Joe diGenova Discusses Declassification and Origin of Obama Political Surveillance Operation…


Former U.S. Attorney to the District of Columbia, Joe diGenova, discusses the declassification of intelligence documents relating to political surveillance; and the origin of the database abuses outlined by FISC Presiding Judge Rosemary Collyer…

.

With President Trump returning from Japan tomorrow (5/28); and with the upcoming state visit to the U.K. coming June 3rd; a declassification “window of opportunity” opens between this Wednesday 5/29 and Saturday 6/2.

Given last weeks visit to Main Justice by congressman Mark Meadows; and considering the visit was specifically to review unredacted Page-Strzok-McCabe messages; it could be surmised the first series of declassified documents might be those communiques. Additionally, John Solomon has stated “Bucket Five” is likely the first release prior to the IG report:

Bucket Five – Intelligence documents that were presented to the Gang of Eight in 2016 that pertain to the FISA application used against U.S. person Carter Page; including all exculpatory intelligence documents that may not have been presented to the FISA Court.  Presumably this would include the recently revealed State Dept Kavalac email; and the FBI transcripts from wiretaps of George Papadopoulos (also listed in Carter Page FISA).

Now that we have significant research files on the 2015 and 2016 political surveillance program; which includes the trail evident within the Weissmann/Mueller report; in combination with the Obama-era DOJ “secret research project” (their words, not mine); we are able to overlay the entire objective and gain a full understanding of how political surveillance was conducted over a period of approximately four to six years.

This is likely why there is institutional panic.

Working with a timeline, but also referencing origination material in 2015/2016 – CTH has tried to show how the program operated. The exploitation of government collected information explains an evolution from the IRS Files in 2010 to the FISA Files in 2016.

More importantly, research indicates the modern political exploitation of the NSA database, for weaponized intelligence surveillance of politicians, began mid 2012.

The FISA-702 database extraction process, and utilization of the protections within the smaller intelligence community, was the primary process. We start by reviewing the established record from the 99-page FISC opinion rendered by Presiding Judge Rosemary Collyer on April 26th, 2017; and explain the details within the FISC opinion.

I would strongly urge everyone to read the FISC report (full pdf below) because Judge Collyer outlines how the DOJ, which includes the FBI, had an “institutional lack of candor” in responses to the FISA court. In essence, the Obama administration was continually lying to the court about their activity, and the rate of fourth amendment violations for illegal searches and seizures of U.S. persons’ private information for multiple years.

Unfortunately, due to intelligence terminology Judge Collyer’s brief and ruling is not an easy read for anyone unfamiliar with the FISA processes outlined. The complexity also helps the media avoid discussing, and as a result most Americans have no idea the scale and scope of the issues. So we’ll try to break down the language.

.

For the sake of brevity and common understanding CTH will highlight the most pertinent segments showing just how systemic and troublesome the unlawful electronic surveillance was.

Early in 2016 NSA Director Admiral Mike Rogers was alerted to a significant uptick in FISA-702(17) “About” queries; these are searches using the FBI/NSA database that holds all metadata records on every form of electronic communication.

The NSA compliance officer alerted NSA Director Admiral Mike Rogers who then initiated a full compliance audit on/around March 9th, 2016, for the period of November 1st, 2015, through May 1st, 2016.

While the audit was ongoing, due to the severity of the results that were identified, Admiral Mike Rogers stopped anyone from using the 702(17) “about query” option, and went to the extraordinary step of blocking all FBI contractor access to the database on April 18, 2016(keep these dates in mind).

Here are some significant segments:

The key takeaway from these first paragraphs is how the search query results were exported from the NSA database to users who were not authorized to see the material. The FBI contractors were conducting searches and then removing, or ‘exporting’, the results. Later on, the FBI said all of the exported material was deleted.

Searching the highly classified NSA database is essentially a function of filling out search boxes to identify the user-initiated search parameter and get a return on the search result.

FISA-702(16) is a search of the system returning a U.S. person (“702”); and the “16” is a check box to initiate a search based on “To and From“. Example, if you put in a date and a phone number and check “16” as the search parameter the user will get the returns on everything “To and From” that identified phone number for the specific date. Calls, texts, contacts etc. Including results for the inbound and outbound contacts.

FISA-702(17) is a search of the system returning a U.S. person (702); and the “17” is a check box to initiate a search based on everything “About” the search qualifier. Example, if you put a date and a phone number and check “17” as the search parameter the user will get the returns of everything about that phone. Calls, texts, contacts, geolocation (or gps results), account information, user, service provider etc. As a result, 702(17) can actually be used to locate where the phone (and user) was located on a specific date or sequentially over a specific period of time which is simply a matter of changing the date parameters.

And that’s just from a phone number.

Search an ip address “about” and read all data into that server; put in an email address and gain everything about that account. Or use the electronic address of a GPS enabled vehicle (about) and you can withdraw more electronic data and monitor in real time. Search a credit card number and get everything about the account including what was purchased, where, when, etc. Search a bank account number, get everything about transactions and electronic records etc. Just about anything and everything can be electronically searched; everything has an electronic ‘identifier’.

The search parameter is only limited by the originating field filled out. Names, places, numbers, addresses, etc. By using the “About” parameter there may be thousands or millions of returns. Imagine if you put “@realdonaldtrump” into the search parameter? You could extract all following accounts who interacted on Twitter, or Facebook etc. You are only limited by your imagination and the scale of the electronic connectivity.

As you can see below, on March 9th, 2016, internal auditors noted the FBI was sharing “raw FISA information, including but not limited to Section 702-acquired information”.

In plain English the raw search returns were being shared with unknown entities without any attempt to “minimize” or redact the results. The person(s) attached to the results were named and obvious. There was no effort to hide their identity or protect their 4th amendment rights of privacy:

But what’s the scale here? This is where the story really lies.

Read this next excerpt carefully.

The operators were searching “U.S Persons”. The review of November 1, 2015, to May 1, 2016, showed “eighty-five percent of those queries” were unlawful or “non compliant”.

85% !! “representing [redacted number]”.

We can tell from the space of the redaction the number of searches were between 1,000 and 9,999 [five digits]. If we take the middle number of 5,000 – that means 4,250 unlawful searches out of 5,000.

The [five digit] amount (more than 1,000, less than 10,000), and 85% error rate, was captured in a six month period.

Also notice this very important quote: “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” So they were searching the same phone number, email address, electronic “identifier”, or people, repeatedly over different dates. Specific people were being tracked/monitored.

Additionally, notice the last quote: “while the government reports it is unable to provide a reliable estimate of” these non lawful searches “since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 coincided with an unusually high error rate”.

That means the 85% unlawful FISA-702(16)(17) database abuse has likely been happening since 2012. (Again, remember that date, 2012) Who was FBI Director? Who was his chief-of-staff? Who was CIA Director? ODNI? etc. Remember, the NSA is inside the Pentagon (Defense Dept) command structure. Who was Defense Secretary? And finally, who wrote and signed-off-on the January 2017 Intelligence Community Assessment?

Tens of thousands of searches over four years (since 2012), and 85% of them are illegal. The results were extracted for?…. (I believe this is all political opposition use; and I’ll explain why momentarily.)

OK, that’s the stunning scale; but who was involved?

Private contractors with access to “raw FISA information that went well beyond what was necessary to respond to FBI’s requests“:

And as noted, the contractor access was finally halted on April 18th, 2016.

[Coincidentally (or not), the wife of Fusion-GPS founder Glenn Simpson, Mary Jacoby, goes to the White House the next day on April 19th, 2016.]

None of this is conspiracy theory.

All of this is laid out inside this 99-page opinion from FISC Presiding Judge Rosemary Collyer who also noted that none of this FISA abuse was accidental in a footnote on page 87: “deliberate decisionmaking“:

This specific footnote, if declassified, would be key. Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”, this sentence has the potential to expose an internal decision; withheld from congress and the FISA court by the Obama administration; that outlines a process for access and distribution of surveillance data.

Note: “no notice of this practice was given to the FISC until 2016“, that is important.

Now, consider this footnote, and then reference THIS from 2012:

December 17, 2012

The Honorable Eric H. Holder, Jr.

Attorney General of the United States

United States Department of Justice

Washington, DC 20530

Dear General Holder:

Recently, the “Wall Street Journal” (WSJ) reported you granted the National Counterterrorism Center (NCTC) new powers to store dossiers on United States citizens, even if said citizens are not suspected of any criminal activity.

With these new powers, the NCTC would have the ability to copy entire government databases holding information on flight records, casino-employee lists, the names of Americans hosting foreign-exchange students, as well as other data.

The WSJ goes on to report the new rules allow the NCTC to keep data about innocent United States citizens for up to five years and to analyze it for suspicious patterns of behavior. Previously, both were prohibited.

If the WSJ report is accurate, these new powers represent a sweeping departure from past practices, which barred the NCTC from storing information about ordinary Americans unless a person was a terror suspect or the information sought was related to an investigation.

If the WSJ report is accurate, it raises numerous concerns and questions. As elected Representatives and members of the House Judiciary Committee, we are concerned such sweeping, fundamental changes would be made to existing policy without public input and Congressional approval. Changes, which fundamentally alter the relationship between the government and the governed, should only be made with input from the people by and through their elected Representatives. (more)

Summary of this aspect: The FISA court identified and quantified tens-of-thousands of search queries of the NSA/FBI database using the FISA-702(16)(17) system. The database was repeatedly used by persons with contractor access; who unlawfully searched and extracted the raw results without redacting the information; and shared it with an unknown number of entities.

The outlined process certainly points toward a political spying, surveillance, and file-building operation; and we are not the only one to think that’s what this system is being used for.

Back in 2017 when House Intelligence Committee Chairman Devin Nunes was working to reauthorize the FISA legislation, Nunes wrote a letter to ODNI Dan Coats about this specific issue:

SIDEBAR: To solve the issue, well, actually attempt to ensure it never happened again, NSA Director Admiral Mike Rogers eventually took away the “About” query option permanently in 2017. NSA Director Rogers said the abuse was so inherent there was no way to stop it except to remove the process completely. [SEE HERE] Additionally, the NSA database operates as a function of the Pentagon, so the Trump administration went one step further. On his last day as NSA Director Admiral Mike Rogers -together with ODNI Dan Coats- put U.S. cyber-command, the database steward, fully into the U.S. military as a full combatant command. [SEE HERE]

There is little doubt the FISA-702(16)(17) database system was used by Obama-era officials, from 2012 through April 2016, as a way to spy on their political opposition. Quite simply there is no other intellectually honest explanation for the scale and volume of database abuse that was taking place.

When we reconcile what was taking place and who was involved, then the actions of the exact same principle participants take on a jaw-dropping amount of clarity.

All of the action taken by CIA Director Brennan, FBI Director Comey, ODNI Clapper and Defense Secretary Ashton Carter make sense. Including their effort to get NSA Director Mike Rogers fired.

Everything after March 9th, 2016, was done to cover up the weaponization of the FISA database. [Explained Here] Spygate, Russia-Gate, the Steele Dossier, and even the 2017 Intelligence Community Assessment (drawn from the dossier and signed by the above) were needed to create a cover-story and protect themselves from discovery of this four year weaponization, political surveillance and unlawful spying. Even the appointment of Robert Mueller as special counsel makes sense; he was FBI Director when this began.

The beginning decision to use FISA(702) as a domestic surveillance and political spy mechanism appears to have started in/around 2012. Perhaps sometime shortly before the 2012 presidential election and before John Brennan left the White House and moved to CIA. However, there was an earlier version of data assembly that preceded this effort.

Political spying 1.0 was actually the weaponization of the IRS. This is where the term “Secret Research Project” originated as a description from the Obama team. It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller. It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

Why disks? Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS. All of the evidence within this sketchy operation came directly to the surface in early spring 2012.

The IRS scandal was never really about the IRS, it was always about the DOJ asking the IRS for the database of information. That is why it was transparently a conflict when the same DOJ was tasked with investigating the DOJ/IRS scandal. Additionally, Obama sent his chief-of-staff Jack Lew to become Treasury Secretary; effectively placing an ally to oversee/cover-up any issues. As Treasury Secretary Lew did just that.

Lesson Learned – It would appear the Obama administration learned a lesson from attempting to gather a large opposition research database operation inside a functioning organization large enough to have some good people that might blow the whistle.

The timeline reflects a few months after realizing the “Secret Research Project” was now worthless (June 2012), they focused more deliberately on a smaller network within the intelligence apparatus and began weaponizing the FBI/NSA database. If our hunch is correct, that is what will be visible in footnote #69:

Additionally, Matt Gaetz appears to have seen “a memo held in the Congressional Sensitive Compartmented Information Facility (SCIF) that contained previously-undisclosed information involving the Federal Bureau of Intelligence (FBI) and Department of Justice (DOJ).” [LINK]  Which sounds like the MOU in the footnote, and the memo that Trey Gowdy and Jason Chaffetz inquired about.

How this all comes together in 2019

Fusion GPS was not hired in April 2016 to research Donald Trump. As shown in the evidence provided by the FISC, the intelligence community was already doing surveillance and spy operations. The Obama administration already knew everything about the Trump campaign, and were monitoring everything by exploiting the FISA database.

However, after the NSA alerts in/around March 9th, 2016, and particularly after the April 18th shutdown of contractor access, the Obama intelligence community needed Fusion GPS to create a legal albeit ex post facto justification for the pre-existing surveillance and spy operations. Fusion GPS gave them that justification in the Steele Dossier.

That’s why the FBI small group, which later transitioned into the Mueller team, are so strongly committed to and defending the formation of the Steele Dossier and its dubious content. The Steele Dossier contains the cover-story and justification for the pre-existing surveillance operation.

During a rather innocuous podcast discussion panel April 12th, 2019, one of President Trump’s personal lawyers Jay Sekulow mentioned the FBI had three FISA applications denied by the FISA court in 2016. [Podcast Here – Note comment at 25:05] The denials were always suspected; however, until now no-one in/around the administration has ever confirmed.

If Sekulow is accurate, this adds additional context to the actions of the FBI in the aftermath of Admiral Mike Rogers and an increased urgency in gaining legal justification for surveillance and spy operation unlawfully taking place. A valid FISA warrant would help the FBI cover-up the surveillance. The likely targets were Manafort, Flynn and Papadopoulos…. but it appears the DOJ/FBI were rebuked.

These FISC denials would then initiate institutional panic dependent on the election outcome. An insurance policy would be needed. The Steele Dossier becomes the investigative virus the FBI wanted inside the system. To get the virus into official status, they used the FISA application as the delivery method and injected it into Carter Page. The FBI already knew Carter Page; essentially Carter Page was irrelevant, what they needed was the FISA warrant and the Dossier in the system {Go Deep}.

Fusion GPS was not hired to research Trump, the intelligence community was already doing surveillance and spy operations. The intelligence community needed Fusion GPS to give them a plausible justification for already existing surveillance and spy operations.

Fusion-GPS gave them the justification they needed for a FISA warrant with the Steele Dossier. Ultimately that’s why the Steele Dossier is so important; without it, the DOJ and FBI are naked with their FISA-702 abuse as outlined by John Ratcliffe.

No-one really knows the extent of the current documents and/or information that may be subject to the AG Bill Barr declassification. However, this is the original list as outlined in September 2018, and the agencies who would be involved in the declassification process:

  1. All versions of the Carter Page FISA applications (DOJ) (DoS) (FBI) (ODNI).
  2. All of the Bruce Ohr 302’s filled out by the FBI. (FBI) (ODNI)
  3. All of Bruce Ohr’s emails (FBI) (DOJ) (CIA) (ODNI), and supportive documents and material provided by Bruce Ohr to the FBI. (FBI)
  4. All relevant documents pertaining to the supportive material within the FISA application. (FBI) (DOJ-NSD ) (DoS) (CIA) (DNI) (NSA) (ODNI);
  5. All intelligence documents that were presented to the Gang of Eight in 2016 that pertain to the FISA application used against U.S. person Carter Page; including all exculpatory intelligence documents that may not have been presented to the FISA Court. (CIA) (FBI) (DOJ) (ODNI) (DoS) (NSA)
  6. All unredacted text messages and email content between Lisa Page and Peter Strzok on all devices. (FBI) (DOJ) (DOJ-NSD) (ODNI)
  7. The originating CIA “EC” or two-page electronic communication from former CIA Director John Brennan to FBI Director James Comey that started Operation Crossfire Hurricane in July 2016. (CIA) (FBI) (ODNI)

♦ President Trump can prove the July 31st, 2016, Crossfire Hurricane counterintelligence operation originated from a scheme within the intelligence apparatus by exposing the preceding CIA operation that created the originating “Electronic Communication” memo. Declassify that two-page “EC” document that Brennan gave to Comey. [The trail is found within the Weissmann report and the use of Alexander Downer – SEE HERE]

♦ Release and declassify all of the Comey memos that document the investigative steps taken by the FBI as an outcome of the operation coordinated by CIA Director John Brennan in early 2016. [The trail was memorialized by James Comey – SEE HERE]

♦ Reveal the November 2015 through April 2016 FISA-702 search query abuse by declassifying the April 2017 court opinion written by FISC Presiding Judge Rosemary Collyer. Show the FBI contractors behind the 85% fraudulent search queries. [Crowdstrike? Fusion-GPS? Nellie Ohr? Daniel Richman?] This was a weaponized surveillance and domestic political spying operation. [The trail was laid down in specific detail by Judge Collyer – SEE HERE]

♦ Subpoena former DOJ-NSD (National Security Division) head John Carlin, or haul him in front of a grand jury, and get his testimony about why he hid the abuse from the FISA court in October 2016; why the DOJ-NSD rushed the Carter Page application to beat NSA Director Admiral Mike Rogers to the FISA court; and why Carlin quit immediately thereafter.

♦ Prove the Carter Page FISA application (October 2016) was fraudulent and based on deceptions to the FISA Court. Declassify the entire document, and release the transcripts of those who signed the application(s); and/or depose those who have not yet testified. The creation of the Steele Dossier was the cover-up operation. [SEE HERE]

♦ Release all of the Lisa Page and Peter Strzok text messages without redactions. Let sunlight pour in on the actual conversation(s) that were taking place when Crossfire Hurricane (July ’16) and the FISA Application (Oct ’16) were taking place. The current redactions were made by the people who weaponized the intelligence system for political surveillance and spy operation. This is why Page and Strzok texts are redacted!

♦ Release all of Bruce Ohr 302’s, FBI notes from interviews and debriefing sessions, and other relevant documents associated with the interviews of Bruce Ohr and his internal communications. Including exculpatory evidence that Bruce Ohr may have shared with FBI Agent Joseph Pientka. [And get a deposition from this Pientka fella] Bruce Ohr is the courier, carrying information from those outside to those on the inside.

♦ Release the August 2nd, 2017, two-page scope memo provided by DAG Rod Rosenstein to special counsel Robert Mueller to advance the fraudulent Trump investigation, and initiate the more purposeful obstruction of justice investigation. Also Release the October 20th, 2017, second scope memo recently discovered. The Scope Memos are keys to unlocking the underlying spy/surveillance cover-up. [SEE HERE and SEE HERE]

The Declassification Directive Gives Pelosi, Schumer and Small Group Few Options…


When President Trump announced the futility of attempting an infrastructure bill with Pelosi and Schumer as they simultaneously tried to impeach him, the president certainly knew he was going to issue a declassification memo within hours.

The declassification directive to AG Bill Barr creates a dynamic ensuring Nancy Pelosi and Chuck Schumer will align with the former intelligence officials and further attack the offices of the President and Attorney General; they have few options.

Those who participated in the creation of Russia-Gate or Spy-Gate have few options except to manufacture a narrative shield and accuse the President of unethical, immoral and criminal conduct.  See: Pelosi’ recent “cover-up” charge.

By advancing even stronger attacks against the president, the ‘small group’ position any investigation into their wrong-doing as political retaliation.  Their best defense is to build a deeper foundation for their political retaliation claim.  Therefore a House impeachment investigation, in some manner or form, is more likely than ever.

The legal risk for participants in ‘Russia-Gate’/’Spy-Gate’ seems very real.  The best defense against that risk is political.  Speaker Pelosi and Senator Schumer know how to lead the defense by saying any evidence discovered by AG Barr is merely weaponized retaliation from the Trump DOJ.  The media are already supporting that cause.

Speaker Pelosi needs to protect John Brennan, James Comey, Andrew McCabe, Sally Yates and the participating small group writ large, if she is to retain her gavel and power.  Minority leader Chuck Schumer knows the play; and the media are already fully circling the wagons as part of their three-year ongoing participation.

As this stage in the sunlight process; and with a mountain of visible evidence locked-in to the record of what took place; there is no evidence anyone inside the Washington Field Office of the FBI was not a participant.

There may be decent “rank-and-file” FBI agents in various positions throughout the country, but there is no honorable “rank-and-file” in the Washington DC Field Office.  The entire apparatus is full of corrupt investigators, manipulative liars, participating schemers, and agents/officials who went along with three years of politically motivated investigations; there’s no recovery from the scale of their involvement.

Interestingly the FBI alignment with Pelosi and Schumer is now similar to the FBI alignment with Feinstein and Harris in the Blasey-Ford fraud (Brett Kavanaugh hearings/fiasco).  The weaponization of the FBI around Washington DC is a feature, not a flaw; nothing is a surprise now.

Careerists within the intelligence apparatus (CIA, FBI, DOJ etc.) will continue to fall in line with the political objectives of Nancy Pelosi and Chuck Schumer because it is in their own best interests.   Schumer and Pelosi will defend the former corruption because they have no political option to retain power; this is their ideological crew.

President Trump’s Declassification Directive Outlines Specific Process and Direction….


Now that President Trump has officially designated the Declassification Memorandum we can review the specifics for process, content and timing.  Our previous research led to a set of expectations for the directive. Now, that we have the directive in hand, we gain increased clarity of purpose.

♦ First, President Trump has assigned ownership of the Directive to U.S. Attorney General William Barr. This part was predictable because the purpose of declassification would be to facilitate a DOJ review of how the intelligence apparatus was used in the 2016 election.

Additionally, because the DOJ review encompasses intelligence systems potentially weaponized in 2016 for political purposes and intents, President Trump carries: (a) declassification authority; but also: (b) an inherent conflict.  In this DOJ endeavor candidate Trump would have been the target of corrupt agency activity; and therefore would be considered the target/victim if weaponization were affirmed by evidence.

To avoid the conflict President Trump designates the U.S. Attorney General as arbiter and decision-maker for the purposes of declassifying evidence within the investigation:

…”The Attorney General has also been delegated full and complete authority to declassify information pertaining to this investigation, in accordance with the long-established standards for handling classified information.” (link)

Additionally, AG Bill Barr does not need to assemble the intelligence product for approval by the executive (Trump).  Instead the office of the president is granting the AG full unilateral decision-making as to each product being considered for declassification.

This is a huge amount of trust from the President to the Attorney General, and a big responsibility for William Barr:

[Sec 2] …”With respect to any matter classified under Executive Order 13526 of December 29, 2009 (Classified National Security Information), the Attorney General may, by applying the standard set forth in either section 3.1(a) or section 3.1(d) of Executive Order 13526, declassify, downgrade, or direct the declassification or downgrading of information or intelligence that relates to the Attorney General’s review referred to in section 1 of this memorandum.”  (read more)

The position-designate slightly works around custom insofar as the intelligence hub, the Office of the Director of National Intelligence (Dan Coats), is given conference – but the decision making is designated to the Attorney General (Bill Barr).

Essentially the DNI will be following the instructions of the AG for this Memorandum.  This is slightly unusual; but given the purpose, necessary and expected.

♦ Secondly, following protocol, the Memorandum is specific to the agencies carrying the documentation that will be reviewed by the Attorney General: The Secretary of State (Pompeo); the Secretary of Treasury (Mnuchin); the Secretary of Defense (Shanahan); the Secretary of Energy (Perry); the Secretary of Homeland Security (McAleenan); the Director of National Intelligence (Coats); the Director of the CIA (Haspel), and the Attorney General himself (Barr).

The agencies give insight into the intelligence product (ie. evidence) being reviewed.  The Treasury and Energy agency was surprisingly notable:

Considering the purpose of the Memorandum: “The Attorney General is currently conducting a review of intelligence activities relating to the campaigns in the 2016 Presidential election and certain related matters“…  The appearance of Treasury and Energy would indicate the pre-existence of investigative evidence; that would be subject to ongoing DOJ review; and potentially be part of ongoing proceedings.

Potential target issues could include: (1) an investigation of Uranium One; (2) an investigation of the Clinton Foundation; and, (3) an investigation of matters related to payments to Iran.

Treasury would come into play with the Committee on Foreign Investment in the United States (CFIUS); which was part of the Uranium One process and also included the Dept. of Energy.  Additional related matters could include George Papadopoulos $10k (Treasury); and The Clinton Foundation.  [Obviously this is supposition, but there are not too many alternate investigative pathways for intelligence within Treasury and Energy.]

The absence of FBI in the memorandum designation is not unusual as the FBI is an internal agency of the DOJ where Barr already has supervision and decision-making authority.

However, that said, one does have to wonder where current FBI Director Christopher Wray, current Deputy Director David Bowditch and current FBI legal counsel Dana Boente line-up within the DOJ investigation itself.

♦ Third, within the memorandum the President does not allow AG Bill Barr to delegate authority.  However, all agencies are required to respond to Barr’s authority.

The purpose of the Declassification Directive also appears to permit the DOJ Inspector General to include classified material in the body of the upcoming report on FISA abuse; this memorandum is granting AG Bill Barr the autonomy to make that decision and declassify that content.

♦ Lastly, regarding the timing of release…. While the purpose of the authority is to empower AG Bill Barr to collect, process and declassify intelligence product that is part of the DOJ investigative review, this does not preclude the public release of intelligence information in advance of the IG report on potential FISA abuse.

Much of the intelligence information may be collected external to the IG review parameters (FISA process), and may be released independently as part of stand-alone declassification that pertains to weaponized DOJ, FBI and CIA political activity.

Ultimately the decision to release, and the timing therein, is now in the hands of U.S. Attorney General William Barr.

(Tweet Link)

The History of Classical Liberalism – Learn Liberty


Published on May 13, 2011

SUBSCRIBE 193K
Historian Stephen Davies describes classical liberalism as a comprehensive philosophy, which has had implications in all the major academic disciplines. Learn More: https://www.learnliberty.org/ At an abstract level, classical liberalism offers three key insights: 1) The goal of life is human happiness and flourishing. 2) Personal choice and individual liberty are crucial in explaining and appreciating how society develops. 3) Commerce, wealth, and trade are preferable to war and conflict. If you agree with these classical liberal insights, you might be a classical liberal! Want to know for sure? Check out Nigel Ashford’s seven minute video entitled “What is Classical Liberalism” http://www.youtube.com/watch?v=iU-8Uz… Watch more videos: http://lrnlbty.co/y5tTcY

 

Jason Riley On “False Black Power?”


Published on Mar 18, 2019

SUBSCRIBE 125K
Recorded on February 21, 2019. What is “false black power?” According to Jason Riley, author of False Black Power?, it is political clout, whereas true black power is human capital and culture. Riley and Peter Robinson dive into the arguments in Riley’s new book, the history of African Americans in the United States, and welfare inequality in black communities. Riley discusses the Moynihan report of 1965, which documented the rise of black families headed by single women in inner cities and how this report was something black sociologists had already been writing about for several years. He argues that there was clearly a breakdown of the nuclear family and that this is a result of the “Great Society” welfare programs of the 1960s rather than the legacy of slavery or Jim Crow laws. In the 1960s, Riley posits that the black activist community’s shift towards political engagement was misguided. He argues that the idea of black political clout leading to black economic advancement was misplaced. Other impoverished communities (i.e. Irish, Jewish, and Italian immigrant communities) at various times in American history focused on economic advancement first before trying to achieve political clout, and they were successful. Instead, the black community focused first on electing black politicians, which ended up doing very little for the economic advancement of the community as politicians typically put their own interests first, above their communities’. Riley points out that the economic data shows that black communities became more impoverished under black leadership. Riley proposes a solution of advocating for more school-choice vouchers, which allow black parents to take better control of their children’s futures and place them in the best schools for them. He also argues for reducing social safety nets, making them a more temporary form of welfare rather than the multigenerational welfare system currently in place. Other resources https://www.amazon.com/Please-Stop-He… Please Stop Helping Us, by Jason Riley https://www.hoover.org/research/discr… – Discrimination and Disparities, with Thomas Sowell https://californiaglobe.com/fr/stanfo… Stanford Hoover Institution economist targets socialism, fears ‘we may not make it’ https://www.youtube.com/watch?v=ZUvQx… – Sowell: Politicians using race as their ticket to whatever racket they’re running Interested in exclusive Uncommon Knowledge content? Check out Uncommon Knowledge on social media! Facebook: https://www.facebook.com/UncKnowledge/ Twitter: https://www.twitter.com/UncKnowledge/ Instagram: https://instagram.com/uncommon_knowle…

SHOW MORE

 

‘No Way Obama Was Not Told’ – Former Intel Officer Tony Shaffer on Spying on Trump Campaign


SUBSCRIBE 38K
With the Mueller report concluding there was no evidence of Trump-Russia collusion, Attorney General William Barr says he will now personally look into the origins of the collusion investigation.

Westmoreland: The General Who Lost Vietnam


Published on Nov 3, 2011

SUBSCRIBE 30K
Lewis Sorely presents “Westmoreland: The General Who Lost Vietnam,” as part of the U.S. Army Heritage and Education Center’s Perspectives in Military History Lecture Series.

 

Identity Politics & The Marxist Lie of White Privilege | Dr. Jordan B. Peterson | SNC 2017


Published on Jan 30, 2018

SUBSCRIBE 9K
Sovereign Nations was honored to have Dr. Jordan B. Peterson to address the thesis “Identity Politics & The Marxist Lie of White Privilege” to guests gathered at the Sovereign Nations Conference at the Trump International Hotel in Washington, DC. Dr. Peterson’s presentation served as a pillar to the overall theme of the conference: Understanding the Causes of Things. Support Sovereign Nations on Patreon: https://www.patreon.com/sovnations

All fakers are equal, but some are more equal than others. 


by Andrei Nekrasov / April 27, 2019
The case of Claas Relotius, an award winning Spiegel writer, who was caught writing fiction and selling it as true stories, seemed to be a game changer in the world of journalism. Yet it soon became just yesterday’s news. And, as Thomas Beschorner of the University of St. Gallen in Switzerland, wrote, it was surprising in the first place that people found the lying in the media so surprising. “Scientists manipulate results of research, managers lie. We know all that happens. Everywhere, but not in journalism?”
Somewhat paradoxically, given his suggestion that lying was routine and common, the same Prof. Beschorner continued: “Whether this is an isolated case, or the problem is systemic and therefore widespread, we don’t know yet.”

Then a similar case was discovered. An award winning contributor to Sueddeutsche Zeitung Magazine, Dirk Gieselmann, had invented a main protagonist in a story he wrote. The SZ stated the forgery had taken place, but revealed few details, while suggesting the case was not as severe as that of Relotius.

One way or another, do two known recent cases of fictitious journalism in Germany make the problem systemic?

But what about the infamous fake news? And alternative facts? Those have been around for a while. Is that something totally different from making up plots and characters as in the above mentioned cases?

Even though it was Donald Trump who was credited with creating the fake-news brand, it was largely applied to his own statements, as well as various stories, posts and tweets coming out of Russia, on its behalf, in favour of its perceived friends, and against its perceived enemies.

Yet, has the fake news era really started with Trump and his collusion with Russia, that never actually was? While some call the Trump era “post-truth”, how should we refer to the times when, for example, a Labour prime minister was lying blatantly to justify a war that was to kill tens of thousands of innocent civilians? Or what was the director of National Intelligence in the administration of a progressive predecessor of President Trump doing as he denied NSA were spying on Americans? He was lying, as it became obvious from Edward Snowden’s revelations a little later, but it was a lie before the post-truth era kicked off “officially”.

I had to do my fair share of pondering on the fake news issue while dealing with the story of Sergei Magnitsky and William Browder. I started investigating the story well before the Trump era, but the consequences of my findings revealed in a film played out fully in the context of the new ideological war between Russia and the West.

In the course of the preparations for a new film I am to shoot this year, I wrote to Frederik Obermaier, a Munich based journalist known for the investigation of the famous Panama Papers leak. Obermaier won a Pulitzer Prize for his work on the Panama Papers, as part of an ICIJ (International Consortium of Investigative Journalists) team. Mr Obermaier was one of the authors of the article “The Cellist and the dead Lawyer” (in the English version: “The Magnitsky Case“) published by Suedeutsche on 27 April 2016.

My new film deals, inter alia, with the ways money is laundered, and I wanted to interview Mr Obermeier, who, along with his ICIJ colleagues, has become an authority on the subject. The article Mr Obermeier co-wrote was of a particular interest to me as it appeared to have traced the money stolen in the fraud associated with the name of Sergei Magnitsky. ICIJ has recently reminded its subscribers of the great investigative article by the German colleagues, published exactly three years ago.

The article seems to have established a connection between the Magnitsky Affair (which my previous film was about) and a friend of Vladimir Putin, Sergei Roldugin. My forthcoming film is in many ways a sequel to the film about the fraud at the centre of the Magnitsky Case.

While studying Frederik Obermaier’s article and its sources I realised that it was full of mistakes. I made a list of the most obvious ones and emailed it to Mr Obermaier on the 23 October 2018. Having not heard back I sent another email on 21 November attaching an updated list of mistakes complete with explanations and links to documents disproving the majority of the claims in the article. The first time round I asked Mr Obermaier for an interview, but then I suggested we discuss the matter off the record. Anyone can make mistakes, but the ability to admit them is as important as the talent for authoring good stories, in my humble opinion. I got no response from Frederik Obermaier whatsoever.

Illustration: Sueddeutsche Zeitung
His Sueddeutsche Zeitung article seems to have essentially re-transmitted the false story of Sergei Magntisky, told by Bill Browder, a hedge fund manager, for whom Magnitsky worked as an accountant.

Browder is wanted by Russia for tax evasion. He claims that the Russian criminal charges are politically motivated. Yet, the tax evasion (as well as a number of related crimes) Browder is being accused of happened in 2001, the criminal probe into it starting in 2004. It is well known, and easily evidenced, that Browder was an outspoken supporter of Putin and his government until at least 2005.

But investor William F. Browder sees it differently. Never mind the arguments about a creeping coup by Putin’s KGB colleagues, the war in Chechnya, the state takeover of television or even the jailing of Russia’s richest man. To Browder, Putin is a true reformer, “the one ally” of Western capitalists who have come to Russia to create a new market economy but have found themselves adrift “in a sea of corrupt bullies.”
 Susan B. Glasser, in:”Investors Rally Around Putin, Discounting Alarm of Critics“, The Washington Post, February 26, 2004
Instead of pushing the country back, Putin has implemented a reform program that is far more liberal than anything that could have been cooked up at the most radical think tank in Washington. (…)

Putin understood that the country would never succeed with seven oligarchs at the helm — particularly since their interests were so counter to those of the nation. He has set clear limits to the oligarchs’ power and their meddling in the affairs of state. While there may be some things about Putin that we disagree with, we should give him the benefit of the doubt in this area and fully support him in his task of taking back control of the country from the oligarchs.

 William Browder, in: “Making the Case for Putin“, The Moscow Times, January 21, 2004
In 2007, as a result of an elaborate tax rebate scam 230 million dollars were paid into the accounts of three Browder’s companies in Russia. No one (neither Browder nor the Russian authorities) deny the tax rebate fraud took place, except that Browder claims he had lost control of his companies before the money was paid out. I investigated Browder’s claims, and found that they were false.

To divert attention from the the proven 2001-2004 tax evasion case, as well as the suspicion that he may have been involved in the 230 million dollar tax rebate, Browder invented a figure of the crusading anti-corruption lawyer, whistleblower, Sergei Magnitsky. Magnitsky existed of course, but he was Browder’s accountant, not a lawyer, and he never blew whistle on anything.

Tragically, Magnitsky died while in pre-trial detention. Browder claims he was beaten to death by eight “riot guards”. Browder presents no evidence for that, apart from selective quotations from Russian documents. Studied in full those documents, as well as an American report commissioned by Browder himself, make no mention of a murder, let alone a murder by beating. The author of the Parliamentary Assembly of the Council of Europe report on Magnitsky, Andreas Gross told me on camera that Magnitsky had not been murdered but died of the “lack of care”.

The investigative journalists at Sueddeutsche Zeitung claim to have traced money flows from the Magnitsky affair, but appear unwilling to recognise that they had uncritically embraced the affair’s interpretation by someone with a vested interest in it.

It is also highly ironic that the journalists, writing about Browder’s Russian business, chose to ignore that Browder himself used off-shore schemes extensively, with the help of his Russian staff that included Magnitsky. Companies controlled by Browder have also appeared in Panama papers, e.g Berkeley Advisors and Starcliff.

In the spring of 2016 my film was secretly, and possibly illegally, seen by U.S. government officials before its premiere at the European parliament was stopped on the 27th of April, and the ARTE transmission cancelled on the 3rd of May. One of those officials was Robert Otto, a top intelligence officer at the State Department who wrote in one of many e-mails that were later leaked online. “I am beginning to feel we are all just part of the Browder P.R. machine.” – Mr Otto wrote.

Another of those emails concerned Sueddeutsche Zeitung, my film and myself:
I recently managed to find out who the recipient of the email about me and my film was: Hubert Wetzel. The email was received at the time of the publication of the “The Cellist and the dead Lawyer“. Mr Wetzel had clearly passed the information to Browder’s acolyte Elena Servettaz, or to another “colleague from Suddeutsche Zeitung” (sic), who then swiftly passed it to Elena Servettaz.

I was not contacted by the SZ, either before the cancelled European Parliament screening or thereafter.

On 13 June 2018 Telepolis organised a screening of my film in Munich, with a following discussion. Frederik Obermaier and Tim Neshitov, who had written about the Magntisky case for the SZ were invited. No-one turned up, nor replied to the invitation.

The “money tracing” SZ/Panama Papers used trying to connect the Magnitsky fraud to Sergei Roldugin, was in its main part presented in the U.S. case against Prevezon Holdings Ltd (2013-2017). After almost five years of trying to prove that Prevezon received and laundered money from the Magnitsky fraud, the American government decided to avoid the litigation and to settle the case with no guilt admitted by Prevezon.

Prevezon lawyers questioned Browder as a witness under oath. It was Browder (as he himself admitted) who had personally handed Preet Bharara, then the U.S. attorney for the Southern District of New York, the version of the Magnitsky story that I disprove in my film. William Felix Browder was the source of the whole sprawling, costly case. And it’s his Magnitsky story that was essentially disproved in a court of law.

Yet the mainstream media, including the Sueddeutsche Zeitung, had no interest in taking another look at their articles which had faithfully re-transmitted Browder’s false story. And a stony, arrogant silence was all I got trying politely and tactfully to point out serious mistakes.

Panama papers became a brand name for the press standing up to corruption and wrongful secrecy of those in the position of power, whether financial or political. It would be paradoxical and particularly regrettable if a journalist, a colleague, would use a power he has acquired through a reputation for openness and association with mainstream German and international investigative networks, to obfuscate legitimate questions and documented objections.

Q.: What steps did you take in finding Mr. Browder to be credible?
A.: Well, we reviewed his documentation, we reviewed some of his statements and verified some of his statements via the internet.
Q.: What did he tell you?
A.: Well, he told us the story of Sergei Magnitsky.
Q.: What public source documents did he refer you to?
A.: He referred me on his website, he referred me to a Russian language newspaper.
Q.: What else?
A.: And the documents that he provided.
Q.: What documents did he provide?
A.: Copies of the bank records, copies of wire transactions
Q.: Did you get in touch with the banks to see if they were accurate?
A.: No, I did not.
Q.: And you obtained flow charts; is that correct?
A.: That’s correct.
Q.: And those were also from Hermitage that you obtained them?
A.: Correct.
Q.: So every transfer here is based on copies that are not authenticated, of records that are incomplete, based on an accounting assumption. Is that right?
A.: That would be correct.
 a scene from the film “The Magnitsky Act – Behind the Scenes”: Deposition of Todd Hymann, a special agent with the Department of Homeland Security, Homeland Security Investigations (United States District Court Southern District of New York)
April 27 / 2019

back to the homepage