There are many reasons why Federal Bureau of Investigation Director James Comey is interested in the emails on Anthony Weiner’s home computer, emails which may include United States government information pertinent to Hillary Clinton or those communicating with her.
The majority of those reasons for Comey’s involvement, for good or for bad depending on your political position, have been laid out across the media spectrum.
But there may be one more reason not yet discussed. Since we seem to be spending so much time this election cycle on the Russians this year, let’s think like Russian intelligence officers. Comey may be looking at an intelligence operation.
Professional intelligence officers do not risk international incidents to play the equivalent of pranks on nation states, say by embarrassing the Democratic National Committee with leaked documents months before the election. That’s WikiLeaks level stuff. No, when you want to rig an election, you rig an election. Have a look at the way the CIA historically manipulated elections — assassinations, massive demonstrations, paid off protesters and journalists, serious stuff that directly affected leaders and votes. You don’t mess around with half-measures.
Now have a look at the Edward Snowden documents, and the incredible efforts the National Security Agency went to to gather information, and then let’s think like intelligence officers. The world of real “spies” is all about “the take,” information. Putin (or Obama, or…) doesn’t likely have on his desk a proposal to risk cyberwar to expose a CNN contributor for handing over debate questions. He wants more of hard information he can use to make decisions about his adversary. What is Obama (or Putin, et al) thinking, what are his plans, what are his negotiating points ahead of the next summit… information at a global strategic level.
That’s worth risking retaliation, maybe even a confrontation, for. So let’s think like intelligence officers. How do you get to that kind of stuff?
How the great game of intelligence gathering works is in the end very basic: who has access to the information you want, what are their vulnerabilities, and how do you exploit those vulnerabilities to get to the information. What do they want and how can you give it to them?
Hillary Clinton as Secretary of State had access to extraordinarily sensitive information, both classified and unclassified. Huma Abedin is arguably the most powerful person in Clinton’s circle, and had access to much or all of that pool of information. What Huma knows would be of great interest to Moscow.
How to get the info? Huma’s husband is a publicly outed sexual predator. Everyone in the world knows he sexts, trolls online message boards, and seemingly does little to hide his identity while doing it all. He is a target, the kind of dream package of vulnerabilities an intelligence officer waits a whole career to have fall into their lap.
Baiting the trap…