How Petraeus Turned the CIA into the Good Guys in Benghazi

Reed Saxon/AP

How did the CIA become the hero in the Benghazi talking point controversy? The Republican theory of the case is that the CIA provided mostly correct talking points (with one big flaw — it blamed spontaneous protests), which the State Department and the White House then edited into misleading mush to protect President Obama and Secretary of State Hillary Clinton. But, of course, the CIA is part of the Obama administration, too, and run by Obama appointees — why hasn't it enjoyed as much scrutiny as everyone else involved?

One reason is the political skills of David Petraeus, then-director of the CIA. The Benghazi talking points came into existence because Rep. Dutch Ruppersberger asked for guidelines for the newer members of the House intelligence committee, so they wouldn't accidentally reveal classified information in interviews with the press, The Washington Post's Scott Wilson and Karen DeYoung report. "A close reading of recently released government e-mails that were sent during the editing process, and interviews with senior officials from several government agencies, reveal Petraeus's early role and ambitions in going well beyond the committee's request, apparently to produce a set of talking points favorable to his image and his agency." As has been widely noted, Petraeus was unenthusiastic about the final talking points, writing:

"No mention of the cable to Cairo, either? Frankly, I’d just as soon not use this, then... [National Security Council] call, to be sure; however, this is certainly not what Vice Chairman Ruppersberger was hoping to get for unclas use."

But Ruppersberger tells the Post, "I'm not sure what he meant. I had no expectations."

Read more on The Atlantic Wire

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.