What If There Were No Prices? The Railroad Thought Experiment


Published on Nov 5, 2015

What if there were no prices? How would you use available resources? To appreciate why market prices are essential to human well-being, consider what a fix we would be in without them. Suppose you were the commissar of railroads in the old Soviet Union. Markets and prices have been banished. You and your comrades. Passionate communists all. Now, directly plan how to use available resources. You want a railroad from city A to city B, but between the cities is a mountain range. Suppose somehow you know that the railroad once built. Will serve the nation equally well. Whether it goes through the mountains or around. If you build through the mountains, you’ll use much less steel for the tracks. Because that route is shorter. But you’ll use a great deal of engineering to design the trestles and tunnels needed to cross the rough terrain. That matters because engineering is also needed to design irrigation systems, mines, harbor installations and other structures. And you don’t want to tie up engineering on your railroad if it would be more valuable designing those other structures instead. You can save engineering for other projects. If you build around the mountains on level ground. But that way you’ll use much more steel rail to go the longer distance and steel is also needed for other purposes. For vehicles, girders, ships, pots and pans and thousands of other things. Which route should you choose for the good of the nation? To answer, you would need to determine which bundle of resources is less urgently needed for other purposes. The large amount of engineering and small amount of steel for the route through the mountains, where the small amount of engineering and large amount of steel for the roundabout route. But how could you find out the urgency of need for engineering and steel in other uses? Find out more as Professor Howard Baetjer Jr. from Towson University explains market prices through the railroad thought experiment.

Jordan Peterson: 5 Hours for the NEXT 50 Years of Your LIFE (MUST WATCH)


Published on May 24, 2018

Jordan Peterson’s Life Advice Will Change Your Future. Be sure to use the Video Guide listed in the description to watch this motivational speech! Subscribe for Motivational Videos Every Weekday, Helping You Get Through The Week! http://bit.ly/MotivationVideos Special Thanks To Jordan Peterson for allowing us to share! YouTube: https://www.youtube.com/user/JordanPe… Twitter: https://twitter.com/jordanbpeterson Support his Patreon: Patreon: https://www.patreon.com/jordanbpeterson Video Guide: 00:08 Sacrifice Current Impulses For Future Gratification 05:37 Don’t Strive For Happiness 09:56 King Of The Losers 12:06 Start Your Day By Cleaning Up Your Room 17:44 Your Story Means Something 29:33 Meaningful Experiences Matter 36:30 What To Aim For In Life? 59:12 The Danger in College 1:15:09 Dealing With Chaos 1:22:36 How To Interpret Dreams 1:30:13 Your Untapped Potential 1:39:41 The Buddha 1:52:12 Responsibility 2:03:37 Creative People 2:15:00 How To Listen To People 2:24:57 Relationship Advice 2:32:37 Potential Mate Traits 2:42:42 The Hero Myth 3:18:27 How To Motivate Yourself 3:26:14 Food Of The Gods 3:31:52 Religious Experience 3:38:10 Psilocybin 3:42:40 Mystical Experiences Through Psychedelics 4:09:39 Psilocybin and DMT 4:17:27 Nietzsche’s Beyond Good And Evil Special Thanks To Jordan Peterson for allowing us to share! YouTube: https://www.youtube.com/user/JordanPe… Twitter: https://twitter.com/jordanbpeterson Patreon: https://www.patreon.com/jordanbpeterson Follow us on: Instagram: http://bit.ly/2rhGNMY Facebook: http://bit.ly/2r85DC3 Twitter: http://bit.ly/2qir5TO —————————————-­­————————- Help us caption & translate this video! http://bit.ly/Translate4Motivation

Modified Declassification Expectations Amid Clarity of Purpose from Ratcliffe…


When previously questioned by Catherine Herridge about timing for declassification of documents President Trump noted “when they need them“.  Within the response, who “they” were was never clarified; but the later directive to empower executive branch cabinet member AG Bill Barr provided a more clear reference.

In the legislative branch representatives Mark Meadows, Doug Collins and John Ratcliffe are the primary House members who were clearly helping to organize timing and distribution.  Additionally, AG Barr has appointed a prosecutor in John H Durham to review the overall DOJ, FBI and intelligence community activity.  Obviously Durham along with Inspector General Horowitz would benefit from declassification of documents in both of their reviews.

Earlier today John Ratcliffe outlined his view of U.S. Attorney John Durham as a benefactor of the declassification insofar as he would gain information for his review.  Interestingly Ratcliffe noted Durham was essentially a ‘special counsel’ and could use access to documents as a tool toward a grand jury review [ergo DOJ declassification would be needed].

Along with noting the likelihood of Durham’s intent, Ratcliffe seemed to temper expectations of any upcoming publicly visible declassification.

The possibility of Durham exploiting/using documents declassified by his boss, AG Bill Barr, would suggest some of the material may not be made public; indeed that’s the inference from Ratcliffe earlier today as he outlined to Maria Bartiromo.

If accurate, it is worthwhile considering what *could be* publicly declassified by AG Barr, and yet not run afoul of any investigative value for Durham.   Example: the declassification of the Rosenstein scope memos to Robert Mueller (no longer a reason to be hidden) would not seem to materially affect the investigative intents of Durham.

So considering investigative value, what documents could be purposefully made publicthat would not impede Durham?

Here’s the list of material possible for declassification. This was the original list as outlined in 2018:

  • All versions of the Carter Page FISA applications (DOJ) (FBI) (ODNI).
  • All of the Bruce Ohr 302’s filled out by the FBI. (FBI) (ODNI)
  • All of Bruce Ohr’s emails (FBI) (DOJ) (CIA) (ODNI). All supportive documents and material provided by Bruce Ohr to the FBI. (FBI)
  • All relevant documents pertaining to the supportive material within the FISA application. (FBI) (DOJ-NSD ) (DoS) (CIA) (DNI) (NSA) (ODNI);
  • All intelligence documents that were presented to the Gang of Eight in 2016 that pertain to the FISA application used against U.S. person Carter Page; including all intelligence documents that may not have been presented to the FISA Court. (CIA) (FBI) (DOJ) (ODNI) (DoS) (NSA)  Presumably this would include the recently revealed State Dept Kavalac email; and the FBI transcripts from wiretaps of George Papadopoulos (also listed in Carter Page FISA). [AKA ‘Bucket Five’]
  • All unredacted text messages and email content between Lisa Page and Peter Strzok on all devices. (FBI) (DOJ) (DOJ-NSD) (ODNI)
  • The originating CIA “EC” or two-page electronic communication from former CIA Director John Brennan to FBI Director James Comey that started Operation Crossfire Hurricane in July 2016. (CIA) (FBI) (ODNI)

Additionally, since the 2018 list was developed, more information has surfaced about underlying material.  This added to the possibility of documents for declassification:

♦ President Trump can prove the July 31st, 2016, Crossfire Hurricane counterintelligence operation originated from a scheme within the intelligence apparatus by exposing the preceding CIA operation that created the originating “Electronic Communication” memo. Declassify that two-page “EC” document that Brennan gave to Comey.  [The trail is found within the Weissmann report and the use of Alexander Downer – SEE HERE]

♦ Release and declassify all of the Comey memos that document the investigative steps taken by the FBI as an outcome of the operation coordinated by CIA Director John Brennan in early 2016.  [The trail was memorialized by James Comey – SEE HERE]

♦ Reveal the November 2015 through April 2016 FISA-702 search query abuse by declassifying the April 2017 court opinion written by FISC Presiding Judge Rosemary Collyer. Show the FBI contractors behind the 85% fraudulent search queries. [Crowdstrike? Fusion-GPS? Nellie Ohr? Daniel Richman?]  This was a weaponized surveillance and domestic political spying operation. [The trail was laid down in specific detail by Judge Collyer – SEE HERE]

♦ Subpoena former DOJ-NSD (National Security Division) head John Carlin, or haul him in front of a grand jury, and get his testimony about why he hid the abuse from the FISA court in October 2016; why the DOJ-NSD rushed the Carter Page application to beat NSA Director Admiral Mike Rogers to the FISA court; and why Carlin quit immediately thereafter.

♦ Prove the Carter Page FISA application (October 2016) was fraudulent and based on deceptions to the FISA Court. Declassify the entire document, and release the transcripts of those who signed the application(s); and/or depose those who have not yet testified. The creation of the Steele Dossier was the cover-up operation. [SEE HERE]

♦ Release all of the Lisa Page and Peter Strzok text messages without redactions. Let sunlight pour in on the actual conversation(s) that were taking place when Crossfire Hurricane (July ’16) and the FISA Application (Oct ’16) were taking place.  The current redactions were made by the people who weaponized the intelligence system for political surveillance and spy operation.  This is why Page and Strzok texts are redacted!

♦ Release all of Bruce Ohr 302’s, FBI notes from interviews and debriefing sessions, and other relevant documents associated with the interviews of Bruce Ohr and his internal communications. Including exculpatory evidence that Bruce Ohr may have shared with FBI Agent Joseph Pientka. [And get a deposition from this Pientka fella] Bruce Ohr is the courier, carrying information from those outside to those on the inside.

♦ Release the August 2nd, 2017, two-page scope memo provided by DAG Rod Rosenstein to special counsel Robert Mueller to advance the fraudulent Trump investigation, and initiate the more purposeful obstruction of justice investigation. Also Release the October 20th, 2017, second scope memo recently discovered.  The Scope Memos are keys to unlocking the underlying spy/surveillance cover-up. [SEE HERE and SEE HERE]

It would appear the scope memos, Kavalec memo, original FISA application and transcript of Papadopoulos conversation with Halper etc. could be released without impeding a grand jury review (hinted by Ratcliffe today).

While CTH would argue that full public declassification of everything would be a better approach; thereby allowing Durham to use any/all evidence therein; I also accept that protecting the “FISA enabled” institutions is not considered in our preferred approach.

Protecting the *legal and national security value* of an appropriately applied “FISA process” seems to be key institutional objective for the principals (Barr, Coats, etc.). As such, there is an institutional tendency to defend process. It’s a tightrope.

If the Barr perspective includes the need to retain legitimate national security value within the processes previously abused, Barr may mitigate what is released.  Again, a tight-rope where ‘We The People’ are expected to trust yet another official.

CTH accepts the possibility of honorable intent within Bill Barr, cautiously.  The ‘trust’ bank account is overdrawn.  Perhaps that’s why very cautious optimism, with frustratingly tempered short-term expectations, is the prudent analytical perspective.

Then again, ‘We The People’ have no more tongue to bite…. A constitutional republic can only accept so much demonstrable corruption before all hell breaks loose.

I hope AG Barr understands this.

BARR: And look, I think if we — we are worried about foreign influence in the campaign? We should be because the heart of our system is the peaceful transfer of power through elections and what gives the government legitimacy is that process. And if foreign elements can come in and affect it, that’s bad for the republic. But by the same token, it’s just as, it’s just as dangerous to the continuation of self-government and our republican system, republic that we not allow government power, law enforcement or intelligence power, to play a role in politics, to intrude into politics, and affect elections.

JAN CRAWFORD: So it’s just as dangerous- So when we talk about foreign interference versus say a government abuse of power, which is more troubling?

WILLIAM BARR: Well they’re both, they’re both troubling.

JAN CRAWFORD: Equally?

WILLIAM BARR: In my mind, they are, sure. I mean, republics have fallen because of Praetorian Guard mentality where government officials get very arrogant, they identify the national interest with their own political preferences and they feel that anyone who has a different opinion, you know, is somehow an enemy of the state. And you know, there is that tendency that they know better and that, you know, they’re there to protect as guardians of the people. That can easily translate into essentially supervening the will of the majority and getting your own way as a government official.

JAN CRAWFORD: And you are concerned that that may have happened in 2016?

WILLIAM BARR: Well, I just think it has to be carefully look atbecause the use of foreign intelligence capabilities and counterintelligence capabilities against an American political campaign to me is unprecedented and it’s a serious red line that’s been crossed.

JAN CRAWFORD: Did that happen?

WILLIAM BARR: There were counterintelligence activities undertaken against the Trump Campaign. And I’m not saying there was not a basis for it, that it was legitimate, but I want to see what that basis was and make sure it was legitimate.

JAN CRAWFORD: So–

WILLIAM BARR: That’s one of the, you know, one of the key responsibilities of the Attorney General, core responsibilities of the Attorney General is to make sure that government power is not abused and that the right of Americans are not transgressed by abusive government power. That’s the responsibility of the Attorney General.  (Transcript source)

Venezuela Collapse Explained


Published on Feb 26, 2019

Venezuela – The Fall of an Oil Empire explained by Patrick Bet-David. Subscribe now. For a FREE PDF of these points, text: 747-260-8461 or visit: https://www.patrickbetdavid.com/venez… Recommended – order the book: All The Shah’s Men https://amzn.to/2T14A5l Recommended Video: DNA of an Entrepreneur https://www.youtube.com/watch?v=o3pSO… About Venezuela: Venezuela is a country on the northern coast of South America with diverse natural attractions. Along its Caribbean coast are tropical resort islands including Isla de Margarita and the Los Roques archipelago. To the northwest are the Andes Mountains and the colonial town of Mérida, a base for visiting Sierra Nevada National Park. Caracas, the capital, is to the north.

The Only Number That Matters


Published on Mar 7, 2016

For more information, go to http://worldcyclesinstitute.com/the-o… Ever heard of the numbers of nature? You really need to know about them because they’re in everything … plants, animals, the human body, artwork, our DNA, the stock market, the planets … you name it, nature’s numbers are there somewhere. The guy that discovered them 900 years ago is the man from Pisa. No, not your Pizza delivery guy … Pisa is a city in central Italy famous for the leaning tower and this man … Leonardo Fibonacci … nice Italian sounding name. These numbers of nature were so revolutionary, that they bear his name even today. It starts with a simple sequence of numbers … here’s how they work: You start with 0 and then 1 and then you simply add the last two number together to get the next … so 1, 2, 3, 5, 8, 11 and so on. Now when you divide any number by the one following it, you get what we refer to as the Golden Mean … .618. It’s also called phi. This is the number that’s in everything … It’s all through nature … it’s all through the stock markets … it’s in our DNA … it’s in music … and it been in architecture since before it was discovered. For example, the Parthenon… one of Greece’s most prized assets … if it’s not now owned by Germany …. It was built in the 4th century BC … many centuries before Fibonacci. And yet it seems to be proportioned closely to the golden mean. The lower portion is about 62% of the total height. The reciprocal is .382 and together, these two numbers occur over and over in artwork because we humans find the ratio pleasing. Something as simple as playing cards, for example. You can then take that “golden rectangle” to humans. It frames the face and positions the eyes, nose, and mouth. The belly button seems to generally divide the body into the golden section. You have 5 fingers, each one with 3 bones perfectly proportioned to the golden mean. You’ll find the golden mean in our DNA. You can see the numbers of nature at work in sunflower leaves. They arrange themselves in Fibonacci layers. There’s the Fibonacci spiral, evident in hurricanes … and sea shells. It goes on and on. In the stock market, when stocks are trending, the waves they form are in ratios of phi. You find it over and over again and many traders use it to trade quite profitably. So, the markets are not random, as so many think. They’re quite predictable. And where could these ratios in nature that we find everywhere on Earth originate Well, let’s look to the heavens. The planets are more or less separated in distance by the golden ratio. They actually follow more of a sine wave. But if you were to take the distances and average them, you’d find they come out to 1.618 … phi! We know that we’re affected by electromagnetic waves from the planets … we just don’t know exactly how we’re affected. But that’s a thought from another video. Is God a mathematician? Well, there’s certainly order to the universe and as we delve deeper and deeper into science, we’ll no doubt find more of the answers.

 

Beijing Begins Predictable Totalitarian Response…


All your interests are belong to us…. There was previous discussion of how Beijing would respond if/when their economic interests were challenged. In essence, the prediction was that China would drop the panda mask and revert back to their oppressive totalitarian tendencies.

It is an interesting dynamic because the more the communist state moves to punish and control western business interests, the less likely any western investment flows into China. It’s a simple question: Why would anyone want to engage a business relationship inside a totalitarian system that could move at any moment to control your business?

(South China Post) China will publish a list of “unreliable” foreign entities deemed to have damaged the interests of Chinese firms – a move set to ratchet up tensions in its escalating conflict with Washington, after the US government blacklisted Chinese telecoms giant Huawei.

The Ministry of Commerce said on Friday that it would blacklist foreign businesses or individuals that violated market rules and contractual obligations, or took “discriminatory measures” to hurt Chinese business rights and interests, as well as national security and interests.

Specific measures for those on the list would be revealed “in the near future”, said ministry spokesman Gao Feng.

Gao said the “unreliable” blacklist would be based on China’s foreign trade, anti-monopoly and national security laws, and it would target entities that had blocked Chinese businesses out of non-commercial concerns. (read more)

The Red Dragon is going to do what the Red Dragon does.  Thus begins the phase when corporate interests, particularly multinationals, recognize at its core China is a communist state-run, controlled-market, system.

The reaction from China is immensely predictable; and creates a downward spiral.  If any corporation is perceived as working against the interests of the state; the state will take control of the corporate interest.   What western business interest would want to do business within China when that reality is the landscape of every economic decision?

The willingness of China to self-immolate is the golden arrow in President Trump’s economic quiver.  The inability of China to modify itself based on downstream economic outcomes is the inherent weakness… Overlay that weakness with the zero-sum outlook and you get this quote from Chinese State-Run broadcast:

…“If the US wants to negotiate, our door is open. If you want to fight, we will fight to the end.”…

Think about the logical reality of this statement as expressed.  Put another way: ‘if you agree to our terms we will work with you; however, if you don’t agree to our terms, we will self destruct.’  That’s the economic reality of the zero-sum dragon mindset.  This inevitable position is what CTH has been outlining for several years.

China has no cultural or political space between peace and war; they are a historic nation based on two points of polarity.  They see peace and war as coexisting with each other.

Chinese engagement stems from a belief that opposite or contrary forces may actually be complementary, interconnected, and interdependent in the natural world, and they may give rise to each other as they interrelate to one another.  However, it must benefit China. 

Peace or war. Win or lose. Yin and Yang. Culturally there is no middle position in dealings with China; they are not constitutionally capable of understanding or valuing the western philosophy of mutual benefit where concession of terms gains a larger outcome.  If it does not benefit China, it is not done. The outlook is simply, a polarity of peace or war.  In politics or economics the same perspective is true.  It is a zero-sum outlook.

As soon as an internal business interest, or an affiliated business relationship, is considered to be a compromise or loss to Beijing, the enterprise is destroyed.

Who decides? The communist regime.

Thus President Trump only has to position U.S. policy to benefit non-engagement with China (see Huawei); and China will respond by destroying any affiliated business they view as participating in, or supporting, the adverse policy. Beijing cannot help itself. The dragon will act as a dragon will act.

President Trump has positioned this geopolitical trade reset perfectly.  Trump is applying Chairman Xi’s own “us -vs them approach” toward confronting China. The supply chain investment Beijing needs to sustain itself is now being controlled by elements outside China.  Beijing responds by attacking those in the international community who control the investment.

This will not end well for China.

Watch as time goes along and more companies, and nations, slowly walk toward the exits with China.  There is just too much inherent financial risk.

President Trump Question: “Are the Drug Lords, Cartels & Coyotes really running Mexico?”…


Oh, he’s done it again… President Trump spotlights the truth that everyone prefers to  avoid discussing: “Are the Drug Lords, Cartels & Coyotes really running Mexico?”

Everyone knows the truthful answer to that question is a resounding YES, Mexico is a narco-state controlled by drug cartels and political system of bribes and payoffs therein.

The most recent evidence was in testimony within the El Chapo Guzman trial, where witnesses testified to paying-off government officials, including the former President of Mexico:

Reuters – Accused Mexican drug lord Joaquin “El Chapo” Guzman once paid a $100 million bribe to former Mexican President Enrique Pena Nieto, a former associate testified on Tuesday that he previously told U.S. authorities. (link)

So again, the premier Gordian-knot cutter known as President Donald Trump, dispatches with obtuse dialogue concerned about delicate sensibilities, and he gets right to the truthful nub of the matter.  What makes Trump’s direct-speak so powerful is the brutal honesty of it.

Never in our lives have we witnessed a President so forcefully broadcasting the truth without regard for recipient discomfort.

Remember 2015? ….”Well, someone’s doing the raping Don“…

.

Don Lemon had a ‘splodey head moment right there in 2015; because Trump was right.

Today it’s 2019, and President Trump hits the exact same sensibility.

Big truth.

When you look at how Trump seems impenetrable it’s completely connected to his truth-speak on uncomfortable issues.  President Trump cannot be brought down because the essence of what he says, his foundational disposition, is built on truth.

The President doesn’t let critical issues continue to remain unsolved because they are clouded in lies and false impressions. Regardless of discomfort he says what is true, and that cuts the Gordian knot.

“Are the Drug Lords, Cartels & Coyotes really running Mexico?”

Your move AMLO.

Incredible.

Never seen anything like it…

Sidney Powell Discusses DOJ in The Lawfare Era: “Guilty Until Proven Innocent”…


Not enough people understand the role of the Lawfare group in the corruption and political weaponization of the DOJ, FBI and larger intelligence community.

What Media Matters is to corrupt left-wing media, the Lawfare group is to the corrupt DOJ and FBI.

All of the headline names around the seditious conspiracy against Donald Trump assemble within the network of the Lawfare group.

Three days after the October 21st, 2016, FISA warrant was obtained, Benjamin Wittes outlined the insurance policy approach.

FBI Director James Comey, FBI Legal Counsel James Baker, Comey memo recepient Daniel Richman, Deputy AG Sally Yates, Comey friend Benjamin Wittes, FBI lead agent Peter Strzok, FBI counsel Lisa Page, Mueller lead Andrew Weissmann and the Mueller team of lawyers, all of them -and more- are connected to the Lawfare group; and this network provides the sounding board for all of the weaponized approaches, including the various new legal theories as outlined within the Weissmann-Mueller Report.

The Lawfare continuum is very simple.  The corrupt 2015 Clinton exoneration; which became the corrupt 2016 DOJ/FBI Trump investigation; which became the corrupt 2017 DOJ/FBI Mueller probe; is currently the 2019 “impeachment” plan.  Weissmann and Mueller delivering their report evolved the plan from corrupt legal theory into corrupt political targeting.  Every phase within the continuum holds the same goal.

The current “impeachment strategy” is planned-out within the Lawfare group.

After the 2018 mid-terms, and in preparation for the “impeachment” strategy, House Intelligence Committee Chairman Adam Schiff and House Judiciary Committee Chairman Jerry Nadler hired Lawfare Group members to become committee staff. Chairman Schiff hired former SDNY U.S. Attorney Daniel Goldman (link), and Chairman Nadler hired  Obama Administration lawyer Norm Eisen and criminal defense attorney Barry Berke (link), all are within the Lawfare network.

Remember, Special Prosecutor Robert Mueller didn’t come into this process as an ‘outsider’, and Mueller didn’t select his team. The corrupt Lawfare team inside government (FBI Counsel James Baker, DOJ Deputy Andrew Weissmann, FBI Deputy McCabe etc.) already knew Mueller.  The team had established personal and professional connections to Mueller, and they brought him in to lead the team.

When you realize that Robert Mueller didn’t select the team; rather the preexisting team selected their figurehead, Robert Mueller; then results make sense.  Robert Mueller can never be allowed to testify to congress because if questioned he actually has very little understanding of what took place.

A disconcerting aspect to the Lawfare dynamic is how current U.S. Attorney General William Barr has knowledge of this.  Barr knows and understands how the Lawfare network operates. Barr is from this professional neighborhood. Like Mueller, Barr also knows these people.

“As a matter of law. In other words, we didn’t agree with the legal analysis- a lot of the legal analysis in the report. It did not reflect the views of the department. It was the views of a particular lawyer or lawyers“…

AG BILL BARR

Under Eric Holder, Sally Yates, Loretta Lynch, Tom Perez, Robert Mueller, James Comey and Andrew McCabe, the focus of the DOJ and FBI became prismatic toward politics and tribalism.  All of the hired senior lawyers and officials had to be aligned with the political intents of the offices.

[CIA Director John Brennan brought the same political goals to an intelligence apparatus that held a preexisting disposition of alignment, see Mike Morell: “I ran the CIA now I’m endorsing Hillary Clinton”.]

Their agencies were used against their ideological enemies in large operations like Fast-n-Furious, IRS targeting, Gibson Guitar etc.  And also smaller operations: Henry Louis Gates, George Zimmerman, Darren Wilson, Ferguson, Baltimore etc.  All of these activist Lawfare examples were pushed and promoted by an allied media.

Many of the ‘weaponized’ approaches use radical legal theory (ex. disparate impact), and that ties into the purposes and methods of the Lawfare Group.  The intent of Lawfare is described in the name: to use Law as a tool in Warfare.  The ideology that binds the group is the ideological outlook and purpose: using the legal system to target political opposition.

The Lawfare group ensures you have the right to remain guilty until they verify your politics and determine your alignment with the tribe.  If accepted, your disposition shifts to innocent and you receive a pass to avoid any legal jeopardy…

When special counsel Robert Mueller formally closed the Russia investigation on May 29th, he opened the door to wide-ranging speculation as to the intent behind his statement. In the eyes of Former Texas Prosecutor Sidney Powell, Mueller’s words stood the rule of law and the presumption of innocence on their heads.

 Julian Assange Indicted on 18 More Counts


Julian Assange of WikiLeaks was charged with conspiring to obtain national security secrets in what prosecutors have described as one of the largest compromises of classified information in U.S. history. They filed 18 new charges against Assange, which include allegations that he aided and abetted former Army intelligence analyst Chelsea Manning’s efforts to leak classified documents to the anti-secrecy group. Prosecutors alleged that Assange did so with reason to believe that the information would be used to injure the United States or help a foreign country.

The charges include one count of conspiracy to receive national security information, seven counts of obtaining it, nine counts of disclosing it and one count of conspiracy to commit computer intrusion. They also have argued that Assange also revealed the names of intelligence sources in Afghanistan, China, Iran, Iraq, and Syria. Naturally, they would love to imprison him for life, but will probably give him a number like 50 to 80 years so he remains there until he dies.

Assange was not charged for simply receiving classified documents like a journalist. They claim that no responsible journalist would release the classified names of intelligence sources. Therefore, they are seeking to distinguish him to avoid any claim of a journalist and First Amendment rights.

The “Secret Research Project” – an IRS List, an NSA Database, and Resulting “Files” on Americans…


A carefully redacted footnote within a report by FISA Court Presiding Judge Rosemary Collyer has always appeared to be a clue to a domestic surveillance program.  Now details behind the redactions tell a concerning story.

A brief refresher is needed for those new to the story. In April 2017 Judge Collyer wrote a highly critical FISA Court opinion following discoveries by Director Admiral Rogers of government contractors accessing the NSA database, and extracting illegal search results from the electronic records of every American.

The scale of abuse was incredible [SEE HERE] and the surveillance issues had been covered up for years.  Collyer cited the Obama administration as having “an institutional lack of candor” in their responses to her and the FISA court.  The judge focused her criticism after a review of the period 2012 through April 2016.

Using the non-compliant admissions by NSA Director Mike Rogers and the results of the compliance audit, Judge Collyer used the period of November 2015 through April 2016 to gauge the scale of abuse at 85 percent. Eighty-five percent of all database search queries were unlawful, and she extended her analysis to say:

“while the government reports it is unable to provide a reliable estimate of [these non lawful searches] since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 period coincided with an unusually high error rate”.

Also this very important:

“many of these non-compliant queries involved the use of the same identifiers over different date ranges.”

Eight-five percent of all use/extraction of the NSA database was unlawful; and they were searching many of the same Americans (“identifier”), repeatedly, over different dates. This means specific Americans were being targeted, tracked and monitored… unlawfully.

Within the 99-page opinion from Judge Rosemary Collyer  she noted none of this FISA-702 database abuse was accidental. In a key footnote on page 87: Collyer outlined the years of unlawful violations was the result of “deliberate decisionmaking“:

This specific footnote, is key to peeling back the onion.

Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”.  This sentence exposes an internal decision; withheld from congress and the FISA court by the Obama administration; and outlines a process for access and distribution of surveillance data. Note: “no notice of this practice was given to the FISC until 2016“.

We feel confident we’ve now found the source of the “memorandum of understanding” that lies at the heart of the issue [Raw Doc Guidelines].

In March 2012 the Obama administration through Attorney General Eric Holder made changes to the exploitation of intelligence databases as noted in this Wall Street Journal article later in the year:

(December 2012 – WSJ) Top U.S. intelligence officials gathered in the White House Situation Room in March to debate a controversial proposal. Counterterrorism officials wanted to create a government dragnet, sweeping up millions of records about U.S. citizens—even people suspected of no crime.

Not everyone was on board. “This is a sea change in the way that the government interacts with the general public,” Mary Ellen Callahan, chief privacy officer of the Department of Homeland Security, argued in the meeting, according to people familiar with the discussions.

A week later, the attorney general signed the changes into effect.

The rules now allow the little-known National Counterterrorism Center to examine the government files of U.S. citizens for possible criminal behavior, even if there is no reason to suspect them. That is a departure from past practice, which barred the agency from storing information about ordinary Americans unless a person was a terror suspect or related to an investigation.

Now, NCTC can copy entire government databases—flight records, casino-employee lists, the names of Americans hosting foreign-exchange students and many others. The agency has new authority to keep data about innocent U.S. citizens for up to five years, and to analyze it for suspicious patterns of behavior. Previously, both were prohibited. Data about Americans “reasonably believed to constitute terrorism information” may be permanently retained.

The changes also allow databases of U.S. civilian information to be given to foreign governments for analysis of their own. In effect, U.S. and foreign governments would be using the information to look for clues that people might commit future crimes.  (more)

The 2012 changes, instituted by Eric Holder, permitted files of specific Americans to be generated under the auspices of potential terror threats.  The NSA databases could be exploited by the National Counterterrorism Center to extract content that would be contained within these files on targeted Americans.

Keep in mind this is early 2012, John Brennan is Deputy National Security Advisor and Asst. to President Obama for Homeland Security.

When Attorney General Eric Holder empowered the National Counterterrorism Center with this new authority, the office assigned to the data-collection was the Terrorist Threat Integration Center (TTIC).  The founder of the TTIC was John Brennan:

On 1 May 2003, the Terrorist Threat Integration Center (TTIC) opened its doors. Led by its first Director, John Brennan, TTIC filled its ranks with approximately three dozen detailees from across the US Government (USG) and was mandated to integrate CT capabilities and missions across the government. (link)

Also note the date of this DOJ Memorandum is March 2012:

Under the new rules issued in March, the National Counterterrorism Center, known as NCTC, can obtain almost any database the government collects that it says is “reasonably believed” to contain “terrorism information.”  (link)

The March 2012 date is right before the IRS scandal hit the headlines.

The IRS targeting scandal is where the term “Secret Research Project” originated as a description from the Obama team. It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller. It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

Why disks? Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS. All of the evidence within this sketchy operation came directly to the surface in spring 2012.

Here’s how it looks:

♦ In 2010 Eric Holder asked the IRS to send him the records of 501(c) non profit groups and individuals representing conservative voters. [LINK] Lois Lerner sent the DOJ 1.1 million pages of 501(c)(4) tax filing data. Including a very specific set of “33 Schedule B attachment files”. The Schedule B’s were specific to Large Conservative 501(c)(4) groups operating and organized to oppose the agenda of President Obama. The Schedule B’s include the donor lists of specific people and sub-groups attached to the 501(c)(4).

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

♦ In 2012 Eric Holder authorizes the use of government databases to search records of Americans and assemble “files” on potential targets. [Link] “The agency has new authority to keep data about innocent U.S. citizens for up to five years, and to analyze it for suspicious patterns of behavior.”

♦ In the period of 2012 through April 2016, According to FISA Judge Rosemary Collyer, there were tens of thousands of illegal (“non-compliant”) search queries of the NSA database targeting Americans.  The search results were unlawfully “extracted” to unknown entities.  Eighty-five out of every hundred searches were illegal (85% non-compliant rate).

Consider purposeful actions, as a political targeting operation, by weaponizing the systems of government.  Steps:

  • First, identify the targets (IRS Database).
  • Second, research the targets (NSA Database).
  • Third assemble files on the targets (DOJ Authorization).
  • Fourth use the files to leverage/destroy your opposition.

We now have evidence of the first three steps; and my hunch is if we apply hindsight a lot of unusual activity will now make sense.  We have been living inside the fourth step for a few years.  We noticed the consequences… but we only had suspicions, until now.

Fusion GPS was not hired to research Trump, the intelligence community was already doing surveillance and spy operations. The intelligence community needed Fusion GPS to give them a plausible justification for already existing surveillance and spy operations.

Fusion-GPS gave the Obama administration the justification they needed for a FISA warrant with the Steele Dossier. Ultimately that’s why the Steele Dossier is so important; without it, the DOJ and FBI are naked with their surveillance and database abuse.

At 12:15pm on January 20th, 2017, Obama’s outgoing National Security Advisor Susan Rice wrote a memo-to-self.  Many people have called this her “CYA” memo, from the position that Susan Rice was protecting herself from consequences if the scheme against President Trump was discovered.  Here’s the email:

On January 5, following a briefing by IC leadership on Russian hacking during the 2016 Presidential election, President Obama had a brief follow-on conversation with FBI Director Jim Comey and Deputy Attorney General Sally Yates in the Oval Office. Vice President Biden and I were also present.

President Obama began the conversation by stressing his continued commitment to ensuring that every aspect of this issue is handled by the Intelligence and law enforcement communities “by the book“.

The President stressed that he is not asking about, initiating or instructing anything from a law enforcement perspective. He reiterated that our law enforcement team needs to proceed as it normally would by the book.

From a national security perspective, however, President Obama said he wants to be sure that, as we engage with the incoming team, we are mindful to ascertain if there is any reason that we cannot share information fully as it relates to Russia.

[Redacted Classified Section of Unknown length]

The President asked Comey to inform him if anything changes in the next few weeks that should affect how we share classified information with the incoming team. Comey said he would.

Susan Rice ~ (pdf link)