Hollywood Didn’t Get Undue Access for Bin Laden Film, Auditors Say

Don Ryan/AP File Photo

Allegations that the White House sought special access to the Defense Department for screenwriters planning a film on the May 2011 raid that killed Osama bin Ladin were found unsubstantiated in a Pentagon inspector general’s report released on Friday.

Rep. Peter King, R-N.Y., chairman of the House Homeland Security Committee, in August 2011 had asked for a probe of whether Hollywood producers and writers had been given “top-level access to the most classified mission in history.” The subsequent investigation was broadened to address a complaint that Leon Panetta, when he was CIA director, had violated procedure by speaking the name of the Navy SEAL commander of the bin Ladin raid during a June 2011 awards ceremony at CIA headquarters.

In response to the King’s initial queries, the report concluded, “Our review did not identify consultations between DoD personnel and representatives of the Executive Office of the President.” The White House, it continued, did communicate with Deputy Defense Secretary for Intelligence Michael Vickers on the film project, and a special operations planner was designated to meet with the filmmakers, but no such meeting occurred.

“Within the DoD, we did not identify instances whereby any special operations tactics, techniques, and procedures-related information was provided to filmmakers,” the report added.

A draft version of the report, leaked earlier this month to the nonprofit Project on Government Oversight, contained discussion of Panetta’s actions, but those sections were not included in the final version. The IG’s office, which reported on the leak to King, said the matter had been referred to the CIA’s inspector general.

“The decision to interview individuals for a particular investigation is based on a wide range of factors, including the accessibility and availability of the information from an array of sources,” said Defense IG spokeswoman Bridget Serchak in a statement. “In this instance, the final report was responsive to the congressional queries without an interview with Secretary Panetta. As with any IG work product, the working draft was edited and revised during a rigorous internal review process.”

She added that related investigations continue and that “certain information was excluded from the final report so as to avoid compromising concurrent inquiries.”

POGO had suggested that the IG might be delaying the report to shield Panetta from criticism. That was denied in a letter to King by Principal Deputy Inspector General Lynne Halbrooks. “No third parties, to include anyone from the Office of the Secretary of Defense or the Executive Office of the President, attempted to influence the content of the report or its release date,” she said.

POGO resident journalist Adam Zagorin, in a Friday blogpost, said, “It remains unclear why the Defense Department IG spent time investigating Panetta’s disclosure of classified Pentagon information only to refer the matter to its counterpart at the CIA.”

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.