Benghazi Whistleblowers Set to Testify on Capitol Hill

Former Secretary of State Hillary Clinton testifies on Capitol Hill on the deadly September attack on the U.S. diplomatic mission in Benghazi. Former Secretary of State Hillary Clinton testifies on Capitol Hill on the deadly September attack on the U.S. diplomatic mission in Benghazi. Pablo Martinez Monsivais/AP

Mark I. Thompson, the acting deputy assistant for operations in the State Department's counterterrorism bureau, will testify on Wednesday that then-Secretary of State Hillary Clinton willfully blocked out his department's involvement on the night of the September 11 Benghazi attacks — and that he has been threatened and intimidated by unnamed State Department officials about saying as much in public, and that al-Qaeda was involved all along. The scoop comes from sources close to the congressional investigation speaking to Fox News, two days ahead of testimony by Thompson and two other whistleblower witnesses before Rep. Darrell Issa's House Oversight and Government Reform Committee. Fox's sources characterize Thompson has having "concluded on Sept. 11 that Clinton and Kennedy tried to cut the counterterrorism bureau out of the loop as they and other Obama administration officials weighed how to respond to — and characterize — the Benghazi attacks."

That charge would seem to suggest that the State Department's actions that night last summer came straight from the top and allegedly without input from Thompson's Counterterrorism Security Group at Foggy Bottom. As CBS News reports, we know that the Obama administration "did not convene its top interagency counterterrorism resource, the Counterterrorism Security Group." And since a certain segment of Issa's Washington is (still) looking back and (still) trying to figure out what went wrong when the American diplomatic mission was attacked, one of the big questions heading into Wednesday's hearing is whether or not CSG involvement would have made a difference. As The Washington Post's Jennifer Rubin insists, the two other witnesses — a regional State Department security officer in Libya and a former department deputy chair of the mission — could send the affair "into a whole different level of scandal."

But remember that this is very much an after-the-fact whistleblower affair, to the point where President Obama refuses to really acknowledge a string of Fox reports about the testimony during his press conference last week. And Thompson's claims about willful ignorance at the top levels of the State Department will not go without questioning. According to a National Security Council spokesman who spoke on the record with CBS, Thompson's group was involved: "From the moment the president was briefed on the Benghazi attack, the response effort was handled by the most senior national security officials in governments. Members of the CSG were of course involved in these meetings and discussions to support their bosses," the spokesperson, Tommy Vietor, told CBS. The network also spoke to a source in CSG who didn't exactly rebuke Vietor's claim but did say that only the top officials in the executive branch were convened about the matter — and that their top counterterrorism experts were not active decision makers. 

Read more on The Atlantic Wire

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.