Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Private Emails Reveal SoS Clinton Aide’s Secret Spy Network (nothing about bridesmaid's dresses)
propublica.com ^ | 3/27/15 | JEFF GERTH w/ Sam Biddle of, Gawker

Posted on 03/28/2015 3:56:18 AM PDT by Liz

Updated March 27 to include responses from the FBI and the State Department.

Emails disclosed by a hacker show a close family friend was funneling intelligence about the crisis in Libya directly to the Secretary of State’s private account starting before the Benghazi attack.

Starting weeks before Islamic militants attacked the U.S. diplomatic outpost in Benghazi, Libya, longtime Clinton family confidante Sidney Blumenthal supplied intelligence to then Secretary of State Hillary Clinton gathered by a secret network that included a former CIA clandestine service officer, according to hacked emails from Blumenthal’s account.

The emails, which were posted on the internet in 2013, also show that Blumenthal and another close Clinton associate discussed contracting with a retired Army special operations commander to put operatives on the ground near the Libya-Tunisia border while Libya’s civil war raged in 2011.

Blumenthal’s emails to Clinton, which were directed to her private email account, include at least a dozen detailed reports on events on the deteriorating political and security climate in Libya as well as events in other nations. They came to light after a hacker broke into Blumenthal’s account and have taken on new significance in light of the disclosure that she conducted State Department and personal business exclusively over an email server that she controlled and kept secret from State Department officials and which only recently was discovered by congressional investigators.

The contents of that account are now being sought by a congressional inquiry into the Benghazi attacks. Clinton has handed over more than 30,000 pages of her emails to the State Department, after unilaterally deciding which ones involved government business; the State Department has so far handed almost 900 pages of those over to the committee. A Clinton spokesman told Gawker and ProPublica (which are collaborating on this story) that she has turned over all the emails Blumenthal sent to Clinton.

The dispatches from Blumenthal to Clinton’s private email address were posted online after Blumenthal’s account was hacked in 2013 by Romanian hacker Marcel-Lehel Lazar, who went by the name Guccifer. Lazar also broke into accounts belonging to George W. Bush’s sister, Colin Powell, and others. He’s now serving a seven-year sentence in his home country and was charged in a U.S. indictment last year.

The contents of the memos, which have recently become the subject of speculation in the right-wing media, raise new questions about how Clinton used her private email account and whether she tapped into an undisclosed back channel for information on Libya’s crisis and other foreign policy matters.

Blumenthal, a New Yorker staff writer in the 1990s, became a top aide to President Bill Clinton and worked closely with Hillary Clinton during the fallout from the Whitewater investigation into the Clinton family.

Clinton tried to hire him when she joined President Obama’s cabinet in 2009, but White House Chief of Staff Rahm Emanuel reportedly nixed the idea on the grounds Blumenthal was a divisive figure whose attacks on Obama during the Democratic primary had poisoned his relationship with the new administration.

It’s unclear who tasked Blumenthal, known for his fierce loyalty to the Clintons, with preparing detailed intelligence briefs. It’s also not known who was paying him, or where the operation got its money. The memos were marked “confidential” and relied in many cases on “sensitive” sources in the Libyan opposition and Western intelligence and security services. Other reports focused on Egypt, Germany, and Turkey.

Indeed, though they were sent under Blumenthal’s name, the reports appear to have been gathered and prepared by Tyler Drumheller, a former chief of the CIA’s clandestine service in Europe who left the agency in 2005. Since then, he has established a consulting firm called Tyler Drumheller, LLC.

He has also been affiliated with a firm called DMC Worldwide, which he co-founded with Washington, D.C., attorney Danny Murray and former general counsel to the U.S. Capitol Police John Caulfield. DMC Worldwide’s now-defunct website describes it at as offering “innovative security and intelligence solutions to global risks in a changing world.”

In one exchange in March 2013, Blumenthal emailed Drumheller, “Thanks. Can you send Libya report.” Drumheller replied, “Here it is, pls do not share it with Cody. I don’t want moin speculating on sources. It is on the Maghreb and Libya.”

Cody is Cody Shearer, a longtime Clinton family operative—his brother was an ambassador under Bill Clinton and his now-deceased sister is married to Clinton State Department official Strobe Talbott—who was in close contact with Blumenthal.

While it’s not entirely clear from the documents, “Moin” may refer to the nickname of Mohamed Mansour El Kikhia, a member of the Kikhia family, a prominent Libyan clan with ties to the Libyan National Transition Council. (An email address in Blumenthal’s address book, which was also leaked, was associated with his Facebook page.)

There’s no indication in Blumenthal’s emails whether Clinton read or replied to them before she left State on February 1, 2013, but he was clearly part of a select group with knowledge of the private clintonemail.com address, which was unknown to the public until

Gawker published it this year. They do suggest that she interacted with Blumenthal using the account after she stepped down. “H: got your message a few days ago,” reads the subject line of one email from Blumenthal to Clinton on February 8, 2013; “H: fyi, will continue to send relevant intel,” reads another.

The memos cover a wide array of subjects in extreme detail, from German Prime Minister Angela Merkel’s conversations with her finance minister about French president Francois Hollande–marked “THIS INFORMATION COMES FROM AN EXTREMELY SENSITIVE SOURCE”—to the composition of the newly elected South Korean president’s transition team.

At least 10 of the memos deal in whole or in part with internal Libyan politics and the government’s fight against militants, including the status of the Libyan oil industry and the prospects for Western companies to participate.

One memo was sent on August 23, 2012, less than three weeks before Islamic militants stormed the diplomatic outpost in Benghazi. It cites “an extremely sensitive source” who highlighted a string of bombings and kidnappings of foreign diplomats and aid workers in Tripoli, Benghazi and Misrata, suggesting they were the work of people loyal to late Libyan Prime Minister Muammar Gaddafi.

While the memo doesn’t rise to the level of a warning about the safety of U.S. diplomats, it portrays a deteriorating security climate. Clinton noted a few days after the Benghazi attack, which left four dead and 10 people injured, that U.S. intelligence officials didn’t have advance knowledge of the threat.

On September 12, 2012, the day after the Benghazi attack, Blumenthal sent a memo that cited a “sensitive source” saying that the interim Libyan president, Mohammed Yussef el Magariaf, was told by a senior security officer that the assault was inspired by an anti-Muslim video made in the U.S., as well as by allegations from Magariaf’s political opponents that he had CIA ties.

Blumenthal followed up the next day with an email titled “Re: More Magariaf private reax.” It said Libyan security officials believed an Islamist radical group called the Ansa al Sharia brigade had prepared the attack a month in advance and “took advantage of the cover” provided by the demonstrations against the video.

An October 25, 2012 memo says that Magariaf and the Libyan army chief of staff agree that the “situation in the country is becoming increasingly dangerous and unmanageable” and “far worse” than Western leaders realize.

Blumenthal’s email warnings, of course, followed a year of Libyan hawkishness on the part of Clinton. In February of 2011, she told the UN Human Rights Council in Geneva that "it is time for Gaddafi to go.” The next month, after having described Russian reluctance over military intervention as “despicable,” Clinton met with rebel leaders in Paris and drummed up support for a no-fly zone while in Cairo. On March 17, 2011, the UN Security Council voted to back Libyan rebels against Gaddafi.

It’s this buildup, which Clinton still proudly recalled in her 2014 memoir, that Blumenthal appears to join in on 2011. In addition to the intel memos, his emails also disclose that he and his associates worked to help the Libyan opposition, and even plotted to insert operatives on the ground using a private contractor.

A May 14, 2011 email exchange between Blumenthal and Shearer shows that they were negotiating with Drumheller to contract with someone referred to as “Grange” and “the general” to place send four operatives on a week-long mission to Tunis, Tunisia, and “to the border and back.” Tunisia borders Libya and Algeria.

“Sid, you are doing great work on this,” Drumheller wrote to Blumenthal. “It is going to be around $60,000, coverting r/t business class airfare to Tunis, travel in country to the border and back, and other expenses for 7–10 days for 4 guys.”

After Blumenthal forwarded that note to Shearer, he wrote back questioning the cost of the operation. “Sid, do you think the general has to send four guys. He told us three guys yesterday, a translator and two other guys. I understand the difficulty of the mission and realize that K will be repaid but I am going to need an itemized budget for these guys.”

“The general” and “Grange” appear to refer to David L. Grange, a major general in the Army who ran a secret Pentagon special operations unit before retiring in 1999. Grange subsequently founded Osprey Global Solutions, a consulting firm and government contractor that offers logistics, intelligence, security training, armament sales, and other services. The Osprey Foundation, which is a nonprofit arm of Osprey Global Solutions, is listed as one of the State Department’s “global partners” in a 2014 report from the Office of Global Partnerships.’

Among the documents in the cache released by Lazar is an August 24, 2011, memorandum of understanding between Osprey Global Solutions and the Libyan National Transition Council—the entity that took control in the wake of Qadaffi’s execution—agreeing that Osprey will contract with the NTC to “assist in the resumption of access to its assets and operations in country” and train Libyan forces in intelligence, weaponry, and “rule-of-land warfare.” The document refers to meetings held in Amman, Jordan between representatives of Osprey and a Mohammad Kikhia, who represented the National Transition Council.

Five months later, according to a document in the leak, Grange wrote on Osprey Global letterhead to Assistant Secretary of State Andrew Shapiro, introducing Osprey as a contractor eager to provide humanitarian and other assistance in Libya. “We are keen to support the people of Libya under the sponsorship of the Ministry of Finance and the Libyan Stock Exchange,” Grange wrote. Shapiro is a longtime Clinton loyalist; he served on her Senate staff as foreign policy advisor.

Another document in the cache, titled “Letter_for_Moin,” is an appeal from Drumheller to then-Libyan Prime Minister Ali Zeidan offering the services of Tyler Drumheller LLC, “to develop a program that will provide discreet confidential information allowing the appropriate entities in Libya to address any regional and international challenges.”

The “K” who was, according to Shearer’s email, to be “repaid” for his role in the Tunisia operation appears to be someone named Khalifa al Sherif, who sent Blumenthal several emails containing up-to-the-minute information on the civil war in Libya, and appears to have been cited as a source in several of the reports.

Contacted by ProPublica and Gawker, Drumheller’s attorney and business partner Danny Murray confirmed that Drumheller “worked” with Blumenthal and was aware of the hacked emails, but declined to comment further.

Shearer said only that "the FBI is involved and told me not to talk. There is a massive investigation of the hack and all the resulting information.” The FBI declined to comment.

Blumenthal, Grange, and Kikhia all did not respond to repeated attempts to reach them. Nick Merrill, a spokesman for Clinton had no comment on Blumenthal’s activities with Drumheller.

Whatever Blumenthal, Shearer, Drumheller, and Grange were up to in 2011, 2012, and 2013 on Clinton’s behalf, it appears that she could have used the help: According to State Department personnel directories, in 2011 and 2012—the height of the Libya crisis—State didn’t have a Libyan desk officer, and the entire Near Eastern Magreb Bureau, which which covers Algeria, Tunisia, Morocco and Libya, had just two staffers. Today, State has three Libyan desk officers and 11 people in the Near Eastern Magreb Bureau. A State Department official wouldn't say how many officers were on the desk in 2011, but said there was always "at least one" officer and "sometimes many more, working on Libya."

Reached for comment, a State Department public affairs official who would only speak on background declined to address questions about Blumenthal’s relationship to Clinton, whether she was aware of the intelligence network, and who if anyone was paying Blumenthal. Asked about the Tunisia-Libya mission, the official replied, “There was a trip with the secretary in October of 2011, but there was also a congressional delegation in April, 2011. There were media reports about both of these at the time." Neither trip involved travelling via Tunis.

Related stories: For more coverage of Hillary Clinton’s email practices, read about her Top Five Clashes Over Secrecy and Echoes of her Past.

Jeff Gerth is a senior reporter at ProPublica who worked as an investigative reporter at The New York Times. Gerth has twice been awarded the Pulitzer Prize.


TOPICS: Crime/Corruption; Egypt; Israel; Politics/Elections; US: Arkansas; US: New York; US: South Carolina; War on Terror
KEYWORDS: 10110514; 1999; 2005; 201105; 20110514; 201110; 20120823; 2013; alsharif; andrewshapiro; angelamerkel; ansaralsharia; arkansas; benghazi; benghazicoverup; bigoil; blumenthal; capitolpolice; caulfield; cia; classifiedemails; clintoncrimefamily; clintonfoundation; clintonscandals; codyshearer; colinpowell; curveball; danielmurray; danmurray; dannymurray; davidgrange; davidlgrange; deltaforce; dmc; dmcworldwide; drumheller; egypt; elkikhia; elmagariaf; email; emails; fbi; followthemoney; francoishollande; gawker; germany; grange; guccifer; hillary; hillaryclinton; hillarycriminalprobe; hillaryemailserver; hillaryintelnetwork; hillaryintelop; hillaryserverwiped; hillaryspynetwork; hillarytrip; israel; jamescomey; johncaulfield; khalifaalsharif; kikhia; lazar; libya; libyanstockexchange; magariaf; marcellehellazar; mercenaries; mercs; merkel; moin; murray; newyork; nigerflap; nongovemail; oil; oilcompanies; osprey; ospreyfoundation; ospreyglobal; peterstrzok; plamegate; powell; robertmueller; romanian; shadowgov; shapiro; shearer; sidneyblumenthal; soshillary; southcarolina; state; statedept; statedeptscandals; stockexchange; strobetalbott; talbott; tunis; tunisia; turkey; tylerdrumheller; uraniumone; uscapitolpolice; waronterror; wipewater
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-8081-84 next last

1 posted on 03/28/2015 3:56:18 AM PDT by Liz
[ Post Reply | Private Reply | View Replies]

To: Liz

Sid needs a subpoena.

L


2 posted on 03/28/2015 3:57:24 AM PDT by Lurker (Violence is rarely the answer. But when it is it is the only answer.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Liz

Having destroyed her copies Hillary has no way to refute purported hacked emails detailing all manner of bestiality. (Bwahha ha!)


3 posted on 03/28/2015 3:58:20 AM PDT by Gen.Blather
[ Post Reply | Private Reply | To 1 | View Replies]

To: Liz

Frankly, it looks like Hillary was running her own covert intelligence network outside the confines of the US Intelligence Center system.

If she ever had a US clearance, then she should have been required to sign statements regarding her loyalty and commitment to the overall intelligence posture of this country. Running your own unsanctioned network is counterintuitive to that tenet. At the very least, she committed a very serious criminal act IMO.


4 posted on 03/28/2015 4:03:28 AM PDT by Gaffer
[ Post Reply | Private Reply | To 1 | View Replies]

To: Liz

With all of the wedding planning she had to work on, showers for the bride, invite lists, flowers, etc. Hillary couldn’t have had time to read such emails. And, what difference does it make, at this point? /s


5 posted on 03/28/2015 4:07:52 AM PDT by doosee (Captain, we are approaching a new level of Hell.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Liz

We came, we saw, HE DIED. . .CACKLE, CACKLE, CACKLE!!!


6 posted on 03/28/2015 4:09:11 AM PDT by McBuff
[ Post Reply | Private Reply | To 1 | View Replies]

To: Lurker
It’s unclear who tasked Blumenthal, known for his fierce loyalty to the Clintons, with preparing detailed intel briefing memos. It’s also not known who was paying him, or where the operation got its money. The memos were marked “confidential” and relied in many cases on “sensitive” sources in the Libyan opposition and Western intelligence and security services. Other reports focused on Egypt, Germany, and Turkey.

Golly watta treasure trove of valuable intel that someone with a "foundation" could peddle for big buck donations (/smirk).

7 posted on 03/28/2015 4:13:03 AM PDT by Liz
[ Post Reply | Private Reply | To 2 | View Replies]

To: Liz

The entire Clinton Crime Syndicate needs to be indicted on RICO charges. That the Democrats should even consider running her for president marks a new low for this country.


8 posted on 03/28/2015 4:15:29 AM PDT by txrefugee
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cindy

in case you’re lurking


9 posted on 03/28/2015 4:17:02 AM PDT by piasa (Attitude adjustments offered here free of charge)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gaffer
Does Blumenthal and Hillary and Obama know anything about MANPADs shoulder fired missiles being sold to ISIL/ISIS and AQIL in order to fight Assad? (verified by available intelligence).

REFERENCE ......though the intel memos were sent under Blumenthal’s name, the reports appear to have been gathered and prepared by Tyler Drumheller, a former chief of the CIA’s clandestine service in Europe who left the agency in 2005. Since then, he has established a consulting firm called Tyler Drumheller, LLC.

Tyler Drumheller has also been affiliated with a firm called DMC Worldwide, which he co-founded with Washington, D.C., attorney Danny Murray and former general counsel to the U.S. Capitol Police John Caulfield.

DMC Worldwide’s now-defunct website describes it at as offering “innovative security and intelligence solutions to global risks in a changing world.”

10 posted on 03/28/2015 4:18:18 AM PDT by Liz
[ Post Reply | Private Reply | To 4 | View Replies]

To: Liz

Likely because of TD and DMC principals’ former IC connections they may have trafficked in classified information or knew of it as being classified. Their former clearance requirements about disclosure and knowledge still remained in effect, as well as Herr Clinton’s duties.

In an apolitical intelligence context, these people would be prosecuted


11 posted on 03/28/2015 4:24:24 AM PDT by Gaffer
[ Post Reply | Private Reply | To 10 | View Replies]

To: All
FREEPERS, CALL YOUR REPS--Did the DOJ's Computer Forensics Division look into Hillary's State Dept server?

If not, why not?

======================================

REFERENCE Computer Crime, E-Crime, Hi-Tech Crime or Electronic Crime is a crime in which a computer plays an essential part. Computer crime is a felony violation of section 1030 of the United States Code. Computer crime also violates copyright laws and property rights in some cases.

This type of crime is the illegal exploitation of computer technologies, usually to support crimes such as fraud, identity theft, sharing of information, and embezzlement. A link to the U.S. Department of Justice's website about e-crime and the DOJ's computer forensics activities is at their web site.

Examples of computer crime are:

<><> * Fraud achieved by the manipulation of computer records.

<><>* Spamming wherever outlawed completely or where regulations controlling it are violated.

<><> * Deliberate circumvention of computer security systems.

<><>>* Unauthorised access to or modification of programs (see software cracking and hacking).

<><>* Intellectual property theft, including software piracy.

<><* Industrial espionage by means of access to or theft of computer materials.

<><>* Identity theft where this is accomplished by use of fraudulent computer transactions.

<><>>* Writing or spreading computer viruses or worms. <>* "Salami slicing" is the practice of stealing money repeatedly in extremely small quantities

<><>* Denial-of-service attack, where company websites are flooded with service requests and their website is overloaded and either slowed or crashes completely

<><>* Making and digitally distributing child pornography

==================================================

•United States Code, Title 17 - Copyrights,January 1, 1998,

1.Chapter 1 - Subject Matter And Scope Of Copyright

2.Chapter 2 - Copyright Ownership And Transfer

3.Chapter 3 - Duration Of Copyright

4.Chapter 4 - Copyright Notice, Deposit, And Registration

5.Chapter 5 - Copyright Infringement And Remedies

6.Chapter 6 - Manufacturing Requirements And Importation

7.Chapter 7 - Copyright Office

8.Chapter 8 - Copyright Arbitration Royalty Panels

9.Chapter 9 - Protection Of Semiconductor Chip Products

10.Chapter 10 - Digital Audio Recording Devices And Media

11.Chapter 11 - Sound Recordings And Music Videos

==============================================

•United States Code, Title 18 - Crimes And Criminal Procedure (Part I - Crimes),January 1, 1998, Chapter 25 - Counterfeiting And Forgery

•Alabama Computer Crime Act, Computer Crime Statutes, May 1, 1995, Chapter 25 - Counterfeiting And Forgery

•Federal Guidelines For Searching And Seizing Computers

•Communications Privacy Act Of 1986, Chapter 119. Wire And Electronic Communications Interception And Interception Of Oral Communications

•Electronic Communications Privacy Act Of 1986, Chapter 121--Stored Wire And Electronic Communications And Transactional Records Access

•Research Needs For Computer Crime

•Privacy Protection Act Of 1980, Chapter 21a - Privacy Protection Subchapter I--First Amendment Privacy Protection

•Preparation Of Search Warrants For Computer-Related Evidence

•Excerpts From Computer Search Warrants

•Code Of Virginia, Title 18.2, Chap. 5 Crimes Against Property, Article 7.1. Computer Crimes

•2004 CSI/FBI Computer Crime And Security Survey

•2005 CSI/FBI Computer Crime And Security Survey

Computer Crime Research Center
http://www.crime-research.org/news/26.11.2005/1661/

12 posted on 03/28/2015 4:25:25 AM PDT by Liz
[ Post Reply | Private Reply | To 10 | View Replies]

To: Liz

13 posted on 03/28/2015 4:25:25 AM PDT by BerryDingle (I know how to deal with communists, I still wear their scars on my back from Hollywood-Ronald Reagan)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BerryDingle

Nice find.


14 posted on 03/28/2015 4:29:01 AM PDT by Liz
[ Post Reply | Private Reply | To 13 | View Replies]

To: Fedora; Travis McGee; Cincinatus' Wife

Merc bump


15 posted on 03/28/2015 4:30:04 AM PDT by piasa (Attitude adjustments offered here free of charge)
[ Post Reply | Private Reply | To 1 | View Replies]

To: sickoflibs; GOPJ; Jane Long; TADSLOS; Tennessee Nana; AuntB; SgtBob; Grampa Dave; ...

ping


16 posted on 03/28/2015 4:30:52 AM PDT by Liz
[ Post Reply | Private Reply | To 14 | View Replies]

To: Liz

Ol’ Tyler Drumheller’s an interesting character...


17 posted on 03/28/2015 4:32:43 AM PDT by piasa (Attitude adjustments offered here free of charge)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ChiefJayStrongbow; Blue Highway; CivilWarBrewing; blueunicorn6; Don Corleone; PROCON; Drago; DB; ...

PING


18 posted on 03/28/2015 4:35:35 AM PDT by Liz
[ Post Reply | Private Reply | To 2 | View Replies]

To: doosee

You forgot yoga emails!


19 posted on 03/28/2015 4:36:44 AM PDT by PghBaldy (12/14 - 930am -rampage begins... 12/15 - 1030am - Obama's advance team scouts photo-op locations.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: The_Media_never_lie; tom paine 2; twister881; PistolPaknMama; Savage Beast; bmwcyle

ping


20 posted on 03/28/2015 4:40:46 AM PDT by Liz
[ Post Reply | Private Reply | To 18 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-8081-84 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson