Romney Foreign Policy Advisor’s Wife Joins Dance on Ambassador Stevens’ Grave

Next up in the campaign to turn the Benghazi attack into Obama’s Jimmy Carter? Danielle Pletka, one of the architects of the false claims that got us into Iraq War.

She draws a parallel between the Obama Administration’s treatment of the Benghazi attack and Spanish Prime Minister José Maria Aznar’s attempts to blame the March 11, 2004 Madrid bombing on ETA rather than al Qaeda. Of course, in Pletka’s version, Aznar’s willingness to get suckered into Bush’s–and Pletka’s–illegal war in Iraq bore no role in Aznar’s loss at all; just his attempts to hide the real culprits.

Why did Aznar insist it was ETA? Simple. He didn’t want the Spanish people to believe that the terrorist attack in Madrid was related to Spain’s involvement in Iraq and Afghanistan, fearing they would punish him at the polls. Ironically, however, it was not the bombings themselves that doomed Aznar and his party in elections held three days later; rather it was the handling, the appearance of a cover-up, and the widespread belief that all of the above was done in the aid of Aznar’s political fortunes rather than policy.

Of course, last I checked, Obama had admitted this was a terrorist attack, so the parallel falls apart unless you’re one of the people trying to turn the September 11 death of a talented Ambassador–one who called for light security himselfinto an electoral opportunity.

I’m sure this effort to win political advantage from Stevens’ death has no connection with the fact that Pletka’s husband, Stephen Rademaker, is a Romney foreign policy advisor. (h/t Ali Gharib) I mean, given Pletka’s history, she’d be willing to politicize an Ambassador’s death all on her own, without the obvious conflict of interest of her husband’s political investments and career possibilities.

Again: there are legitimate reasons to have Congress investigate this. Which is why it would be nice if the Romney campaign would stop this celebration and allow people without obvious conflicts of interest–someone like Mike Rogers–to conduct that investigation.

The Libyan Left Behind Novels

I confess I’m skeptical every time a set of documents gets “left behind” in Libya. First there were the intelligence documents showing how the US and UK collaborated in the rendition and torture of Libyan opposition figures. Then there was Ambassador Chris Stevens’ journal, in apparently undamaged condition. And now there are the documents a WaPo reporter found at the still unsecured compound.

Documents detailing weapons collection efforts, emergency evacuation protocols, the full internal itinerary of Ambassador J. Christopher Stevens’s trip and the personnel records of Libyans who were contracted to secure the mission were among the items scattered across the floors of the looted compound when a Washington Post reporter and a translator visited Wednesday.

[snip]

At least one document found amid the clutter indicates that Americans at the mission were discussing the possibility of an attack in early September, just two days before the assault took place. The document is a memorandum dated Sept. 9 from the U.S. mission’s security office to the 17th February Martyrs Brigade, the Libyan-government-sanctioned militia that was guarding the compound, making plans for a “quick reaction force,” or QRF, that would provide security.

“In the event of an attack on the U.S. Mission,” the document states, “QRF will request additional support from the 17th February Martyrs Brigade.”

Other the documents detail — with names, photographs, phone numbers and other personal information — the Libyans contracted to provide security for the mission from a British-based private firm, Blue Mountain. Some of those Libyans say they now fear for their lives, and the State Department has said it shares concerns about their safety.

Not only do I find it a remarkable coinkydink that only in Libya do documents have a way of conveniently appearing. But all the documents in question are documents that address a specifically relevant subject matter at a convenient time. Moreover, given earlier reports that documents showing contacts were looted, I’m doubly skeptical an itinerary of Chris Stevens’ meetings would be left lying around, particularly given all the questions about what he was doing in Benghazi. And I’ll come back to my thoughts about the Libyan security contractors in a later post.

Ah well. None of that takes away from the laudable work of the reporters that continue to unearth this stuff.

Which brings me to the real question raised by the discovery of these documents. Thus far, at least 3 media teams have spent significant time at the compound.

And yet the FBI haven’t shown up for a visit once.

Perhaps that’s a factor of the FBI having chased their Arabic Agents out of the Bureau (I haven’t heard of similar problems with Agents of North African descent); it’d be a lot easier to at least do a few evidence collection visits if the FBI officers didn’t look and sound like Ken and Barbie. But in the WaPo’s case, at least, a reporter and a translator made it safely in and out of the compound.

Maybe the FBI can deputize the press to conduct this investigation?

About That FBI Investigation of the Benghazi Attack…

The NYT’s Eric Schmitt reports that JSOC is preparing target packages for those who attacked the Benghazi consulate.

The American military’s top-secret Joint Special Operations Command is preparing detailed information that could be used to kill or capture some of the militants suspected in the attack last month in Libya that killed Ambassador J. Christopher Stevens and three other Americans, senior military and counterterrorism officials said on Tuesday.

[snip]

It remained unclear precisely how many of the “target packages” are being prepared — perhaps a dozen or more — but military and counterterrorism officials said that the Libyan authorities had identified several suspected assailants based on witness accounts, video and other photographs from the scene.

“They are putting together information on where these individuals live, who their family members and their associates are, and their entire pattern of life,” said one American official who has been briefed on the target planning now under way.

American intelligence-gathering assets — spies, satellite imagery, electronic-eavesdropping devices, among others — are finite, so counterterrorism authorities preparing the “target packages” must prioritize which militants in Benghazi — or elsewhere if they have fled the area since the attack — need to be monitored on a nearly hour-by-hour, if not minute-by-minute, basis.

To help with this effort since the attacks, the Pentagon has increased the frequency of surveillance drones that fly over eastern Libya, collecting electronic intercepts, imagery and other information that could help planners compile their target lists. American intelligence agencies have assigned additional analysts to concentrate on the suspects. [my emphasis]

Schmitt doesn’t breathe a word about this in yesterday’s article, but four days before he wrote that JSOC article, he contributed to this article describing the FBI’s difficulties investigating the attack.

Sixteen days after the death of four Americans in an attack on a United States diplomatic mission here, fears about the near-total lack of security have kept F.B.I. agents from visiting the scene of the killings and forced them to try to piece together the complicated crime from Tripoli, more than 400 miles away.

[snip]

The Libyan government has advised the F.B.I. that it cannot ensure the safety of the American investigators in Benghazi. So agents have been conducting interviews from afar, relying on local Libyan authorities to help identify and arrange meetings with witnesses to the attack and working closely with the Libyans to gauge the veracity of any of those accounts.

“There’s a chance we never make it in there,” said a senior law enforcement official.

Read more

Why Can’t Darrell Issa Read the Wall Street Journal?

In addition to the rather amusing fact that Darrell Issa is conducting an investigation that Mike Rogers should be conducting, there’s another oddity about his “investigation.” The answers to the questions he asks Hillary Clinton have been available for over 10 days in this WSJ front page article.

In his letter, Issa asks,

  1. Was State Department headquarters in Washington aware of all the above incidents? If not, why not?
  2. If so, what measures did the State Department take to match the level of security provided to the U.S. Mission in Libya to the level of threat?
  3. Please detail any requests made by Embassy Tripoli to State Department headquarters for additional security, whether in general or in light of specific attacks mentioned above. How did the Department respond to each of these requests.

In the September 21 article, the WSJ listed several of the attacks in Issa’s letter (as well as an April 10 attack on the UN’s envoy). More importantly, it provided anonymous explanations from senior State Department officials describing their thinking about security in Benghazi.

The State Department chose to maintain only limited security in Benghazi, Libya, despite months of sporadic attacks there on U.S. and other Western missions. And while the U.S. said it would ask Libya to boost security there, it did so just once, for a one-week period in June, according to Libyan officials.

[snip]

State Department officials said security for the consulate was frequently reviewed and was deemed sufficient to counter what U.S. officials considered to be the most likely threat at the time: a limited hit-and-run attack with rocket-propelled grenades or improvised explosive devices, or IEDs.

There was a string of attacks in Benghazi in the months before Sept. 11, including a June 6 IED explosion outside the consulate compound. “These types of incidents were the ones that were our principal concerns,” a senior State Department official said. Based on the outcome of the June 6 attack, in which a perimeter wall was damaged but no Americans hurt, a second State Department official added: “Our security plan worked.”

[snip]

[After the Brits pulled out of their consulate in Benghazi] The U.S. deemed the security level sufficient and decided to stay, “given the very important mission that we have in eastern Libya to support U.S. national security interests,” said a senior State Department official. He said “robust” security improvements had been made to the compound since the Americans moved into it in May 2011, including cement barriers and barbed wire.

More importantly, the article describes who made the decision to opt for a light security approach over something more aggressive: Ambassador Stevens.

Current and former officials said the security choices in Benghazi reflected efforts by Mr. Stevens to maintain a low-profile security posture and show faith in Libya’s new leaders, despite questions about their ability to rein in heavily armed bands of militants. Read more

Why Is Darrell Issa Doing Mike Rogers’ Job?

In his latest of a series of posts on the Benghazi strike, Eli Lake reveals that Darrell Issa and Jason Chaffetz have written a letter to Hillary Clinton suggesting State ignored intelligence about terrorists in Benghazi.

In the five months leading up to this year’s 9/11 anniversary, there were two bombings on the U.S. consulate in Benghazi and increasing threats to and attacks on the Libyan nationals hired to provide security at the U.S. missions in Tripoli and Benghazi.

Details on these alleged incidents stem in part from the testimony of a handful of whistleblowers who approached the House Committee on Oversight and Government Reform in the days and weeks following the attack on the Benghazi consulate. The incidents are disclosed in a letter to be sent Tuesday to Hillary Clinton from Rep. Darrell Issa, the chairman of the House Committee on Oversight and Government Reform, and Rep. Jason Chaffetz, the chairman of the oversight committee’s subcommittee that deals with national security.

The State Department did not offer comment on the record last night.

The new information disclosed in the letter obtained by The Daily Beast strongly suggests the U.S. consulate in Benghazi and the late Ambassador Chris Stevens were known by U.S. security personnel to be targets for terrorists. Indeed, the terrorists made their threats openly on Facebook.

Curiously, Lake doesn’t ask a really obvious question: why would a slew of “whistleblowers” go to Darrell Issa with their complaints about missed intelligence rather than Mike Rogers, Chair of the House Intelligence Committee? After all, if there was an intelligence failure, then it is HPSCI’s job to do something about it.

The question is all the more curious given that Issa’s Committee does not have the clearance for some levels of intelligence (the kind that sources who could well be these very same whistleblowers have already been sharing with Lake).

Meaning this letter will have an utterly predictable result: State will respond that they can’t share the information that Issa is seeking. And then Issa will escalate this, turning his “investigation” into Son of Fast and Furious.

Moreover, this intelligence should have already been shared with the House (and Senate) Intelligence Committees (note that Peter King, a leaky sieve, sits on both committees). If it hasn’t been, then Mike Rogers has all the more reason to escalate this issue. The only possible reasons for Issa to investigate this, then, is if 1) Rogers is failing to do his job and/or 2) this is just a stunt to turn a legitimate intelligence issue, the Benghazi attack, into a political attack on Obama.

Back in May, Mitt made it clear he was hoping for a hostage situation he could use as an electoral opportunity. Yesterday, Craig Unger confirmed what was already clear; Mitt intends to use the Benghazi attack as his “Jimmy Carter” strategy against Obama.

According to a highly reliable source, as Mitt Romney and President Barack Obama prepare for the first presidential debate Wednesday night, top Republican operatives are primed to unleash a new two-pronged offensive that will attack Obama as weak on national security, and will be based, in part, on new intelligence information regarding the attacks in Libya that killed U.S. ambassador Chris Stevens on September 11.

The source, who has first-hand knowledge of private, high-level conversations in the Romney camp that took place in Washington, DC last week, said that at various times the GOP strategists referred to their new operation as the Jimmy Carter Strategy or the October Surprise.

He added that they planned to release what they hoped would be “a bombshell” that would make Libya and Obama’s foreign policy a major issue in the campaign. “My understanding is that they have come up with evidence that the Obama administration had positive intelligence that there was going to be a terrorist attack on the intelligence.”

Since the presumed time of the meeting last week, Lake has written four stories about Benghazi.

But Unger’s source wouldn’t reveal what the second-prong of this attack was.

The source said that “there was quite a bit more” to the operation than simply revealing the intelligence regarding Libya. He declined to discuss what he described as the second phase of the operation.

According to Lake, Issa plans to hold an October 10 hearing on the Benghazi attack, even while Congress is out of session. That would put the hearing the day before the VP debate, and in plenty of time for Issa to create his scandal before the Presidential foreign policy debates on October 16 and 22.

I think it’s fairly clear what the second prong of this strategy is.

But the whole strategy is premised on a very flawed premise: one that says Oversight should investigate things it doesn’t have clearance for and that are solidly HPSCI’s responsibility.

I actually do want to know what happened here, and I was suggesting it was a planned al Qaeda attack longer than Lake has been. But it’s blatantly obvious Issa’s investigation is not designed to find out what happened.

Why Is Jose Rodriguez Hanging Out John Brennan NOW?

I’m no fan of either Jose Rodriguez or John Brennan. So I take no pleasure that the former is blaming the latter for a big intelligence scam carried out against the CIA back in the day.

As head of the multi-agency Terrorist Threat Integration Center in 2003 and 2004, Brennan disseminated to the Bush White House a stream of CIA intelligence from a bogus source, former CIA officials say. Ridiculed by some with the CIA, the bogus intelligence nevertheless led to disruption in the U.S. and abroad, including an orange terror alert and the cancellation of dozens of international flights.

[snip]

At the CIA, the information was controversial from the beginning, and many agency officials said at the time that it should not have been distributed. Jose Rodriguez, who was directing the CIA’s Counterterrorism Center, said the CTC viewed the intelligence as “crazy.”

“We were very skeptical,” Rodriguez recalled.

[snip]

“It was briefed by John. He was the guy who was bringing it there,” said Rodriguez, who added that he believes Brennan was trying to build up his own profile. “My own view is he saw this, he took this, as a way to have relevance, to take something important to the White House.”

But I am interested in why Rodriguez is doing this now–particularly since, as Defense News points out, he chose not to do so in his own book.

I can think of three possible reasons this is coming out now–they’re all wildarsed guesses. It’s possible that Brennan’s star is fading, so he’s vulnerable now in a way he wasn’t before.

It’s possible that some story behind the underlying scam this guy–Dennis Montgomery–carried out against the government is about to unfold. Read more

Maybe Congress Doesn’t Want Constituents to Know Surveillance Has Spiked Under Obama?

The ACLU sued the government to get it to release the reports on how much DOJ has used Pen Registers and Trap and Trace devices to get criminal suspects’ phone and email call records.

The records show a sharp increase in the use of PR/TT requests. Of particularly note, three times as many people have had their records turned over to DOJ under Obama.

In its post on the topic, ACLU notes that whereas, under Bush, neither Congress nor the public were getting these records, Obama’s Administration has submitted the reports in timely fashion, but Congress has not released the reports.

When no reports surfaced in 2010 and 2011, the ACLU filed a FOIA request to obtain them. After our request received no response, we filed suit to enforce it.

Although the Justice Department has in the past repeatedly failed to submit the annual reports to Congress, it appears that it has now cleaned up its act. Both the 2010 and 2011 reports were submitted to Congress in compliance with the reporting requirement. Unfortunately, Congress has done nothing at all to inform the public about the federal government’s use of these invasive surveillance powers. Rather than publishing the reports online, they appear to have filed them away in an office somewhere on Capitol Hill.

This is unacceptable. Congress introduced the pen register reporting requirement in order to impose some transparency on the government’s use of a powerful surveillance tool. For democracy to function, citizens must have access to information that they need to make informed decisions—information such as how and to what extent the government is spying on their private communications. Our representatives in Congress know this, and created the reporting requirement exactly for this reason.

It shouldn’t take a FOIA lawsuit by the ACLU to force the disclosure of these valuable reports. There is nothing stopping Congress from releasing these reports, and doing so routinely. They could easily be posted online, as the ACLU has done today.

Of course, Congress didn’t require DOJ to share this information with actual citizens; it only required DOJ share the information with Congress. Republicans have no incentive to turn over records that show Obama’s DOJ has investigated crime (in particularly the drug trafficking these records are most often used to investigate) more aggressively than Bush did. And Democrats have no incentive to show their President has trampled privacy. And given the likelihood these records are being used in creative new ways, neither party has an incentive giving people more reason to question how PR/TT are being used (I’ve long noted that their used started to rise after Bush’s illegal wiretap program got exposed, and suspect there may be a connection).

In short, Congress is complicit in hiding the extent to which increasing numbers of Americans are being surveilled by the government.

But that shouldn’t be a surprise at this point.

No Easy Day, WikiLeaks, and Mitt’s 47%: Three Different Approaches to Illicitly-Released Information

[youtube]nYXXkOLgMqQ[/youtube]

Last week, DOD issued a guidance memo instructing DOD personnel what they are–and are not–permitted to do with the Matt Bissonnettte book, No Easy Day, that they claim has sensitive and maybe even classified information. DOD personnel,

  • are free to purchase NED;
  • are not required to store NED in containers or areas approved for the storage of classified information, unless classified statements in the book have been identified;
  • shall not discuss potentially classified and sensitive unclassified information with persons who do not have an official need to know and an appropriate security clearance;
  • who possess either firsthand knowledge of, or suspect information within NED to be classified or sensitive, shall not publically speculate or discuss potentially classified or sensitive unclassified information outside official U.S. Government channels (e.g., Chain-of-Command, Public Affairs, Security, etc.);
  • are prohibited from using unclassified government computer systems to discuss potentially classified or sensitive contents ofNED, and must not engage in online discussions via social networking or media sites regarding potentially classified or sensitive unclassified information that may be contained in NED.

The memo points to George Little’s earlier flaccid claims that the book contains classified information as the basis for this policy, even though those claims fell far short of an assertion that there was actually classified information in the book.

The strategy behind this policy seems to be to accept the massive release of this information, while prohibiting people from talking about what information in the book is classified or sensitive–or even challenging Little’s half-hearted claim that it is classified. Moreover, few of the people bound by this memo know what the President insta-declassified to be able to tell his own version of the Osama bin Laden raid, so the memo also gags discussions about information that has likely been declassified, not to mention discussions about the few areas where Bissonnette’s version differs from the Administration’s official version.

Still, it does let people access the information and talk about it generally.

Compare that policy with the Administration’s three-prong approach to WikiLeaks information:

  • Government employees cannot discuss–and are not supposed to consult at all–WikiLeaks cables. The treatment of Peter Van Buren for–among other things–linking to some WikiLeaks cables demonstrates the lengths to which the government is willing to go to silence all discussion of the cables. (Though I imagine the surveillance of social media will be similar to enforce the DOD guidance.)
  • Gitmo lawyers not only cannot discuss material–like the dodgy intelligence cable that the government used to imprison Latif until he died of still undisclosed causes or the files that cite tortured confessions to incriminate other detainees–released by WikiLeaks unless the press speaks of them first. But unlike DOD personnel who do not necessarily have a need to know, Gitmo lawyers who do have a need to know couldn’t consult WikiLeaks except in closely controlled secure conditions.
  • The Government will refuse to release cables already released under FOIA. While to some degree, this strategy parallels the DOD approach–whereas the NED policy avoids identifying which is and is not classified information, the WikiLeaks policy avoids admitting that cables everyone knows are authentic are authentic, the policy also serves to improperly hide evidence of illegal activity through improper classification.

Now, one part of the Administration’s logic behind this approach to purportedly classified information (thus far without the legal proof in either case, or even a legal effort to prove in the case of Bissonnette) is to limit discussion of information that was allegedly released via illegal means. Read more

Jay Bybee Wrote Memo Permitting Broad Sharing of Intelligence-Related Grand Jury Information

In March 2011, I noted a previously unreleased OLC memo mentioned in Jack Goldsmith’s May 6, 2004 illegal wiretapping memo seemingly giving the President broad authority to learn about grand jury investigations.

For example, this Office has concluded that, despite statutory restrictions upon the use of Title III wiretap information and restrictions on the use of grand jury information under Federal Rule of Criminal Procedure 6(e), the President has an inherent constitutional authority to receive all foreign intelligence information in the hands of the government necessary for him to fulfill his constitutional responsibilities and that statutes and rules should be understood to include an implied exception so as not to interfere with that authority. See Memorandum for the Deputy Attorney General from Jay S. Bybee, Assistant Attorney General, Office of Legal Counsel, Re: Effect of the Patriot Act on Disclosure to the President and Other Federal Officials of Grand Jury and Title III Information Relating to National Security and Foreign Affairs 1 (July 22, 2002)

The Brennan Center has now liberated that memo (though they don’t yet have it linked). And it shows that in July 2002, Jay Bybee interpreted a section of the PATRIOT Act that expanded information-sharing to include sharing grand jury information, with no disclosure, with the President and his close aides.

The notion that grand jury testimony should be secret dates back to at least the seventeenth century. The rules governing disclosure of grand jury proceedings are set by the Federal Rules of Criminal Procedure; prior to the PATRIOT Act, those rules declared that grand jury information could be shared only under certain circumstances, such as when the material was necessary to assist a prosecutor. However, disclosures had to be reported to a judge, and everyone receiving the information had to be told of its confidentiality.

The PATRIOT Act changed these rules significantly. Government lawyers could now share “any grand-jury matter involving foreign intelligence, counterintelligence …, or foreign intelligence information” with nearly any federal official, including those working in law enforcement, intelligence, immigration, national defense, or national security. Even records about a grand jury’s deliberations or a particular grand juror’s vote were apparently fair game. And the standard for sharing the information was not whether the material was “necessary” to the official’s duties; instead, the information need only “assist” the official in some way.

[snip]

First, although the rule expressly requires that disclosures of grand jury information be reported to the court, Bybee advised that disclosures to the president need not be reported lest they “infringe on the presumptively confidential nature of presidential communications.” (OLC had previously decided that similar disclosures to the president would be reportable in some circumstances but not in others.)  In addition, disclosures to the president’s “close advisors” – including the president’s chief of staff, the vice president, and counsel to the president – could be kept secret as well. While only “information that is actually necessary for the President to discharge his constitutional duties” could be secretly disclosed to the president or his advisors, that requirement is highly unlikely to be tested in practice.

Permitting the content of deliberations or a grand juror’s vote to be shared secretly with the vice president is surprising enough.  The memo goes much further, however.  Once an attorney for the government has shared grand jury information with anyone – the president, one of his close advisors, or any other federal official whose duties are listed above – the person receiving the information can share it with anyone else without reporting to the court.  That later disclosure, according to the memo’s crabbed reasoning, is not a disclosure “under” the rule, and therefore is not bound by the reporting requirement.

And there’s more: the recipient of one of those subsequent distributions can use the information for any purpose.  Because these down-the-line releases are not technically disclosures “under” the rule, the “official duties” constraint does not apply.

I’ll have more to say about this once I get the memo.

But imagine how it might be used in, say, the Valerie Plame or the Thomas Drake investigations. They were, after all, investigations about the unauthorized disclosure of foreign intelligence information. They also happened to be investigations into Dick Cheney’s law-breaking, but they were ostensibly about leaks of precisely the kind of information Jay Bybee permitted be shared with the President and … the Vice President. And in the case of the Plame leak, once Cheney got a hold of the information, he could share it with Karl Rove who could do whatever the fuck he wanted with it.

Mind you, once Pat Fitzgerald got put in charge, I doubt such sharing happened on the Plame case–at least not before August 2005, when Jim Comey retired. After that, who’s to say what David Margolis, the master of institutional self-preservation, might have done with grand jury information implicating top White House officials?

And, yes, by all appearances, this memo remains operative.

Update: Here’s the memo. And here’s the operative passage:

 Although the new provision in Rule 6(e) requires that any such disclosures be reported to the district court responsible for supervising the grand jury, disclosures made to the President fall outside the scope of the reporting requirement contained in that amendment, as do related subsequent disclosures made to other officials on the President’s behalf.

We Have Always Been at War in Iran

The NYT has a weird story on new allegations made by Iran, listing a bunch of ways the west has sabotaged it.

Iran said Tuesday that it had amassed new evidence of attempts by saboteurs to attack Iranian nuclear, defense, industrial and telecommunications installations, including the use of computer virus-infected American, French and German equipment.

[snip]

The accounts of sabotage came three days after the top Iranian lawmaker for national security and foreign policy, Aladdin Boroujerdi, said Iranian security experts haddiscovered explosives planted inside equipment bought from Siemens, the German technology company. Mr. Boroujerdi was quoted in Iran’s state-run news media as saying the explosives, which were defused, had been intended to detonate after installation and derail Iran’s enrichment of uranium.

It portrays–presumably intentionally–Iran as a crazed country lashing out in all directions.

My favorite line from the story, though, is this one.

Siemens said its nuclear division had done no business with Iran since the 1979 Islamic Revolution, suggesting that the Iranians, who are prohibited from buying nuclear equipment under United Nations sanctions, bought the booby-trapped equipment from third parties.

The NYT seems to pretend that Iran doesn’t know the US has imposed sanctions on it. It’s so funny because I’ve actually seen NatSec types respond to this article asking whether this admission–effectively Iran listing what it has gotten via illicit channels–isn’t more damning to Iran than vice versa. As if Iran and the rest of the world don’t know it shops at different markets than the US.

Compare that article with this Ellen Nakashima article repeating Joe Lieberman’s claims that Iran is behind some crude cyberattacks on American banks.

In particular, assaults this week on the Web sites of JPMorgan Chase and Bank of America probably were carried out by Iran, Sen. Joseph I. Lieberman (I-Conn.), chairman of the Homeland Security and Governmental Affairs Committee, said Friday.

“I don’t believe these were just hackers who were skilled enough to cause disruption of the Web sites,” said Lieberman in an interview taped for C-SPAN’s “Newsmakers” program. “I think this was done by Iran and the Quds Force, which has its own developing cyberattack capability.” The Quds Force is a special unit of Iran’s Revolutionary Guard Corps, a branch of the military.

Lieberman said he believed the efforts were in response to “the increasingly strong economic sanctions that the United States and our European allies have put on Iranian financial institutions.”

Somehow Nakashima doesn’t distance herself enough from the absurd man making the accusations, because she goes on to make this absurd statement.

Unlike the cyberattacks attributed to the United States and Israel that disabled Iranian nuclear enrichment equipment, experts said, the Iranian attacks were intended to disrupt commercial Web sites. Online operations at Bank of America and Chase both experienced delays this week.

Read more