The “Secret Research Project” – an IRS List, an NSA Database, and Resulting “Files” on Americans…


A carefully redacted footnote within a report by FISA Court Presiding Judge Rosemary Collyer has always appeared to be a clue to a domestic surveillance program.  Now details behind the redactions tell a concerning story.

A brief refresher is needed for those new to the story. In April 2017 Judge Collyer wrote a highly critical FISA Court opinion following discoveries by Director Admiral Rogers of government contractors accessing the NSA database, and extracting illegal search results from the electronic records of every American.

The scale of abuse was incredible [SEE HERE] and the surveillance issues had been covered up for years.  Collyer cited the Obama administration as having “an institutional lack of candor” in their responses to her and the FISA court.  The judge focused her criticism after a review of the period 2012 through April 2016.

Using the non-compliant admissions by NSA Director Mike Rogers and the results of the compliance audit, Judge Collyer used the period of November 2015 through April 2016 to gauge the scale of abuse at 85 percent. Eighty-five percent of all database search queries were unlawful, and she extended her analysis to say:

“while the government reports it is unable to provide a reliable estimate of [these non lawful searches] since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 period coincided with an unusually high error rate”.

Also this very important:

“many of these non-compliant queries involved the use of the same identifiers over different date ranges.”

Eight-five percent of all use/extraction of the NSA database was unlawful; and they were searching many of the same Americans (“identifier”), repeatedly, over different dates. This means specific Americans were being targeted, tracked and monitored… unlawfully.

Within the 99-page opinion from Judge Rosemary Collyer  she noted none of this FISA-702 database abuse was accidental. In a key footnote on page 87: Collyer outlined the years of unlawful violations was the result of “deliberate decisionmaking“:

This specific footnote, is key to peeling back the onion.

Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”.  This sentence exposes an internal decision; withheld from congress and the FISA court by the Obama administration; and outlines a process for access and distribution of surveillance data. Note: “no notice of this practice was given to the FISC until 2016“.

We feel confident we’ve now found the source of the “memorandum of understanding” that lies at the heart of the issue [Raw Doc Guidelines].

In March 2012 the Obama administration through Attorney General Eric Holder made changes to the exploitation of intelligence databases as noted in this Wall Street Journal article later in the year:

(December 2012 – WSJ) Top U.S. intelligence officials gathered in the White House Situation Room in March to debate a controversial proposal. Counterterrorism officials wanted to create a government dragnet, sweeping up millions of records about U.S. citizens—even people suspected of no crime.

Not everyone was on board. “This is a sea change in the way that the government interacts with the general public,” Mary Ellen Callahan, chief privacy officer of the Department of Homeland Security, argued in the meeting, according to people familiar with the discussions.

A week later, the attorney general signed the changes into effect.

The rules now allow the little-known National Counterterrorism Center to examine the government files of U.S. citizens for possible criminal behavior, even if there is no reason to suspect them. That is a departure from past practice, which barred the agency from storing information about ordinary Americans unless a person was a terror suspect or related to an investigation.

Now, NCTC can copy entire government databases—flight records, casino-employee lists, the names of Americans hosting foreign-exchange students and many others. The agency has new authority to keep data about innocent U.S. citizens for up to five years, and to analyze it for suspicious patterns of behavior. Previously, both were prohibited. Data about Americans “reasonably believed to constitute terrorism information” may be permanently retained.

The changes also allow databases of U.S. civilian information to be given to foreign governments for analysis of their own. In effect, U.S. and foreign governments would be using the information to look for clues that people might commit future crimes.  (more)

The 2012 changes, instituted by Eric Holder, permitted files of specific Americans to be generated under the auspices of potential terror threats.  The NSA databases could be exploited by the National Counterterrorism Center to extract content that would be contained within these files on targeted Americans.

Keep in mind this is early 2012, John Brennan is Deputy National Security Advisor and Asst. to President Obama for Homeland Security.

When Attorney General Eric Holder empowered the National Counterterrorism Center with this new authority, the office assigned to the data-collection was the Terrorist Threat Integration Center (TTIC).  The founder of the TTIC was John Brennan:

On 1 May 2003, the Terrorist Threat Integration Center (TTIC) opened its doors. Led by its first Director, John Brennan, TTIC filled its ranks with approximately three dozen detailees from across the US Government (USG) and was mandated to integrate CT capabilities and missions across the government. (link)

Also note the date of this DOJ Memorandum is March 2012:

Under the new rules issued in March, the National Counterterrorism Center, known as NCTC, can obtain almost any database the government collects that it says is “reasonably believed” to contain “terrorism information.”  (link)

The March 2012 date is right before the IRS scandal hit the headlines.

The IRS targeting scandal is where the term “Secret Research Project” originated as a description from the Obama team. It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller. It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

Why disks? Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS. All of the evidence within this sketchy operation came directly to the surface in spring 2012.

Here’s how it looks:

♦ In 2010 Eric Holder asked the IRS to send him the records of 501(c) non profit groups and individuals representing conservative voters. [LINK] Lois Lerner sent the DOJ 1.1 million pages of 501(c)(4) tax filing data. Including a very specific set of “33 Schedule B attachment files”. The Schedule B’s were specific to Large Conservative 501(c)(4) groups operating and organized to oppose the agenda of President Obama. The Schedule B’s include the donor lists of specific people and sub-groups attached to the 501(c)(4).

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

♦ In 2012 Eric Holder authorizes the use of government databases to search records of Americans and assemble “files” on potential targets. [Link] “The agency has new authority to keep data about innocent U.S. citizens for up to five years, and to analyze it for suspicious patterns of behavior.”

♦ In the period of 2012 through April 2016, According to FISA Judge Rosemary Collyer, there were tens of thousands of illegal (“non-compliant”) search queries of the NSA database targeting Americans.  The search results were unlawfully “extracted” to unknown entities.  Eighty-five out of every hundred searches were illegal (85% non-compliant rate).

Consider purposeful actions, as a political targeting operation, by weaponizing the systems of government.  Steps:

  • First, identify the targets (IRS Database).
  • Second, research the targets (NSA Database).
  • Third assemble files on the targets (DOJ Authorization).
  • Fourth use the files to leverage/destroy your opposition.

We now have evidence of the first three steps; and my hunch is if we apply hindsight a lot of unusual activity will now make sense.  We have been living inside the fourth step for a few years.  We noticed the consequences… but we only had suspicions, until now.

Fusion GPS was not hired to research Trump, the intelligence community was already doing surveillance and spy operations. The intelligence community needed Fusion GPS to give them a plausible justification for already existing surveillance and spy operations.

Fusion-GPS gave the Obama administration the justification they needed for a FISA warrant with the Steele Dossier. Ultimately that’s why the Steele Dossier is so important; without it, the DOJ and FBI are naked with their surveillance and database abuse.

At 12:15pm on January 20th, 2017, Obama’s outgoing National Security Advisor Susan Rice wrote a memo-to-self.  Many people have called this her “CYA” memo, from the position that Susan Rice was protecting herself from consequences if the scheme against President Trump was discovered.  Here’s the email:

On January 5, following a briefing by IC leadership on Russian hacking during the 2016 Presidential election, President Obama had a brief follow-on conversation with FBI Director Jim Comey and Deputy Attorney General Sally Yates in the Oval Office. Vice President Biden and I were also present.

President Obama began the conversation by stressing his continued commitment to ensuring that every aspect of this issue is handled by the Intelligence and law enforcement communities “by the book“.

The President stressed that he is not asking about, initiating or instructing anything from a law enforcement perspective. He reiterated that our law enforcement team needs to proceed as it normally would by the book.

From a national security perspective, however, President Obama said he wants to be sure that, as we engage with the incoming team, we are mindful to ascertain if there is any reason that we cannot share information fully as it relates to Russia.

[Redacted Classified Section of Unknown length]

The President asked Comey to inform him if anything changes in the next few weeks that should affect how we share classified information with the incoming team. Comey said he would.

Susan Rice ~ (pdf link)

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.