defense. the role of the president i believe as commander-in-chief to keep the american people safe. he s done that first and foremost and is sending a strong message. your say now s the time to play the cards. does the president have the information he needs and what you think you should be doing. i been a longtime advocate for open source intelligence. there s so much information out there. i ve been an advocate for more cyber offensive capability and an advocate for true informational campaign to the north korean people. one thing kim jong-un fears is an educated and well informed citizenry. there s things we can do there. he s feeling pressure. he s hired ten agents to train as bodyguards. they have a terrible situation with starvation and they ve always had hunger issues.
government is for the common defense. the role of the president i believe as commander-in-chief to keep the american people safe. he s done that first and foremost and is sending a strong message. your say now s the time to play the cards. does the president have the information he needs and what you think you should be doing. i been a longtime advocate for open source intelligence. there s so much information out there. i ve been an advocate for more cyber offensive capability and an advocate for true informational campaign to the north korean people. one thing kim jong-un fears is an educated and well informed citizenry. there s things we can do there. he s feeling pressure. he s hired ten agents to train as bodyguards. they have a terrible situation with starvation and they ve
we ve known for years we see it in all the spy movies that somebody puts a thing in where you compromise the phone as opposed to the apps. that s right. the big story here is that as more people are using encryption, this is the way the cia and the fbi and nsa have to do things. they have to get on to the device directly because they can t grab this thing in transit for the most part. tara, the information, if it s valid, again, we haven t been able to authenticate it yet. what s the bigger danger here? the spies in our own agencies who think it s okay or valuable to let this information out, or the actual information that s getting to our adversaries? is there anything in here that s actually worrisome because someone can use it against us? it is worrisome. because our counterintelligence operations, our counterterrorism operations rely not just on human intelligence, not just on signals intelligence or open source intelligence, but in this day and age they rely on being abl
there because the security was unknown situation. reporter: no one knew that. if it is unknown situation at a minimum you send forces there to facilitate the exfil or medical injuries. we could have sent a c-130 to benghazi to provide medical evacuation for injured. reporter: given time lines by a number of different agencies. they don t add up, just the open source intelligence shows that. we ve been told these teams could have made it there. the response from the administration, some of the people in the military has been they flew to italy, would have taken too much time. this source and other ones said from the outset a team specifically training in croatia could have been on the plane within an hour. they say there was a team available possibly in spain that could have made it there in time as well as germany. martha, as you can see a lot of information is coming out as people are getting more confidence to step in front of cameras. we ll see what the response is if there is
not cherry picking one story here or one document there. looking it everything. bret: jay carney said in a few hours the organization ansar al-sharia claimed it had not been responsible for the attack. the problem with that, one man in custody in tunisia, is a member of ansar al-sharia. let s bring in panel. steve hayes for weekly standard. mara liasson of national public radio. syndicated columnist charles krauthammer. steve? importance of the e-mails and significance? they are significant. contrary to what secretary clin says, they are evidence. the intelligence community considers all of this when it makes evaluation as to what actually happened. this would have been what they first considered, they re called the open source intelligence. they are not classified and they didn t come through a secret operations. but they are, in fact, evidence. they may end up not being determinative.