 2013 on.[287]
A new hash standard, SHA-3, has recently been selected through the competition concluded October 2, 2012 with the selection of Keccak as the algorithm. The process to select SHA-3 was similar to the one held in choosing the AES, but some doubts have been cast over it,[288][289] since fundamental modifications have been made to Keccak in order to turn it into a standard.[290] These changes potentially undermine the cryptanalysis performed during the competition and reduce the security levels of the algorithm.[288]
NSA promoted the inclusion of a random number generator called Dual_EC_DRBG in the U.S. National Institute of Standards and Technology‘s 2007 guidelines. This led to speculation of a backdoor which would allow NSA access to data encrypted by systems using that pseudo random number generator.[291]
This is now deemed to be plausible based on the fact that the output of the next iterations of the PRNG can provably be determined if the relation between two internal elliptic curve points is known.[292][293] Both NIST and RSA are now officially recommending against the use of this PRNG.[294][295]
Because of concerns that widespread use of strong cryptography would hamper government use of wiretaps, NSA proposed the concept of key escrow in 1993 and introduced the Clipper chip that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials.[296] The proposal was strongly opposed and key escrow requirements ultimately went nowhere.[297] However, NSA’s Fortezza hardware-based encryption cards, created for the Clipper project, are still used within government, and NSA ultimately declassified and published the design of the Skipjack cipher used on the cards.[298][299]
Perfect Citizen is a program to perform vulnerability assessment by the NSA on U.S. critical infrastructure.[300][301] It was originally reported to be a program to develop a system of sensors to detect cyber attacks on critical infrastructure computer networks in both the private and public sector through a network monitoring system named Einstein.[302][303] It is funded by the Comprehensive National Cybersecurity Initiative and thus far Raytheon has received a contract for up to $100 million for the initial stage.
Academic research
NSA has invested many millions of dollars in academic research under grant code prefix MDA904, resulting in over 3,000 papers (as of 2007-10-11). NSA/CSS has, at times, attempted to restrict the publication of academic research into cryptography; for example, the Khufu and Khafre block ciphers were voluntarily withheld in response to an NSA request to do so. In response to a FOIA lawsuit, in 2013 the NSA released the 643-page research paper titled, “Untangling the Web: A Guide to Internet Research,[304] ” written and compiled by NSA employees to assist other NSA workers in searching for information of interest to the agency on the public Internet.[305]
Patents
NSA has the ability to file for a patent from the U.S. Patent and Trademark Office under gag order. Unlike normal patents, these are not revealed to the public and do not expire. However, if the Patent Office receives an application for an identical patent from a third party, they will reveal NSA’s patent and officially grant it to NSA for the full term on that date.[306]
One of NSA’s published patents describes a method of geographically locating an individual computer site in an Internet-like network, based on the latency of multiple network connections.[307] Although no public patent exists, NSA is reported to have used a similar locating technology called trilateralization that allows real-time tracking of an individual’s location, including altitude from ground level, using data obtained from cellphone towers.[308]
Excerpt of James Clapper‘s false testimony to Congress on NSA surveillance programs
In the United States, at least since 2001,[309] there has been legal controversy over what signal intelligence can be used for and how much freedom the National Security Agency has to use signal intelligence.[310] The government has made, in 2015, slight changes in how it uses and collects certain types of data,[311] specifically phone records. President Barack Obama has asked lawyers and his national security team to look at the tactics that are being used by the NSA. President Obama made a speech on January 17, 2014 where he defended the national security measures, including the NSA, and their intentions for keeping the country safe through surveillance. He said that it is difficult to determine where the line should be drawn between what is too much surveillance and how much is needed for national security because technology is ever changing and evolving. Therefore, the laws cannot keep up with the rapid advancements.
President Obama did make some changes to national security regulations and how much data can be collected and surveyed.[citation needed] The first thing he added, was more presidential directive and oversight so that privacy and basic rights are not violated. The president would look over requests on behalf of American citizens to make sure that their personal privacy is not violated by the data that is being requested. Secondly, surveillance tactics and procedures are becoming more public, including over 40 rulings of the FISC that have been declassified.[citation needed] Thirdly, further protections are being placed on activities that are justified under Section 702, such as the ability to retain, search and use data collected in investigations, which allows the NSA to monitor and intercept interaction of targets overseas. Finally, national security letters, which are secret requests for information that the FBI uses in their investigations, are becoming less secretive. The secrecy of the information requested will not be indefinite and will terminate after a set time if future secrecy is not required.[citation needed] Concerning the bulk surveillance of American’s phone records, President Obama also ordered a transition from bulk surveillance under Section 215 to a new policy that will eliminate unnecessary bulk collection of metadata.
As of May 7, 2015, the U.S. Court of Appeals for the Second Circuit ruled that the interpretation of Section 215 of the Patriot Act was wrong and that the NSA program that has been collecting Americans’ phone records in bulk is illegal.[312] It stated that Section 215 cannot be clearly interpreted to allow government to collect national phone data and, as a result, expired on June 1, 2015. This ruling “is the first time a higher-level court in the regular judicial system has reviewed the N.S.A. phone records program.” [313] The new bill getting passed later in May taking its place is known as the U.S.A. Freedom Act, which will enable the NSA to continue hunting for terrorists by analyzing telephone links between callers but “keep the bulk phone records in the hands of phone companies.”[313] This would give phone companies the freedom to dispose the records in an 18-month period. The White House argued that this new ruling validated President Obama’s support of the government being extracted from bulk data collection and giving power to the telecommunications companies.
Previously, the NSA paid billions of dollars to telecommunications companies in order to collect data from them.[314] While companies such as Google and Yahoo! claim that they do not provide “direct access” from their servers to the NSA unless under a court order,[315] the NSA had access to emails, phone calls and cellular data users.[316] With this new ruling, telecommunications companies would not provide the NSA with bulk information. The companies would allow the disposal of data in every 18 months,[313] which is arguably putting the telecommunications companies at a higher advantage.
This ruling made the collecting of phone records illegal, but it did not rule on Section 215’s constitutionality. Senate Majority Leader Mitch McConnell has already put forth a new bill to re-authorize the Patriot Act.[317] Defenders of this surveillance program are claiming that judges who sit on the Foreign Intelligence Surveillance Court (FISC) had ruled 37 times that this kind of collection of data is, in fact, lawful.[317] The FISC is the court specifically mandated to grant surveillance orders in the name of foreign intelligence. The new ruling made by the Second District Court of Appeals now retroactively dismisses the findings of the FISC on this program.
The Internal Revenue Service is the latest in a growing list of US federal agencies known to have possessed the sophisticated cellphone dragnet equipment known as Stingray, according to documents obtained by the Guardian.
Invoices obtained following a request under the Freedom of Information Act show purchases made in 2009 and 2012 by the federal tax agency with Harris Corporation, one of a number of companies that manufacture the devices. Privacy advocates said the revelation “shows the wide proliferation of this very invasive surveillance technology”.
The 2009 IRS/Harris Corp invoice is mostly redacted under section B(4) of the Freedom of Information Act, which is intended to protect trade secrets and privileged information. However, an invoice from 2012, which is also partially redacted, reports that the agency spent $65,652 on upgrading a Stingray II to a HailStorm, a more powerful version of the same device, as well as $6,000 on training from Harris Corporation.
Stingrays are the best-known example of a type of device called an IMSI-catcher, also known as “cell-site simulators”. About the size of a briefcase, they work by pretending to be cellphone towers in order to strip metadata and in some cases even content from phones which connect to them.
Despite their extensive capabilities, they require only a low-level court order called a PEN register, also known as a “trap and trace”, to grant permission for their use.
Immense secrecy has so far surrounded these devices, but a picture is slowly emerging which shows widespread use. Various revelations by the American Civil Liberties Union and news outlets including the Guardian had shown that at least 12 federal agencies are already known to have these devices, including the National Security Agency and the Federal Bureau of Investigation. The IRS makes 13.
In November 2014, the Wall Street Journal uncovered an operation run by the US Marshals Service using a Boeing-made IMSI-catcher known as “dirtbox”. This is the first time that the IRS has been found to own the device.
Story 1: Benghazi Scandal Is A Massive Cover-up of President Obama’s Secret Finding For Central Intelligence Agency’s Covert Operations In Libya and Syria — American People Demand Declassification And Release of Entire CIA Covert Operations Finding For Libya and Syria and Public Testimony By Former CIA Director General Petraeus, CIA Director Brennan, CIA Libya Station Chief and Chief of Mission and CIA Employees in Benghazi, Libya On September 11, 2012 — Massive Scandal and Foreign Policy Disaster — Stop The Cover-up, Stonewalling and Slow-walking! — “Why Was The United States in Libya?” — No More Behind Closed Doors — Videos
IT TAKES TREY GOWDY JUST THREE MINUTES TO SILENCE THE MEDIA
Trey Gowdy: Congress’ Benghazi probe not aimed at Clinton
Benghazi timeline: “We are under attack”
Malzberg | Clare Lopez, member of the Citizens’ Commission on Benghazi
Media Silent About Obama’s Undeclared Wars
U.S. fighting undeclared wars with six countries? – FoxNews 110610
Wesley Clark ( US 4 Star General ) US will attack 7 countries in 5 years
END WAR: Brzezinski Debates Why Libya War Right Choice, Goal Is Regime Change With A United Libya
Vijay Prashad Urges Re-Evaluation of NATO Attack on Libya in Debate Over Syria Intervention
How Will History Judge U.S., Coalition Intervention in Libya?
Did the Military Intervention in Libya Succeed? (Benjamin Friedman)
Life After Qaddafi — Libya: A Broken State
Libya War: What They Don’t Want You to Know
OBAMA CONFRONTED ON BENGHAZI – Stutters Through Response
Where is All the Worlds Gold?(full documentary) HD
Ex-CIA officer: Obama fools himself, Muslims see US bombing Libya
U.S. Intelligence knew in 2012: Rise of ISIS, Arms shipments from Libya to Syria
Ex-CIA Agent: America creates its own enemies
Benghazi US consulate attack: why is no one talking about the CIA mission?
Breaking: CNN Reports CIA Engaged in Massive Intimidation Campaign to Keep Benghazi a Secret
August 1, 2013 – Breaking: CNN Reports CIA Engaged in Massive Intimidation Campaign to Keep Benghazi a Secret — This is HUGE. Basically the CIA is reportedly giving polygraph tests EVERY MONTH to more than a dozen CIA employees that were on the ground in Benghazi during the attack, to ensure that none of them talk about what happened that night. CNN — CNN has uncovered exclusive new information about what
Kevin Shipp at AIM’s Citizens Commission on Benghazi Conference
Roger Aronoff Speaks about the newly formed Citizens Commission on Benghazi
Admiral James Lyons Speaks at the Citizens Commission on Benghazi
Lt. General Thomas McInerney Speaks at the Citizens Commission on Benghazi
Ken Timmerman at AIM’s Citizens Commission on Benghazi Conference
Benghazi Attack Cover Up! Obama Armed Al Qaeda?
Bachmann Challenges Former CIA Director on Benghazi
Bachmann: Administration misled public on Benghazi
Benghazi Bombshell – Whistleblower’s Lawyer: 400 Surface To Air Missiles Stolen – Wake Up America
Attorney for Benghazi Whistleblower says 400 missiles stolen during attack
Published on Aug 13, 2013
An attorney for the Benghazi whistleblowers says that some 400 surface to air missles (SAMs) were ‘taken from Libya’ during the terror attack on the U.S. consulate in Benghazi.
He added that the U.S. intelligence community is terrified they might be used to shoot down airliners.
Joe diGenova, whose wife Victoria Toensing — a former deputy assistant attorney general — also represents Benghazi witnesses and others with knowledge of the terror attack, told WMAL radio that the loss of those missiles is also one the reasons the U.S. State Department shut down 19 embassies across the Middle East last week.
‘A lot of people have come forward to share information with us,’ he said during the radio station’s ‘Mornings On The Mall’ program Monday morning.
‘We have learned that one of the reasons the administration is so deeply concerned’ is that ‘there were 400 surface-to-air missiles stolen, and that they are … in the hands of many people, and that the biggest fear in the U.S. intelligence community is that one of these missiles will be used to shoot down an airliner. 400 missiles, surface-to-air missiles, taken from Libya.’
Asked if the missiles are now ‘in the hands of al-Qaeda operatives,’ DiGenova replied, ‘That is what these people are telling us.’
DiGenova said his sources are ‘former intelligence officials who stay in constant contact with people in the Special Ops and intelligence community.’
‘And it’s pretty clear that the biggest concern right now are 400 missiles which have been diverted in Libya and have gotten in the hands of some very ugly people.’
diGenova said that while he was uncertain whether the stolen weapons were being kept at the U.S. Consulate’s CIA annex, ‘it is clear that the annex was somehow involved in the process of the distribution of those missiles.’
‘They were afraid that there was going to be a missile attack on one of the embassies. Remember, you can take a shoulder-held missile and shoot it into an embassy. Not just into the sky.’ ‘That’s what this was all about,’ he insisted. ‘That’s why they’re so worried. That’s why they have lied repeatedly about what happened in Benghazi, because they are now responsible for all of the stepchildren of violence that happens as a result of this. This is a very serious matter.’
FSA rocket shoots down Assad helicopter – Truthloader
White House Knew at 6:07 PM EST That Ansar Al-Sharia Was Behind the Benghazi Attack
Death And Deceit In Benghazi – Did Obama Amind Try Hide The Truth? – W Bret Bair
CIA operators were denied request for help during Benghazi attack, sources say
The Benghazi Select Committee: Many Questions Remain Unanswered
The House Select Committee on Benghazi is gearing up to investigate the many unanswered questions surrounding the attack on the U.S. diplomatic facility on September 11, 2012. Contrary to the Obama Administration’s assertions, numerous questions remain unanswered about what happened that fateful day both in Benghazi and here in Washington. This, despite the determined efforts of members of Congress to extract answered from a reluctant White House and State Department. Yet, in order to prevent a recurrence of unnecessary loss of American lives, systemic failures must be addressed, as well as the lack of accountability among those responsible for diplomatic security. Equally importantly, the families of the victims and indeed Americans need to know why no retaliation or justice has been visited upon those who killed U.S. diplomats.
“Peace President” Obama Let Benghazi Happen
As the Mail Online out it, “The Citizens Commission on Benghazi, a self-selected group of former top military officers, CIA insiders and think-tankers, declared Tuesday in Washington that a seven-month review of the deadly 2012 terrorist attack has determined that it could have been prevented — if the U.S. hadn’t been helping to arm al-Qaeda militias throughout Libya a year earlier.”
Obama “Switched Sides” in War on Terror
Former CIA officer Clare Lopez argues: Libya in 2011 marks the place and the time that the United States (U.S.) and the Obama administration formally switched sides in the Global War on Terror (GWOT). A mere 10 years after al-Qa’eda (supported by Hizballah and Iran) attacked the American homeland in the worst act of terrorism ever suffered by this country, U.S. leadership decided to facilitate the provision of weapons to jihadist militias known to be affiliated with al-Qa’eda and the Muslim Brotherhood in order to bring down a brutal dictator who also just happened to be a U.S. ally in the GWOT at the time.
Obama Let Them Die at Benghazi
Wayne Simmons spent 27 years working with the CIA to combat terrorism, narco-terrorism and narcotics trafficking, arms smuggling, counterfeiting, cyber-terrorists, and industrial and economic espionage. He sits on the Advisory Council for the Intelligence Summit, and is a contributor to the conservative publication Human Events.
“Dark Forces” at Benghazi and Muslim Brotherhood Infiltration
Why didn’t the U.S. military respond in time in Benghazi
Benghazi Victim’s Mother: ‘Why Isn’t Hillary Out Here?’
Rand Paul Questions Hillary Clinton on Benghazi (Flashback)
Benghazi ➡Hillary gave ‘stand down’ order – Cover Up & Deceive America 2016
13 hours in Benghazi FULL VERSION INTERVIEW 5 parts combined.
Benghazi, Victims’ Families & Investigators Testify At House Hearing On Benghazi – Lou Dobbs
9-19-2013 “Reviews of the Benghazi Attack and
Unanswered Questions” Part I
9-19-2013 “Reviews of the Benghazi Attack and Unanswered Questions” Part II
9-19-2013 “Reviews of the Benghazi Attack and Unanswered Questions” Part III
Benghazi Scandal Review Of The Benghazi Attack & Questions That Remain Unanswered
Rep. Gowdy Talks Obamacare and Benghazi with Lou Dobbs
Chairman Issa’s Opening Statement Benghazi
Chaffetz Questions Adm. Mullen About Military Capability During Attack In Benghazi
Chaffetz to Families of Benghazi Victims: “We have a duty to find out the truth.”
Benghazi Victim’s Mother ‘Why Isn’t Hillary Out Here’
Congressman Mica questions Administration on Benghazi
In an exchange with witnesses during our Congressional Oversight Hearing, Congressman John Mica explains to Administration officials that most Americans believe the State Department report on responsibility for the Bengazhi attack was a “whitewash”. Those conducting the review were appointed by Secretary of State Hillary Clinton who they failed to interview along with other top State and Administration officials. Mica stated that this looks like an inside job where no one was held accountable, fired and none of the killers captured or brought to justice.
Benghazi Scandal – “It Was Clear Pretty Quickly” – General: Benghazi Was No Demonstration!
Independent Benghazi Review Briefed Clinton, Mills on Report Before Released
House Of Scandals Obama Gives Speech To Distract Americans – Rand Paul (R-KY)- Hannity
The Benghazi Testimony Fox Doesn t Want You To See
Rep. Meehan Questions Officials Responses to Location of Embassy in Benghazi
CNN Benghazi Claims: Report alleges CIA operatives in Libya were sending weapons to Syrian rebels
Obama authorized CIA covert operation in Libya
SYRIA Retired General Suspects A US Covert Operation For Running Libya Arms To Syria
The Daring Early Years of the CIA: Covert Ops from WW2 to Vietnam (1995)
CIA Covert Operations and U.S. Interventions Since World War II Full documentary
DC Scandals – Time To Testify? – Issa: We Call Hillary Clinton Back! – Benghazi Scandal
Benghazi Scandal Investigation Widening Lawmakers Seek Interviews Of 13 Top Officials
Benghazi Scandal Is Obama Admin Trying To Hide Something! Force Into Silence! OReilly
David Petraeus Scandal: Benghazi Attack Testimony Behind Closed Doors
The former CIA head will go behind closed doors to give testimony on the terror attacks.
General Petraeus leaked secret info on Benghazi attack to his mistress?
Glenn Beck: Military Action In Syria Is Designed To Cover Up Benghazi
REVEALED: If This Is True, Benghazi Is Even Worse Than We Ever Thought
The feature story that Michael Lewis just published about President Obama’s decisionmaking prior to the war in Libya includes a lot of details that inspire confidence in his leadership. By all accounts he’s intelligent, sober-minded, and inclined to seek out an array of perspectives. And he’s frequently forced to make extraordinarily difficult tradeoffs with imperfect information. I don’t envy his job.
But the article also raises serious questions about his honesty and regard for the constitution. Let’s take them in turn.
INCONSISTENT EXPLANATIONS
On March 28, 2011, Obama gave a televised address about Libya. It included this passage about his actions:
Confronted by this brutal repression and a looming humanitarian crisis, I ordered warships into the Mediterranean. European allies declared their willingness to commit resources to stop the killing. The Libyan opposition, and the Arab League, appealed to the world to save lives in Libya. At my direction, America led an effort with our allies at the United Nations Security Council to pass an historic Resolution that authorized a No0Fly Zone to stop the regime’s attacks from the air, and further authorized all necessary measures to protect the Libyan people.
In his telling, (a) America led the effort to establish the No-Fly Zone; and (b) the No-Fly Zone would stop the Libyan regime’s attacks from the air.
Compare these assertions to the inside account reported by Lewis (which wasvetted by the White House prior to publication):
If you were president just then and you turned your television to some cable news channel you would have seen many Republican senators screaming at you to invade Libya and many Democratic congressmen hollering at you that you had no business putting American lives at risk in Libya. If you flipped over to the networks on March 7 you might have caught ABC White House correspondent Jake Tapper saying to your press secretary, Jay Carney, “More than a thousand people have died, according to the United Nations. How many more people have to die before the United States decides, O.K., we’re going to take this one step of a no-fly zone?”
By March 13, Qaddafi appeared to be roughly two weeks from getting to Benghazi. On that day the French announced they were planning to introduce a resolution in the United Nations to use U.N. forces to secure the skies over Libya in order to prevent Libyan planes from flying. A “no-fly zone” this was called, and it forced Obama’s hand. The president had to decide whether to support the no-fly-zone resolution or not. At 4:10 p.m. on March 15 the White House held a meeting to discuss the issue. “Here is what we knew,” recalls Obama, by which he means here is what I knew. “We knew that Qaddafi was moving on Benghazi, and that his history was such that he could carry out a threat to kill tens of thousands of people. We knew we didn’t have a lot of time–somewhere between two days and two weeks. We knew they were moving faster than we originally anticipated. We knew that Europe was proposing a no-fly zone.”
That much had been in the news. One crucial piece of information had not. “We knew that a no-fly zone would not save the people of Benghazi,” says Obama. “The no-fly zone was an expression of concern that didn’t really do anything.” European leaders wanted to create a no-fly zone to stop Qaddafi, but Qaddafi wasn’t flying. His army was racing across the North African desert in jeeps and tanks. Obama had to have wondered just how aware of this were these foreign leaders supposedly interested in the fate of these Libyan civilians. He didn’t know if they knew that a no-fly zone was pointless, but if they’d talked to any military leader for five minutes they would have. And that was not all. “The last thing we knew,” he adds, “is that if you announced a no-fly zone and if it appeared feckless, there would be additional pressure for us to go further. As enthusiastic as France and Britain were about the no-fly zone, there was a danger that if we participated the U.S. would own the operation. Because we had the capacity.”
To summarize, (a) America did not lead the effort to establish a no-fly zone — it reluctantly signed on to the idea after its hand was forced by the French; (b) the no-fly zone wouldn’t stop the regime’s attacks because they weren’t coming from the air. It was, rather, a preamble to escalation.
Due to the nature of the Libya conflict, these misrepresentations weren’t nearly as consequential as, say, the way George W. Bush spoke out about weapons of mass destruction before the Iraq war. It is nevertheless an example of the president deliberately misleading the American people in order to facilitate false impressions about foreign military actions that he finds convenient.
ZERO REGARD FOR CONGRESSIONAL APPROVAL
It’s long been established that Obama failed to secure a congressional declaration of war, as the constitution and Senator Obama’s understanding of it dictated; and that he violated the War Powers Resolution. It is nevertheless worth revisiting the subject given these new details about his thought process:
Obama insists that he still had not made up his mind what to do when he returned to the Situation Room — that he was still considering doing nothing at all. A million people in Benghazi were waiting to find out whether they would live or die, and he honestly did not know. There were things the Pentagon might have said to deter him, for instance. “If somebody had said to me that we could not take out their air defense without putting our fliers at risk in a significant way; if the level of risk for our military personnel had been ratcheted up–that might have changed my decision,” says Obama. “Or if I did not feel Sarkozy or Cameron were far enough out there to follow through. Or if I did not think we could get a U.N resolution passed.” Once again he polled the people in the room for their views. Of the principals only Susan Rice (enthusiastically) and Hillary Clinton (who would have settled for a no-fly zone) had the view that any sort of intervention made sense. “How are we going to explain to the American people why we’re in Libya,” asked William Daley, according to one of those present. “And Daley had a point: who gives a shit about Libya?”
From the president’s point of view there was a certain benefit in the indifference of the American public to whatever was happening in Libya. It enabled him to do, at least for a moment, pretty much whatever he wanted to do. Libya was the hole in the White House lawn.
Obama made his decision: push for the U.N resolution and effectively invade another Arab country. Of the choice not to intervene he says, “That’s not who we are,” by which he means that’s not who I am. The decision was extraordinarily personal. “No one in the Cabinet was for it,” says one witness. “There was no constituency for doing what he did.” Then Obama went upstairs to the Oval Office to call European heads of state and, as he puts it, “call their bluff.” Cameron first, then Sarkozy. It was three a.m. in Paris when he reached the French president, but Sarkozy insisted he was still awake. (“I’m a young man!”) In formal and stilted tones the European leaders committed to taking over after the initial bombing. The next morning Obama called Medvedev to make sure that the Russians would not block his U.N. resolution. There was no obvious reason why Russia should want to see Qaddafi murder a city of Libyans, but in the president’s foreign dealings the Russians play the role that Republicans currently more or less play in his domestic affairs. The Russians’ view of the world tends to be zero-sum: if an American president is for it, they are, by definition, against it. Obama thought that he had made more progress with the Russians than he had with the Republicans; Medvedev had come to trust him, he felt, and believed him when he said the United States had no intention of moving into Libya for the long term. A senior American official at the United Nations thought that perhaps the Russians let Obama have his resolution only because they thought it would end in disaster for the United States.
And it could have. All that exists for any president are the odds. On March 17 the U.N. gave Obama his resolution. The next day he flew to Brazil and was there on the 19th, when the bombing began. A group of Democrats in Congress issued a statement demanding Obama withdraw from Libya; Ohio Democratic congressman Dennis Kucinich asked if Obama had just committed an impeachable offense. All sorts of people who had been hounding the president for his inaction now flipped and questioned the wisdom of action. A few days earlier Newt Gingrich, busy running for president, had said, “We don’t need the United Nations. All we have to say is that we think slaughtering your own citizens is unacceptable and that we’re intervening.” Four days after the bombing began, Gingrich went on the Today show to say he wouldn’t have intervened and was quoted on Politico as saying, “It is impossible to make sense of the standard of intervention in Libya except opportunism and news media publicity.” The tone of the news coverage shifted dramatically, too. One day it was “Why aren’t you doing anything?” The next it was “What have you gotten us into?” As one White House staffer puts it, “All the people who had been demanding intervention went nuts after we intervened and said it was outrageous. That’s because the controversy machine is bigger than the reality machine.”
Put more succinctly, going to war in Libya was a close call; there are things various folks could have said to deter him; he ran the decision through executive branch and international channels; most people told him not to do it; but if Congress came into the picture at all, it wasn’t enough to merit mention in the retelling, and certainly not enough to follow the constitution and put the prospective war to a vote. The people’s representatives were excluded.
The imperial presidency is so well entrenched that a journalist like Michael Lewis needn’t really question circumventing Congress to feel as though he’s including all the crucial parts of the story about going to war.
That remains a scandal.
And it is telling that Michael Lewis, one of America’s finest journalists, didn’t even ask Obama about failing to put the decision about Libya before Congress. He didn’t ask despite the plain language of the Constitution, Obama’s prior statements indicating he fully understood his legal obligations, and the fact that various members of Congress complained about his unilateral action. The imperial presidency is so well entrenched that a journalist like Lewis needn’t really question those things to feel as though he’s including all the crucial parts of the story about going to war.
That is quite a precedent Obama has set. And Mitt Romney is ready to exploit it if he wins. As he put it: “I can assure you if I’m president, the Iranians will have no question but that I will be willing to take military action if necessary to prevent them from becoming a nuclear threat to the world. I don’t believe at this stage, therefore, if I’m president that we need to have a war powers approval or special authorization for military force. The president has that capacity now.”
War is commonly defined as “a state of usually open and declared armed hostile conflict between states or nations.” By that definition, the United States and its allies have been at war with Libya since late last week. “At my direction,” President Obama told Congress, “U.S. military forces commenced operations” in Libya.
Article I, section 8 of the United States Constitution states that “Congress shall have the power … to declare war…” Since Congress has not declared war on Libya, is American involvement in the Libyan war unconstitutional?
Some members of Congress think so. Rep. Scott Ringell, a freshman from Virginia, said that the Libya hostilities “should trigger a debate within Congress and [among] the American people about proper interpretation and application of [the] Constitution. I’m surprised more conservatives aren’t speaking out about this issue.” Some Democrats have spoken out questioning the validity of the action. In the past, Senators Obama and Biden both said the president lacks the authority to do what President Obama has done.
The question of the constitutionality of the Libyan effort depends on the original public meaning of Article I, section 8 of the Constitution. Vice President (then Senator) Joseph Biden recalled that meaning in a speech on the Senate floor on July 30, 1998. He noted that the original draft of the Constitution would have empowered Congress to “make war.” James Madison and Elbridge Gerry moved that the language be changed to “declare war” so that the president would have the power “to repel sudden attacks.” Biden pointed out that only one framer, Pierce Butler of South Carolina, thought the president should have the power to initiate war.
Biden concluded that under the Constitution, the president could not use force without prior authorization unless it was necessary to “repel a sudden attack.” Presidential candidate Barack Obama agreed in 2007: “the President does not have power under the Constitution to unilaterally authorize a military attack in a situation that does not involve stopping an actual or imminent threat to the nation.”
Senator Biden also expounded on the framers’ reasons for limiting presidential discretion:
The rationale for vesting the power to launch war in Congress was simple. The Framers’ views were dominated by their experience with the British King, who had unfettered power to start wars. Such powers the Framers were determined to deny the President.
Of course, in 1998 and today, some claim the president has broad powers to initiate and carry on war under the “executive power” and the commander-in-chief clauses of Article II. But the framers rejected this “monarchist view” of the presidency.
The framers of the Constitution knew that the English king possessed certain prerogatives or discretionary powers to act for the public interest. Among these prerogatives was the power to declare war. He could also carry on undeclared wars. Yet the framers explicitly gave Congress the power to declare war. Apart from repelling sudden attacks, the Constitution is silent on the president’s power to conduct undeclared wars. Read against the English background, the text of the Constitution creates a constrained executive for the new nation.
What does this history imply for the present? President Obama told Congress that the use of force in Libya was intended “to prevent a humanitarian catastrophe and address the threat posed to international peace and security by the crisis in Libya.” But the framers did not empower the president to initiate war to prevent humanitarian catastrophes, deal with threats to international peace and security, or protect the lives of foreign nationals. The framers stated that the Constitution was instituted to provide for the common defense of We, the People, not the defense of people everywhere.
They did recognize a limited power to repel sudden attacks. The Libyan regime did not suddenly attack the United States or its citizens. There is nothing to repel. America’s war in Libya thus cannot be constitutional.
What now? The Supreme Court is unlikely to invalidate presidential actions in Libya. The task of vindicating the Constitution falls to Congress. It needs to hear from its conservatives, those who believe in the original meaning of the Constitution. Congress also needs to hear from its liberals, those who believe what Senators Biden and Obama once said about presidential power. Together members of Congress could finally live up to their constitutional obligations and impose restraints on a president who has become too much of a king.
John Samples directs the Cato Institute’s Center for Representative Government and is the author of The Struggle to Limit Government: A Modern Political History.
March 2011: U.S. secretly approves arms shipments from Qatar to Libyan rebels.
May 2011: Al-Qaeda flags raised over Benghazi. November 2011: Rebel leader Abdel-Hakim al-Hasidi admits a significant number of Libyan rebels were al-Qaeda fighters who fought American troops in Iraq.
April 19, 2012: State Department rejects ambassador to Libya’s request for more security personnel.
June 20, 2012: Assassination attempt on the British Ambassador to Libya.
July 9, 2012: Ambassador Stevens asks the State Department for more security personnel.
August 8, 2012: The number of security personnel at Benghazi reduced by State Department.
August 16, 2012: U.S. Site Security in Benghazi alerts the State Department that conditions are perilous. September 4, 2012: Gallup presidential tracking poll: Obama 47 percent; Romney 46 percent. September 4–6, 2012: Democratic National Convention (“al-Qaeda decimated; bin Laden is dead and GM is alive; al-Qaeda is on the run”).
September 11, 2012: Ambassador Stevens alerts the State Department that conditions in Benghazi are deteriorating.
3:40 p.m. (D.C. time): Stevens calls deputy chief of mission Greg Hicks in Tripoli and alerts him that the consulate in Benghazi is under attack.
4:00 p.m.: The White House is advised that the consulate is under attack. 10th Special Forces Group in Croatia is three hours away; Brigadier General (Ret.) Robert Lovell, Deputy Director of Intelligence for AFRICOM, later testifies that intelligence knew immediately that it was not a protest but a terrorist attack; no request for aid comes from the State Department.
5:00 p.m.: Defense Secretary Leon Panetta discusses attack with President Obama.
6:00 p.m.: U.S. Embassy in Tripoli advises the White House and the State Department that al-Qaeda affiliate Ansar al-Sharia has claimed responsibility for the attack. CIA deputy director Mike Morrell later testifies that “analysts knew from the get-go that al Qaeda was involved with this attack.”
8:00 p.m.: Greg Hicks calls Clinton and tells her that consulate is under terrorist attack.
10:00 p.m.: Clinton and Obama talk.
10:30 p.m.: Clinton issues a statement linking the attack to an inflammatory internet video.
11:00–11:30 p.m.: Former Navy SEALs Glen Doherty and Ty Woods killed.
September 12, 2012: Redacted e-mail from a State Department official says the official advised the Libyan government that the attack was carried out by Ansar al-Sharia. No mention of video.
September 12–15, 2012: CIA drafts several iterations of talking points; contains no known references to video as cause of the attack.
September 13, 2012: State Department memo blames the attack on terrorists.
September 13, 2012: Defense Intelligence Agency assigns blame for the attack on Ansar al-Sharia in Libya. No mention of a video.
September 13, 2012: Clinton condemns violence against U.S. consulate in Libya due to a video. September 13, 2012: Jay Carney condemns attack due to a video.
September 14, 2012: State Department says the attack was a spontaneous demonstration due to a video.
September 14, 2012: Obama and Clinton receive the families of the fallen as their caskets arrive at Andrews Air Force Base; blame the attack on a video. Clinton tells Ty Woods’s father, Charles, that they will “get” the producer of the video.
September 14, 2012: Jay Carney blames the video.
September 14, 2012, 8:00 p.m.: Deputy national-security adviser Ben Rhodes sends an e-mail regarding the preparation of Susan Rice for the Sunday talk shows, advising Rice to underscore the video and that the attack is “not a broader failure of policy.” September 15, 2012: Obama blames the video.
September 16, 2012: Susan Rice appears on five Sunday talk shows and characterizes the attacks as a spontaneous reaction due to a video. September 16, 2012: Libyan president disputes Rice’s comments, asserting Benghazi was a planned attack.
September 18, 2012: Obama appears on the David Letterman show, blames the video.
September 19, 2012: The head of the National Counterterrorism Center testifies that the attack was not a protest but a terrorist attack.
September 20, 2012: Obama blames the video. September 20, 2012: Obama and Clinton run an ad on Pakistani TV apologizing for the video.
September 21, 2012: Clinton says it was a terrorist attack.
September 24, 2012: Obama appears on The View, blames the video.
October 4, 2012: Clinton establishes the Accountability Review Board (“ARB”) to examine the circumstances surrounding the loss of personnel in Benghazi. Clinton not interviewed by ARB.
October 11, 2012: At the vice-presidential debate, Joe Biden claims the administration was not informed about requests for more security at the consulate in Benghazi.
October 16, 2012: Obama, in a response to a question from a reporter about whether he denied requests for aid to Benghazi on September 11 responds, “The minute I found out this was going on, I gave three directives. Number one, make sure we are securing our personnel and doing whatever we need to. Number two, we are going to investigate exactly what happened and make sure it doesn’t happen again. Number three, find out who did this so that we can bring them to justice.”
October 18, 2012: Judicial Watch makes a Freedom of Information Act request to the administration for talking points and communications regarding the events in Benghazi. The administration ignores the request.
October 20, 2012: Obama claims that he was not aware of any requests for additional security in Benghazi.
January 23, 2013: Clinton asks, “What difference, at this point, does it make whether it was a terrorist attack or a spontaneous demonstration?”
June 21, 2013: Judicial Watch sues the administration for unlawfully withholding documents pertaining to Benghazi.
July 25, 2013: Obama slams the “endless parade of distractions, political posturing, and phony scandals.”
August 2013: The House Committee on Oversight and Government Reform requests Benghazi e-mails. The Ben Rhodes e-mail is not among those produced.
April 18, 2014: Federal court orders the administration to turn over documents to Judicial Watch. 41 documents are released, including the Ben Rhodes e-mail.
May 1, 2014: Tommy Vietor tells Fox News the president was not in the Situation Room on September 11, 2012.
May 2, 2014: Speaker John Boehner announces a vote to form a select committee on Benghazi.
May 4, 2014: Representative Adam Schiff (D.., Calif.), member of the House Intelligence Committee, suggests Democrats boycott the House select committee as a “colossal waste of time.”
May 5, 2014: Carney will not say whether White House will cooperate with the select committee. (Clearly, much remains to be filled in by the select committee. Numerous questions and lines of inquiry are prompted by the above. The chronology is based on congressional testimony and reports from, among others, the Wall Street Journal, the Washington Post, the Washington Times, the New York Times, the New York Post and Fox News, and the reporting of Steve Hayes and Jennifer Griffin.)
Posted on October 26, 2012 | Updated on May 2, 2014
Summary
The question won’t go away: Did President Obama and administration officials mislead the public when they initially claimed that the deadly Sept. 11 attack on the U.S. consulate in Benghazi began “spontaneously” in response to an anti-Muslim video?
The question surfaced again on Oct. 25 — more than six weeks after the incident — when government emails showed the White House and the State Department were told even as the attack was going on that Ansar al-Sharia, a little-known militant group, had claimed credit for it.
We cannot say whether the administration was intentionally misleading the public. We cannot prove intent. There is also more information to come — both from the FBI, which is conducting an investigation, and Congress, which has been holding hearings.
But, at this point, we do know that Obama and others in the administration were quick to cite the anti-Muslim video as the underlying cause for the attack in Benghazi that killed four U.S. diplomats, including U.S. Ambassador to Libya Chris Stevens. And they were slow to acknowledge it was a premeditated terrorist attack, and they downplayed reports that it might have been.
What follows is a timeline of events that we hope will help put the incident into perspective. We call attention in particular to these key facts:
There were no protesters at the Benghazi consulate prior to the attack, even though Obama and others repeatedly said the attackers joined an angry mob that had formed in opposition to the anti-Muslim film that had triggered protests in Egypt and elsewhere. The State Department disclosed this fact Oct. 9 — nearly a month after the attack.
Libya President Mohamed Magariaf insisted on Sept. 16 — five days after the attack — that it was a planned terrorist attack, but administration officials continued for days later to say there was no evidence of a planned attack.
Magariaf also said the idea that the attack was a “spontaneous protest that just spun out of control is completely unfounded and preposterous.” This, too, was on Sept. 16. Yet, Obama and others continued to describe the incident in exactly those terms — including during the president’s Sept. 18 appearance on the “Late Show With David Letterman.”
Matt Olsen, director of the National Counterterrorism Center, was the first administration official to call it “a terrorist attack” during a Sept. 19 congressional hearing. Secretary of State Hillary Clinton did the same on Sept. 20. Even so, Obama declined opportunities to call it a terrorist attack when asked at a town hall meeting on Sept. 20 and during a taping of “The View” on Sept. 24.
Here is our timeline:
Analysis
Sept. 11: The Attack
2:30 p.m. Eastern Daylight Time (8:30 p.m. Benghazi time): U.S. Ambassador to Libya Chris Stevens steps outside the consulate to say goodbye to a Turkish diplomat. There are no protesters at this time. (“Everything is calm at 8:30,” a State Department official would later say at an Oct. 9 background briefing for reporters. “There’s nothing unusual. There has been nothing unusual during the day at all outside.”)
3 p.m.: Ambassador Stevens retires to his bedroom for the evening. (See Oct. 9 briefing.)
Approximately 3:40 p.m. A security agent at the Benghazi compound hears “loud noises” coming from the front gate and “gunfire and an explosion.” A senior State Department official at the Oct. 9 briefing says that “the camera on the main gate reveals a large number of people – a large number of men, armed men, flowing into the compound.”
About 4 p.m.: This is the approximate time of attack that was given to reporters at a Sept. 12 State Department background briefing. An administration official identified only as “senior administration official one” provides an official timeline of events at the consulate, but only from the time of the attack — not prior to the attack. The official says, “The compound where our office is in Benghazi began taking fire from unidentified Libyan extremists.” (Six of the next seven entries in this timeline — through 8:30 p.m. EDT — all come from the Sept. 12 briefing. The exception being the 6:07 p.m. entry, which comes from Reuters.)
About 4:15 p.m.: “The attackers gained access to the compound and began firing into the main building, setting it on fire. The Libyan guard force and our mission security personnel responded. At that time, there were three people inside the building: Ambassador Stevens, one of our regional security officers, and Information Management Officer Sean Smith.”
Between 4:15 p.m.-4:45 p.m.: Sean Smith is found dead.
About 4:45 p.m.: “U.S. security personnel assigned to the mission annex tried to regain the main building, but that group also took heavy fire and had to return to the mission annex.”
About 5:20 p.m.: “U.S. and Libyan security personnel … regain the main building and they were able to secure it.”
Around 6 p.m.: “The mission annex then came under fire itself at around 6 o’clock in the evening our time, and that continued for about two hours. It was during that time that two additional U.S. personnel were killed and two more were wounded during that ongoing attack.”
6:07 p.m.: The State Department’s Operations Center sends an email to the White House, Pentagon, FBI and other government agencies that said Ansar al-Sharia has claimed credit for the attack on its Facebook and Twitter accounts. (The existence of the email was not disclosed until Reuters reported it on Oct. 24.)
About 8:30 p.m.: “Libyan security forces were able to assist us in regaining control of the situation. At some point in all of this – and frankly, we do not know when – we believe that Ambassador Stevens got out of the building and was taken to a hospital in Benghazi. We do not have any information what his condition was at that time. His body was later returned to U.S. personnel at the Benghazi airport.”
About 10:00 p.m.: Secretary of State Hillary Clinton issues a statement confirming that one State official was killed in an attack on the U.S. consulate in Benghazi. Her statement, which MSNBC posted at 10:32 p.m., made reference to the anti-Muslim video.
Clinton: Some have sought to justify this vicious behavior as a response to inflammatory material posted on the Internet. The United States deplores any intentional effort to denigrate the religious beliefs of others. Our commitment to religious tolerance goes back to the very beginning of our nation. But let me be clear: There is never any justification for violent acts of this kind.
Sept.12: Obama Labels Attack ‘Act of Terror,’ Not ‘Terrorism’
Sept. 12: Clinton issues a statement confirming that four U.S. officials, not one, had been killed. She called it a “violent attack.”
Clinton: All the Americans we lost in yesterday’s attacks made the ultimate sacrifice. We condemn this vicious and violent attack that took their lives, which they had committed to helping the Libyan people reach for a better future.
Sept. 12: Clinton delivers a speech at the State Department to condemn the attack in Benghazi and to praise the victims as “heroes.” She again makes reference to the anti-Muslim video in similar language.
Clinton: Some have sought to justify this vicious behavior, along with the protest that took place at our Embassy in Cairo yesterday, as a response to inflammatory material posted on the Internet. America’s commitment to religious tolerance goes back to the very beginning of our nation. But let me be clear — there is no justification for this, none.
Sept. 12: Obama delivers a morning speech in the Rose Garden to address the deaths of U.S. diplomats in Libya. He said, “No acts of terror will ever shake the resolve of this great nation, alter that character, or eclipse the light of the values that we stand for.” He also makes reference to the anti-Muslim video when he says: “Since our founding, the United States has been a nation that respects all faiths. We reject all efforts to denigrate the religious beliefs of others. But there is absolutely no justification to this type of senseless violence. None.” He uses the term “act of terror” later that night when talking about the attack at a campaign event in Las Vegas.
Sept. 12: After his Rose Garden speech, Obama tapes an interview for “60 Minutes.” Obama says he didn’t use the word “terrorism” in his Rose Garden speech because “it’s too early to know exactly how this came about.” Steve Kroft, the show’s host, wonders how the attack could be described as a “mob action” since the attackers were “very heavily armed.” Obama says “we’re still investigating,” but he suspects “folks involved in this . . . were looking to target Americans from the start.”
Kroft: Mr. President, this morning you went out of your way to avoid the use of the word terrorism in connection with the Libya attack.
Obama: Right.
Kroft: Do you believe that this was a terrorist attack?
Obama: Well, it’s too early to know exactly how this came about, what group was involved, but obviously it was an attack on Americans and we are going to be working with the Libyan government to make sure that we bring these folks to justice one way or the other.
Kroft: It’s been described as a mob action. But there are reports that they were very heavily armed with grenades. That doesn’t sound like your normal demonstration.
Obama: As I said, we’re still investigating exactly what happened. I don’t want to jump the gun on this. But you’re right that this is not a situation that was exactly the same as what happened in Egypt. And my suspicion is, is that there are folks involved in this, who were looking to target Americans from the start.
Sept. 12: Senior administration officials, who did not permit use of their names, hold a briefing with reporters to answer questions about the attack. Twice officials characterize those involved in the attack as “extremists.” In one case, an official identified only as “senior administration official one” is asked by Fox News reporter Justin Fishel if the administration had ruled out the possibly that the attack was in response to the anti-Muslim video. The official says, “We just don’t know.”
Senior administration official one: With regard to whether there is any connection between this Internet activity and this extremist attack in Benghazi, frankly, we just don’t know. We’re not going to know until we have a chance to investigate. And I’m sorry that it is frustrating for you that so many of our answers are “We don’t know,” but they are truthful in that.
NBC’s Andrea Mitchell asks officials to address news reports that the attack has been “linked to a terror attack, an organized terror attack,” possibly al Qaeda. The official refers to it as a “complex attack,” but says it is “too early to say who they were” and their affiliation.
Senior administration official one: Frankly, we are not in a position to speak any further to the perpetrators of this attack. It was clearly a complex attack. We’re going to have to do a full investigation. We are committed to working with the Libyans both on the investigation and to ensure that we bring the perpetrators to justice. The FBI is already committed to assisting in that, but I just – we’re – it’s just too early to speak to who they were and if they might have been otherwise affiliated beyond Libya.
Sept. 12, 4:09 p.m.: At a press briefing en route to Las Vegas, White House Press Secretary Jay Carney is asked, “Does the White House believe that the attack in Benghazi was planned and premeditated?” He responds, “It’s too early for us to make that judgment. I think — I know that this is being investigated, and we’re working with the Libyan government to investigate the incident. So I would not want to speculate on that at this time.”
Sept. 12: Libya’s deputy ambassador to London, Ahmad Jibril, tells the BBC that Ansar al-Sharia was behind the attack. The little-known militant group issues a statement that says it “didn’t participate as a sole entity,” neither confirming nor denying the report.
Sept. 12, 6:06 p.m.: Beth Jones, the acting assistant secretary of state for the Near East, sends an email to top State Department officials that reads in part: “[T]he group that conducted the attacks, Ansar al-Sharia, is affiliated with Islamic extremists.” (An excerpt of Jones’ email was read by Rep. Trey Gowdy at the May 8, 2013, House oversight hearing.)
Sept. 12: Citing unnamed “U.S. government officials,” Reuters reports that “the Benghazi attack may have been planned in advance” and that members of Ansar al-Sharia “may have been involved.” Reuters quotes one of the U.S. officials as saying: “It bears the hallmarks of an organized attack.”
Sept. 13: ‘Clearly Planned’ or ‘Spontaneous’ Attack?
Sept. 13: Clinton meets with Ali Suleiman Aujali — the Libyan ambassador to the U.S. — at a State Department event to mark the end of Ramadan. Ambassador Aujali apologizes to Clinton for what he called “this terrorist attack which took place against the American consulate in Libya.” Clinton, in her remarks, does not refer to it as a terrorist attack. She condemns the anti-Muslim video, but adds that there is “never any justification for violent acts of this kind.”
Clinton: Religious freedom and religious tolerance are essential to the stability of any nation, any people. Hatred and violence in the name of religion only poison the well. All people of faith and good will know that the actions of a small and savage group in Benghazi do not honor religion or God in any way. Nor do they speak for the more than 1 billion Muslims around the world, many of whom have shown an outpouring of support during this time.
Unfortunately, however, over the last 24 hours, we have also seen violence spread elsewhere. Some seek to justify this behavior as a response to inflammatory, despicable material posted on the Internet. As I said earlier today, the United States rejects both the content and the message of that video. The United States deplores any intentional effort to denigrate the religious beliefs of others. At our meeting earlier today, my colleague, the foreign minister of Morocco, said that all prophets should be respected because they are all symbols of our humanity, for all humanity.
But both of us were crystal clear in this paramount message: There is never any justification for violent acts of this kind. And we look to leaders around the world to stand up and speak out against violence, and to take steps to protect diplomatic missions from attack.
Sept. 13: At a daily press briefing, State Department spokeswoman Victoria Nuland was asked if the Benghazi attack was “purely spontaneous or was premeditated by militants.” She declined to say, reiterating that the administration did not want to “jump to conclusions.”
Nuland: Well, as we said yesterday when we were on background, we are very cautious about drawing any conclusions with regard to who the perpetrators were, what their motivations were, whether it was premeditated, whether they had any external contacts, whether there was any link, until we have a chance to investigate along with the Libyans. So I know that’s going to be frustrating for you, but we really want to make sure that we do this right and we don’t jump to conclusions.
That said, obviously, there are plenty of people around the region citing this disgusting video as something that has been motivating. As the Secretary said this morning, while we as Americans, of course, respect free speech, respect free expression, there’s never an excuse for it to become violent.
Sept. 13: Clinton met with Moroccan Foreign Minister Saad-Eddine Al-Othmani. She condemned what she called the “disgusting and reprehensible” anti-Muslim video and the violence that it triggered. She said, “Islam, like other religions, respects the fundamental dignity of human beings, and it is a violation of that fundamental dignity to wage attacks on innocents. As long as there are those who are willing to shed blood and take innocent life in the name of religion, the name of God, the world will never know a true and lasting peace.”
Sept. 13: At a campaign event in Colorado, Obama again uses the phrase “act of terror.” He says: “I want people around the world to hear me: To all those who would do us harm, no act of terror will go unpunished.”
Sept. 13: CNN reports that unnamed “State Department officials” say the incident in Benghazi was a “clearly planned military-type attack” unrelated to the anti-Muslim movie.
CNN: “It was not an innocent mob,” one senior official said. “The video or 9/11 made a handy excuse and could be fortuitous from their perspective but this was a clearly planned military-type attack.”
Sept. 14: White House Says No Evidence of Planned Attack
Sept. 14: Clinton spoke at Andrews Air Force Base at a ceremony to receive the remains of those killed in Benghazi. She remarked that she received a letter from the president of the Palestinian Authority praising Stevens and “deploring — and I quote — ‘an act of ugly terror.’ ” She, however, did not call it an act of terror or a terrorist attack and neither did the president.
Sept. 14: At a State Department press briefing, spokeswoman Nuland says the department will no longer answer any questions about the Benghazi attack. “It is now something that you need to talk to the FBI about, not to us about, because it’s their investigation.”
Sept. 14: At a White House press briefing, Press Secretary Carney denies reports that it was a preplanned attack. “I have seen that report, and the story is absolutely wrong. We were not aware of any actionable intelligence indicating that an attack on the U.S. mission in Benghazi was planned or imminent. That report is false.” Later in that same briefing, Carney is told that Pentagon officials informed members of Congress at a closed-door meeting that the Benghazi attack was a planned terrorist attack. Carney said the matter is being investigated but White House officials “don’t have and did not have concrete evidence to suggest that this was not in reaction to the film.”
Question: Jay, one last question — while we were sitting here — [Defense] Secretary [Leon] Panetta and the Vice Chair of the Joint Chiefs briefed the Senate Armed Services Committee. And the senators came out and said their indication was that this, or the attack on Benghazi was a terrorist attack organized and carried out by terrorists, that it was premeditated, a calculated act of terror. Levin said — Senator Levin — I think it was a planned, premeditated attack. The kind of equipment that they had used was evidence it was a planned, premeditated attack. Is there anything more you can — now that the administration is briefing senators on this, is there anything more you can tell us?
Carney: Well, I think we wait to hear from administration officials. Again, it’s actively under investigation, both the Benghazi attack and incidents elsewhere. And my point was that we don’t have and did not have concrete evidence to suggest that this was not in reaction to the film. But we’re obviously investigating the matter, and I’ll certainly — I’m sure both the Department of Defense and the White House and other places will have more to say about that as more information becomes available.
Sept. 14: Defense Secretary Leon Panetta meets with the Senate Armed Services Committee. Roll Call, a Capitol Hill newspaper, reports that Republicans and Democrats came away with the conclusion that the Benghazi attack was a planned terrorist attack.
The Hill: Senators spoke with Panetta about the response to the situation in Libya. Four Americans were killed in an attack Tuesday on the U.S. consulate in Benghazi, including Ambassador Chris Stevens.
Senators said it has become clearer the attack was coordinated, although they would not say anything specific about any connection to the broader protests that came after an anti-Muslim video was released.
“I think it was a planned, premeditated attack,” Senate Armed Services Chairman Carl Levin (D-Mich.) said. He added he did not know the specific group responsible for the assault on the complex.
[Sen. John] McCain expressed a similar view.“People don’t go to demonstrate and carry RPGs and automatic weapons,” he said, adding that the facts suggest “this was not a ‘mob’ action [or] a group of protesters.”
Sept. 15-16: Susan Rice Contradicts Libyan President
Sept. 15: Obama discusses the Benghazi attack in his weekly address. He makes no mention of terror, terrorists or extremists. He does talk about the anti-Muslim film and “every angry mob” that it inspired in pockets of the Middle East.
Obama: This tragic attack [in Benghazi] takes place at a time of turmoil and protest in many different countries. I have made it clear that the United States has a profound respect for people of all faiths. We stand for religious freedom. And we reject the denigration of any religion — including Islam.
Yet there is never any justification for violence. There is no religion that condones the targeting of innocent men and women. There is no excuse for attacks on our Embassies and Consulates.
Sept. 16: Libya President Mohamed Magariaf says on CBS News’ “Face the Nation” that the attack on the U.S. consulate was planned months in advance. But Susan Rice, the U.S. ambassador to the United Nations, tells CBS News’ Bob Schieffer: “We do not have information at present that leads us to conclude that this was premeditated or preplanned.” She says it began “spontaneously … as a reaction to what had transpired some hours earlier in Cairo,” and “extremist elements” joined in the protest. (It was later learned that Rice received her information from talking points developed by the CIA.)
Update, May 16, 2013: The talking points given to Rice were extensively revised, largely at the request of the State Department. The original CIA talking points said, “We do know that Islamic extremists with ties to al-Qa’ida participated in the attack.” And they said that “[i]nitial press reporting linked the attack to Ansar al-Sharia.” References to al-Qaeda and Ansar al-Sharia were removed. However, all of the drafts say the attack began “spontaneously” in response to the Cairo protest. Read our article “Benghazi Attack, Revisited” for more information on what changes were made to the talking points.
Update, May 2, 2014: Two days before Rice’s appearance on the Sunday talk show circuit, Deputy National Security Adviser for Strategic Communications Ben Rhodes sent an email to other administration officials, including White House Press Secretary Jay Carney, with the subject line “PREP CALL with Susan: Saturday at 4:00 pm ET.” Rhodes’ email outlined four “goals” for Rice’s TV appearances. One of the goals: “To underscore that these protests are rooted in an Internet video, and not a broader failure of policy.” The email contained a mock Q&A session, and the third question asked whether the Benghazi attack was “an intelligence failure.” The answer in the email parroted — nearly word for word — Rice’s talking points when it said: “The currently available information suggests that the demonstrations in Benghazi were spontaneously inspired by the protests at the US Embassy in Cairo and evolved into a direct assault against the US Consulate and subsequently its annex.” The Rhodes email was released April 29 by Judicial Watch, a conservative watchdog group that obtained 41 State Department documents under the Freedom of Information Act.
Schieffer: Was this a long-planned attack, as far as you know? Or what– what do you know about that?
Magariaf: The way these perpetrators acted and moved … this leaves us with no doubt that this has preplanned, determined– predetermined.
Schieffer: And you believe that this was the work of al Qaeda and you believe that it was led by foreigners. Is that — is that what you are telling us?
Magariaf: It was planned — definitely, it was planned by foreigners, by people who — who entered the country a few months ago, and they were planning this criminal act since their — since their arrival. …
Schieffer: And joining us now, Susan Rice, the U.N. ambassador, our U.N. ambassador. Madam Ambassador, [Magariaf] says this is something that has been in the planning stages for months. I understand you have been saying that you think it was spontaneous? Are we not on the same page here?
Rice: Bob, let me tell you what we understand to be the assessment at present. First of all, very importantly, as you discussed with the president, there is an investigation that the United States government will launch led by the FBI, that has begun and —
They are not on the ground yet, but they have already begun looking at all sorts of evidence of — of various sorts already available to them and to us. And they will get on the ground and continue the investigation. So we’ll want to see the results of that investigation to draw any definitive conclusions.
But based on the best information we have to date, what our assessment is as of the present is in fact what began spontaneously in Benghazi as a reaction to what had transpired some hours earlier in Cairo where, of course, as you know, there was a violent protest outside of our embassy — sparked by this hateful video. But soon after that spontaneous protest began outside of our consulate in Benghazi, we believe that it looks like extremist elements, individuals, joined in that– in that effort with heavy weapons of the sort that are, unfortunately, readily now available in Libya post-revolution. And that it spun from there into something much, much more violent.
Schieffer: But you do not agree with him that this was something that had been plotted out several months ago?
Rice: We do not– we do not have information at present that leads us to conclude that this was premeditated or preplanned.
Schieffer: Do you agree or disagree with him that al Qaeda had some part in this?
Rice: Well, we’ll have to find out that out. I mean I think it’s clear that there were extremist elements that joined in and escalated the violence. Whether they were al Qaeda affiliates, whether they were Libyan-based extremists or al Qaeda itself I think is one of the things we’ll have to determine.
Sept. 16: Magariaf says in an interview with NPR: “The idea that this criminal and cowardly act was a spontaneous protest that just spun out of control is completely unfounded and preposterous. We firmly believe that this was a precalculated, preplanned attack that was carried out specifically to attack the U.S. consulate.”
Sept. 17: State Defends Rice and ‘Initial Assessment’
Sept. 17: Nuland, the State Department spokeswoman, is asked about Rice’s comments on “Face the Nation” and four other Sunday talk shows. Nuland says, “The comments that Ambassador Rice made accurately reflect our government’s initial assessment.” Nuland uses the phrase “initial assessment” three times when discussing Rice’s comments.
Sept. 18: Obama Says ‘Extremists’ Used Video As ‘Excuse’
Sept. 18: Obama was asked about the Benghazi attack on “The Late Show with David Letterman.” The president said, “Here’s what happened,” and began discussing the impact of the anti-Muslim video. He then said, “Extremists and terrorists used this as an excuse to attack a variety of our embassies, including the consulate in Libya.” He also said, “As offensive as this video was and, obviously, we’ve denounced it and the United States government had nothing to do with it. That’s never an excuse for violence.”
Sept. 18: Asked about Magariaf’s assessment that the video had nothing to do with the terrorist attack in Benghazi, the White House spokesman says Obama “would rather wait” for the investigation to be completed. “But at this time, as Ambassador Rice said and as I said, our understanding and our belief based on the information we have is it was the video that caused the unrest in Cairo, and the video and the unrest in Cairo that helped — that precipitated some of the unrest in Benghazi and elsewhere,” Carney says. “What other factors were involved is a matter of investigation.”
Sept. 18: After meeting with Mexican Secretary of Foreign Relations Patricia Espinosa, Clinton speaks with reporters and is asked if the Libyan president is “wrong” that “this attack was planned for months.” Clinton says, “The Office of the Director of National Intelligence has said we had no actionable intelligence that an attack on our post in Benghazi was planned or imminent.” She does not say if Magariaf is right or wrong.
Sept. 19: Olsen Calls It a ‘Terrorist Attack’
Sept. 19: Matt Olsen, director of the National Counterterrorism Center, tells a Senate subcommittee (at 1:06:49 in the video) that the four State Department officials in Benghazi “were killed in the course of a terrorist attack on our embassy.” It is the first time an administration official labeled it a “terrorist attack.” But he also tells the senators that he has no “specific evidence of significant advanced planning.”
Olsen: Yes, they were killed in the course of a terrorist attack on our embassy. … The best information we have now, the facts that we have now, indicate that this was an opportunist attack on our embassy. The attack began and evolved and escalated over several hours. … [I]t appears that individuals who were certainly well armed seized on the opportunity presented as the events unfolded. … What we don’t have, at this point, is specific intelligence that there was a significant advanced planning or coordination for this attack.
Sept. 19: At a State Department briefing, the department spokeswoman is asked if she now believes that the attack was a “terrorist attack”? She says, “Well, I didn’t get a chance to see the whole testimony that was given by Matt Olsen of the NCTC, but obviously we stand by comments made by our intelligence community who has first responsibility for evaluating the intelligence and what they believe that we are seeing.”
Sept. 19: The White House spokesman does not call it a “terrorist attack” in his press briefing. Carney says, “Based on the information we had at the time — we have now, we do not yet have indication that it was preplanned or premeditated. There’s an active investigation. If that active investigation produces facts that lead to a different conclusion, we will make clear that that’s where the investigation has led.”
Sept. 20: W.H. Spokesman Calls It a ‘Terrorist Attack’ — Not Obama
Sept. 20: Carney calls it a “terrorist attack” after being asked how the White House now classifies the attack. But he says the White House has no evidence that it was “a significantly preplanned attack” and blames the video for igniting the incident in Benghazi.
Carney: It is, I think, self-evident that what happened in Benghazi was a terrorist attack. Our embassy was attacked violently, and the result was four deaths of American officials. So, again, that’s self-evident. I would point you to a couple of things that Mr. Olsen said, which is that at this point it appears that a number of different elements were involved in the attack, including individuals connected to militant groups that are prevalent in Eastern Libya.
He also made clear that at this point, based on the information he has — and he is briefing the Hill on the most up-to-date intelligence — we have no information at this point that suggests that this was a significantly preplanned attack, but this was the result of opportunism, taking advantage of and exploiting what was happening as a result of reaction to the video that was found to be offensive.
Sept. 20: Obama, at a town hall meeting, says “extremists” took advantage of the “natural protests” to the anti-Muslim video to attack the consulate in Benghazi. He does not call it a “terrorist attack.”
Question: We have reports that the White House said today that the attacks in Libya were a terrorist attack. Do you have information indicating that it was Iran, or al Qaeda was behind organizing the protests?
Obama: Well, we’re still doing an investigation, and there are going to be different circumstances in different countries. And so I don’t want to speak to something until we have all the information. What we do know is that the natural protests that arose because of the outrage over the video were used as an excuse by extremists to see if they can also directly harm U.S. interests.
Sept. 21: Clinton Calls It a ‘Terrorist Attack’
Sept. 21: Clinton, speaking to reporters before a meeting with Pakistani Foreign Minister Hina Rabbani Khar, calls it a “terrorist attack” for the first time. She says, “Yesterday afternoon when I briefed the Congress, I made it clear that keeping our people everywhere in the world safe is our top priority. What happened in Benghazi was a terrorist attack, and we will not rest until we have tracked down and brought to justice the terrorists who murdered four Americans.”
Sept. 24-25: Obama Refuses to Call It a Terrorist Attack
Sept. 24: Clinton meets with the Libyan president and calls the Benghazi attack a “terrorist assault.” She says, “As we all know, the United States lost a great ambassador and the Libyan people lost a true friend when Chris Stevens and three other Americans were killed in the terrorist assault on our consulate in Benghazi.”
Sept. 24: Obama tapes an appearance on “The View,” and he’s asked by co-host Joy Behar whether the Libya attack was an act of terrorism or caused by the anti-Muslim video. He does not call it a terrorist attack and says, “We’re still doing an investigation.”
Joy Behar: It was reported that people just went crazy and wild because of this anti-Muslim movie, or anti-Muhammad, I guess, movie. But then I heard Hillary Clinton say that it was an act of terrorism. Is it? What do you say?
Obama: Well, we’re still doing an investigation. There’s no doubt that the kind of weapons that were used, the ongoing assault, that it wasn’t just a mob action. Now, we don’t have all the information yet, so we’re still gathering it. But what’s clear is that around the world, there’s still a lot of threats out there. That’s why we have to maintain the strongest military in the world, that’s why we can’t let down our guard when it comes to the intelligence work that we do and staying on top of — not just al Qaeda, the traditional al Qaeda in Pakistan and Afghanistan. …
Sept. 25: Obama speaks at the United Nations. He praises Chris Stevens as “the best of America” and condemns the anti-Muslim video as “crude and disgusting.” He does not describe the Benghazi attack as a terrorist attack.
Sept. 26: ‘Let’s Be Clear, It Was a Terrorist Attack’
Sept. 26: Carney is asked at a press briefing aboard Air Force One en route to Ohio why the president has not called the Benghazi incident a “terrorist attack.” He said, “The president — our position is, as reflected by the NCTC director, that it was a terrorist attack. It is, I think by definition, a terrorist attack when there is a prolonged assault on an embassy with weapons. … So, let’s be clear, it was a terrorist attack and it was an inexcusable attack.”
Sept. 26: Deputy Secretary of State William Burns, in an interview with Al Jazeera, is asked whether he agrees with the president of Libya that the Benghazi attack was premeditated and had nothing to do with the anti-Muslim video. He said: “It’s clear that the attack which took the lives of Chris Stevens and three other colleagues was clearly choreographed and directed and involved a fair amount of firepower, but exactly what kind of planning went into that and how it emerged on that awful night, we just don’t know right now. But I’m confident we’ll get to the bottom of it.”
Sept. 27: When Did Administration Know?
Sept. 27: At a press briefing, Defense Secretary Leon Panetta says that “it was a terrorist attack,” but declines to say when he came to that conclusion. “It took a while to really get some of the feedback from what exactly happened at that location,” he said. “As we determined the details of what took place there, and how that attack took place, that it became clear that there were terrorists who had planned that attack.”
Army Gen. Martin E. Dempsey, chairman of the Joint Chiefs of Staff, at the same briefing addresses what the U.S. knew in advance of the Benghazi attack. He says there was “a thread of intelligence reporting that groups in … eastern Libya were seeking to coalesce, but there wasn’t anything specific and certainly not a specific threat to the consulate that I’m aware of.”
Sept. 27: In a report on “Anderson Cooper 360 Degrees,” Fran Townsend, former Homeland Security adviser to President George W. Bush, says the administration knew early on that it was a terrorist attack. “The law enforcement source who said to me, from day one we had known clearly that this was a terrorist attack,” she says.
Sept. 27-28: Intelligence ‘Evolved’
Sept. 27: The White House spokesman is asked yet again why the president has refused to call the incident a terrorist attack. “The president’s position [is] that this was a terrorist attack,” Carney says.
Question: If the president does not call it, label it a terrorist attack as you and others have, is there some legal or diplomatic trigger that that brings? Why hasn’t he said that?
Carney: I think you’re misunderstanding something here. I’m the president’s spokesman. When the head of the National Counterterrorism Center, Matt Olsen, in open testimony in Congress answered a question by saying yes, by the definitions we go by — this is me paraphrasing — this was a terrorist attack — I echoed that, because this president, this administration, everybody looks to the intelligence community for the assessments on this. And it has been since I said so, the president’s position that this was a terrorist attack.
Sept. 28: Shawn Turner, a spokesman for the director of national intelligence, says in a statement that the office’s position on the attack evolved. It was first believed that “the attack began spontaneously,” but it was later determined that “it was a deliberate and organized terrorist attack,” he says.
Turner: In the immediate aftermath, there was information that led us to assess that the attack began spontaneously following protests earlier that day at our embassy in Cairo. We provided that initial assessment to Executive Branch officials and members of Congress, who used that information to discuss the attack publicly and provide updates as they became available. Throughout our investigation we continued to emphasize that information gathered was preliminary and evolving.
As we learned more about the attack, we revised our initial assessment to reflect new information indicating that it was a deliberate and organized terrorist attack carried out by extremists. It remains unclear if any group or person exercised overall command and control of the attack, and if extremist group leaders directed their members to participate.
Oct. 2-3: Clinton Cites ‘Continuing Questions’
Oct. 2: White House spokesman Carney at a press briefing in Nevada: “At every step of the way, the administration has based its public statements on the best assessments that were provided by the intelligence community. As the intelligence community learned more information they updated Congress and the American people on it.”
Oct. 3: Clinton tells reporters after a meeting with Foreign Minister of Kazakhstan Erlan Idrissov: “There are continuing questions about what exactly happened in Benghazi on that night three weeks ago. And we will not rest until we answer those questions and until we track down the terrorists who killed our people.”
Oct. 9: ‘Everything Calm’ Prior to Benghazi Attack, No Protests
Oct. 9: At a background briefing, senior state department officials reveal there were no protests prior to the terrorist attack on the U.S. consulate in Benghazi — contrary to what administration officials have been saying for weeks. A senior department official says “everything is calm at 8:30 p.m.” (Libya time) when Stevens was outside the building to bid a visitor goodbye. The ambassador retired to his bedroom for the evening at 9 p.m. The calm was shattered by 9:40 p.m. when “loud noises” and “gunfire and an explosion” are heard. (The background briefing provided on Sept. 12 also said the attack began at about 10 p.m., or about 4 p.m. EDT, but it did not provide information about what happened prior to the attack.)
A senior official says it was “not our conclusion” that the Benghazi attack started as a spontaneous protest to the anti-Muslim video. He also said “there was no actionable intelligence of any planned or imminent attack.”
Question: What in all of these events that you’ve described led officials to believe for the first several days that this was prompted by protests against the video?
Senior state department official two: That is a question that you would have to ask others. That was not our conclusion. I’m not saying that we had a conclusion, but we outlined what happened. The Ambassador walked guests out around 8:30 or so, there was no one on the street at approximately 9:40, then there was the noise and then we saw on the cameras the – a large number of armed men assaulting the compound.
Oct. 10: Administration Says It Gave Public ‘Best Information’
Oct. 10: Carney, the White House spokesman, is asked at a press briefing why the president and administration officials described the anti-Muslim video as the underlying cause of the attack on Benghazi when the State Department “never concluded that the assault in Benghazi was part of a protest on the anti-Muslim film.” He replied, in part: “Again, from the beginning, we have provided information based on the facts that we knew as they became available, based on assessments by the intelligence community — not opinions — assessments by the IC, by the intelligence community. And we have been clear all along that this was an ongoing investigation, that as more facts became available we would make you aware of them as appropriate, and we’ve done that.”
Oct. 10: After testifying before a House committee, Under Secretary for Management Patrick Kennedy is asked at a press briefing what the State Department should have done differently in releasing information about the Benghazi attack. He said, “We are giving out the best information we have at the time.”
Kennedy: [T]his is obviously an incredibly complicated situation. We’ve always made clear from the very beginning that we are giving out the best information we have at the time we are giving it out. That information has evolved over time. For example, if any Administration official, including any career official, had been on television on Sunday, September 16th, they would have said the same thing that Ambassador Rice would have said. She had information at that point from the intelligence community, and that is the same information I had and this – I would have made exactly the same points. Clearly, we know more today, but we knew what we knew when we knew it.
Oct. 10: The House Committee on Oversight and Government Reform releases State Department memos requesting additional security in Libya. Charlene Lamb, a State Department official who denied those requests, tells the committee that the State Department had been training local Libyans for nearly a year and additional U.S. security personnel were not needed. As reported by Foreign Policy: “We had the correct number of assets in Benghazi on the night of 9/11,” Lamb testified. Others testified differently. “All of us at post were in sync that we wanted these resources,” testified Eric Nordstrom, the top regional security officer in Libya over the summer, Foreign Policy reported.
Oct. 15: Clinton Blames ‘Fog of War’
Oct. 15: Clinton, in an interview on CNN, blamed the “fog of war” when asked why the administration initially claimed the attack began with the anti-Muslim video, even though the State Department never reached that conclusion. “In the wake of an attack like this in the fog of war, there’s always going to be confusion, and I think it is absolutely fair to say that everyone had the same intelligence,” Clinton said. “Everyone who spoke tried to give the information they had. As time has gone on, the information has changed, we’ve gotten more detail, but that’s not surprising. That always happens.”
Oct. 15: The New York Timesreports that the Benghazi attack came “without any warning or protest,” but “Libyans who witnessed the assault and know the attackers” say it was “in retaliation for the video.”
Oct. 24: White House, State Department Emails on Ansar al-Sharia
Oct. 24: Reuters reports the White House, Pentagon and other government agencies learned just two hours into the Benghazi attack that Ansar al-Sharia, an Islamic militant group, had “claimed credit” for it. The wire service report was based on three emails from the State Department’s Operations Center. One of the emails said, “Embassy Tripoli reports the group claimed responsibility on Facebook and Twitter and has called for an attack on Embassy Tripol.” The article also noted, “Intelligence experts caution that initial reports from the scene of any attack or disaster are often inaccurate.” (It should be noted that Reuters first reported on Sept. 12 that unnamed U.S. officials believed that Ansar al-Sharia may have been involved.)
Oct. 24: Clinton warns at a press conference that you cannot draw conclusions from the leaked emails because “cherry-picking one story here or one document there” can be misleading. She said, “The independent Accountability Review Board is already hard at work looking at everything — not cherry-picking one story here or one document there — but looking at everything, which I highly recommend as the appropriate approach to something as complex as an attack like this. Posting something on Facebook is not in and of itself evidence, and I think it just underscores how fluid the reporting was at the time and continued for some time to be.”
Oct. 24: Carney, the White House spokesman, says that “within a few hours” of the attack Ansar al-Sharia “claimed that it had not been responsible.” He added, “Neither should be taken as fact — that’s why there’s an investigation underway.”
May 8, 2013: At a hearing of the House Committee on Oversight & Government Reform, Rep. Trey Gowdy reads excerpts of a Sept. 12, 2011, email written by Acting Assistant Secretary of State for the Near East Beth Jones. According to Gowdy, Jones wrote, “I spoke to the Libyan ambassador and emphasized the importance of Libyan leaders to continue to make strong statements,” and “When he said his government suspected that former Qaddafi regime elements carried out the attack, I told him that the group that conducted the attacks, Ansar al-Sharia, is affiliated with Islamic extremists.” Gowdy said the email was sent to several top State Department officials, including Under Secretary for Management Patrick Kennedy. The committee did not release the full contents of the email. House Speaker John Boehner said the State Department did not allow the House to keep a copy of it.)
May 15, 2013: The White House releases 100 pages of emails regarding the CIA’s original talking points that were developed for the House Permanent Select Committee on Intelligence and used by U.S. Ambassador to the United Nations Susan Rice during her Sept. 16 Sunday talk show appearances. The emails show there were extensive changes made at the request of the State Department. (See “Sept. 16″ in our timeline for more information.)
Update, Nov. 6, 2012: This article was updated to add the president’s Sept. 12 interview with “60 Minutes,” which did not release the video and transcript until Nov. 4.
Update, May 9, 2013: This article was updated to include testimony from the May 8, 2013, hearing of the House Committee on Oversight & Government Reform.
The timeline below details the ongoing investigation into the September 11, 2012 attack upon the American diplomatic mission at Benghazi, in Libya. The attack and the investigation are the subject of much controversy in the American political sphere.
The New York Times reported: “American and European officials said that while many details about the attack remained unclear, the assailants seemed organized, well trained and heavily armed, and they appeared to have at least some level of advance planning.” The article also noted that a senior Obama administration official told reporters that “it was clearly a complex attack,” but provided no details.[4]
CBS News reported that Wanis al-Sharef (also spelled al-Sharif), a Libyan Interior Ministry official in Benghazi, said that an angry mob had gathered outside the consulate to protest a U.S.-made film that ridicules Islam’s Prophet Muhammad. According to al-Sharef, the mob stormed the consulate after the U.S. troops who responded fired rounds into the air to try and disperse the crowd.[5]
CBS News later reported that U.S. officials said the attack was not an out-of-control demonstration as first suspected, but a well-executed assault. From the wording of the report it is unclear whether the protesters were a group distinct from the attackers or were the attackers themselves.[6]
The Guardian published a video interview of a local Libyan on the consulate compound right after the attack, who presumed and empathized that the attack was in response to the anti-Islamic film.[7]
The Washington Post reported that U.S. officials and Middle East analysts said that the attack “may have been planned by extremists and inspired by al-Qaeda.”[8]
In a press release, the Qulliam Foundation, a counter-extremism think tank based in London, stated that the “military assault” was not related to the film but was to “avenge the death of Abu Yahya al-Libi, al-Qaeda’s second in command killed a few months ago.”[9]
BBC reported that Libya’s deputy ambassador to London, Ahmad Jibril, named Ansar al-Sharia, also known as Al-Qaeda in the Arabian Peninsula, as the perpetrators. They also said a Libyan reporter told them that the attack was executed by as many as 80 militiamen “armed with assault rifles, rocket-propelled grenades, mortars and 14.5 mm anti-aircraft machine guns.”[10][11]
Deputy Interior Minister Wanis al-Sharif of the Libyan government told a news conference in Benghazi that it was likely that the perpetrators had been Gaddafi loyalists, suggesting the attack could have been intended as a revenge for the extradition of Abdullah al-Senoussi (Gaddafi’s former intelligence chief) from Mauritania the previous month.[12]
September 13
The FBI opened an investigation into the deaths; a team was sent to investigate, with another team for security.[13] The FBI officials were set to arrive by September 21 in Benghazi to work with Libyan officials.[14]
In a briefing to congressional staffers, State Department Under Secretary Patrick Kennedy said that the attack appeared planned because it was so extensive and because of the “proliferation” of small and medium weapons.[15]
CNN reported that the attackers were part of an Al Qaeda spinoff group. They spoke with Sen. Dianne Feinstein (D-Calif.), who said the killings were possibly linked to the terrorist group blamed for the 9/11 hijackings. According to Sen. Feinstein, “The weapons were somewhat sophisticated, and they blew a big hole in the building and started a big fire.”[16]
September 14
The Senate Armed Services Committee was briefed by Secretary of Defense Leon Panetta about the response to the situation in Libya. Afterwards, Senate Armed Services Chairman Carl Levin (D-MI) was quoted as saying, “I think it was a planned, premeditated attack.” He added that he did not know the group responsible for the attack.[17]
Talking points prepared by the CIA, stated “The currently available information suggests that the demonstrations in Benghazi were spontaneously inspired by the protests at the U.S. Embassy in Cairo and evolved into a direct assault against the U.S. Consulate and subsequently its annex. There are indications that extremists participated in the violent demonstrations.” [19]
September 16
In an interview with NPR in Benghazi, President Mohammed el-Megarif said that foreigners infiltrated Libya over the past few months, planned the attack, and used Libyans to carry it out.[20] According to el-Megarif: “The idea that this criminal and cowardly act was a spontaneous protest that just spun out of control is completely unfounded and preposterous. We firmly believe that this was a precalculated, preplanned attack that was carried out specifically to attack the U.S. Consulate.” He said the attackers used the protesters outside the consulate as a cover, and there is evidence showing that elements of Ansar al-Sharia, an extremist group in eastern Benghazi, were used by foreign citizens with ties to al-Qaida to attack the consulate.[21]
U.S. Ambassador to the United Nations Susan Rice appeared on several Sunday morning talk shows and stated, “Putting together the best information that we have available to us today our current assessment is that what happened in Benghazi was in fact initially a spontaneous reaction to what had just transpired hours before in Cairo, almost a copycat of– of the demonstrations against our facility in Cairo, which were prompted, of course, by the video. What we think then transpired in Benghazi is that opportunistic extremist elements came to the consulate as this was unfolding. They came with heavy weapons which unfortunately are readily available in post revolutionary Libya. And it escalated into a much more violent episode.”[22][23]
Senator John McCain (R-AZ), the top Republican on the Senate Armed Services Committee, voiced suspicion that the attack was planned in advance and not prompted by the furor over the film. He noted that “[m]ost people don’t bring rocket-propelled grenades and heavy weapons to demonstrations. That was an act of terror.”[24]
September 17
Fox News reported that an “intelligence source on the ground in Libya” said “there was no demonstration outside the U.S. Consulate in Benghazi” before the attack.[25] The source was quoted as saying, “There was no protest and the attacks were not spontaneous.” The source also said that the attack “was planned and had nothing to do with the movie.” The source said the assault came with no warning at about 9:35 p.m. local time and included fire from more than two locations. The information for the time and for multiple directions of the attack corroborates an eyewitness report.[26]
Representative Mike Rogers (R) Michigan, the chairman of the House Intelligence Committee, said in an interview with Real Clear Politics that there were reports that the Consulate sustained “indirect fire, artillery type fire from mortars. They had direct unit action. It was coordinated in a way that was very unusual. They repulsed a quick reaction force that came to the facility….”[27]
September 19
The director of the National Counterterrorism Center, Matthew Olson, appeared before the Senate Homeland Security and Governmental Affairs Committee. During the hearing Olsen said that the Americans killed in Libya died “in the course of a terrorist attack.”[28] But he said that “the facts that we have now indicate that this was an opportunistic attack,” one in which heavily armed militants took advantage of an ongoing demonstration at the Consulate.
Sen. Susan Collins (R-Maine) disagreed with Olsen’s statement that the attack did not appear pre-planned. She said, “Based on the briefings I have had, I’ve come to the opposite conclusion. I just don’t think that people come to protests equipped with RPGs [rocket-propelled grenades] and other heavy weapons. And the reports of complicity—and they are many—with Libyan guards who were assigned to guard the consulate also suggest to me that this was premeditated.” Olsen told committee members that the U.S. is “looking at indications” that some attackers had connections to al-Qaeda or its North African affiliate, al-Qaeda in the Islamic Maghreb.
Fox News reported intelligence sources that the attack was tied to Al Qaeda via the involvement of Abu Sufian bin Qumu, a former Guantanamo Bay detainee.[29][30] However, a US national security official tells Mother Jones that “that report is wrong, there’s no intelligence suggesting that he was leading the attack on the consulate that evening.”[31]
September 20
Reuters reported that U.S. authorities are investigating the prospect of collusion between the militants who launched the attack on the consulate and locally hired Libyan personnel guarding the facility.[32] This corroborates earlier statements by U.S. government officials who stated there were multiple accounts of collusion between the attackers and the Libyan security guards.[28]
Secretary Clinton announced the formation of a panel to investigate the attack,[33] which is separate from the FBI investigation.
White House Press Secretary Jay Carney for the first time called the event “a terrorist attack.” In the same report CNN noted conflicting reports that U.S. Ambassador to Libya Chris Stevens “believed he was on an al Qaeda hit list.”[34]
September 21
U.S. officials said that the heavily armed extremists who laid siege to the consulate used “military-style tactics” in what appeared to be a “sophisticated operation”. Intelligence reports indicated that 50 or more people, many of them masked, took part in the attack and used gun trucks and precise mortar fire.[35] Intelligence reports also indicated that the attackers set up a perimeter to control access in and out of the compound.
September 23
A report in The New York Times has stated that there were two facilities used by the Americans in Benghazi, one for the American mission and an annex a half-mile away [36] and that:
Neither was heavily guarded, and the annex was never intended to be a “safe house,” as initial accounts suggested. Two of the mission’s guards — Tyrone S. Woods and Glen A. Doherty, former members of the Navy SEALs — were killed just outside the villa’s front gate.
September 25
U.S. Senators John McCain (R-AZ), Lindsey Graham (R-SC), Kelly Ayotte (R-NH) and Ron Johnson (R-WI) sent a letter to U.N. Ambassador Susan Rice seeking clarification on statements she made on the five Sunday talk shows on September 16 that the September 11 attack in Benghazi was the result of a “spontaneous reaction.” The senators wrote that the evidence clearly showed the attack was planned and coordinated.[37] Ms. Rice wrote in her reply letter, “I relied solely and squarely on the information the intelligence community provided to me … This information represented the intelligence community’s best, current assessment as of the date of my television appearances.” The four senators replied in a statement: “Elements of the intelligence community apparently told the administration within hours of the attack that militants connected with al Qaeda were involved, yet Ambassador Rice claims her comments five days later reflected the ‘best’ and ‘current’ assessment of the intelligence community. Either the Obama administration is misleading Congress and the American people, or it is blaming the entire failure on the intelligence community.”[38]
September 26
The Daily Beast reported that three separate U.S. intelligence officials knew within 24 hours of the attack that it was “planned and the work of al Qaeda affiliates operating in Eastern Libya.”[39]
Libyan president Mohamed Magariefd, in an interview with NBC News, said that there were no protestors at the site before the attack and that the anti-Islam film had “nothing to do with” the attack.[40] “Reaction should have been, if it was genuine, should have been six months earlier. So it was postponed until the 11th of September,” he said. “They chose this date, 11th of September to carry a certain message.”
Eight Republican Representatives on the House Armed Services Committee sent a letter to President Obama asking him to provide answers to questions in a classified format.[41] Their letter reads in part: “While we appreciate your willingness to provide the House of Representatives with an interagency briefing last week, many of the members’ questions were left unanswered. To that end, we are seeking additional information regarding the intelligence leading up to the attack, the security posture of our embassy, the role former Guantanamo Bay detainees may have played, as well as the way forward in Libya and, indeed, the region.”
September 28
A statement released by the Director of Public Affairs for the Director of National Intelligence, Shawn Turner, on the intelligence related to the terrorist attack on the U.S. Consulate in Benghazi, Libya, read in part:[42] “As we learned more about the attack, we revised our initial assessment to reflect new information indicating that it was a deliberate and organized terrorist attack carried out by extremists. It remains unclear if any group or person exercised overall command and control of the attack, and if extremist group leaders directed their members to participate. However, we do assess that some of those involved were linked to groups affiliated with, or sympathetic to al-Qa’ida. We continue to make progress, but there remain many unanswered questions. As more information becomes available our analysis will continue to evolve and we will obtain a more complete understanding of the circumstances surrounding the terrorist attack.”
October 2012
October 2
In a letter to Secretary of State Clinton, Darrell Issa (R-CA, chairman of the Committee) and Jason Chaffetz (R-UT, chairman of the subcommittee on National Security, Homeland Defense, and Foreign Operations) write that “the attack that claimed the Ambassador’s life was the latest in a long line of attacks on Western diplomats and officials in Libya in the months leading up to September 11, 2012. It was clearly never, as Administration officials once insisted, the result of a popular protest.”[43] The letter goes on to state that the mission in Benghazi was denied increased security they repeatedly requested. Subpoenaed witnesses set to testify before the committee on October 10 are Charlene Lamb, Deputy Assistant Secretary for International Programs, Bureau of Diplomatic Security, U.S. Department of State; Eric Nordstrom, Regional Security Officer, U.S. Department of State; and Lt. Col. Andrew Wood, Utah National Guard, U.S. Army.[44] According to Lt. Col. Wood, his 16-member team and a six-member State Department elite force called a Mobile Security Deployment team left Libya in August, one month before the assault on the diplomatic mission. Wood says that’s despite the fact that U.S. officials in Libya wanted security increased, not decreased.[45]
In an evening briefing to reporters, the State Department said it never concluded that the consulate attack in Libya stemmed from protests over the video.[50][51]
Senate Foreign Relations Committee member Bob Corker (R-TN) met with Libyan officials in Tripoli, and said that investigators are examining video from security cameras at the primary Benghazi compound to help them reconstruct what happened in the attack and identify attack participants.[52]
Senators John McCain (R-AZ), Lindsey Graham (R-SC), Kelly Ayotte (R-NH), and Saxby Chambliss (R-GA) sent letters to Director of National Intelligence James Clapper, CIA Director David Petraeus, and John Brennan, Assistant to the President for Homeland Security and Counterterrorism, asking them to respond to “specific questions regarding the shifting official explanations” about the attack.[53]
October 10
The four witnesses called to testify at the October 10, 2012 hearing of the House Committee on Oversight and Government Reform (l to r) were Lt. Col. Andrew Wood, Utah National Guard, U.S. Army; Eric Nordstrom, Regional Security Officer, U.S. Department of State; Charlene Lamb, Deputy Assistant Secretary for International Programs, Bureau of Diplomatic Security, U.S. Department of State; and Ambassador Patrick Kennedy, Under Secretary for Management, U.S. Department of State. An image of the U.S. compound can be seen behind Ms. Lamb.
The House Committee on Oversight and Government Reform held its hearing, “The Security Failures of Benghazi.”[44] In addition to the three witnesses originally named, a fourth witness testified: Ambassador Patrick Kennedy, Under Secretary for Management, U.S. Department of State.
In sworn testimony, Mr. Kennedy said, “…if any administration official, including any career official, were on television on Sunday, September 16th, they would have said what Ambassador Rice said. The information she had at that point from the intelligence community is the same that I had at that point.”[54] However, in a briefing to congressional staffers on September 13, Mr. Kennedy said that the attack appeared planned.[15] With regard to the so-called “talking points” memo UN Ambassador Susan Rice relied upon for information during television interviews following the Benghazi attack, The Guardian reports that on 16 November 2012, former CIA Director David Petraeus told congressional hearings, references to al-Queda had been removed from the memo. The references where remove so as not to give up information which could compromise classified sources. Rice was unaware of al-Qaida ties to the Benghazi attack.[55]
During testimony State Department witnesses acknowledged that it rejected appeals for more security at its diplomatic posts in Libya in the months before the attack.[56] The “annex” and “safe house” in the second diplomatic compound was inadvertently revealed to be a U.S. intelligence post.[57][58][59]
Charlene Lamb, Deputy Assistant Secretary of State for International Programs, said in her prepared testimony that she had a firm grasp on what happened in Benghazi, starting moments after the assault began. ”When the attack began, a Diplomatic Security agent working in the tactical operations center immediately … alerted the annex U.S. quick reaction security team stationed nearby … and the Diplomatic Security Command Center in Washington. From that point on, I could follow what was happening in almost real-time.”[60]
During testimony Representative Issa described the existence of video tape of the attack taken from consulate security cameras; the tape was not available to committee members at the time of the hearing.
October 12
U.S. Senate Committee on Homeland Security and Governmental Affairs announced its plan to conduct a bipartisan investigation. Part of their investigation will seek to determine “why the Administration’s initial public assessments of this attack were subsequently proven inaccurate.”[61]
October 14
Senator Lindsey Graham (R-SC), speaking on CBS’ Face the Nation, said that “[t]he intelligence community on the ground in Libya has told Senator Corker and myself that within twenty-four hours, they communicated up to Washington that this was a terrorist attack.”[62]
October 15
U.S. Secretary of State Hillary Rodham Clinton assumed responsibility for the Benghazi attack, saying that she is in charge of her 60,000-plus staff all over the world and “the president and the vice president wouldn’t be knowledgeable about specific decisions that are made by security professionals. They’re the ones who weigh all of the threats and the risks and the needs and make a considered decision.”[63] Republican Senator John McCain praised her “laudable gesture, especially when the White House is trying to avoid any responsibility whatsoever” but insisted that either there were drastic failures in the national security operation in not keeping the president aware of ongoing threats, or Obama himself knew of the threats and needed to take responsibility for the shortcomings.[64]
In an interview with the Los Angeles Times, the two Libyan militiamen guarding the consulate denied aiding the attackers. The compound was “lazily quiet” in the hours before the assault, they said. Around 9:30 p.m., the guards heard cries of “Allahu akbar!”—”God is great”—three times from outside the walls, then a voice called out in Arabic “You infidels!” and the attackers raced inside.[65]
The New York Times reported that witnesses of the attack knowledgeable of the circumstances were very convinced that it was carried out by a group of local Islamic militants in response to the video. According to local militia leaders familiar with the militant group, it was capable of carrying out the attack on short notice with only a few hour’s planning.[66]
October 17
Libyan officials report that the founder of Libya’s Islamist militia Ansar al-Sharia was at the compound during the attack, but that he remains free a week after those allegations were disclosed to Libyan political leaders and U.S. investigators.[67] The militia commander, identified as Ahmed Abu Khattalah, is a former political prisoner whose fighters were also blamed for assassinating a senior military officer after he defected to the opposition during last year’s revolution against Moammar Kadafi.[68]
October 18
The New York Times reported that Ahmed Abu Khattala, 41, claimed the Benghazi attack had grown out of a peaceful protest against a video made in the United States that mocked the Prophet Muhammad and Islam.[69] On or about 15 June 2014 American military and law enforcement personnel operating in Libya captured Ahmed Abu Khattala, who had been secretly indicted in the U.S. for his alleged role as a mastermind and/or ring-leader in the Benghazi attack.
Senate Committee on Homeland Security & Governmental Affairs made its first request for documents and briefings into the circumstances surrounding the attack. In separate letters to Secretary Hillary Clinton, Director of National Intelligence James Clapper, and Secretary of Defense Leon Panetta, the committee requested a classified briefing for members of the committee. The briefing is to address threat assessments before the attack, security needs, requests for security, description and chronology of the attack, and what the Obama administration knew about the attack in the immediate aftermath and “whether any initial public statements issued by members of the Administration in the days following the attack were inaccurate and, if so, why.”[70]
Senator Dianne Feinstein (D-CA), chair of the Senate Intelligence Committee, questioned the security at the compound and the initial intelligence surrounding the attack. Feinstein was quoted in an interview: “I think what happened was the director of national intelligence, which we call the DNI, who is a very good individual, the former head of the Defense Intelligence Agency, Gen. Jim Clapper, put out some speaking points on the initial intelligence assessment. I think that was possibly a mistake.”[71]
October 19
Oversight and Government Reform Committee Chairman Darrell Issa and National Security Subcommittee Chairman Jason Chaffetz sent a 10-page letter to President Obama,[72] accompanied by 166 pages of unclassified documents[73] and photos.[74] The committee stated that the “letter requests that the White House respond to questions about its role in the controversial decision to have the U.S. diplomatic mission in Libya pursue a course of ‘normalization’ that was intended to help create the perception of success in Libya and contrast it to U.S. operations in Iraq and Afghanistan.”[75]
Representative Peter T. King (R-NY), Chairman of the House Committee on Homeland Security, sent a letter to President Obama requesting him to release Intelligence Community (1) reporting that led Obama Administration officials to initially characterize the assault as a “spontaneous reaction” to a film and (2) data and intelligence that led the Administration to change its characterization from a “spontaneous reaction” to a “terrorist attack.”[76]
Senators John McCain (R-AZ), Lindsey Graham (R-SC), and Kelly Ayotte (R-NH) renewed their request from 10 days ago that Director of National Intelligence James Clapper, CIA Director David Petraeus and John Brennan, Assistant to the President for Homeland Security and Counterterrorism, answer questions regarding “the shifting official explanations surrounding” the attack. The senators wrote, “Our questions should not be hard to answer, and the American people have a right to learn what our intelligence communities knew about the events of September 11, 2012, and when they knew it.”[77]
U.S. officials told The Associated Press that the CIA station chief in Libya compiled intelligence reports within 24 hours of the attack that indicated there was evidence it was carried out by militants, using the pretext of demonstrations against U.S. facilities in Egypt against the film to cover their intent. The report from the station chief was written late Wednesday, Sept. 12, and reached intelligence agencies in Washington the next day. It was not clear how widely the information was circulated.[78]
October 20
The Washington Post reported that talking points prepared by the CIA on Sept. 15 stated: “The currently available information suggests that the demonstrations in Benghazi were spontaneously inspired by the protests at the U.S. Embassy in Cairo and evolved into a direct assault against the U.S. Consulate and subsequently its annex. There are indications that extremists participated in the violent demonstrations.” [19]
CBS News reported Congress members have asked why military assistance was not sent. General Dempsey and Secretary Panetta “looked at available options, and the ones we exercised had our military forces arrive in less than 24 hours, well ahead of timelines laid out in established policies.” An unmanned Predator drone was sent to Benghazi, and the drone observed the final hours of the attack. The Pentagon said it moved a team of special operators from central Europe to Naval Air Station Sigonella; other nearby military forces available were fighter jets and AC-130 gunships. Gary Berntsen stated, “They made zero adjustments in this. They stood and they watched and our people died.”[79]
October 22
The New York Times reported that Ms. Rice, the US ambassador to the UN, “has said that the judgments she offered on the five talk shows on Sept. 16 came from talking points prepared by the C.I.A., which reckoned that the attack that killed Ambassador J. Christopher Stevens and three other Americans had resulted from a spontaneous mob that was angry about an anti-Islamic video that had set off protests elsewhere. That assessment, described to Ms. Rice in briefings the day before her television appearances, was based on intercepted communications, informants’ tips and Libyan press reports, officials said.” [80]
October 23
Media reports indicate that the State Department’s Operations Center sent a “Sensitive but unclassified” email at 4:05 p.m. Washington time (10:05 p.m. Benghazi time) on September 11 titled “U.S. Diplomatic Mission in Benghazi Under Attack” to the White House Situation Room and other U.S. security units and two hours later sent an email titled “Update 2: Ansar al-Sharia Claims Responsibility for Benghazi Attack.”[81][82] The first email reads in part: “approximately 20 armed people fired shots; explosions have been heard as well. Ambassador Stevens, who is currently in Benghazi, and four COM (Chief of Mission/embassy) personnel are in the compound safe haven.”[83] Secretary of State Hillary Rodham Clinton cautioned that those emails are “not in and of itself evidence” that the administration had definitively assessed the assault as a terrorist attack from the beginning.[84] A Tunisian man who was arrested in Turkey earlier this month with reported links to the Benghazi attack has been returned to Tunisia and is facing terrorism charges.[85][86]
October 24
It is reported that both Reuters and Fox News obtained copies of an email sent about 2 hours after the attack in which the White House, Pentagon, and other agencies are told that the Islamist militant group Ansar al-Sharia had “claimed responsibility.”[87]
October 25
A suspected Al-Qaeda member who was believed to have been involved in the Consulate attack was shot dead by Egyptian police, after they received a tip that he was staying in an apartment in Madinat Nasr. Egyptian police also arrested a seven-member cell in Cairo, five of whom are Libyans and the other two Egyptians.[88]
October 26
Republican Senators John McCain, Lindsey Graham, and Kelly Ayotte wrote to Defense Secretary Leon Panetta, CIA Director David Petraeus, and Attorney General Eric Holder requesting they make public the surveillance video taken at the consulate during the attack.[89]Fox News reported that military back-up was denied by the CIA chain of command, and the annex was instructed twice to “stand down”. Woods, and two others, ignored those instructions and evacuated the consulate. Upon returning to the annex, and after beginning to taking fire, the annex requested fire support as they had a laser targeted on the mortar team that was attacking them. A CIA spokeswoman, Jennifer Youngblood, denied the claims.[90]
October 27
The Associated Press published a timeline of the comments by the administration and Libyan officials regarding the Benghazi attack,[91] as well as Libyan witnesses account.[92] The AP article noted that a witness said he militants before the attack gathering around 20 youths from nearby to chant against the anti-Islam film. The article reports that American officials suggest it was a planned militant assault and that the attackers may have used the film controversy as a cover for the attack.
October 31
Former House Speaker Newt Gingrich suggested that “at least two networks have emails from the National Security Adviser’s office telling a counterterrorism group to stand down” in assisting the besieged U.S. consulate in Benghazi.[93] Gingrich said that the bombshell emails could be revealed within the next two days.Fox News reported that a cable marked “SECRET” and addressed to the Office of the Secretary of State Hillary Clinton summarized an “emergency meeting” convened by the U.S. Mission in Benghazi on August 15, 2012. In the meeting the State Department’s regional security officer “expressed concerns with the ability to defend Post in the event of a coordinated attack due to limited manpower, security measures, weapons capabilities, host nation support, and the overall size of the compound.” According to Fox News, “The details in the cable seemed to foreshadow the deadly Sept. 11 attack on the U.S. compound, which was a coordinated, commando-style assault using direct and indirect fire. Al Qaeda in North Africa and Ansar al-Sharia, both mentioned in the cable, have since been implicated in the consulate attack.”[94]
November 2012
November 1
CBS News reported that during the attack the Obama administration did not convene its top interagency counterterrorism resource: the Counterterrorism Security Group, (CSG). A high-ranking government official was quoted: “The CSG is the one group that’s supposed to know what resources every agency has. They know of multiple options and have the ability to coordinate counterterrorism assets across all the agencies. They were not allowed to do their job. They were not called upon.”[95] The article goes on to state that counterterrorism sources and internal emails reviewed by CBS News expressed frustration that key responders were ready to deploy but were not called upon to help in the attack.
Documents found by reporters for the American magazine Foreign Policy on Oct. 26 amid the wreckage of the U.S. consulate indicate there was concern about security at the compound. One letter dated Sept. 11 and addressed to Mohamed Obeidi, the head of the Libyan Ministry of Foreign Affairs’ office in Benghazi, reads in part: “Finally, early this morning at 0643, September 11, 2012, one of our diligent guards made a troubling report. Near our main gate, a member of the police force was seen in the upper level of a building across from our compound. It is reported that this person was photographing the inside of the U.S. special mission and furthermore that this person was part of the police unit sent to protect the mission.”[96] The article states that this accords with a message written by Smith, the IT officer who was killed in the assault, on a gaming forum on Sept. 11. “Assuming we don’t die tonight. We saw one of our ‘police’ that guard the compound taking pictures,” he wrote hours before the assault.
Washington Post published a detailed CIA timeline of the attack described by a senior intelligence official.[97]
November 2
Fifty-three members of the House of Representatives sent a letter to President Obama and Secretary Clinton requesting responses to oversight questions, including questions on the president’s Daily Brief, how the State Department designated the Benghazi compound (and how it affected security requirements), contradictions in the administration’s public statements of the attack as a deliberate terrorist attack or a spontaneous protest, and discrepancies between danger pay increases for mission personnel but denial for additional security.[98]Senior U.S. intelligence officials acknowledged that Woods and Doherty were contracted by the Central Intelligence Agency, not the State Department as originally publicly identified.[99]
Fox News reported that U.S. military intelligence informed senior commanders as early as 7 p.m. ET (that is, less than 4 hours after the attack began) that Ansar al-Sharia carried out the attack. The intelligence was relayed with no caveats, according to a source familiar with the intelligence.[100]
The Pentagon said that two U.S. service members volunteered to join the CIA team that travelled from Tripoli to Benghazi on the rescue mission.[101]
November 3
U.S. Senators John McCain (R-AZ), Lindsey Graham (R-SC) and Kelly Ayotte (R-NH) urged the immediate creation of a temporary Select Committee to investigate the Benghazi attack.[102]Fox News reported that the Blue Mountain Security manager (who was in charge of the local force hired to guard the consulate perimeter) made calls on both two-way radios and cell phones to colleagues in Benghazi warning of problems at least an hour earlier than the attack. Allegedly, those calls were to local security contractors, who say that the annex was also notified much earlier than 9:40 p.m., when the attack started. U.S. military intelligence also said that armed militias were gathering up to 3 hours before the attack.[103]
November 9
David H. Petraeus resigned his position as CIA Director and admitted to having an extramarital affair; he was scheduled to testify before Congress the week of November 12 on the Benghazi attack.[104] As of then it was not clear that General Petraeus would have to testify, and whether he would be disposed to do so if requested or required by Congress, though Senator Dianne Feinstein, D-CA, Chair of the Senate Intelligence Committee, indicated that the Congress would need to interview him. On Wednesday, November 14, 2012, it was made known that he had agreed to testify the following day, Thursday, November 15.[105]
November 10
The Department of Defense released a press release stating they released a detailed timeline yesterday of the Pentagon’s response to the attack.[106]
November 12
Paula Broadwell gave a talk on October 26 at the University of Denver in which she revealed that the CIA annex was used to imprison Libyan militia members.[107] In the same speech, Broadwell speculated that this may have been the motivation behind the attack on the consulate.[108] A Fox News Source confirmed to them that the CIA Annex was used as a detention center for not just militia members, but for prisoners from all parts of Northern Africa and the Middle East. The CIA has denied these allegations.[109]
November 15
U.S. intelligence and counter-terrorism officials testified in congressional public and closed hearings today.[110] CNN reported that legislators saw “real-time film (showing) exactly what happened”, starting before the attack began up “through the incident and the exodus,” according to Sen. Dianne Feinstein. The video was reported to be from “a combination of video from a surveillance camera and a drone.”[111]
November 16
Former CIA Director David Petraeus testified in closed hearings to both congressional intelligence committees. Speaking with reporters after the hearing, Representative Peter T. King (R-NY), Chairman of the House Committee on Homeland Security, said that Petraeus testified that he knew that the attack was a terrorist attack linked to al-Qaeda affiliates and not sparked by a protest over an anti-Islam video, as White House officials and President Obama had said for days afterwards.[112] “The original talking points put out by the CIA were different from what was later put out,” King said. “Petraeus says his initial assessment was from the start it was a terrorist attack.” King said a CIA analyst specifically told lawmakers that the al-Qaeda affiliates line “was taken out.”[113]
Other House members in attendance at the hearing said that Petraeus made clear that the modifications of the original talking points were not done for political reasons. Petraeus “was adamant there was no politicization of the process, no White House interference or political agenda,” said Rep. Adam Schiff (D-CA). “He completely debunked that idea.” Regarding Ambassador Susan Rice‘s comments during television interviews after the attack, Schiff went on to say that the, according to Petraeus, the comments “reflected the best intelligence at the time that could be released publicly”. “There was an interagency process to draft it, not a political process,” Schiff said. “They came up with the best assessment without compromising classified information or source or methods. So changes were made to protect classified information.”[114] According to Petraeus’s statements during the hearing, administration officials were concerned that, by publicly disclosing the involvement of Al Qaeda affiliates and sympathizers in the attack, those groups would be tipped off that US government agencies were aware of their involvement.[115]
The Washington Post reported that, since the attack, the CIA and other intelligence analysts have settled on a hybrid view of the attack, suggesting that the Cairo protest sparked militants in Libya, who quickly mobilized the assault on U.S. facilities in Benghazi.[116] Details about possible al-Qaeda links were not in initial talking points used by both Petraeus and UN Ambassador Susan Rice because they were preliminary and based on classified sources, intelligence officials said.
November 20
CBS News reported that the Office of the Director of National Intelligence (DNI) cut specific references to “al Qaeda” and “terrorism” from the unclassified talking points given to Ambassador Susan Rice on the attack, with the agreement of the CIA and FBI.[117]
November 27
In a White House press briefing to reporters, Press Secretary Jay Carney told reporters: “There was no protest outside the Benghazi facility. To this day, it is the assessment of this administration and of our intelligence community and certainly the assessment of your colleagues and the press who have interviewed participants on the ground in the assault on our facilities in Benghazi that they acted at least in part in response to what they saw happening in Cairo and took advantage of that situation.”[118]
U.S. Ambassador to the UN Susan Rice testified for about an hour in a closed session with Republican Senators John McCain, Lindsey Graham, and Kelly Ayotte.[119] McCain told reporters after the meeting: “We are significantly troubled by many of the answers that we got, and some that we didn’t get, concerning evidence that was overwhelming leading up to the attack on our consulate…. It is clear that the information that she gave the American people was incorrect when she said that it was a spontaneous demonstration triggered by a hateful video.” Rice later issued a statement saying: “We explained that the talking points provided by the intelligence community, and the initial assessment upon which they were based, were incorrect in a key respect: there was no protest or demonstration in Benghazi…. While, we certainly wish that we had had perfect information just days after the terrorist attack, as is often the case, the intelligence assessment has evolved.”
December 2012
December 7
The House Committee on Foreign Affairs announced that Secretary of State Hillary Clinton will testify, as early as next week, at an open hearing on the Benghazi attack.[120]
December 15
Hillary Clinton faints and suffers a concussion. As a result, her aides announce that they no longer expect her to testify at the hearing on the Benghazi attack.[121]
December 18
An independent inquiry into the attack sharply criticises State Department officials in Washington for ignoring requests for more guards and safety upgrades, and for failing to adapt security procedures to a deteriorating security environment.[122]
December 31
A bipartisan SenateHomeland Security Committee report faults the State Department and Pentagon for providing inadequate protection to the U.S. Consulate. It also criticized the Obama Administration’s handling of the attack.[123]
January 2013
January 23
Hillary Clinton testifies before Congress on the subject of the attack. She decries the “politicization” of incident, and defends the State Department.[124][125] Noteworthy highlights from her testimony include her comment, “What difference, at this point, does it make?” in response to questions about why the Benghazi attack occurred and how the controversial talking points were created. She also stated, in response to Senator Rand Paul‘s question about the U.S. transferring weapons to Turkey from Libya, “I do not know. I don’t have any information on that,” further stating, “you’ll have to direct that question to the agency that ran the annex.”[126]
February 2013
February 07
Leon Panetta and Martin Dempsey testify before Senate Armed Services Committee on the subject of the attack. Under questioning by Lindsey Graham, Panetta and Dempsey said that they both only talked to President Obama one time on the day of the attack.[127][128][129]
February 18
The United States has been denied access to individuals who were detained after a raid in the Nasr City neighborhood of Cairo by Egyptian officials. One of these individuals is Muhammad Jamal al Kashef, who is suspected of establishing training camps where attackers of the Benghazi consulate and CIA annex had trained.[130][131]
April 2013
April 23
House Republicans released a report on the Benghazi attack that was highly critical of the White House and the State Department; the White House dismissed the report, and House Democrats called the report biased.[132]Among dozens of findings, the report[133] states that:
“Senior State Department officials knew that the threat environment in Benghazi was high and that the Benghazi compound was vulnerable and unable to withstand an attack, yet the department continued to systematically withdraw security personnel”
The “[Obama] Administration willfully perpetuated a deliberately misleading and incomplete narrative that the attacks evolved from a political demonstration caused by a YouTube video.”
“… after a White House Deputies Meeting on Saturday, September 15, 2012, the Administration altered the talking points to remove references to the likely participation of Islamic extremists in the attacks. The Administration also removed references to the threat of extremists linked to al-Qa’ida in Benghazi and eastern Libya….”
“The Administration deflected responsibility by blaming the IC [intelligence community] for the information it communicated to the public in both the talking points and the subsequent narrative it perpetuated.”
May 2013
May 8
Gregory Hicks, Eric Nordstrom, and Mark Thompson testify before the United States House Committee on Oversight and Government Reform,[134] and were called “whistleblowers” by the committee chairman.[135] Hicks testified that more assistance from the U.S. military could have been provided, that attempts to send additional forces were told to stand down by another authority, and he was demoted for telling his recollection of events; the Defense Department disputed Hicks’ testimony, and the State Department did not respond.[136][137] Hicks further stated that since the Libyan government had called the attack a terrorist attack, and the United States did not, complicated the FBI investigation.[136] Thompson testified that a Foreign Emergency Support Team was not sent due to instructions from the State Department, which the State Department said would have taken too long to be effective; Nordstrom criticized the Accountability Review Board, that it did not look into decisions made by those individuals in higher authority.[136] Furthermore, they testified that their previous attempts to increase security leading up to the attacks were denied.[136] Democrats charged that the Republicans were politicizing the investigation.[138]
August 2013
August 06
The United States Department of Justice filed the first criminal charges in the Benghazi attack against Ahmed Abu Khattala, leader of a Libyan militia. The charges were sealed and their exact nature wasn’t clear, nor was the number of suspects named in the case. The Justice Department declined to comment on specific charges.[139][140]
Ansar al-Sharia in Libya (ASL, English: Partisans of Islamic Law) is a SalafistIslamistmilitia group that advocates the implementation of strict Sharia law across Libya.[1] Ansar al-Sharia came into being in 2011, during the Libyan Civil War. Until January 2015, it was led by its “Emir“, Mohamed al-Zahawi.[4] The organization has deliberately targeted both Libyan and American civilians and took part in the 2012 Benghazi attack. The group has been designated as a terrorist organization by the United Nations,[10] Turkey, the UAE, the United Kingdom and the United States.[11]
Ansar al-Sharia was formed during the Libyan Civil War and rose to prominence after the killing of Muammar Gaddafi. Made up of former rebels from the Abu Obayda Bin Aljarah Brigade, Malik Brigade and February 17th Martyrs Brigade and many more,[7] the Salafist militia initially made their name by posting videos of themselves fighting in the Battle of Sirte, the final battle in the war.[12]
Their first major public appearance occurred on 7 June 2012, when they led a rally of as many as 200 pickup trucks mounted with artillery[13] along Benghazi’s Tahrir Square and demanded the imposition of Sharia law.[14] According to the New York Times, “Western diplomats who watched said they were stunned by the scale and weaponry of the display.”[13]
The leader of Ansar al-Sharia, Sheikh Muhammad al-Zahawi, later gave an interview on a local TV station forbidding participation in Libya’s first post-civil war parliamentary elections on the grounds that they were un-Islamic.[15] The militia went on to provide security to some public property in eastern Libya, including Benghazi’s Al Jala Hospital.[12] The group is reportedly the military arm of Al-Dawa wa Al-Islah, a charitable organization.[16]
Ansar al-Sharia carried out destruction of Sufishrines in Benghazi, which they regarded as idolatrous.[20] In November 2011, Libyan Salafis engaged in a series of attacks on Sufi shrines all over the country.[21]Mohamed Yousef el-Magariaf, the president of the General National Congress (GNC) denounced the shrine attacks as “disgraceful acts” and said “those involved were criminals who would be pursued.”[21]
Ansar al-Sharia used its online presence to denounce the 2013 capture and removal from Libya of al-Qaeda operative Abu Anas al-Libi, by American military forces.[22]
Aside from militant activities, Ansar al-Sharia has attempted to gain local support through Dawah (missionary activities), the provision of social services, ranging from security patrols to garbage collection, and the establishment of medical clinics and religious schools.[8] In January 2015, the group introduced Islamic religious police and a sharia court in parts of Benghazi.[23]
2012 U.S. Consulate attack in Benghazi
On 11 September 2012, the United States Department of State Operations Center advised the White House Situation Room and other U.S. security units that Ansar al-Sharia was claiming responsibility for the attack on the U.S. diplomatic mission in Benghazi that had just occurred.[24] Witnesses said they saw vehicles with the group’s logo at the scene of the assault and that fighters there acknowledged at the time that they belonged to Ansar al-Sharia.[19] Witnesses also said they saw Ahmed Abu Khattala, a commander of Ansar al-Sharia, leading the embassy attack, a claim Mr. Khattala denied.[25] According to longwarjournal.org, the group issued a statement asserting that it “didn’t participate as a sole entity” and that the attack “was a spontaneous popular uprising” to the film trailer Innocence of Muslims, widely condemned as anti-Islamic.[26]
As of 6 August 2013, U.S. officials confirmed that Ahmed Abu Khattala, the Libyan leader of Ansar al-Sharia, has been charged with playing a significant role in last year’s attack on the U.S. diplomatic compound in Benghazi. According to NBC, the charges were filed under seal in Washington, D.C. in late July.[27] Khattalah was arrested by U.S. Delta Force special operations personnel in a raid on Libya on 15 June 2014.[28][29] He is being transported to the United States aboard the USS New York aircraft carrier and is expected to face trial in a U.S. criminal court.[30]
Temporary withdrawal and resurgence
On 21 September 2012, after massive anti-militia protests in Benghazi which largely blamed Ansar al-Sharia for the mission attack, hundreds of protesters stormed the militia headquarters, pulled down flags of the militia and torched a vehicle inside the base.[31] The group was forced out of its bases in Benghazi the next day.[32]
A few hours after the attack, Martyrs of February 17, together with Bou Salim Martyrs brigade, allegedly agreed to disband,[33] however about 150-200 militiamen moved from Benghazi to Jebel Akhdar area.[34]
As of December 2012, the group still existed, although it had adopted a low-key position.[35] By March 2013, the group had returned to Benghazi and began patrolling hospitals and manning checkpoints, as well as providing humanitarian services to residents.[36] By late 2013, the group had opened up a branch in Derna, under the slogan “A step toward building the Islamic state”.[37] The group also established a presence in the Libyan cities of Ajdabiya and Sirte.[6]
Following prolonged tensions between Islamists and non-Islamists in Libya, on 16 May 2014 military forces loyal to General Khalifa Belqasim Haftar launched a large scale air and ground offensive codenamed Operation Dignity on Islamist militia groups in Benghazi including Ansar al-Sharia.[38][39]
After initial reverses, Ansar al-Sharia, and other Islamist and jihadist militias fighting together as the Shura Council of Benghazi Revolutionaries, launched a counteroffensive against units loyal to Haftar in the following months, largely driving them out of the city by August of the same year.[40][41] After capturing several army bases in this offensive, Ansar al Sharia posted images on the internet of the weapons and equipment that had seized, including D-30 Howitzers, Multiple rocket launchers, Strela 2Man-portable air-defense systems, large quantities of ammunition and vehicles.[41][42]
In late 2014, the group’s leader, Mohamed al-Zahawi, died of wounds he had received from the fighting.[4] In the months that followed, many members of Ansar al-Sharia, including the majority of its organisation in Sirte, reportedly defected to the Islamic State of Iraq and the Levant in Libya.[43][44] On 30 March 2015, the group’s chief Sharia jurist, Abu Abdullah Al-Libi, pledged allegiance to ISIL,[45] and defected with a number of fighters. Ansar al-Sharia quickly announced that Abu Tamim al Libi has been selected as his replacement.[46] While there have been rumors that the group could pledge allegiance to ISIL, it has retained its independence.[23]
Designation as a terrorist organization
The countries and organizations below have officially listed the Ansar Al Sharia as a terrorist organization.
This article is about a particular use of the term connected with military and political organizations. For covert operations in intelligence gathering, organized crime and religious or minor political groups, see Front organization.
“Covert operative” redirects here. For the legal definition of covert agents or operatives, see covert agent.
[hide]This article has multiple issues. Please help improve it or discuss these issues on the talk page.
The examples and perspective in this article deal primarily with the United States and do not represent a worldwide view of the subject. (December 2009)
This article needs additional citations for verification. (January 2013)
According to the U.S. Department of Defense Dictionary of Military and Associated Terms, a covert operation (also as CoveOps or covert ops) is “an operation that is so planned and executed as to conceal the identity of or permit plausible denial by the sponsor.” It is intended to create a political effect which can have implications in the military, intelligence or law enforcement arenas. Covert operations aim to fulfill their mission objectives without any parties knowing who sponsored or carried out the operation.
Under United States law, the Central Intelligence Agency (CIA) must lead covert operations unless the president finds that another agency should do so and properly informs the Congress. Normally, the CIA is the US Government agency legally allowed to carry out covert action.[1] The CIA’s authority to conduct covert action comes from the National Security Act of 1947.[2] President Ronald Reagan issued Executive Order 12333 titled United States Intelligence Activities in 1984. This order defined covert action as “special activities”, both political and military, that the US Government could legally deny. The CIA was also designated as the sole authority under the 1991 Intelligence Authorization Act and in Title 50 of the United States Code Section 413(e).[2][3] The CIA must have a “Presidential Finding” issued by the President of the United States in order to conduct these activities under the Hughes-Ryan amendment to the 1991 Intelligence Authorization Act.[1] These findings are then monitored by the oversight committees in both the US Senate and the House of Representatives.[4] As a result of this framework, the CIA “receives more oversight from the Congress than any other agency in the federal government”.[5] The Special Activities Division (SAD) is a division of the CIA’s National Clandestine Service, responsible for Covert Action and “Special Activities”. These special activities include covert political influence and paramilitary operations. The division is overseen by the United States Secretary of State.[2]
In a covert operation, the identity of the sponsor is concealed, while in a clandestine operation the operation itself is concealed. Put differently, clandestine means “hidden,” while covert means “deniable.” The term stealth refers both to a broad set of tactics aimed at providing and preserving the element of surprise and reducing enemy resistance and to a set of technologies (stealth technology) to aid in those tactics. While secrecy and stealthiness are often desired in clandestine and covert operations, the terms secret and stealthy are not used to formally describe types of missions.
Covert operations are employed in situations where openly operating against a target would be disadvantageous. These operations are generally illegal in the target state and are frequently in violation of the laws of the sponsoring country. Operations may be directed at or conducted with allies and friends to secure their support for controversial components of foreign policy throughout the world. Covert operations may include sabotage, assassinations, support for coups d’état, or support for subversion. Tactics include the use of a false flag or front group.
The activity of organizations engaged in covert operations is in some instances similar to, or overlaps with, the activity of front organizations. While covert organizations are generally of a more official military or paramilitary nature, like the DVS German Air Transport School in the Nazi era, the line between both becomes muddled in the case of front organizations engaged in terrorist activities and organized crime.
The following persons are known to have participated in covert operations, as distinct from clandestine intelligence gathering (espionage) either by their own admission or by the accounts of others:
Roy Farran Major Roy Alexandar Farran DSO MC and Two Bars served in her majesty’s SAS during WW2 taking part in Operation Tombola, author of Winged Dagger lived 2 January 1921 – 2 June 2006.
Charles Beckwith, US Army colonel who was an early exchange officer with the British Special Air Service (SAS), and created the Delta Force (1st Special Forces Operational Detachment-Delta) based on the SAS.
Richard Meinertzhagen, British officer who engaged in deceptive operations against Turkish forces in World War I, although falsifying later operations.
Richard Quirin, German World War II saboteur landed by German submarine in the US, as part of Operation Pastorius. Captured and executed. ex parte Quirin was a Supreme Court case challenging the constitutionality of execution of unlawful combatants.
Pavel Sudoplatov, major general in Soviet state security (under many organizational names), with roles ranging from assassin to director of field operations.
Jesús Villamor, Filipino Air Force officer that helped organize World War II guerilla movements.
Executive Secrets: Coved the Presidency, William J. Daugherty, University of Kentucky Press, 2004, page 25.
Executive Secrets: Covert Action and the Presidency, William J. Daugherty, University of Kentucky Press, 2004.
All Necessary Means: Employing CIA operatives in a Warfighting Role Alongside Special Operations Forces, Colonel Kathryn Stone, Professor Anthony R. Williams (Project Advisor), United States Army War College (USAWC), 7 April 2003, page 7
Special Operations Group (SOG) is the department within SAD responsible for operations that include the collection of intelligence in hostile countries and regions, and all high threat military or intelligence operations with which the U.S. government does not wish to be overtly associated.[2] As such, members of the unit (called Paramilitary Operations Officers and Specialized Skills Officers) normally do not carry any objects or clothing (e.g., military uniforms) that would associate them with the United States government.[3] If they are compromised during a mission, the United States government may deny all knowledge.[4]
SOG Paramilitary Operations Officers account for a majority of Distinguished Intelligence Cross and Intelligence Star recipients during any given conflict or incident which elicits CIA involvement. An award bestowing either of these citations represents the highest honors awarded within the CIA organization in recognition of distinguished valor and excellence in the line of duty. SAD/SOG operatives also account for the majority of the names displayed on the Memorial Wall at CIA headquarters indicating that the agent died while on active duty.[5]
Political Action Group (PAG) is responsible for covert activities related to political influence, psychological operations and economic warfare. The rapid development of technology has added cyberwarfare to their mission. Tactical units within SAD are also capable of carrying out covert political action while deployed in hostile and austere environments. A large covert operation usually has components that involve many, or all, of these categories, as well as paramilitary operations. Political and Influence covert operations are used to support U.S. foreign policy. Often overt support for one element of an insurgency would be counter-productive due to the impression it would have on the local population. In such cases, covert assistance allows the U.S. to assist without damaging these elements in the process. Many of the other activities (such as propaganda, economic and cyber) support the overall political effort. There have been issues in the past with attempts to influence the US media such as in Operation Mockingbird. However, these activities are now subject to the same oversight as all covert action operations.[6]
SAD provides the President of the United States with an option when overt military and/or diplomatic actions are not viable or politically feasible. SAD can be directly tasked by the President of the United States or the National Security Council at the President’s direction. This is unlike any other U.S. special mission force. However, SAD/SOG has far fewer members than most of the other special missions units, such as the U.S. Army’s 1st Special Forces Operational Detachment-Delta (Delta Force) or Naval Special Warfare Development Group (DEVGRU).[7][8][9]
As the action arm of the DO, SAD/SOG conducts direct action missions such as raids, ambushes, sabotage, targeted killings[10][11][12] and unconventional warfare (e.g., training and leading guerrilla and military units of other countries in combat). SAD/SOG also conducts special reconnaissance, that can be either military or intelligence driven, but is carried out by Paramilitary Officers (also called Paramilitary Operatives) when in “non-permissive environments“. Paramilitary Operations Officers are also fully trained case officers (i.e., “spies”) and as such conduct clandestine human intelligence (HUMINT) operations throughout the world.[13] SAD/SOG officers are selected from the most elite U.S. military units.[9]
The political action group within SAD conducts the deniable psychological operations, also known as black propaganda, as well as “Covert Influence” to effect political change as an important part of any Administration’s foreign policy.[1] Covert intervention in a foreign election is the most significant form of political action. This could involve financial support for favored candidates, media guidance, technical support for public relations, get-out-the-vote or political organizing efforts, legal expertise, advertising campaigns, assistance with poll-watching, and other means of direct action. Policy decisions could be influenced by assets, such as subversion of officials of the country, to make decisions in their official capacity that are in the furtherance of U.S. policy aims. In addition, mechanisms for forming and developing opinions involve the covert use of propaganda.[14]
Propaganda includes leaflets, newspapers, magazines, books, radio, and television, all of which are geared to convey the U.S. message appropriate to the region. These techniques have expanded to cover the internet as well. They may employ officers to work as journalists, recruit agents of influence, operate media platforms, plant certain stories or information in places it is hoped it will come to public attention, or seek to deny and/or discredit information that is public knowledge. In all such propaganda efforts, “black” operations denote those in which the audience is to be kept ignorant of the source; “white” efforts are those in which the originator openly acknowledges himself; and “gray” operations are those in which the source is partly but not fully acknowledged.[14][15]
SAD’s existence became better known as a result of the “Global War on Terror“. Beginning in autumn of 2001, SAD/SOG paramilitary teams arrived in Afghanistan to hunt down al-Qaeda leaders, facilitate the entry of U.S. Army Special Forces and lead the United Islamic Front for the Salvation of Afghanistan against the ruling Taliban. SAD/SOG units also defeated Ansar al-Islam in Iraqi Kurdistan prior to the invasion of Iraq in 2003[17][18] and trained, equipped, organized and led the Kurdishpeshmerga forces to defeat the Iraqi army in northern Iraq.[13][17] Despite being the most covert unit in U.S. Special Operations, numerous books have been published on the exploits of CIA paramilitary officers, including Conboy and Morrison’s Feet to the Fire: CIA Covert Operations in Indonesia,[19] and Warner’s Shooting at the Moon: The Story of America’s Clandestine War in Laos.[20] Most experts consider SAD/SOG the premiere force for unconventional warfare (UW), whether that warfare consists of either creating or combating an insurgency in a foreign country.[7][21][22]
There remains some conflict between the National Clandestine Service and the more clandestine parts of the United States Special Operations Command (USSOCOM),[23] such as the Joint Special Operations Command. This is usually confined to the civilian/political heads of the respective Department/Agency. The combination of SAD and USSOCOM units has resulted in some of the most notable successes of the wars in Iraq and Afghanistan, to include the locating and killing of Osama bin Laden.[22][24] SAD/SOG has several missions. One of these missions is the recruiting, training, and leading of indigenous forces in combat operations.[22] SAD/SOG and its successors have been used when it was considered desirable to have plausible deniability about U.S. support (this is called a covert operation or “covert action”).[13] Unlike other special missions units, SAD/SOG operatives combine special operations and clandestine intelligence capabilities in one individual.[9] These individuals can operate in any environment (sea, air or ground) with limited to no support.[7]
The Pentagon commissioned a study to determine whether the CIA or the U.S. Department of Defense (DoD) should conduct covert action paramilitary operations. Their study determined that the CIA should maintain this capability and be the “sole government agency conducting covert action.” The DoD found that, even under U.S. law, it does not have the legal authority to conduct covert action, nor the operational agility to carry out these types of missions.[27] The operation in May 2011 that resulted in the death of Osama bin Laden was a covert action under the authority of the CIA.[24][28]
SAD/SOG has several hundred officers, mostly former members of special operations forces (SOF) and a majority from the Joint Special Operations Command (JSOC).[29] The CIA has also recruited individuals within the agency.[30] The CIA’s formal position for these individuals is “Paramilitary Operations Officers” and “Specialized Skills Officers.” Paramilitary Operations Officers attend the Clandestine Service Trainee (CST) program, which trains them as clandestine intelligence operatives (known as “Core Collectors” within the Agency). The primary strengths of SAD/SOG Paramilitary Officers are operational agility, adaptability, and deniability. They often operate in small teams, typically made up of six operators (with some operations being carried out by a single officer), all with extensive military special operations expertise and a set of specialized skills that does not exist in any other unit.[9] As fully trained intelligence case officers, Paramilitary Operations Officers possess all the clandestine skills to collect human intelligence—and most importantly—to recruit assets from among the indigenous troops receiving their training. These officers often operate in remote locations behind enemy lines to carry out direct action (including raids and sabotage), counter-intelligence, guerrilla/unconventional warfare, counter-terrorism, and hostage rescue missions, in addition to being able to conduct espionage via HUMINT assets.
There are four principal elements within SAD’s Special Operations Group: the Air Branch, the Maritime Branch, the Ground Branch, and the Armor and Special Programs Branch. The Armor and Special Programs Branch is charged with development, testing, and covert procurement of new personnel and vehicular armor and maintenance of stockpiles of ordnance and weapons systems used by SOG, almost all of which must be obtained from clandestine sources abroad, in order to provide SOG operatives and their foreign trainees with plausible deniability in accordance with U.S. Congressional directives.
Together, SAD/SOG contains a complete combined arms covert military. Paramilitary Operations Officers are the core of each branch and routinely move between the branches to gain expertise in all aspects of SOG.[30] As such, Paramilitary Operations Officers are trained to operate in a multitude of environments. Because these officers are taken from the most highly trained units in the U.S. military and then provided with extensive additional training to become CIA clandestine intelligence officers, many U.S. security experts assess them as the most elite of the U.S. special missions units.[31]
While the World War IIOffice of Strategic Services (OSS) was technically a military agency under the Joint Chiefs of Staff, in practice it was fairly autonomous of military control and enjoyed direct access to PresidentFranklin D. Roosevelt. Major General William Joseph Donovan was the head of the OSS. Donovan was a soldier and Medal of Honor recipient from World War I. He was also a lawyer and former classmate of FDR at Columbia Law School.[37] Like its successor, the CIA, OSS included both human intelligence functions and special operations paramilitary functions. Its Secret Intelligence division was responsible for espionage, while its Jedburgh teams, a joint U.S.-UK-French unit, were forerunners of groups that create guerrilla units, such as the U.S. Army Special Forces and the CIA. OSS’ Operational Groups were larger U.S. units that carried out direct action behind enemy lines. Even during World War II, the idea of intelligence and special operations units not under strict military control was controversial. OSS operated primarily in the European Theater of Operations (ETO) and to some extent in the China-Burma-India Theater, while General of the ArmyDouglas MacArthur was extremely reluctant to have any OSS personnel within his area of operations.
One of the OSS’ greatest accomplishments during World War II was its penetration of Nazi Germany by OSS operatives. The OSS was responsible for training German and Austrian commandos for missions inside Nazi Germany. Some of these agents included exiled communists and socialist party members, labor activists, anti-NaziPOWs, and German and Jewish refugees. At the height of its influence during World War II, the OSS employed almost 24,000 people.[38]
OSS Paramilitary Officers parachuted into many countries then behind enemy lines, including France, Norway, Greece and The Netherlands. In Crete, OSS paramilitary officers linked up with, equipped and fought alongside Greek resistance forces against the Axis occupation.
OSS was disbanded shortly after World War II, with its intelligence analysis functions moving temporarily into the U.S. Department of State. Espionage and counterintelligence went into military units, while paramilitary and related functions went into an assortment of ‘ad hoc’ groups, such as the Office of Policy Coordination. Between the original creation of the CIA by the National Security Act of 1947 and various mergers and reorganizations through 1952, the wartime OSS functions generally went into CIA. The mission of training and leading guerrillas generally stayed in the United States Army Special Forces, but those missions required to remain covert were folded into the paramilitary arm of the CIA. The direct descendant of the OSS’ Special Operations is the CIA’s Special Activities Division.
Tibet
After the Chinese invasion of Tibet in October 1950, the CIA inserted SAD paramilitary teams into Tibet to train and lead Tibetan resistance fighters against the People’s Liberation Army of China. These teams selected and then trained Tibetan soldiers in the Rocky Mountains of the United States;[39] training occurred at Camp Hale.[40][41] The SAD teams then advised and led these commandos against the Chinese, both from Nepal and India. In addition, SAD Paramilitary Officers were responsible for the Dalai Lama‘s clandestine escape to India, narrowly escaping capture and certain execution by the Chinese government.[39]
According to a book by retired CIA officer John Kenneth Knaus, entitled Orphans Of The Cold War: America And The Tibetan Struggle For Survival, Gyalo Thondup, the older brother of the 14th (and current) Dalai Lama, sent the CIA five Tibetan recruits. These recruits were then trained in paramilitary tactics on the island of Saipan in the Northern Marianas.[42] Shortly thereafter, the five men were covertly returned to Tibet “to assess and organize the resistance” and selected another 300 Tibetans for training. U.S. assistance to the Tibetan resistance ceased after the 1972 Nixon visit to China, after which the United States and China normalized relations.[43]
The CIA sponsored a variety of activities during the Korean War. These activities included maritime operations behind North Korean lines. Yong Do Island, connected by a rugged isthmus to Pusan, served as the base for those operations. These operations were carried out by well-trained Korean guerrillas. The four principal U.S. advisers responsible for the training and operational planning of those special missions were Dutch Kramer, Tom Curtis, George Atcheson and Joe Pagnella. All of these Paramilitary Operations Officers operated through a CIA front organization called the Joint Advisory Commission, Korea (JACK), headquartered at Tongnae, a village near Pusan, on the peninsula’s southeast coast.[44] These paramilitary teams were responsible for numerous maritime raids and ambushes behind North Korean lines, as well as prisoner of war rescue operations. These were the first maritime unconventional warfare units that trained indigenous forces as surrogates. They also provided a model, along with the other CIA-sponsored ground based paramilitary Korean operations, for the Military Assistance Command, Vietnam-Studies and Observations Group (MACV-SOG) activities conducted by the U.S. military and the CIA/SAD in Vietnam.[7][44] In addition, CIA paramilitary ground-based teams worked directly for U.S. military commanders, specifically with the 8th Army, on the “White Tiger” initiative. This initiative included inserting South Korean commandos and CIA Paramilitary Operations Officers prior to the two major amphibious assaults on North Korea, including the landing at Inchon.[7]
The Bay of Pigs Invasion (known as “La Batalla de Girón”, or “Playa Girón” in Cuba), was an unsuccessful attempt by a U.S.-trained force of Cuban exiles to invade southern Cuba and overthrow the Cuban government of Fidel Castro. The plan was launched in April 1961, less than three months after John F. Kennedy assumed the presidency of the United States. The Cuban Revolutionary Armed Forces, trained and equipped by Eastern Bloc nations, defeated the exile-combatants in three days.
The sea-borne invasion force landed on April 17, and fighting lasted until April 19, 1961. CIA Paramilitary Operations Officers Grayston Lynch and William “Rip” Robertson led the first assault on the beaches, and supervised the amphibious landings.[45] Four American aircrew instructors from Alabama Air National Guard were killed while flying attack sorties.[45] Various sources estimate Cuban Army casualties (killed or injured) to be in the thousands (between 2,000 and 5,000).[46] This invasion followed the successful overthrow by the CIA of the Mosaddeqgovernment in Iran in 1953[47] and Arbenz government in Guatemala in 1954,[48] but was a failure both militarily and politically.[49] Deteriorating Cuban-American relations were made worse by the 1962 Cuban Missile Crisis.
Bolivia
The National Liberation Army of Bolivia (ELN-Ejército de Liberación Nacional de Bolivia) was a communist guerrilla force that operated from the remote Ñancahuazú region against the pro-U.S. Bolivian government. They were joined by Che Guevara in the mid-1960s.[50][51] The ELN was well equipped and scored a number of early successes against the Bolivian army in the difficult terrain of the mountainous Camiri region.[52] In the late 1960s, the CIA deployed teams of SAD Paramilitary Operations Officers to Bolivia to train the Bolivian army in order to counter the ELN.[52] These SAD teams linked up with U.S. Army Special Forces and Bolivian Special Forces to track down and capture Guevara, who was a special prize because of his leading role in the Cuban Revolution.[52] On October 9, 1967, Guevara was executed by Bolivian soldiers on the orders of CIA paramilitary operative Félix Rodríguez shortly after being captured, according to CIA documents.[53]
Vietnam and Laos
South Vietnam, Military Regions, 1967
The original OSS mission in Vietnam under MajorArchimedes Patti was to work with Ho Chi Minh in order to prepare his forces to assist the United States and their Allies in fighting the Japanese. After the end of World War II, the US agreed at Potsdam to turn Vietnam back to their previous French rulers and in 1950 the US began providing military aid to the French.[54]
CIA Paramilitary Operations Officers trained and led Hmong tribesmen in Laos and Vietnam, and their actions of these officers were not known for several years. Air America was the air component of the CIA’s paramilitary mission in Southeast Asia and was responsible for all combat, logistics and search and rescue operations in Laos and certain sections of Vietnam.[55] The ethnic minority forces numbered in the tens of thousands and they conducted direct actions mission, led by Paramilitary Operations Officers, against the communist Pathet Lao forces and their North Vietnamese allies.[7]
Elements of SAD were seen in the CIA’s Phoenix Program. One component of the Phoenix Program was involved in the capture and killing of suspected Viet Cong (National Liberation Front – NLF) members.[56] Between 1968 and 1972, the Phoenix Program captured 81,740 National Liberation Front of South Vietnam (NLF or Viet Cong) members, of whom 26,369 were killed. This was a large proportion of U.S. killings between 1969 and 1971. The program was also successful in destroying their infrastructure. By 1970, communist plans repeatedly emphasized attacking the government’s “pacification” program and specifically targeted Phoenix agents. The NLF also imposed quotas. In 1970, for example, communist officials near Da Nang in northern South Vietnam instructed their agents to “kill 400 persons” deemed to be government “tyrant[s]” and to “annihilate” anyone involved with the “pacification” program. Several North Vietnamese officials have made statements about the effectiveness of Phoenix.[57][58]
MAC-V SOG (Studies and Observations Group) (which was originally named the Special Operations Group, but was changed for cover purposes), was created and active during the Vietnam War. While CIA was just one part of MAC-V SOG, it did have operational control of some of the programs. Many of the military members of MAC-V SOG joined the CIA after their military service. The legacy of MAC-V SOG continues within SAD’s Special Operations Group.[59]
Maritime activities against the USSR
In 1973, SAD/SOG and the CIA’s Directorate of Science and Technology built and deployed the USNS Glomar Explorer (T-AG-193), a large deep-sea salvage ship, on a secret operation. This operation was called Project Azorian (erroneously called Project Jennifer by the press).[60] Her mission was to recover a sunken Sovietsubmarine, K-129, which had been lost in April 1968.[61][62] A mechanical failure caused two-thirds of the submarine to break off during recovery,[60] but SAD recovered two nuclear-tipped torpedoes, cryptographic machines and the bodies of six Soviet submariners.[63] An alternative theory claims that all of K-129 was recovered[64] and that the official account was an “elaborate cover-up”.[65]
Also in the 1970s, the U.S. Navy, the National Security Agency (NSA) and SAD/SOG [66] conducted Operation Ivy Bells and a series of other missions to place wire taps on Soviet underwater communications cables. These operations were covered in detail in the 1998 book Blind Man’s Bluff: The Untold Story of American Submarine Espionage.[67] In the 1985 edition of “Studies in Intelligence”, the CIA’s in-house journal that outsiders rarely get to see, the CIA describes the “staggering expense and improbable engineering feats” that culminated in the August 1974 mission.[68]
Nicaragua
In 1979, the U.S.-backed Anastasio Somoza Debayle dictatorship in Nicaragua fell to the socialist Sandinistas. Once in power, the Sandinistas disbanded the Nicaraguan National Guard, who had committed many human rights abuses, and arrested and executed some of its members. Other former National Guard members helped to form the backbone of the Nicaraguan Counterrevolution or Contra. SAD/SOG paramilitary teams were deployed to train and lead these forces against the Sandinista government. These paramilitary activities were based in Honduras and Costa Rica. Direct military aid by the United States was eventually forbidden by the Boland Amendment of the Defense Appropriations Act of 1983. The Boland Amendment was extended in October 1984 to forbid action by not only the Defense Department, but also to include the Central Intelligence Agency.[69][70]
The Boland Amendment was a compromise because the U.S. Democratic Party did not have enough votes for a comprehensive ban on military aid. It covered only appropriated funds spent by intelligence agencies. Some of Reagan’s national security officials used non-appropriated money of the National Security Council (NSC) to circumvent the Amendment. NSC officials sought to arrange funding by third parties. These efforts resulted in the Iran-Contra Affair of 1987, which concerned Contra funding through the proceeds of arms sales to the Islamic Republic of Iran. No court ever made a determination whether Boland covered the NSC and on the grounds that it was a prohibition rather than a criminal statute, no one was indicted for violating it. Congress later resumed aid to the Contras, totaling over $300 million. The Contra war ended when the Sandinistas were voted out of power by a war-weary populace in 1990.[70][71]Sandinista leader Daniel Ortega was re-elected as President of Nicaragua in 2006 and took office again on January 10, 2007.
El Salvador
CIA personnel were also involved in the Salvadoran civil war.[72] Some allege that the techniques used to interrogate prisoners in El Salvador foreshadowed those later used in Iraq and Afghanistan.[73] In fact, when a similar counter-insurgency program was proposed in Iraq, it was referred to as “the Salvador Option”.[74]
Somalia
Location of Somalia
SAD sent in teams of Paramilitary Operations Officers into Somalia prior to the U.S. intervention in 1992. On December 23, 1992, Paramilitary Officer Larry Freedman became the first casualty of the conflict in Somalia. Freedman was a former Army Delta Force operator who had served in every conflict that the U.S. was involved in, both officially and unofficially, since Vietnam.[75] Freedman was killed while conducting special reconnaissance in advance of the entry of U.S. military forces. His mission was completely voluntary, as it required entry into a very hostile area without any support. Freedman was awarded the Intelligence Star on January 5, 1993 for his “extraordinary heroism”.[76]
SAD/SOG teams were key in working with JSOC and tracking high value targets (HVT), known as “Tier One Personalities”. Their efforts, working under extremely dangerous conditions with little to no support, led to several very successful joint JSOC/CIA operations.[77] In one specific operation, a CIA case officer, Michael Shanklin[78] and codenamed “Condor”, working with a CIA Technical Operations Officer from the Directorate of Science and Technology, managed to get a cane with a beacon in it to Osman Ato, a wealthy businessman, arms importer, and Mohammed Aideed, a money man whose name was right below Mohamed Farrah Aidid’s on the Tier One list.
Once Condor confirmed that Ato was in a vehicle, JSOC‘s Delta Force launched a capture operation.
a Little Bird helicopter dropped out of the sky and a sniper leaned out and fired three shots into the car’s engine block. The car ground to a halt as commandos roped down from hovering Blackhawks [sic], surrounded the car and handcuffed Ato. It was the first known helicopter takedown of suspects in a moving car. The next time Jones saw the magic cane, an hour later, Garrison had it in his hand. “I like this cane,” Jones remembers the general exclaiming, a big grin on his face. “Let’s use this again.” Finally, a tier one personality was in custody.[77]
President Bill Clinton withdrew U.S. forces on May 4, 1994.[79]
In June 2006, the Islamic Courts Union seized control of southern Somalia, including the country’s capital Mogadishu, prompting the Ethiopian government to send in troops to try to protect the transitional government. In December, the Islamic Courts warned Ethiopia they would declare war if Ethiopia did not remove all its troops from Somalia. Sheikh Sharif Ahmed, leader of the Islamic Courts, called for a jihad, or holy war, against Ethiopia and encouraged foreign Muslim fighters to come to Somalia. At that time, the United States accused the group of being controlled by al-Qaeda, but the Islamic Courts denied that charge.[80]
In 2009, PBS reported that al-Qaeda had been training terrorists in Somalia for years. Until December 2006, Somalia’s government had no power outside of the town of Baidoa, 150 miles (240 km) from the capital. The countryside and the capital were run by warlords and militia groups who could be paid to protect terrorist groups.[80]
CIA officers kept close tabs on the country and paid a group of Somali warlords to help hunt down members of al-Qaeda according to the New York Times.[citation needed] Meanwhile, Ayman al-Zawahiri, the deputy to al-Qaeda leader Osama bin Laden, issued a message calling for all Muslims to go to Somalia.[80] On January 9, 2007, a U.S. official said that ten militants were killed in one airstrike.[81]
On September 14, 2009, Saleh Ali Saleh Nabhan, a senior al-Qaeda leader in East Africa as well as a senior leader in Shabaab, al Qaeda’s surrogate in Somalia, was killed by elements of U.S. Special Operations. According to a witness, at least two AH-6 Little Bird attack helicopters strafed a two-car convoy. Navy SEALs then seized the body of Nabhan and took two other wounded fighters captive.[82][83] JSOC and the CIA had been trying to kill Nabhan for some time including back in January 2007, when an AC-130 Gunship was called in on one attempt. A U.S. intelligence source stated that CIA paramilitary teams are directly embedded with Ethiopian forces in Somalia, allowing for the tactical intelligence to launch these operations.[84] Nabhan was wanted for his involvement in the 1998 United States embassy bombings, as well as leading the cell behind the 2002 Mombasa attacks.[82][85]
From 2010 to 2013, the CIA set up the Somalia National Intelligence and Security Agency (NISA) by providing training, funding and diplomatic access. In the same time period, the EU and UN has spent millions of dollars for the military training of the Somali National Army (SNA). NISA is considered a professional Somali security force that can be relied upon to neutralize the terrorist threat.[86] This force responded to the complex al-Shabaab attack on the Banadir Regional Courthouse in Mogadishu which killed 25 civilians. NISA’s response however saved 100s and resulted in the death of all the al-Shabaab guerrillas involved.[87]
Significant events during this timeframe included the targeted drone strikes against British al-Qaida operative Bilal el-Berjawi [88] and Moroccan al-Qaida operative Abu Ibrahim.[89] It also included the rescue of U.S. citizen Jessica Buchanan by U.S. Navy SEALs.[90] All likely aided by intelligence collection efforts in Somalia.[91]
Afghanistan
Hamid Karzai with Special Forces and CIA Paramilitary in late 2001.
During the Soviet war in Afghanistan in the 1980s, Paramilitary Operations Officers were instrumental in equipping Mujaheddin forces against the Soviet Army. Although the CIA in general, and a Texas congressman named Charlie Wilson in particular, have received most of the attention, the key architect of this strategy was Michael G. Vickers. Vickers was a young Paramilitary Operations Officer from SAD/SOG. The CIA’s efforts have been given credit for assisting in ending the Soviet involvement in Afghanistan and bringing Taliban to power.[92]
SAD paramilitary teams were active in Afghanistan in the 1990s in clandestine operations to locate and kill or capture Osama Bin Laden. These teams planned several operations, but did not receive the order to execute from President Bill Clinton because the available intelligence did not guarantee a successful outcome weighed against the extraordinary risk to the SAD/SOG teams that would execute the mission.[13] These efforts did however build many of the relationships that would prove essential in the 2001 U.S. Invasion of Afghanistan.[13]
On September 26, 2001, members of the Special Activities Division, led by Gary Schroen, were the first U.S. forces inserted into Afghanistan. The Northern Afghanistan Liaison Team entered the country nine days after the 9/11 attack[93][94] and linked up with the Northern Alliance as part of Task Force Dagger.[95]
They provided the Northern Alliance with resources including cash to buy weapons and prepared for the arrival of USSOCOM forces. The plan for the invasion of Afghanistan was developed by the CIA, the first time in United States history that such a large-scale military operation was planned by the CIA.[96] SAD, U.S. Army Special Forces, and the Northern Alliance combined to overthrow the Taliban in Afghanistan with minimal loss of U.S. lives. They did this without the use of conventional U.S. military ground forces.[13][97][98][99]
What made the Afghan campaign a landmark in the U.S. Military’s history is that it was prosecuted by Special Operations forces from all the services, along with Navy and Air Force tactical power, operations by the Afghan Northern Alliance and the CIA were equally important and fully integrated. No large Army or Marine force was employed”.[100]
The valor exhibited by Afghan and American soldiers, fighting to free Afghanistan from a horribly cruel regime, will inspire even the most jaded reader. The stunning victory of the horse soldiers – 350 Special Forces soldiers, 100 C.I.A. officers and 15,000 Northern Alliance fighters routing a Taliban army 50,000 strong – deserves a hallowed place in American military history”.[101]
Small and highly agile paramilitary mobile teams spread out over the countryside to meet with locals and gather information about the Taliban and al-Qa’ida. During that time, one of the teams was approached in a village and asked by a young man for help in retrieving his teenage sister. He explained that a senior Taliban official had taken her as a wife and had sharply restricted the time she could spend with her family. The team gave the man a small hand-held tracking device to pass along to his sister, with instructions for her to activate it when the Taliban leader returned home. The team responded to her emergency signal, capturing the senior Taliban official and rescuing the sister. The siblings’ tearful reunion left the team at a loss for words—a rarity for the normally loud warriors of CIA’s Special Activities Division.[102]
In December 2001, SAD/SOG and the Army’s Delta Force tracked down Osama bin Laden in the rugged mountains near the Khyber Pass in Afghanistan.[103] Former CIA station chief Gary Berntsen as well as a subsequent Senate investigation claimed that the combined American special operations task force was largely outnumbered by al-Qaeda forces and that they were denied additional US troops by higher command.[104] The task force also requested munitions to block the avenues of egress of bin Laden, but that request was also denied.[105] The team allegedly uncovered evidence in the subsequent site exploration that bin Laden’s ultimate aim was to obtain and detonate a nuclear device in a terrorist attack.[96] According to other press reports, SAD were ineffectual and “Bin Laden and bodyguards walked uncontested out of Tora Bora and disappeared into Pakistan’s unregulated tribal area.”[106]
Surge
In September 2009, the CIA planned on “deploying teams of spies, analysts and paramilitary operatives to Afghanistan, part of a broad intelligence ‘surge’ ordered by President Obama. This will make its station there among the largest in the agency’s history.”[107] This presence is expected to surpass the size of the stations in Iraq and Vietnam at the height of those wars.[107] The station is located at the U.S. Embassy in Kabul and is led “by a veteran with an extensive background in paramilitary operations”.[108] The majority of the CIA’s workforce is located among secret bases and military special operations posts throughout the country.[108][109]
Also in 2009, General Stanley McChrystal, the commander of NATO forces in Afghanistan, planned to request an increase in teams of CIA operatives, including their elite paramilitary officers, to join with U.S. military special operations forces. This combination worked well in Iraq and is largely credited with the success of that surge.[108][110] There have been basically three options described in the media: McChrystal’s increased counterinsurgency campaign; a counter-terror campaign using special operations raids and drone strikes; and withdrawal. The most successful combination in both the wars in Afghanistan and Iraq has been the linking up of SAD and military special forces to fight alongside highly trained indigenous units. One thing all of these options have in common is a requirement for greater CIA participation.[110]
The End Game
According to the current and former intelligence officials, General McChrystal also had his own preferred candidate for the Chief of Station (COS) job, a good friend and decorated CIA paramilitary officer.[111] The officer had extensive experience in war zones, including two previous tours in Afghanistan with one as the Chief of Station, as well as tours in the Balkans, Baghdad and Yemen. He is well known in CIA lore as “the man who saved Hamid Karzai‘s life when the CIA led the effort to oust the Taliban from power in 2001″. President Karzai is said to be greatly indebted to this officer and was pleased when the officer was named chief of station again. According to interviews with several senior officials, this officer “was uniformly well-liked and admired. A career paramilitary officer, he came to the CIA after several years in an elite Marine unit”.[111][112]
General McChrystal’s strategy included the lash up of special operations forces from the U.S. Military and from SAD/SOG to duplicate the initial success and the defeat of the Taliban in 2001[113] and the success of the “Surge” in Iraq in 2007.[114] This strategy proved highly successful and worked very well in Afghanistan with SAD/SOG and JSOC forces conducting raids nearly every night having “superb results” against the enemy.[115]
In 2001, the CIA’s SAD/SOG began creating what would come to be called Counter-terrorism Pursuit Teams (CTPT).[116][117] These units grew to include over 3,000 operatives by 2010 and have been involved in sustained heavy fighting against the enemy. It is considered the “best Afghan fighting force”.
Located at 7,800 feet (2,400 m) above sea level, Firebase Lilley in Shkin serves as a “nerve center for the covert war”.[117] This covert war includes being a hub for these CTPT operations with Firebase Lilley being just one in a constellation of CIA bases across Afghanistan.[117] These units have not only been highly effective in combat operations against the Taliban and al-Qaeda forces, but have also been used to engage with the tribes in areas with no other official government presence.[118]
This covert war also includes a large SOG/CTPT expansion into Pakistan to target senior al-Qaeda and Taliban leadership in the Federally Administered Tribal Area (FATA).[119] CTPT units are the main effort in both the “Counterterrorism plus” and the full “Counterinsurgency” options being discussed by the Obama administration in the December 2010 review.[120] SOG/CTPT are also key to any exit strategy for the U.S. government to leave Afghanistan, while still being able to deny al-Qaeda and other trans-national extremists groups a safehaven both in Afghanistan and in the FATA of Pakistan.[121]
In January 2013, a CIA drone strike killed Mullah Nazir a senior Taliban commander in the South Waziristan area of Pakistan believed responsible for carrying out the insurgent effort against the US military in Afghanistan. Nazir’s death degraded the Taliban.[122]
The U.S. has decided to lean heavily on CIA in general and SAD specifically in their efforts to withdraw from Afghanistan as it did in Iraq.[123] There are plans being considered to have several US Military special operations elements assigned to CIA after the withdrawal.[124]
Yemen
On November 5, 2002, a missile launched from a CIA-controlled Predator drone killed al-Qaeda members traveling in a remote area in Yemen. SAD/SOG paramilitary teams had been on the ground tracking their movements for months and called in this air strike.[125] One of those in the car was Ali Qaed Senyan al-Harthi, al-Qaeda’s chief operative in Yemen and a suspect in the October 2000 bombing of the destroyer USS Cole. Five other people, believed to be low-level al-Qaeda members, were also killed to include an American named Kamal Derwish.[126][127] Former Deputy U.S. Defense Secretary Paul Wolfowitz called it “a very successful tactical operation” and said “such strikes are useful not only in killing terrorists but in forcing al-Qaeda to change its tactics”.[126]
“It’s an important step that has been taken in that it has eliminated another level of experienced leadership from al-Qaeda,” said Vince Cannistraro, former head of counter-terrorism for the CIA and current ABC News consultant. “It will help weaken the organization and make it much less effective.”[128][129] Harithi was on the run, pursued by several security forces who were looking for him and Muhammad Hamdi al-Ahdal, another suspect in the USS Cole bombing case.[130]
In 2009, the Obama administration authorized continued lethal operations in Yemen by the CIA.[131] As a result, the SAD/SOG and JSOC have joined together to aggressively target al-Qaeda operatives in that country, both through leading Yemenese special forces and intelligence driven drone strikes.[131] A major target of these operations is ImamAnwar al-Aulaqi, an American citizen with ties to both Nidal Hassan, the alleged Fort Hood attacker, and Umar Farouk Abdulmutallab, the Christmas 2009 attempted bomber of Northwest Airline flight 253.[132] Imam al-Aulaki was killed on September 30, 2011 by an air attack carried out by the Joint Special Operations Command.[133]
Iraq
SAD paramilitary teams entered Iraq before the 2003 invasion. Once on the ground they prepared the battle space for the subsequent arrival of U.S. military forces. SAD teams then combined with U.S. Army special forces (on a team called the Northern Iraq Liaison Element or NILE).[17] This team organized the KurdishPeshmerga for the subsequent U.S. led invasion. This joint team combined in Operation Viking Hammer to defeat Ansar al-Islam, an Islamist group allied to al-Qaeda, which several battle-hardened fighters from Afghanistan had joined after the fall of the Taliban, in a battle for control over the northeast of Iraq – a battle that turned out being one of the “most intense battles of Special Forces since Vietnam”.[134] This battle was for an entire territory that was completely occupied by Ansar al-Islam and was executed prior to the invasion in February 2003. If this battle had not been as successful as it was, there would have been a considerable hostile force in the rear of the U.S./secular Kurdish force in the subsequent assault on the Iraqi army to the south. The U.S. side was represented by paramilitary operations officers from SAD/SOG and the army’s 10th Special Forces Group (10th SFG). 10th SFG soldiers were awarded three Silver Stars and six Bronze Stars with V for valor for this battle alone [135] and several paramilitary officers were awarded the Intelligence Star for valor in combat.[136] This battle was a significant direct attack and victory on a key U.S. opponent. It resulted in the deaths of a substantial number of militants and the uncovering of a crude laboratory that had traces of poisons and information on chemical weapons at Sargat.[17][137] The team found foreign identity cards, visas, and passports on the enemy bodies. They had come from a wide variety of Middle Eastern and north African countries including Yemen, Sudan, Saudi Arabia, Qatar, Oman, Tunisia, Morocco, and Iran.[135] Sargat was also the only facility that had traces of chemical weapons discovered in the Iraq war.[18][136][138]
The village of Biyara and Base of Ansar al-Islam 2001–2003
In a 2004 U.S. News & World Report article, “A firefight in the mountains”, the author states:
“Viking Hammer would go down in the annals of Special Forces history—a battle fought on foot, under sustained fire from an enemy lodged in the mountains, and with minimal artillery and air support.”[135]
SAD/SOG teams also conducted high risk special reconnaissance missions behind Iraqi lines to identify senior leadership targets. These missions led to the initial assassination attempts against Iraqi PresidentSaddam Hussein and his key generals. Although the initial air strike against Hussein was unsuccessful in killing the dictator, it was successful in effectively ending his ability to command and control his forces. Other strikes against key generals were successful and significantly degraded the command’s ability to react to and maneuver against the U.S.-led invasion force.[17][139] SAD operations officers were also successful in convincing key Iraqi army officers to surrender their units once the fighting started and/or not to oppose the invasion force.[18]
NATO member Turkey refused to allow its territory to be used by the U.S. Army’s 4th Infantry Division for the invasion. As a result, the SAD/SOG, U.S. Army special forces joint teams, the Kurdish Peshmerga and the 173d Airborne Brigade were the entire northern force against the Iraqi army during the invasion. Their efforts kept the 13 divisions of the Iraqi Army in place to defend against the Kurds rather allowing them to contest the coalition force coming from the south.[134] This combined U.S. special operations and Kurdish force defeated the Iraqi Army.[17] Four members of the SAD/SOG team received CIA’s rare Intelligence Star for “extraordinary heroism”.[18]
The mission that captured Saddam Hussein was called “Operation Red Dawn“. It was planned and carried out by JSOC’s Delta Force and SAD/SOG teams (together called Task Force 121). The operation eventually included around 600 soldiers from the 1st Brigade of the 4th Infantry Division.[140][141] Special operations troops probably numbered around 40. Much of the publicity and credit for the capture went to the 4th Infantry Division soldiers, but CIA and JSOC were the driving force. “Task Force 121 were actually the ones who pulled Saddam out of the hole” said Robert Andrews, former deputy assistant Secretary of Defense for special operations and low-intensity conflict. “They can’t be denied a role anymore.”[140]
CIA paramilitary units continued to team up with the JSOC in Iraq and in 2007 the combination created a lethal force many credit with having a major impact in the success of “the Surge“. They did this by killing or capturing many of the key al-Qaeda leaders in Iraq.[142][143] In a CBS60 Minutes interview, Pulitzer Prize-winning journalist Bob Woodward described a new special operations capability that allowed for this success. This capability was developed by the joint teams of CIA and JSOC.[144] Several senior U.S. officials stated that the “joint efforts of JSOC and CIA paramilitary units was the most significant contributor to the defeat of al-Qaeda in Iraq”.[142][145]
In May 2007, Marine Major Douglas A. Zembiec was serving in SAD Ground Branch in Iraq when he was killed by small arms fire while leading a raid.[146][147] Reports from fellow paramilitary officers stated that the flash radio report sent was “five wounded and one martyred”[148] Major Zembiec was killed while saving his soldiers, Iraqi soldiers. He was honored with an intelligence star for his valor in combat.[149]
On October 26, 2008, SAD/SOG and JSOC conducted an operation in Syria targeting the “foreign fighter logistics network” bringing al-Qaeda operatives into Iraq (See 2008 Abu Kamal raid).[150] A U.S. source told CBS News that “the leader of the foreign fighters, an al-Qaeda officer, was the target of Sunday’s cross-border raid.” He said the attack was successful, but did not say whether or not the al-Qaeda officer was killed.[151]Fox News later reported that Abu Ghadiya, “al-Qa’ida’s senior coordinator operating in Syria”, was killed in the attack.[152]The New York Times reported that during the raid U.S. forces killed several armed males who “posed a threat”.[153]
In September 2014 with the rise of the Islamic State, the U.S. government began aggressive military operations against them in both Iraq and Syria. SAD Ground Branch was placed in charge of the ground war.[154] This is a testament to SAD being the preeminent force for unconventional warfare and their long-standing relationship with the most effective fighting force in the region, the Kurdish Peshmerga.[155]
SAD/SOG has been very active “on the ground” inside Pakistan targeting al-Qaeda operatives for Unmanned Aerial Vehicle (UAV) Predator strikes and along with USSOCOM elements they have been training Pakistani Special Service Group Commandos.[156] Before leaving office, President George W. Bush authorized SAD’s successful killing of eight senior al-Qaeda operatives via targeted air strikes.[157] Among those killed were the mastermind of a 2006 plot to detonate explosives aboard planes flying across the Atlantic Rashid Rauf and the man thought to have planned the Islamabad Marriott Hotel bombing on September 20, 2008 that killed 53 people.[158][159] The CIA Director authorized the continuation of these operations and on January 23, SAD/SOG performed killings of 20 individuals in northwestern Pakistan that were terrorists. Some experts assess that the CIA Director – at that time Leon Panetta – has been more aggressive in conducting paramilitary operations in Pakistan than his predecessor.[160] A Pakistani security official stated that other strikes killed at least 10 insurgents, including five foreign nationals and possibly “a high-value target” such as a senior al-Qaeda or Taliban official.[161] On February 14, the CIA drone killed 27 taliban and al-Qaeda fighters in a missile strike in south Waziristan, a militant stronghold near the Afghan border where al-Qaeda leaders Osama bin Laden and Ayman al-Zawahri were believed to be hiding.[162]
According to the documentary film Drone, by Tonje Schei, since 2002 the U.S. Air Force17th Reconnaissance Squadron has been working for the CIA as “customer”, carrying out at least some of the armed missions in Pakistan.[163]
In a National Public Radio (NPR) report dated February 3, 2008, a senior official stated that al-Qaeda has been “decimated” by SAD/SOG’s air and ground operations. This senior U.S. counter-terrorism official goes on to say, “The enemy is really, really struggling. These attacks have produced the broadest, deepest and most rapid reduction in al-Qaida senior leadership that we’ve seen in several years.”[164] President Obama’s CIA Director Leon Panetta stated that SAD/SOG’s efforts in Pakistan have been “the most effective weapon” against senior al-Qaeda leadership.[165][166]
These covert attacks have increased significantly under President Obama, with as many at 50 al-Qaeda militants being killed in the month of May 2009 alone.[167][168][169] In June 2009, sixty Taliban fighters were killed while at a funeral to bury fighters that had been killed in previous CIA attacks.[170] On July 22, 2009, National Public Radio reported that U.S. officials believe Saad bin Laden, a son of Osama bin Laden, was killed by a CIA strike in Pakistan. Saad bin Laden spent years under house arrest in Iran before traveling last year to Pakistan, according to former National Intelligence Director Mike McConnell. It’s believed he was killed sometime in 2009. A senior U.S. counter-terrorism said U.S. intelligence agencies are “80 to 85 percent” certain that Saad bin Laden is dead.[171]
On August 6, 2009, the CIA announced that Baitullah Mehsud was killed by a SAD/SOG drone strike in Pakistan.[172]The New York Times said, “Although President Obama has distanced himself from many of the Bush administration’s counter-terrorism policies, he has embraced and even expanded the C.I.A.’s covert campaign in Pakistan using Predator and Reaper drones”.[172] The biggest loss may be to “Osama bin Laden’s al-Qa’ida”. For the past eight years, al-Qaeda had depended on Mehsud for protection after Mullah Mohammed Omar fled Afghanistan in late 2001. “Mehsud’s death means the tent sheltering Al Qaeda has collapsed,” an Afghan Taliban intelligence officer who had met Mehsud many times told Newsweek. “Without a doubt he was Al Qaeda’s No. 1 guy in Pakistan,” adds Mahmood Shah, a retired Pakistani Army brigadier and a former chief of the Federally Administered Tribal Area, or FATA, Mehsud’s base.[173]
Airstrikes from CIA drones struck targets in the Federally Administered Tribal Areas (FATA) of Pakistan on September 8, 2009. Reports stated that seven to ten militants were killed to include one top al-Qaida leaders. He was Mustafa al-Jaziri, an Algerian national described as an “important and effective” leader and senior military commander for al-Qaida. The success of these operations are believed to have caused senior Taliban leaders to significantly alter their operations and cancel key planning meetings.[174][175]
The CIA is also increasing its campaign using Predator missile strikes on al-Qaeda in Pakistan. The number of strikes in 2009 exceeded the 2008 total, according to data compiled by the Long War Journal, which tracks strikes in Pakistan.[108] In December 2009, the New York Times reported that President Obama ordered an expansion of the drone program with senior officials describing the program as “a resounding success, eliminating key terrorists and throwing their operations into disarray”.[176] The article also cites a Pakistani official who stated that about 80 missile attacks in less than two years have killed “more than 400” enemy fighters, a number lower than most estimates but in the same range. His account of collateral damage was strikingly lower than many unofficial counts: “We believe the number of civilian casualties is just over 20, and those were people who were either at the side of major terrorists or were at facilities used by terrorists.”[176]
On December 6, 2009, a senior al-Qaeda operative, Saleh al-Somali, was killed in a drone strike in Pakistan. He was responsible for their operations outside of the Afghanistan-Pakistan region and formed part of the senior leadership. Al-Somali was engaged in plotting terrorist acts around the world and “given his central role, this probably included plotting attacks against the United States and Europe”.[177][178] On December 31, 2009, senior Taliban leader and strong Haqqani ally Haji Omar Khan, brother of Arif Khan, was killed in the strike along with the son of local tribal leader Karim Khan.[179]
In January 2010, al-Qaeda in Pakistan announced that Lashkar al-Zil leader Abdullah Said al Libi was killed in a drone missile strike. Neither al-Qaeda nor the US has revealed the date of the attack that killed Libi.[180] On January 14, 2010, subsequent to the suicide attack at Camp Chapman, the CIA located and killed the senior Taliban leader in Pakistan, Hakimullah Mehsud. Mehsud had claimed responsibility in a video he made with the suicide bomber Humam Khalil Abu-Mulal al-Balawi.[181]
On February 5, 2010, the Pakistani Inter-Services Intelligence (ISI) and CIA’s SAD/SOG conducted a joint raid and apprehended Mullah Abdul Ghani Baradar. Baradar was the most significant Taliban figure to be detained since the beginning of the Afghan War more than eight years ago until that date. He ranked second to Mullah Muhammad Omar, the Taliban’s founder and was known to be a close associate of Osama bin Laden. Mullah Baradar was interrogated by CIA and ISI officers for several days before news of his capture was released.[182] This capture sent the message that the Taliban leadership is not safe in Afghanistan or Pakistan.[183] “The seizure of the Afghan Taliban’s top military leader in Pakistan represents a turning point in the U.S.-led war against the militants”, U.S. officials and analysts said.[184] Per Pakistani Interior Minister Rehman Malik, several raids in Karachi in early February netted dozens of suspected Afghan militants.[184] In other joint raids that occurred around the same time, Afghan officials said that the Taliban “shadow governorsP for two provinces in northern Afghanistan had also been detained. Mullah Abdul Salam, the Taliban’s leader in Kunduz, and Mullah Mir Mohammed of Baghlan were captured in Akora Khattack.[185]
On February 20, Muhammad Haqqani, son of Jalaluddin Haqqani, was one of four people killed in the drone strike in Pakistan’s tribal region in North Waziristan, according to two Pakistani intelligence sources.[186]
On May 31, 2010, the New York Times reported that Mustafa Abu al Yazid (AKA Saeed al Masri), a senior operational leader for Al Qaeda, was killed in an American missile strike in Pakistan’s tribal areas.[187]
From July to December 2010, predator strikes killed 535 suspected militants in the FATA to include Sheikh Fateh Al Misri, Al-Qaeda’s new third in command on September 25.[188] Al Misri was planning a major terrorist attack in Europe by recruiting British Muslims who would then go on a shooting rampage similar to what transpired in Mumbai in November 2008.[189]
The operation in the Bilal military cantonment area in the city of Abbottabad resulted in the acquisition of extensive intelligence on the future attack plans of al-Qaeda.[194][195][196] The body of bin Laden was flown to Afghanistan to be identified and then out to the USS Carl Vinson for a burial at sea.[197] DNA from bin Laden’s body, compared with DNA samples on record from his dead sister, confirmed his identity.
The operation was a result of years of intelligence work that included the Inter-Services Intelligence (ISI), the CIA, the DSS, and the Delta Force‘s, apprehension and interrogation of Khalid Sheik Mohammad (KSM),[198][199][200] the discovery of the real name of the courier disclosed by KSM, the tracking, via signal intelligence, of the courier to the Abbottobad compound by paramilitary operatives and the establishment of a CIA safe house that provided critical advance intelligence for the operation.[201][202][203][203]
The material discovered in the raid indicated that bin Laden was still in charge of his Al-Qaeda organization and was developing plans and issuing orders at the time of his death. There is considerable controversy over claims that elements of the Pakistani government, particularly the ISI, may have been concealing the presence of Osama bin Laden in Pakistan.[204][205][206] Bin Laden’s death has been labeled a “game changer” and a fatal blow to Al-Qaeda, by senior U.S. officials.[207]
Iran
In the early 1950s, the Central Intelligence Agency and Britain’s Secret Intelligence Service were ordered to overthrow the government of Iran, Prime Minister Mohammed Mosaddeq, and re-install deposed ShahMohammad Reza Pahlavi.[208] This event was called Operation Ajax.[209][210] The senior CIA officer was Kermit Roosevelt, Jr., the grandson of American president Theodore Roosevelt. The operation utilized all of SAD’s components to include political action, covert influence and paramilitary operations. The paramilitary component included training anti-Communist guerrillas to fight the Tudeh Party if they seized power in the chaos of Operation Ajax.[211] Although a significant tactical/operational success, Operation Ajax is considered very controversial with many critics.[212]
On March 9, 2007 alleged CIA Agent Robert Levinson was kidnapped from Iran’s Kish Island. On July 7, 2008, Pulitzer Prize winning investigative journalist and author Seymour Hersh wrote an article in the New Yorker stating that the Bush Administration had signed a Presidential Finding authorizing the CIA to begin cross border paramilitary operations from Iraq and Afghanistan into Iran. These operations would be against Quds Force, the commando arm of the Iranian Revolutionary Guard, public and private sector strategic targets, and “high-value targets” in the war on terror. Also enrolled to support CIA objectives were the Mujahideen-e-Khalq, known in the West as the M.E.K.,and the Baluchis insurgents. “The Finding was focused on undermining Iran’s nuclear ambitions and trying to undermine the government through regime change,” a person familiar with its contents said, and involved “working with opposition groups and passing money.”[215] Any significant effort against Iran by the Obama Administration would likely come directly from SAD.[216] and in July 2010, Director Panetta chose a former chief of SAD as the new NCS Director.[217]
Libya
After the Arab Spring movements overthrew the rulers of Tunisia and Egypt, its neighbours to the west and east respectively, Libya had a major revolt beginning in February 2011.[218][219] In response, the Obama administration sent in SAD paramilitary operatives to assess the situation and gather information on the opposition forces.[220][221] Experts speculated that these teams could be determining the capability of these forces to defeat the Muammar Gaddafi regime and whether Al-Qaeda had a presence in these rebel elements.
U.S. officials had made it clear that no U.S. troops would be “on the ground”, making the use of covert paramilitary operatives the only alternative.[222] During the early phases of the Libyan offensive of U.S. led air strikes, paramilitary operatives assisted in the recovery of a U.S. Air Force pilot who had crashed due to mechanical problems.[223][224] There was speculation that President Obama issued a covert action finding in March 2011 that authorizes the CIA to carry out a clandestine effort to provide arms and support to the Libyan opposition.[225]
Syria
CIA paramilitary teams have been deployed to Syria to report on the uprising, to access the rebel groups, leadership and to potentially train, equip and lead one of those rebel groups against the Bashar al-Assad regime.[226] In early September 2013, President Obama told U.S. Senators that the CIA had trained the first 50-man insurgent element and that they had been inserted into Syria.[227] The deployment of this unit and the supplying of weapons may be the first tangible measure of support since the U.S. stated they would begin providing assistance to the opposition.[228][229]
In October 2013, SAD was tasked with overthrowing the Syrian government of Bashar al-Assad. This program was considered too limited to have the desired outcome.[230] However, with the rise of the Islamic State, SAD was given the overall command and control of the ground fight against them. This fight will cross the borders between Iraq and Syria.[154][231]
The CIA has always had a Special Activities Division, which secretly carries out special operations mission. However, since September 11, 2001 the US government has relied much more on SAD/SOG because fighting terrorists does not usually involve fighting other armies. Rather, it involves secretly moving in and out of countries like Pakistan, Iran and Somalia where the American military is not legally allowed to operate.[232]
If there are missions in these countries that are denied to U.S. military special operations forces, SAD/SOG units are the primary national special missions units to execute those operations.[233]
In the War on Terror, SAD has the lead in the covert war being waged against al Qaeda.[11][234] SAD/SOG paramilitary teams have apprehended many of the senior leaders. These include: Abu Zubaydah,[235] the chief of operations for al-Qaeda; Ramzi bin al-Shibh,[236] the so-called the “20th hijacker”;[237]Khalid Sheikh Mohammed, the mastermind of the September 11, 2001 attacks on New York City and Washington, D.C.;[238]Abd al-Rahim al-Nashiri, alleged to be the mastermind of the USS Cole bombing and leader of al Qaeda operations in the Persian Gulf prior to his capture in November 2002;[239]Abu Faraj al-Libi, al Qaeda’s “field general” believed to have taken the role of No. 3 in al Qaeda following the capture of Khalid Sheikh Mohammed in Pakistan;[240] and Mullah Abdul Ghani Baradar, the number two taliban commander and the highest level taliban commander apprehended in the Afghan War.[241] Prior to the beginning of the “War on Terror”, SAD/SOG located and captured many notable militants and international criminals, including Abimael Guzman and Carlos the Jackal. These were just three of the over 50 caught by SAD/SOG just between 1983 and 1995.[242]
In 2002, the George W. Bush Administration prepared a list of “terrorist leaders” the CIA is authorized to kill in a targeted killing, if capture is impractical and civilian casualties can be kept to an acceptable number. The list includes key al Qaeda leaders like Osama bin Laden (deceased) and his chief deputy, Ayman al-Zawahiri, as well as other principal figures from al Qaeda and affiliated groups. This list is called the “high value target list”.[243] The U.S. president is not legally required to approve each name added to the list, nor is the CIA required to obtain presidential approval for specific attacks, although the president is kept well informed about operations.[243]
SAD/SOG teams have been dispatched to the country of Georgia, where dozens of al Qaeda fugitives from Afghanistan are believed to have taken refuge with Chechen separatists and thousands of refugees in the Pankisi Gorge. Their efforts have already resulted in 15 Arab militants linked to al Qaeda being captured.[125]
The SAD/SOG teams have also been active in the Philippines, where 1,200 U.S. military advisers helped to train local soldiers in “counter-terrorist operations” against Abu Sayyaf, a radical Islamist group suspected of ties with al Qaeda. Little is known about this U.S. covert action program, but some analysts believe that “the CIA’s paramilitary wing, the Special Activities Division (SAD), has been allowed to pursue terrorist suspects in the Philippines on the basis that its actions will never be acknowledged”.[125]
On July 14, 2009, several newspapers reported that DCIA Leon Panetta was briefed on a CIA program that had not been briefed to the oversight committees in Congress. Panetta cancelled the initiative and reported its existence to Congress and the President. The program consisted of teams of SAD paramilitary officers organized to execute targeted killing operations against al Qaeda operatives around the world in any country. According to the Los Angeles Times, DCIA Panetta “has not ruled out reviving the program”.[11] There is some question as to whether former Vice President Dick Cheney instructed the CIA not to inform Congress.[244] Per senior intelligence officers, this program was an attempt to avoid the civilian casualties that can occur during predator drone strikes using Hellfire missiles.[245][246]
According to many experts, the Obama administration has relied on the CIA and their paramilitary capabilities, even more than they have on U.S. military forces, to maintain the fight against terrorists in the Afghanistan and Pakistan region, as well as places like Yemen, Somalia and North Africa.[247][248] Ronald Kessler states in his book The CIA at War: Inside the Secret War Against Terror, that although paramilitary operations are a strain on resources, they’re winning the war against terrorism.[247][249]
SAD/SOG paramilitary officers executed the clandestine evacuation of U.S. citizens and diplomatic personnel in Somalia, Iraq (during the Persian Gulf War) and Liberia during periods of hostility, as well as the insertion of Paramilitary Operations Officers prior to the entry of U.S. military forces in every conflict since World War II.[250] SAD officers have operated covertly since 1947 in places such as North Korea, Vietnam, Laos, Cambodia, Lebanon, Iran, Syria, Libya, Iraq, El Salvador, Guatemala, Colombia, Mexico, Nicaragua, Honduras, Chile, Bosnia and Herzegovina, Serbia, Somalia, Kosovo, Afghanistan and Pakistan.[251]
The Fulton surface-to-air recovery system (STARS) is a system developed in the early 1950s by CIA paramilitary officers for retrieving persons on the ground from a MC-130E Combat Talon I aircraft. It uses a harness and a self-inflating balloon that carries an attached lift line. An MC-130E engages the line with its V-shaped yoke and the individual is reeled on board.[252]Project COLDFEET was a very successful mission in 1962 in which two military officers parachuted into a remote abandoned Soviet site in the Arctic. The two were subsequently extracted by the Fulton sky hook. The team gathered evidence of advanced research on acoustical systems to detect under-ice US submarines and efforts to develop Arctic anti-submarine warfare techniques.[253]
Sergeant Major (SgtMaj) Billy Waugh was a Special Forces soldier attached to CIA in the 1960s. During his time at MACV-SOG in Vietnam, he developed and conducted the first combat High Altitude-Low Opening (HALO) jump, “In October 1970, my team made a practice Combat Infiltration into the NVA owned War Zone D, in South Vietnam, for reassembly training, etc. This was the first one in a combat zone.”[254] HALO is a method of delivering personnel, equipment, and supplies from a transport aircraft at a high altitude via free-fall parachute insertion. HALO and HAHO (High Altitude-High Opening) are also known as Military Free Fall (MFF). In the HALO technique, the parachutist opens his parachute at a low altitude after free-falling for a period of time to avoid detection by the enemy. Waugh also led the last combat special reconnaissance parachute insertion into enemy territory occupied by communist North Vietnamese Army (NVA) troops on June 22, 1971.[255]
On October 25, 2003, paramilitary officers Christopher Mueller and William “Chief” Carlson were killed while conducting an operation to kill/capture high level al-Qa’ida leaders near Shkin, Afghanistan. Both these officers were honored with Stars on the CIA Memorial Wall at their Headquarters in Langley, Virginia.[256] “The bravery of these two men cannot be overstated,” Director of Central Intelligence George J. Tenet told a gathering of several hundred Agency employees and family members. “Chris and Chief put the lives of others ahead of their own. That is heroism defined.” Mueller, a former US Navy SEAL and Carlson, a former Army Special Forces soldier, Delta Force operator, and member of the Blackfeet Nation in Montana, died while on this covert operation. Both officers saved the lives of others, including Afghan soldiers, during the engagement with al-Qa’ida forces.[256][257][258] In Oliver North’s book American Heroes in Special Operations, a chapter is devoted to their story.[259]
Notable political action officers
Virginia Hall Goillot started as the only female paramilitary officer in the OSS. She shot herself in the leg while hunting in Turkey in 1932, which was then amputated below the knee. She parachuted into France to organize the resistance with her prosthesis strapped to her body. She was awarded the Distinguished Service Cross. She married an OSS officer named Paul Goillot and the two joined the CIA as paramilitary operations officers in SAD. Once aboard, Mrs. Goillot made her mark as a political action officer playing significant roles in the Guatemala and Guyana operations. These operations involved the covert removal of the governments of these two countries, as directed by the President of the United States.[260]
E. Howard Hunt (October 9, 1918 – January 23, 2007) was an Ivy league educated Naval officer who joined the CIA in 1949 after serving with the OSS in World War II. Hunt was a political action officer in what came to be called their Special Activities Division.[261] He became station chief in Mexico City in 1950, and supervised William F. Buckley, Jr., (Not to be confused with a famous SAD Paramilitary Officer of the same name) who worked for the CIA in Mexico during the period 1951–1952. Buckley, another SAD political action specialist, only served briefly in the CIA and went on to be considered the father of the modern American conservative movement. Buckley and Hunt remained lifelong friends.[262] Hunt ran Operation PBSUCCESS, which overthrew the government in Guatemala in 1954, was heavily involved in the Bay of Pigs Invasion operation, frequently mentioned in the JFK assassination, and was one of the operatives in the Watergate scandal.[263] Hunt was also a well-known author with over 50 books to his credit. These books were published under several alias names and several were made into motion pictures.[264]
David Atlee Phillips Perhaps the most famous propaganda officer ever to serve in CIA, Phillips began his career as a journalist and amateur actor in Buenos Aires, Argentina. He joined the Agency in the 1950s and was one of the chief architects of the operation to overthrow Communist president Arbenz in Guatemala in 1954. He was later heavily engaged as a principal member of the Bay of Pigs Task Force at Langley, and in subsequent anti-Castro operations throughout the 1960s. He founded the Association of Former Intelligence Officers (AFIO) after successfully contesting a libel suit against him.
The CIA Memorial Wall is located at CIA headquarters in Langley, Virginia. It honors CIA employees who died in the line of duty.[265] As of August 6, 2012, there were 103 stars carved into the marble wall,[266] each one representing an officer. A majority of these were paramilitary officers.[265] A black book, called the “Book of Honor”, lies beneath the stars and is encased in an inch-thick plate of glass.[266] Inside this book are stars, arranged by year of death, and the names of 77 employees who died in CIA service alongside them.[265][266] The other names remain secret, even in death.[265]
Story 1: Playing The Blame Game — Avoiding Responsibility and Accountability — Government Failure! — 9/11: Trump Blames Bush — Clinton Blames Republicans ! — Videos
Hillary Clinton and the “Dark Forces” in Benghazi
Kenneth Timmerman, author of Dark forces: The Truth About What Happened in Benghazi, looks at Hillary Clinton’s next scheduled appearance before the Benghazi special committee and the Iranian nuclear deal. He cites evidence that the Iranians were behind the attack in Benghazi that killed four Americans on September 11, 2012. In addition, Timmerman says Iran was involved in the September 11, 2001, attacks. Timmerman also discusses Russian backing for Iran and the Russian role in attacking the opponents of Assad in Syria. Timmerman also looks at: Will Russia attack the Kurds? And who are the Kurds? Is Obama a Muslim? Will Israel strike Iran?
Donald Trump blames George W. Bush for 9/11
Did Donald Trump blame Bush for 9/11?
Jake Tapper calls out Jeb Bush for saying his brother is blameless for 9/11
9-11 WTC Attacks Original Sound
Who Was Really Behind the 9/11 Attacks?
George Bush Takes Questions After Meeting With 9/11 Commission – 4/29/2004
Richard Clarke, Former Counterterrorism Chief, Apologizes for 9/11
Why Government Failure Occurs: Richard Clarke on National Security Disasters (2008)
Your Government Failed You: Richard Clarke at the September 11 Commission on Counterterrorism (2004)
Richard Alan Clarke (born October 27, 1950) is the former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States.
Clarke worked for the State Department during the presidency of Ronald Reagan. In 1992, President George H.W. Bush appointed him to chair the Counter-terrorism Security Group and to a seat on the United States National Security Council. President Bill Clinton retained Clarke and in 1998 promoted him to be the National Coordinator for Security, Infrastructure Protection, and Counter-terrorism, the chief counter-terrorism adviser on the National Security Council. Under President George W. Bush, Clarke initially continued in the same position, but the position was no longer given cabinet-level access. He later became the Special Advisor to the President on cybersecurity. Clarke left the Bush administration in 2003.
Clarke came to widespread public attention for his role as counter-terrorism czar in the Clinton and Bush administrations in March 2004, when he appeared on the 60 Minutes television news magazine, released his memoir about his service in government, Against All Enemies, and testified before the 9/11 Commission. In all three instances, Clarke was sharply critical of the Bush administration’s attitude toward counter-terrorism before the 9/11 terrorist attacks, and of the decision to go to war with Iraq.
On March 24, 2004, Clarke testified at the public 9/11 Commission hearings.[17] At the outset of his testimony Clarke offered an apology to the families of 9/11 victims and an acknowledgment that the government had failed: “I also welcome the hearings because it is finally a forum where I can apologize to the loved ones of the victims of 9/11…To the loved ones of the victims of 9/11, to them who are here in this room, to those who are watching on television, your government failed you. Those entrusted with protecting you failed you. And I failed you. We tried hard, but that doesn’t matter because we failed. And for that failure, I would ask, once all the facts are out, for your understanding and for your forgiveness.”[17]
Many of the events Clarke recounted during the hearings were also published in his memoir. Clarke charged that before and during the 9/11 crisis, many in the Administration were distracted from efforts against Osama bin Laden’s Al-Qaeda organization by a pre-occupation with Iraq and Saddam Hussein. Clarke had written that on September 12, 2001, President Bush pulled him and a couple of aides aside and “testily” asked him to try to find evidence that Saddam was connected to the terrorist attacks. In response he wrote a report stating there was no evidence of Iraqi involvement and got it signed by all relevant agencies, including the Federal Bureau of Investigation and the CIA. The paper was quickly returned by a deputy with a note saying “Please update and resubmit.”[18] After initially denying that such a meeting between the President and Clarke took place, the White House later reversed its denial when others present backed Clarke’s version of the events.
Clarke is currently Chairman of Good Harbor Consulting and Good Harbour International, two strategic planning and corporate risk management firms; an on-air consultant for ABC News, and a contributor to the Good Harbor Report, an online community discussing homeland security, defense, and politics. He is an adjunct lecturer at the Harvard Kennedy School and a faculty affiliate of its Belfer Center for Science and International Affairs.[35] He has also become an author of fiction, publishing his first novel, The Scorpion’s Gate, in 2005, and a second, Breakpoint, in 2007.
Clarke wrote an op-ed for the Washington Post on May 31, 2009 harshly critical of other Bush administration officials, entitled “The Trauma of 9/11 Is No Excuse”.[36] Clarke wrote that he had little sympathy for his fellow officials who seemed to want to use the excuse of being traumatized, and caught unaware by Al-Qaeda’s attacks on the USA, because their being caught unaware was due to their ignoring clear reports a major attack on U.S. soil was imminent. Clarke particularly singled out former Vice President Dick Cheney and former Secretary of State, Condoleezza Rice.
911 Press for Truth
Intelligence Stove Piping Is System Failure
Fannie Mae, Jamie Gorelick and The 911 Commission
911 Commission Co-Chair Explains Need for New Investigation
Jamie Gorelick for FBI director? Are you kidding me?
Inside Libya’s Militias
Libya War: What They Don’t Want You to Know
How Will History Judge U.S., Coalition Intervention in Libya?
Libyan No Fly Zone Necessary But Intervention Has Imperialist Objectives