You have commented 339 times on Rantburg.

Your Name
Your e-mail (optional)
Website (optional)
My Original Nic        Pic-a-Nic        Sorry. Comments have been closed on this article.
Bold Italic Underline Strike Bullet Blockquote Small Big Link Squish Foto Photo
-Lurid Crime Tales-
Beest's Emails Compromised Benghazi, Almost Certainly Killed the Ambassador
2016-03-08
[The Post] When the story first broke about an unsecured email server being used by then Secretary of State Hillary Clinton almost a year ago, we outlined the probable areas of damage in our article entitled Former Intelligence Officer: The Utter Stupidity of Hillary's Actions. At that point we made the specific point that operatives from Al Quaida were certainly reading the emails from her, in fact it is almost axiomatic.

On September 11, 2012 Ambassabor Chris Stevens and others were killed in a terrorist attack on the Consulate in Benghazi. We speculated if Mrs. Clinton had talked about details of the movements of the people on the ground in Benghazi in her unsecure email system, the terrorists would have used this for targeting and may have enabled the terrorist to bring about their attack.

While we do not yet have access to all of her emails, Breitbart has published some excerpts from emails regarding the movements of Christopher Stevens.

This was devastating. Let me explain:

Put yourself in the shoes of a terrorist who is planning an attack. The usual things, weapons, logistics, etc. are already taken care of, since you are operating on home turf. To complete the plan you need information about where the target will be, when and for how long he will be there, and what are his security arrangements. Thanks to Hillary's emails, you now have access. Make your plan, execute your plan, your targets are dead, all your people are alive and free. Yes, the right intelligence is that valuable.

If Consulate security is run competently, terrorist attacks and/or ambushes are very difficult, because the target (in this case Ambassador Stevens) moves quickly, vulnerabilities are hardened and security assets have the advantage of knowing their methods and where they are going, and the terrorists do shris.

The emails provided advanced information on where the Ambassador would be and his plans and intentions. Not only does this provide specific targeting information in the short term, but it also enables the terrorists to watch security arrangements being made before the Ambassador arrives, to study the security preparations and to devise attacks to circumvent them.

Equally important, it allows terrorist surveillance to be more secure. It is a huge advantage for terrorist team to dig in and establish static surveillance before security is in place. Static surveillance (i.e. an observation post so well camouflaged it can't be detected) ahead of time means security assets arriving on the scene and looking for movement or suspicious activity will not see it.
Posted by:Besoeker

#15  That's right Joe, but she would have no doubt neen in the loop.
Posted by: Besoeker   2016-03-08 21:27  

#14  IMO the greater issue remains the Bammer's role in Benghazi as well as the "Fast-N-Furious" Schemes, OR LACK OF IT, + WHY!?

Again, Hillary is NOT the Prez nor CIC nor SecDef, hence could not had ordered any final Mil or Mil-led relief for Benghazi even iff she wanted to. As SecState, USDOD Local + Regional Commanders would NOT had listened to any orders she gave no matter the merits.
Posted by: JosephMendiola   2016-03-08 19:48  

#13  @Rambler, yes I heard that, too, but didn't think that this came even close to an explanation, let alone an excuse.

Of course someone should ask State why they allowed it.
Posted by: European Conservative   2016-03-08 19:32  

#12  The Post’s latest revelations, however, are particularly damning. It found that three-quarters of the classified emails she sent were written by Clinton herself.

Is Obama going to through her under the bus? Loretta Lynch and the Justice Department must impanel a grand jury before criminal charges can be brought according to the following article: Grand jury must be impaneled by the DOJ.
Posted by: JohnQC   2016-03-08 18:08  

#11  EC, someone did ask her that question, though not quite in that form. Her answer was that she was too technically challenged to use two different devices.
Posted by: Rambler in Virginia    2016-03-08 16:27  

#10  According to KimDotCom, Julian Assange (wikileaks) has the goods on Clinton.
Posted by: dk70 the scantily clad   2016-03-08 16:13  

#9  One thing I really don't understand: Why does nobody ask Hillary that simple question: WHY did you do it? Why did you conduct government business - classified or not - on a private server? What was the purpose?
Posted by: European Conservative   2016-03-08 15:57  

#8  The scary question is:
If Team Assad put a hit on Benghazi, would they have had to hack the server?
Posted by swksvolFF


"Had to hack the server"? No, but nothing wrong with a little nod from Russian or Chinese hackers for insurance.

I'll never believe Clinton was not a HVT (High Value Target) cyber target.

If armchair blog sleuths reading open source traffic can piece together a plausible scenario [I say again plausible] regarding Benghazi, the stand-down, high level email hacking, etc, think what HPSCI and SSCI staffers, the intelligence community, and other insiders must know. My guess is a number of someone's are hiding the ugly details, but that's just a guess.

I wonder how retired Congressman and former HPSCI Chairman Mike Rogers is getting on these days. Not much interest in Trey Gowdy's pesky Benghazi inquiries I would assume. But then again, he never did have much time for the Benghazi business as I recall.
Posted by: Besoeker   2016-03-08 14:45  

#7  Hillary in the case of Whitewater, Vince Foster's curiously hampered death investigation, travelgate abuses, the vile Clinton Global Foundation masquerade as a charity while functioning as a political patronage and shakedown for access program, and now the entire email fiasco, coupled with the Obama abandonment of investigations of Bergdahl, the ATF, IRS, ICE, and the wholesale failure to enforce a myriad of laws pertain to immigration, the cooked books on the economy, unemployment, voter registration fraud, have made it clear: the powerful are exempt from the rules that they use to govern us, and ignore or circumvent those that are not politically advantageous. The pap that is offer by Goebbles surrogates like Josh Ernest (the name always makes me laugh)is meant to pacify the shallow thinkers on the left and the timid on the right. P2K is right, the Republic is gone, and the Imperium is beginning. The importation of 60 million immigrants, most with their hands out, confirms it and when they are registered to vote, the descent into civil unrest awaits. I thought we were exempt from the forces of entropy, but I was wrong.
Posted by: NoMoreBS   2016-03-08 12:35  

#6  Email Scandal: Hillary Clinton’s Last Defense Just Blew Up

"National Security: The Washington Post, of all places, found that not only did Hillary Clinton send and receive classified material on her unsecured email server as Secretary of State, she wrote dozens of classified emails herself."

Posted by: Vast Right Wing Conspiracy   2016-03-08 12:19  

#5  The scary question is:
If Team Assad put a hit on Benghazi, would they have had to hack the server?
Posted by: swksvolFF   2016-03-08 12:03  

#4  Clinton Foundation receives Russian cash.
Uranium goes to Russia.
Uranium goes to Iran.
Russian/Iran do not like arms going to Team Not-Assad. Hit takes place during unexpected protest of an unknown video.

Stopping there before qualifying for an Al hat.


Wear the Al hat with pride. I suspect you've pieced together the correct events string.
Posted by: Besoeker   2016-03-08 11:44  

#3  Clinton Foundation receives Russian cash.
Uranium goes to Russia.
Uranium goes to Iran.
Russian/Iran do not like arms going to Team Not-Assad.
Hit takes place during unexpected protest of an unknown video.

Stopping there before qualifying for an Al hat.
Posted by: swksvolFF   2016-03-08 11:19  

#2  
Posted by: 3dc   2016-03-08 08:55  

#1  To complete the plan you need information about where the target will be, when and for how long he will be there, and what are his security arrangements.

'Security arrangements'....to include timely notification of inbound or cancelled in-extremis rescue force.

Any confirmation from NSA or the Cyber Warfare Command? No. Any confirmation anticipated in the future? No, why do you ask ?
Posted by: Besoeker   2016-03-08 08:31  

00:00