Posts

Stormy Weather Ahead

As you may have heard, there is an interview on CBS 60 Minutes tonight of former Trump paramour Stormy Daniels. In the last 48 hours, there have been a slew of Stormy biographies. From the New York Times, the Washington Post, and CNN. All worth a check if you are interested, but all paint a similar picture.

It is a picture of a modern empowered and self assured woman. She is no slouch, she is bright and ready. It was been all too casual for the press to early on slough her off and characterize her as a “porn star” like that automatically makes some throw away bimbo. Clearly, nothing is further from the case.

The picture that emerges on closer inspection is far different. She is an informed and savvy woman in full. She is a mother and businesswoman, and one who understands and worries about the conflicts between the two. Karen McDougal, in her Thursday interview on CNN came off as genuine and honest, even if somewhat lost in why she is here with all of the public now. Daniels has none of that. And her story is, within the salacious category Trump brings us to consider, far more compelling.

The stories of Daniels and McDougall were literally concurrent, starting with a golf tournament tete a tete at the Tahoe Pro Am. But McDougall presents as a jilted woman once in love, Daniels is flat out a smarter woman who knew then, and knows now, what was up, then and now, and just isn’t going to stand for the rank hypocrisy and lying by Trump and his goons like Michael Cohen.

The rushed out bios linked above largely track each other, but to my eye, the New York Times is the best:

Those who know her well have registered the moment differently. Ms. Clifford has subsisted amid the seamier elements of a business often rife with exploitation and unruly fare; more than a few of her film titles are unprintable. But for most of her professional life, Ms. Clifford has been a woman in control of her own narrative in a field where that can be uncommon. With an instinct for self-promotion, she evolved from “kindergarten circuit” stripper to star actress and director, and occasional mainstream success, by her late 20s. Why would a piece of paper and an executive legal team set her back?
….
“She was a very serious businesswoman and a filmmaker and had taken the reins of her career,” said Judd Apatow, who directed her cameos in the R-rated comedies “Knocked Up” and “The 40-Year-Old Virgin.” “She is not someone to be underestimated.”
….
She has a daughter, a third husband and an expensive hobby: equestrian shows. “She blends right in,” said Packy McGaughan, a trainer on the competition circuit.
….
“Just as these misguided arbiters of the mainstream view an adult entertainment star as an anathema to the political process,” she said, when she eventually decided against a bid, “so too do they view the dishwasher, the cashier or the bus driver.”

This woman is real. Please go read at least the NY Times story, if not the others linked. She is everything you think she is, and far, far, more. And she has no fear. Not of her career, and not of Trump. That has to terrify Trump.

Here is the other thing that is different: Stormy Daniels has Michael Avenatti as her lawyer. Never met or talked to Avenatti before, but I have heard of him in cases (and from auto racing things), and from friends, for several years. He is good.

After three years at O’Melveny, he joined Greene Broillet & Wheeler, a Los Angeles boutique litigation firm. While there, Michael spearheaded many high-profile cases, including a $10 million defamation case against Paris Hilton; a successful idea theft lawsuit involving the reality show The Apprentice and its producer, Mark Burnett, as well as Donald Trump; and a large corporate multi-national embezzlement case involving in excess of $42,000,000.

In 2007, Michael formed the law firm Eagan Avenatti, LLP (fka Eagan O’Malley & Avenatti, LLP), with offices in Newport Beach, Los Angeles and San Francisco. Since co-founding the firm, Michael has been responsible for securing a number of large verdicts and settlements as lead counsel, including an April 2017 $454 Million verdict after a jury trial in Federal Court in Los Angeles in a fraud case against Kimberly-Clark (NYSE: KMB) and Halyard Health (NYSE: HYH) that was featured on 60 Minutes (won every jury question as to every defendant); a $80.5 million class action settlement against Service Corporation International (NYSE: SCI) in another case featured on 60 Minutes and in the international press (settlement reached in the middle of trial); a $41 million jury verdict after a nearly five-week trial in New Jersey; a $39 million settlement in a case involving the alleged theft of trade secrets; and a $13 million plus verdict after a six week jury trial in Palm Beach, Florida (won every jury question as to every defendant). In 2015, Michael prevailed against the National Football League after a two-week jury trial in Federal District Court in Dallas, Texas after obtaining a court order requiring Jerry Jones to attend trial and be cross-examined.

I had heard of him before, but really first watched Avenatti when he took on the National Football League and Jerry Jones. Because of some sports law friends, some of whom were closer to that story, I paid attention. Avenatti is seriously that good, and he has the extra bonus of knowing how to be a good trial lawyer AND play the PR game, personally, well. There are not many such lawyers, and ones tending to the PR more than the law are routinely panned mercilessly here at this blog. For good reason.

If you don’t have a winning strategy with the press, don’t talk to the press. Even if you think you do, think twice and thrice before doing so. Or, by my book, just don’t do it. But Avenatti has a really special combination of savvy, and has proven it long before Stormy Daniels.

Nobody knows how it all ends up, and playing the press is a risky game even for those genuinely good at it. But, so far, Avenatti and Stormy have played Trump and the press like a Stradivarius.

And, if as Trump is reportedly contemplating, Trump decides to get personally aggressive, watch out. He may well have met his match with Ms. Daniels and Michael Avenatti. By my guess, they are almost making bank Trump will try that ill advised tact. Let it be. Please, let it be.

Did NSA Just Reveal Its China BIOS Story Was Made Up?

Secrecy News just released an NSA notice to Congress of authorized disclosure of classified information. The notice was dated December 13, just two days before 60 Minutes had a solicitous piece on the NSA.

Here’s the classified information the NSA says they gave what must be 60 Minutes.

The reference to assisting in locating hostages probably map to the metadata analysis of pirates done onscreen (albeit with altered phone numbers).

But what’s not there in unredacted form — at least beyond the vague description of “USG efforts to mitigate cyber threats” was the China kaboom story told on the show.

John Miller: Could a foreign country tomorrow topple our financial system?

Gen. Keith Alexander: I believe that a foreign nation could impact and destroy major portions of our financial system, yes.

John Miller: How much of it could we stop?

Gen. Keith Alexander: Well, right now it would be difficult to stop it because our ability to see it is limited.

One they did see coming was called the BIOS Plot. It could have been catastrophic for the United States. While the NSA would not name the country behind it, cyber security experts briefed on the operation told us it was China. Debora Plunkett directs cyber defense for the NSA and for the first time, discusses the agency’s role in discovering the plot.

Debora Plunkett: One of our analysts actually saw that the nation state had the intention to develop and to deliver, to actually use this capability– to destroy computers.

John Miller: To destroy computers.

Debora Plunkett: To destroy computers. So the BIOS is a basic input, output system. It’s, like, the foundational component firmware of a computer. You start your computer up. The BIOS kicks in. It activates hardware. It activates the operating system. It turns on the computer.

This is the BIOS system which starts most computers. The attack would have been disguised as a request for a software update. If the user agreed, the virus would’ve infected the computer.

John Miller: So, this basically would have gone into the system that starts up the computer, runs the systems, tells it what to do.

Debora Plunkett: That’s right.

John Miller: –and basically turned it into a cinderblock.

Debora Plunkett: A brick.

John Miller: And after that, there wouldn’t be much you could do with that computer.

Debora Plunkett: That’s right. Think about the impact of that across the entire globe. It could literally take down the U.S. economy.

John Miller: I don’t mean to be flip about this. But it has a kind of a little Dr. Evil quality– to it that, “I’m going to develop a program that can destroy every computer in the world.” It sounds almost unbelievable.

Debora Plunkett: Don’t be fooled. There are absolutely nation states who have the capability and the intentions to do just that.

John Miller: And based on what you learned here at NSA. Would it have worked?

Debora Plunkett: We believe it would have. Yes.

As I noted at the time, the story — the claim that a country of 1.3 billion people who have become very interdependent with the United States would want to destroy the US economy — was a bit absurd.

I’ll need to go back and review this, but the jist of the scary claim at the heart of the report is that the NSA caught China planning a BIOS plot to shut down the global economy.

To.

Shut.

Down.

The.

Global.

Economy.

Of course, if that happened, it’d mean a goodly percentage of China’s 1.3 billion people would go hungry, which would lead to unbelievable chaos in China, which would mean the collapse of the state in China, the one thing the Chinese elite want to prevent more than anything.

But the NSA wants us to believe that this was actually going to happen.

That China was effectively going to set off a global suicide bomb. Strap on the economy in a cyber-suicide vest and … KABOOOOOOOM!

And the NSA heroically thwarted that attack.

That’s what they want us to believe and some people who call themselves reporters are reporting as fact.

Anyway, like I said, no unredacted mention that this was among the classified information shared with CBS. Even accounting for the fact that NSA didn’t identify the country in question to CBS, even the description of the plot would seem to be classified.

If it were true.

But it doesn’t appear on the list of classified things revealed to CBS.

The 28 Pages

On Sunday, President Obama said this about about Hillary’s email scandal: “There’s classified & then there’s classified.”

Perhaps that’s what has led him to decide, after 15 years, the 28 pages on the Saudis’ role in 9/11 can finally be released (or at least reviewed for declassification; given the way the 60 Minutes script ignored evidence about Bandar bin Sultan, I suspect they’ll still protect him).

The ostensible precipitating factor was a 60 Minutes show that, as I understand, didn’t expose anything we haven’t known for a decade (for comparison see this declaration Bob Graham submitted last year in a suit against the Saudis). But given the way 60 Minutes have become a house organ for the Intelligence Community, and given the way Nancy Pelosi had a statement (emphasizing her long role in Intelligence oversight, such as it exists) endorsing the disclosure all ready to go,

“As the former Ranking Democrat on the House Intelligence Committee and top the House Democrat on the Joint Congressional investigation looking into the 9/11 attacks, I agree with former Senator Bob Graham that these documents should be declassified and made public, and that the Bush Administration’s refusal to do so was a mistake,” Pelosi said in a statement. “I have always advocated for providing as much transparency as possible to the American people consistent with protecting our national security.”

I gotta believe this was all orchestrated.

After pretending the Saudis have been good faith partners for 15 years, in spite of abundant evidence evidence they have always continued to support terrorism as a tool in their bid for power, it seems, the Intelligence Committee has finally decided it was convenient to be able to discuss the Saudi role in 9/11.

Mind you, if the IC was really serious about discussing what bad partners the Saudis have always been, they should also declassify the other abundant evidence that the Saudis have been playing two sides with us.

But that would discomfort a good many Americans, I suspect.

Jim Comey Lied When He Claimed FBI Needs a Judge to Read Your Email

I believe that Americans should be deeply skeptical of government power. You cannot trust people in power. The founders knew that. That’s why they divided power among three branches, to set interest against interest. — FBI Director Jim Comey

As part of a piece on James Risen’s stories, 60 Minutes did an interview with Jim Comey. It rehearsed his role in running up hospital steps in 2004 to prevent Andy Card from getting an ill John Ashcroft to rubber stamp illegal surveillance — without mentioning that Comey and the other hospital heroes promptly got the same program authorized by bullying the FISA Court. Trevor Timm called out this aspect of 60 Minutes’ report here.

CBS also permitted Comey to engage in Apple encryption fear-mongering without challenge. CNN, to its credit, called Comey on his misrepresentations here.

But perhaps Comey’s biggest stretcher came when Scott Pelley asked him whether FBI engages in surveillance without a court order.

Scott Pelley: There is no surveillance without court order?

James Comey: By the FBI? No. We don’t do electronic surveillance without a court order.

Scott Pelley: You know that some people are going to roll their eyes when they hear that?

James Comey: Yeah, but we cannot read your emails or listen to your calls without going to a federal judge, making a showing of probable cause that you are a terrorist, an agent of a foreign power, or a serious criminal of some sort, and get permission for a limited period of time to intercept those communications. It is an extremely burdensome process. And I like it that way.

Comey was admittedly careful to caveat his answer, stating that FBI does not engage in “electronic surveillance” without a court order. That probably excludes FBI’s use of National Security Letters. Though as DOJ’s Inspector General has made clear, FBI uses NSLs for a number of things — including communities of interest, obtaining one or possibly two degree collection of phone records, as well as a bunch of other things that remain redacted — that the NSL law didn’t envision. Indeed, FBI’s NSL requests have gotten so exotic that some Internet companies started to refuse — successfully — in 2009 to comply with the requests, forcing FBI to use Section 215 orders instead.

But the second part of that exchange — Comey’s claim that “we cannot read your emails without going to a federal judge” is egregiously false.

As both ODNI and PCLOB have made clear, FBI can and does query incidentally collected data obtained under Section 702 (PRISM) — that is, it accesses email content — without a warrant. Alarmingly, it does so at the assessment level, before FBI even has any real evidence of wrong-doing.

Second, whenever the FBI opens a new national security investigation or assessment, FBI personnel will query previously acquired information from a variety of sources, including Section 702, for information relevant to the investigation or assessment. With some frequency, FBI personnel will also query this data, including Section 702–acquired information, in the course of criminal investigations and assessments that are unrelated to national security efforts.

That’s not conducting electronic surveillance — because FBI gets the email after the electronic surveillance has already occurred. But that does entail warrantless access of US person content, and does so without any review by a judge. Indeed, with Section 702 collection, a judge never even reviews the foreign targets, much less the US incidental collection accessed by the FBI.

Now I get that Jim Comey is a terrifically charismatic guy, with great PR instincts. But still, 60 Minutes is supposed to be a journalism show. Why, when Comey was telling 60 Minutes straight out they should not trust the government, did they let him make so many bogus claims?

The Civil Liberties Celebration Hangover Wears Off

JusticePicAt the end of last week, I joked a little about privacy and civil liberties advocates having had the “best week ever”. It was indeed a very good week, but only relatively compared to the near constant assault on the same by the government. But the con is being put back in ICon by the Administration and its mouthpieces.

As I noted in the same post, Obama himself has already thrown cold water on the promise of his NSA Review Board report. Contrary to some, I saw quite a few positives in the report and thought it much stronger than I ever expected. Still, that certainly does not mean it was, or is, the particularly strong reform that is needed. And even the measures and discussion it did contain are worthless without sincerity and dedication to buy into them by the intelligence community and the administration. But if Obama on Friday was the harbinger of the walkback and whitewash of real reform, the foot soldiers are taking the field now to prove the point.

Sunday morning brought out former CIA Deputy Director Michael Morrell on CBS Face the Nation to say this:

I think that is a perception that’s somehow out there. It is not focused on any single American. It is not reading the content of your phone calls or my phone calls or anybody else’s phone calls. It is focused on this metadata for one purpose only and that is to make sure that foreign terrorists aren’t in contact with anybody in the United States.

Morrell also stated that there was “no abuse” by the NSA and that Ed Snowden was a “criminal” who has shirked his duties as a “patriot” by running. Now Mike Morrell is not just some voice out in the intelligence community, he was one of the supposedly hallowed voices that Barack Obama chose to consider “reform”.

Which ought to tell you quite a bit about what Barack Obama really thinks about true reform and your privacy interests. Not much. In fact, Morrell suggested (and Obama almost certainly agrees) that the collection dragnet should be expanded from telephony to also include email. Not exactly the kind of “reform” we had in mind.

Then, Sunday night 60 Minutes showed that fluffing the security state is not just a vice, but an ingrained habit for them. Hot on the heels of their John Miller blowjob on the NSA, last night 60 Minutes opened with a completely hagiographic puff piece on and with National Security Advisor Susan Rice. There was absolutely no news whatsoever in the segment, it was entirely a forum for Rice and her “interviewer”, Lesley Stahl, to spew unsupported allegations about Edward Snowden (He “has 1.5 million documents!”), lie about how the DOJ has interacted with the court system regarding the government surveillance programs (the only false statements have been “inadvertent”) and rehab her image from the Benghazi!! debacle. That was really it. Not exactly the hard hitting journalism you would hope for on the heels of a federal judge declaring a piece of the heart of the surveillance state unconstitutional.

Oh, yes, Susan Rice also proudly proclaimed herself “a pragmatist like Henry Kissinger which, as Tim Shorrock correctly pointed out, is not exactly reassuring from the administration of a Democratic President interested in civil liberties, privacy and the rule of law.

So, the whitewashing of surveillance dragnet reform is in full swing, let the giddiness of last week give way to the understanding that Barack Obama, and the Intelligence Community, have no intention whatsoever of “reforming”. In fact, they will use the illusion of “reform” to expand their authorities and power. Jonathan Turley noted:

Obama stacked the task force on NSA surveillance with hawks to guarantee the preservation of the program.

Not just preserve, but to give the false, nee fraudulent, patina of Obama Administration concern for the privacy and civil liberties concerns of the American citizenry when, in fact, the Administration has none. It is yet another con.

Or, as Glenn Greenwald noted:

The key to the WH panel: its stated purpose was to re-establish public confidence in NSA – NOT reform it.

There may be some moving of the pea beneath the shells, but there will be no meaningful reform from the administration of Barack Obama. The vehicle for reform, if there is to be one at all, will have to come from the Article III federal courts. for an overview of the path of Judge Leon’s decision in Klayman through the DC circuit, see this piece by NLJ’s Zoe Tillman.

Lastly, to give just a little hope after the above distressing content, I recommend a read of this excellent article by Adam Serwer at MSNBC on the cagy pump priming for surveillance reform Justice Sotomayor has done at the Supreme Court:

If Edward Snowden gave federal courts the means to declare the National Security Agency’s data-gathering unconstitutional, Sonia Sotomayor showed them how.

It was Sotomayor’s lonely concurrence in U.S. v Jones, a case involving warrantless use of a GPS tracker on a suspect’s car, that the George W. Bush-appointed Judge Richard Leon relied on when he ruled that the program was likely unconstitutional last week. It was that same concurrence the White House appointed review board on surveillance policy cited when it concluded government surveillance should be scaled back.

“It may be necessary to reconsider the premise that an individual has no reasonable expectation of privacy in information voluntarily disclosed to third parties,” Sotomayor wrote in 2012. “This approach is ill suited to the digital age, in which people reveal a great deal of information about themselves to third parties in the course of carrying out mundane tasks.”

Give the entire article a read, Adam is spot on. If there is to be reform on the surveillance dragnet, it will almost certainly have to be the handiwork of the courts, and Justice Sotomayor planted the seed. The constant barrage of truth and facts coming from the Snowden materials, what Jay Rosen rightfully terms “The Snowden Effect” is providing the food for Sotomayor’s seed to flower. Hopefully.

That Pirate May Be the Missing Link We Should Drone Kill

As I mocked last night, 60 Minutes decided to use pirate data collected under EO 12333 to demonstrate how it conducts call chaining on US citizen data collected under Section 215. But the exchange is rather interesting for the way the NSA analyst, Stephen Benitez, describes finding a potentially key player in a network of pirates.

Metadata has become one of the most important tools in the NSA’s arsenal. Metadata is the digital information on the number dialed, the time and date, and the frequency of the calls.  We wanted to see how metadata was used at the NSA.  Analyst Stephen Benitez showed us a technique known as “call chaining” used to develop targets for electronic surveillance in a pirate network based in Somalia.

Stephen Benitez: As you see here, I’m only allowed to chain on anything that I’ve been trained on and that I have access to. Add our known pirate. And we chain him out.

John Miller: Chain him out, for the audience, means what?

Stephen Benitez: People he’s been in contact to for those 18 days.

Stephen Benitez: One that stands out to me first would be this one here. He’s communicated with our target 12 times.

Stephen Benitez: Now we’re looking at Target B’s contacts.

John Miller: So he’s talking to three or four known pirates?

Stephen Benitez: Correct. These three here. We have direct connection to both Target A and Target B. So we’ll look at him, too, we’ll chain him out. And you see, he’s in communication with lots of known pirates. He might be the missing link that tells us everything. [my emphasis]

Compare the language Benitez uses here with that which Gregory McNeal used to describe drone targeting back in February.

Networked based analysis looks at terrorist groups as nodes connected by links, and assesses how components of that terrorist network operate together and independently of one another.  Those nodes and links, once identified will be targeted with the goal of disrupting and degrading their functionality.  To effectively pursue a network based approach, bureaucrats rely in part on what is known as “pattern of life analysis” which involves connecting the relationships between places and people by tracking their patterns of life. This analysis draws on the interrelationships among groups “to determine the degree and points of their interdependence.” It assesses how activities are linked and looks to “determine the most effective way to influence or affect the enemy system.”

[snip]

Viewing targeting in this way demonstrates how seemingly low level individuals such as couriers and other “middle-men” in decentralized networks such as al Qaeda are oftentimes critical to the successful functioning of the enemy organization. Targeting these individuals can “destabilize clandestine networks by compromising large sections of the organization, distancing operatives from direct guidance, and impeding organizational communication and function.” Moreover, because clandestine networks rely on social relationships to manage the trade-off between maintaining secrecy and security, attacking key nodes can have a detrimental impact on the enemy’s ability to conduct their operations. [my emphasis]

That is, the language describing the process behind signature strikes closely matches the language describing NSA’s targeting for wiretapping. Both these analyses are doing the same thing: trying to find the key nodes in networks of people (though the drone targeting appears to draw in additional intelligence about someone’s observed actions and locations).

Now, as I said, when Benitez used the word “target,” he was presumably discussing only targeting for surveillance, not for drone killing (besides, thus far we haven’t drone killed any pirates I know of).

But it is very easy to see what kind of role metadata analysis would play in the early stages of targeting a signature strike, because that’s precisely how the intelligence community identify the nodes that, McNeal tells us, they’re often targeting when they conduct signature strikes. Wiretap the person at that node and you may learn a lot (that’s also probably the same kind of targeting they do to select potential informants, as we know they do with metadata), kill that person and you may damage the operational capabilities of a terrorist (or pirate) organization.

When the WaPo reported on NSA’s role in drone killing, it focused on how NSA collected content associated with a known target — Hassan Ghul — to pinpoint his location for drone targeting.

But NSA probably plays a role in the far more controversial targeting of people we don’t know for death, with precisely the kind of contact chaining it uses on US persons.

Note, in related news, Richard Leon has just ruled for Larry Klayman in one of the first suits challenging the phone dragnet (with the injunction stayed pending appeal). I’ll have analysis on that later.

60 Minutes Betters Their Benghazi Debacle: Pirates Ahoy! and Chinese Global Suicide Bombers

I will have more to say about tonight’s 60 Minutes debacle.

But for now, let me make three points.

First, John Miller should never work in journalism again (he’s reportedly prepping to run NYPD’s intelligence shop, so he may not need to). There were numerous examples in tonight’s 60 Minutes piece where even a mildly curious journalist would have asked follow-up questions. But given that Miller, who has an ODNI and FBI background, knows this stuff, his failure to ask obvious follow-up questions is proof this was not at all about journalism.

Of particular note that everyone is getting snookered on: Lying Keith Alexander said that NSA only listens to the phone calls of 60 US persons. When Miller sort of asked a follow-up, Alexander seemed to reiterate that this is NSA.

Of course, FBI formally owns the wiretapping of US persons in the US. So that 60 number may only be Americans we wiretap overseas. One of those follow-up questions that might have been useful.

Then there was the NSA’s effort to show us what contact chaining looks like. As a threshold matter, they had subbed out all the real phone numbers with “555-1212” type numbers. Which means the computer was altered for TV.

Then, CBS showed an NSA analyst contact chaining off pirates.

Yes, pirates!

Aside from opening up NSA to the claim that we’re now all 3 degrees of Captain Hook, the pirate operation of course means the claims of the analyst only apply to EO 12333 collection (cause pirates are almost never US persons).

That is, we should assume it is completely meaningless as a demonstration of what the US phone dragnet is about.

Then there’s the scary BIOS plot.

I’ll need to go back and review this, but the jist of the scary claim at the heart of the report is that the NSA caught China planning a BIOS plot to shut down the global economy.

To.

Shut.

Down.

The.

Global.

Economy.

Of course, if that happened, it’d mean a goodly percentage of China’s 1.3 billion people would go hungry, which would lead to unbelievable chaos in China, which would mean the collapse of the state in China, the one thing the Chinese elite want to prevent more than anything.

But the NSA wants us to believe that this was actually going to happen.

That China was effectively going to set off a global suicide bomb. Strap on the economy in a cyber-suicide vest and … KABOOOOOOOM!

And the NSA heroically thwarted that attack.

That’s what they want us to believe and some people who call themselves reporters are reporting as fact.

“Morgan Jones'” Three Unverifiable Claims Covered Up His Own Failures

As Michael Calderone reports, 60 Minutes has finally conceded they got hoodwinked by “Morgan Jones” AKA “Dylan Davies.”

I’ve heard no related concession from Dick Cheney propagandist Mary Matalin that her Simon & Schuster imprint, Threshold, published a fabrication, “Jones'” book. Until we learn how that happened — which surely drove some of the credibility 60 Minutes accorded a guy working under a pseudonym for obviously nonsensical reasons (his other name, Dylan Davies, had already been published, at a time much closer to the attack) — I think it worth examining what story he chose to tell.

The 60 Minutes platform gave “Jones” the opportunity to make 3 claims that, as delivered, were unverifiable (because there were no witnesses).

2 of them conflict with the incident report that has been his undoing. In the first — and the one that has attracted all the attention — “Jones” claimed he had heroically entered the compound and bashed some guy’s face in (but not shot him).

Not long afterwards, Morgan Jones scaled the 12-foot high wall of the compound that was still overrun with al Qaeda fighters.

Morgan Jones: One guy saw me. He just shouted. I couldn’t believe that he’d seen me ’cause it was so dark. He started walking towards me.

Lara Logan: And as he was coming closer?

Morgan Jones: As I got closer, I just hit him with the butt of the rifle in the face.

Lara Logan: And?

Morgan Jones: Oh, he went down, yeah.

Lara Logan: He dropped?

Morgan Jones: Yeah, like– like a stone.

Lara Logan: With his face smashed in?

Morgan Jones: Yeah.

Lara Logan: And no one saw you do it?

Morgan Jones: No.

Lara Logan: Or heard it?

Morgan Jones: No, there was too much noise.

The incident report says that “Jones” tried to drive to the compound but upon hitting Ansar al-Sharia roadblocks, his driver judged they’d be killed if they tried to get closer, so they turned back. They were gone from “Jones'” villa for no more than an hour total.

But what’s remarkable about this heroic scene is the designed unverifiability of it. Had “Jones” claimed to have shot a man, there’d be bullets missing from his gun, a dead body. Instead, he bashed the guy’s face in, which is not only more exciting, but also has the advantage of being quieter. No witness to see or hear the event.

I’m far more interested in “Jones'” claim to have gone to the hospital (guarded by the same militia whose roadblocks convinced “Jones” to turn back from the compound) to see Chris Stevens’ dead body. The incident report says, instead, that one of his guards had gone to the hospital to check after one of the guards who had been shot and while there had seen and photographed the Ambassador, and learned he had still been alive when brought to the hospital by Libyan men but then died. Crucially, “Jones'” incident report claims he didn’t tell his own Managing Director that night about Stevens (at least about Stevens’ passing, but possibly even about his being brought to the hospital).

I kept quiet about the Ambassadors [sic] death as I knew there would be huge repercussions.

Compare that with what he told 60 Minutes.

Morgan Jones: I was dreading seeing who it was, you know? It didn’t take long to get to the room. And I could see in through the glass. And I didn’t even have to go into the room to see who it was. I knew who it was immediately.

Lara Logan: Who was it?

Morgan Jones: It was the ambassador, dead. Yeah, shocking.

Morgan Jones said he’d never felt so angry in his life. Only hours earlier, Amb. Chris Stevens had sought him out, concerned about the security at the U.S. Special Mission Compound where Morgan was in charge of the Libyan guard force.

The story was nonsensical in any case, because if an American employed contractor had seen the Ambassador’s body in a hospital controlled by a hostile militia, you might thing he’d claim custody of the body.

But the story does serve to let “Jones” claim that he had just spoken about security with Stevens.

Read more

60 Minutes Goes Black–Who Does It Protect?

As a number of you pointed out in the comments, 60 Minutes curiously went off the air in Northern Alabama last night for over half of the segment on Governor Siegelman. The station did rebroadcast the show at 10 PM last night. Still, the fact that just one station in Alabama lost the show just when it was showing a damning story on Alabama’s politicized prosecutions sure reeks, particularly given the way the local newspapers have buried the story.

Now it is possible that the station’s explanation–that its receiver went out–is true. But on the off chance that it’s not, I wanted to look at whom the Bush crony-Bass owned station might have been trying to protect, if the lost signal was intentional.

According to this comment from Mooncat, the broadcast picked up just past midway.

The first thing I saw was Doug Jones and this is the first bit I recall hearing (p. 3)

"They started over. People started getting subpoenas that had never gotten subpoenas before, for testimony, for records. The governor’s brother, his bank records started getting subpoenaed. The net was cast much wider than had ever been cast before," Jones says.

It may have been on for a few seconds before that, but not much.

Thus, the segment that showed included details about how DOJ got involved in the process:

Justice Department headquarters in Washington had ordered a top to bottom review of the case

And how Leura Canary oversaw a prosecution in which she had serious conflicts.

The prosecution was handled by the office of U.S. Attorney Leura Canary, whose husband Bill Canary had run the campaign of Siegelman’s opponent, Gov. Riley.

“Why would you do it that way?” Woods asks. “Why wouldn’t you say, ‘You know what? We’re going to bring in someone from another jurisdiction to do it.

So the blackout certainly didn’t protect Leura Canary. But it did leave out the damning comment from Canary’s husband, where he said "his girls" would fix his Siegelman problem.

Canary told her she didn’t have to do more intelligence work because, as Canary allegedly said, “My girls” can take care of Siegelman. Simpson says she asked “Who are your girls?”

“And he says, ‘Oh, my wife, Leura. You know, she’s the Middle District United States Attorney.’ And he said, ‘And then Alice Martin. She is the Northern District Attorney, and I’ve helped with her campaign,’” Simpson says.

Read more