Two-Tiered Justice and Professional Escape Artists – Prior IG Conclusions Impede Current AG Barr…


CTH shared a prediction in September 2018 which bears repeating.  However, prior to revisiting the past let us overlay today’s events. Keep in mind, much of what is happening is downstream from predicate events that took place long before AG Bill Barr was confirmed to run the DOJ.  Actually, while not intending to defend Bill Barr, some of the recent events are beyond his control.  Here’s how:

First, if you remember when the 568 page IG report on FBI/DOJ conduct was delivered in June 2018, you might remember how the ‘executive summary and conclusions’ were disconnected from the main body of evidence within the report.  In 2018 CTH warned this “disconnect” was by design; essentially the corrupt officials were laying down a defense for any conduct, later outlined, that is connected to the body of the IG review.

When IG Horowitz announced last year he could find no evidence of actions taken as a result of political bias by FBI and DOJ officials; he also stated he could not rule out bias within their investigation.  Horowitz pointed to the lack of action by FBI Agent Peter Strzok -following the September 28th, 2016, notification of Clinton emails on Abedin laptop- as lacking reasonable explanation.  Essentially, despite suspicions, the summary conclusion was the IG could find “no evidence of intentional wrongdoing“.

The 568-pages contained a multitude of examples of FBI misconduct (media leaks etc.), but the same IG report summary said “no illegal activity was discovered.”  In the Sessions/Rosenstein led DOJ there was a disconnect between the summary/conclusions and the body of evidence.

With that in mind, how could the Bill Barr DOJ prosecute on evidence of behavior from within a report where the Rod Rosenstein DOJ conclusion was no evidence of “intentional wrongdoing”?

In short, he can’t.

Think about how easy it would be for a defense attorney representing one of the accused officials detailed in the IG report…. Take the IG report, which outlines the events for which the client is being prosecuted, and simply say: “the conclusion of the FBI investigation said “no evidence of intentional wrongdoing” so why is my client being charged?”

It’s a circular defense created by a prior conclusion. If there was no evidence of intentional wrongdoing, the downstream events cannot be prosecuted. This is by design. The design  explains this:

Now, having said that, let’s expand on prior words of caution.

QUESTION: If the DOJ Office of Inspector General found no intentional DOJ and FBI malfeasance in the June ’18 report covering the totality of the 2016 election; and no direct evidence of political bias within the decision-making of the officials being reviewed; what’s the likelihood of the same OIG finding malfeasance as it relates to DOJ/FBI *FISA activity* and the exact same people?

The extensive OIG election-period report found no DOJ/FBI misconduct (only some bad judgement). There were no criminal referrals. There were recommendations for internal improvement, which FBI Director Wray said the FBI would implement (link).

It’s important to note the Office of Inspector General FISA review/investigation of potential FISA abuses (opened March 28th, 2018) was launched three months prior to the “Election Activity” final report in June 14th 2018.  There was obvious investigative overlap; however, the June report said “no evidence of intentional misconduct.”

The time frame covered by the “Election Activity” review (OIG report 2) and the “FISA Activity” review (OIG report 3) are the same. The topics are different (FISA being more specific), but the people under review and time-frame therein are identical.

If the OIG found no intentional corrupt activity in the June ’18 report (only bad judgement); no referrals were made; and time period and people are exactly the same; how can the OIG produce a post-facto FISA review report with substantively different conclusions?  It seems unlikely.

However, that said, there is a narrow window of potential optimism for those seeking some measure of accountability inside IG report #3.

DOJ Official Bruce Ohr is likely still employed for the same reason the dispatch of Peter Strzok and James Baker was delayed prior to the finalization of IG report #2. The OIG and INSD (inspection division) can only reach those still inside the system.

On the narrow issue of how the DOJ and FBI assembled, handled and used the FISA application (and subsequent Title-1 surveillance warrant), against the Trump campaign and officials therein, Bruce Ohr is a key and central witness for the OIG (link).

Mr. Ohr has testified (transcript here) that he was interviewed by IG Horowitz about his role in assembling the information that was later used in gaining a FISA Title-1 surveillance warrant without following the Woods Procedure.  [Note: Mr. Ohr was never interviewed by John Huber]

Unlike the previous OIG report #2 (Election-era Issues) if the OIG can find direct and intentional “gross misconduct” (by referencing traditional and historic FISA application assembly therein), toward those officials who participated in the FISA assembly, then it becomes possible the OIG report could potentially outline that the FISA application resulted in serious fourth amendment civil rights violations. And that perspective could be a narrow opening toward legal issues for DOJ and FBI officials who participated in assembling an *intentional* and fraudulently-based application to the FISA court.

That approach is a high bar for the OIG to reach. The OIG would have to find “direct evidence” of “gross misconduct” resulting in civil rights violations. The defensive arguments by the corrupt group would be filled with legal justification(s) and internal process discussion.  Lots of room for reasonable doubt.

However, with the introduction of John Durham, there’s a possibility that building this scale of evidence is exactly what AG Bill Barr is trying to accomplish.

Any finding of “fourth amendment” FISA-abuse would be adverse to the interests of the larger U.S. intelligence apparatus and institutional participants who rely on the current use of the FISA process.  Current officials would want to protect it.

I suspect the team of DOJ/FBI officials who abused the FISA court, and are now watching things unfold, are also relying upon the institutional necessity of the FISA process to protect themselves from too much scrutiny and sunlight.  An example of that unfortunate reality is found with HPSCI Chairman Devin Nunes advocating for FISA reauthorization on January 11th, 2018 (link); right in the middle of the explosive revelations and discoveries of potential abuse.

As HPSCI Chairman, Devin Nunes knew back in 2017 the FISA process was abused for corrupt political intent.  However, he also knows FISA is a critical component and tool for the U.S. intelligence system and national security.  Currently Mr. Nunes is advocating for a much larger conversation about FISA and “Title-1” authority before any further congressional re-authorization.

We can only imagine the downstream political chaos if IG Horowitz started cracking open the doors to possible civil rights violations from Obama-era FISA abuse.

Oh, believe me, those gross civil rights violations are present. [SEE HERE]  The surveillance system that Obama officials assembled is massive and visible evidence of post-constitutional abuse of government databases, and violations of fourth amendment protections.  But will AG Bill Barr actually be able to bring evidence of those abuses to the public?

No-one really knows the extent of the current documents and/or information that may be subject to the AG Bill Barr declassification. However, this is the original list as outlined in September 2018, and the agencies who would be involved in the declassification process:

  1. All versions of the Carter Page FISA applications (DOJ) (DoS) (FBI) (ODNI).
  2. All of the Bruce Ohr 302’s filled out by the FBI. (FBI) (ODNI)
  3. All of Bruce Ohr’s emails (FBI) (DOJ) (CIA) (ODNI), and supportive documents and material provided by Bruce Ohr to the FBI. (FBI)
  4. All relevant documents pertaining to the supportive material within the FISA application. (FBI) (DOJ-NSD ) (DoS) (CIA) (DNI) (NSA) (ODNI);
  5. All intelligence documents that were presented to the Gang of Eight in 2016 that pertain to the FISA application used against U.S. person Carter Page; including all exculpatory intelligence documents that may not have been presented to the FISA Court. (CIA) (FBI) (DOJ) (ODNI) (DoS) (NSA)
  6. All unredacted text messages and email content between Lisa Page and Peter Strzok on all devices. (FBI) (DOJ) (DOJ-NSD) (ODNI)
  7. The originating CIA “EC” or two-page electronic communication from former CIA Director John Brennan to FBI Director James Comey that started Operation Crossfire Hurricane in July 2016. (CIA) (FBI) (ODNI)

♦ President Trump can prove the July 31st, 2016, Crossfire Hurricane counterintelligence operation originated from a scheme within the intelligence apparatus by exposing the preceding CIA operation that created the originating “Electronic Communication” memo. Declassify that two-page “EC” document that Brennan gave to Comey. [The trail is found within the Weissmann report and the use of Alexander Downer – SEE HERE]

♦ Release and declassify all of the Comey memos that document the investigative steps taken by the FBI as an outcome of the operation coordinated by CIA Director John Brennan in early 2016. [The trail was memorialized by James Comey – SEE HERE]

♦ Reveal the November 2015 through April 2016 FISA-702 search query abuse by declassifying the April 2017 court opinion written by FISC Presiding Judge Rosemary Collyer. Show the FBI contractors behind the 85% fraudulent search queries. [Crowdstrike? Fusion-GPS? Nellie Ohr? Daniel Richman?] This was a weaponized surveillance and domestic political spying operation. [The trail was laid down in specific detail by Judge Collyer – SEE HERE]

♦ Subpoena former DOJ-NSD (National Security Division) head John Carlin, or haul him in front of a grand jury, and get his testimony about why he hid the abuse from the FISA court in October 2016; why the DOJ-NSD rushed the Carter Page application to beat NSA Director Admiral Mike Rogers to the FISA court; and why Carlin quit immediately thereafter.

♦ Prove the Carter Page FISA application (October 2016) was fraudulent and based on deceptions to the FISA Court. Declassify the entire document, and release the transcripts of those who signed the application(s); and/or depose those who have not yet testified. The creation of the Steele Dossier was the cover-up operation. [SEE HERE]

♦ Release all of the Lisa Page and Peter Strzok text messages without redactions. Let sunlight pour in on the actual conversation(s) that were taking place when Crossfire Hurricane (July ’16) and the FISA Application (Oct ’16) were taking place. The current redactions were made by the people who weaponized the intelligence system for political surveillance and spy operation. This is why Page and Strzok texts are redacted!

♦ Release all of Bruce Ohr 302’s, FBI notes from interviews and debriefing sessions, and other relevant documents associated with the interviews of Bruce Ohr and his internal communications. Including exculpatory evidence that Bruce Ohr may have shared with FBI Agent Joseph Pientka. [And get a deposition from this Pientka fella] Bruce Ohr is the courier, carrying information from those outside to those on the inside.

♦ Release the August 2nd, 2017, two-page scope memo provided by DAG Rod Rosenstein to special counsel Robert Mueller to advance the fraudulent Trump investigation, and initiate the more purposeful obstruction of justice investigation. Also Release the October 20th, 2017, second scope memo recently discovered. The Scope Memos are keys to unlocking the underlying spy/surveillance cover-up. [SEE HERE and SEE HERE]

 

Too Deep To Drain? – OIG Finds Preponderance of Evidence Against FBI Deputy Asst. Director – DOJ Refuses to Prosecute…


Citing the ongoing internal investigation of FBI leaks to media, from the 2018 OIG report on FBI conduct, today the Office of Inspector General outlined a preponderance of evidence against a corrupt FBI Deputy Asst. Director.  However, the DOJ is refusing to prosecute:

(Source)

The most alarming aspect is the OIG finding of the Deputy Asst. Director leaking grand jury information to the media, and yet the DOJ is declining to prosecute.

Incredibly, the inspector general (IG) indicated, without explanation, that “prosecution of the DAD [deputy assistant director] was declined.”  Instead, the investigation’s findings will be referred to the FBI for “appropriate action”.   What the hell is going on?

Unfortunately this is a pattern; and bears striking similarities to the FBI finding clear evidence of former Senate Intelligence Committee Security head James Wolfe leaking the classified FISA application on Carter Page, and yet never facing charges for those leaks.

From the 2018 OIG report, here is how Michael Horowitz explained the media leaking:

What do the following four points have in common?

  • The manipulated DC legal case surrounding the Awan brothers; and how they escaped full accountability, likely due to need to protect politicians. (House of Representatives) The sweetheart plea deal.
  • The manipulated DC legal case surrounding SSCI Security Director James Wolfe; and how he was allowed to plea only to lying to investigators when the evidence was clearfrom the outset how he leaked classified information to his journalist concubine. Again, likely due to the need to protect politicians. (SSCI, Senate) The sweetheart plea deal.
  • The manipulated DC legal case surrounding Obama lawyer Greg Craig; and how he escaped accountability for FARA violations by running out the statute of limitations and burying Mueller’s evidence for 18 months. Again, likely due to the need to protect politicians (Obama White House). Sweetheart double standards.
  • The manipulated DC legal case, a non-filing, surrounding former FBI Deputy Director Andrew McCabe for lying to INSD investigators about his media leaks. Again, likely due to the need to protect the administrative state. Criminal referral (April 19, 2018); grand jury (Approx. July 2018); Status?… Oh, wait for it….

If you note the common thread is: U.S. Attorney for DC, Jessie K Liu, well, you would be entirely accurate. Oh, but wait, we’ve only just begun.

Pay attention to the timelines.

While newly confirmed Attorney General William Barr was “getting his arms” around ongoing corruption within the organization he is now attempting to lead, there was an announcement on March 5th, about U.S. Attorney Jessie Liu becoming the #3 official at the DOJ.

Three weeks later, on March 28th, there was an announcement about a change of plans, and U.S. Attorney Jessie Liu’s name was withdrawn from consideration.

In addition to AG Bill Barr “getting his arms around” issues within the department, what else happened between March 5th and March 28th that would so drastically change plans for Ms. Liu?:

On March 21st Representatives Jim Jordan and Mark Meadows send a letter (full pdf available here) to Attorney General William Barr wanting to know what is the status of the year-old (April 19th, 2018) criminal referral for fired FBI Deputy Director Andrew McCabe. (link)

.

Answering the letter from Jordan and Meadows would be easy. The AG picks up the phone, calls Ms. Liu, asks the question and then sends back a response. Except, well, there was no response. Instead, a week after receiving the letter Ms. Liu’s name is withdrawn from consideration for promotion…. and later AG Barr admits there was ‘spying’.

Keep in mind Meadows and Jordan obviously suspected –as did we– that no DOJ case against McCabe was being pursued; after all, the evidence was previously gathered, it doesn’t take a year. Additionally, when Mark Meadows is directly asked about the status of this specific issue today with Maria Bartiromo what does he answer? He doesn’t… [watch the interview] he avoids the question completely.

Put it all together and be intellectually honest…. McCabe’s current non-worried book-tour status is directly in-line with the politically convenient Awan, Wolfe and Craig approach.

See the picture?

Obviously we don’t yet have a solid history to reference AG Barr’s motive and intentions (cautious optimism). However, granting benefit of doubt, CTH can imagine an eyes-wide-open diplomatic response from any Bill Barr ‘hands-around-it‘ line of inquiry….

Hence, Liu withdrawn.

Now some might ask why Barr would simultaneously make Jessie Liu the chair of the Attorney General Advisory Committee on the same day her name is withdrawn (March 28th announcement); however, Barr doesn’t have a choice about the DC U.S. Attorney sitting on the AGAC. By law [28 CFR § 0.10] the Attorney General can pick all of the AGAC members, with one exception. The DC U.S. Attorney is required to be a member.

[Nice little deep state continuity trick]

Given that Barr is bringing in people from outside the DOJ –specifically from his prior law practice- that he knows he can trust, CTH suspects Barr made Liu Chairwoman of the AGAC for two reasons: (1) keep eyes on her; and (2) busy her with administrative work.

But wait…. it gets better.

Accepting that Ms. Jessie Liu is a career participant in the DOJ aspects of deep state preservation; even acting in a role as Deputy Chief of Staff for the DOJ National Security Division (yes, the DOJ-NSD division at the heart of the FISA issues); and remembering that Ms. Liu was also a member of the Trump transition team…. well, who the hell recommended her for those roles?

Someone ‘inside’ the Trump operation had to recommend Jessie Liu as a member of the transition team knowing full well her ideology would protect the administrative state. Who was that person who recommended her, and brought her in?

Additionally, regarding the recent March 5th, 2019, recommendation for Associate Attorney General (position #3), there has to be a point-of-contact between the DOJ and the inner circle of the White House. A person who would carry a recommendation from the DOJ institution, internally, to President Trump. Who was/is that person specifically?

If the 2016/2017 recommending transition member is the same as the 2019 recommending administration member… well, that’s the person who is directly working to the detriment of President Trump’s agenda.

Again, for those who might prefer to look-away from cold data, go back to the four points of specific reference we started with and research:

  • The manipulated DC legal case surrounding the Awan brothers; and how they escaped full accountability, likely due to need to protect politicians. (House of Representatives) The sweetheart plea deal.
  • The manipulated DC legal case surrounding SSCI Security Director James Wolfe; and how he was allowed to plea only to lying to investigators when the evidence was clearfrom the outset how he leaked classified information to his journalist concubine. Again, likely due to the need to protect politicians. (SSCI, Senate) The sweetheart plea deal.
  • The manipulated DC legal case surrounding Obama lawyer Greg Craig; and how he escaped accountability for FARA violations by running out the statute of limitations and burying Mueller’s evidence for 18 months. Again, likely due to the need to protect politicians (Obama White House). Sweetheart double standards.
  • The manipulated DC legal case, a non-filing, surrounding former FBI Deputy Director Andrew McCabe for lying to INSD investigators about his media leaks. Again, likely due to the need to protect the administrative state. Criminal referral (April 19, 2018); grand jury (Approx. July 2018); Status?…

Look up those specific backstories.

Right there, in combination with the non-accountability outcomes of the two previous inspector general reports, is a big part of the corruption problem. If AG Bill Barr intends to save these institutions, he has his work cut out for him.

When we overlay a day when corrupt special prosecutor Robert Mueller takes to the podium to state prosecutors cannot prove guilt, but rather President Trump must prove his innocence; and simultaneously the DOJ refuses to prosecute a demonstrably corrupt Deputy Asst. Director…. Well, things are beyond FUBAR.

When we see that justice is measured, not by due process, but by compulsion; when we  see that in order to invoke our sixth amendment right to due process, we need to obtain permission from men who rebuke the constitution; when we see that justice is determined by those who leverage, not in law, but in politics; when we see that men get power over individual liberty by graft and by scheme, and our representatives don’t protect us against them, but protect them against us; when we see corruption holding influence and individual liberty so easily dispatched and nullified – we may well know that our freedom too is soon to perish…

Robert Mueller Delivers (Opening) Statement….


The ¹Scheme Team always had a central problem. Their plan needed to utilize the Weissmann-Mueller report, and standing testimonial support therein, as a launching platform for impeachment proceedings.  However, they also couldn’t have Mueller appear before congress because he would face questions that would expose & collapse the fraud.

After several weeks of “negotiations” (ie. discussions and planning sessions) by Chairman Jerry Nadler and the “small DOJ/FBI group” of political usurpers, they decided to have Mueller deliver an opening statement to congress, and then immediately leave without facing questions.  Today, Mueller did exactly that…

.

¹Scheme Team: Pelosi, Schumer, Nadler, Schiff, Cummings, Weissmann, Mueller, Rosenstein, Brennan, Clapper, Wray, Bowditch, Boente, Comey, McCabe, Baker, Yates, McCord, Carlin, Strzok, Page, Archey, Warner, Feinstein, et al.

For almost two years the professionally obtuse beltway punditry suspended disbelief and ridiculed anyone who acknowledged Robert Mueller was a corrupt member of the established DC system.  The media purposefully positioned Mueller as a Boy Scout unmotivated by politics.  However, in the most clear exhibition to date, today Mueller he showed his true colors.

 Julian Assange Indicted on 18 More Counts


Julian Assange of WikiLeaks was charged with conspiring to obtain national security secrets in what prosecutors have described as one of the largest compromises of classified information in U.S. history. They filed 18 new charges against Assange, which include allegations that he aided and abetted former Army intelligence analyst Chelsea Manning’s efforts to leak classified documents to the anti-secrecy group. Prosecutors alleged that Assange did so with reason to believe that the information would be used to injure the United States or help a foreign country.

The charges include one count of conspiracy to receive national security information, seven counts of obtaining it, nine counts of disclosing it and one count of conspiracy to commit computer intrusion. They also have argued that Assange also revealed the names of intelligence sources in Afghanistan, China, Iran, Iraq, and Syria. Naturally, they would love to imprison him for life, but will probably give him a number like 50 to 80 years so he remains there until he dies.

Assange was not charged for simply receiving classified documents like a journalist. They claim that no responsible journalist would release the classified names of intelligence sources. Therefore, they are seeking to distinguish him to avoid any claim of a journalist and First Amendment rights.

Trey Gowdy Discusses Sanctimonious James Comey…


Now that we are aware Trey Gowdy had written a letter to AG Eric Holder about the DOJ assembling research files on political targets in 2012, and then seemingly did nothing about it, his downstream commentary is even more, well, interesting.

In this interview, Trey Gowdy is discussing the current self-interested positioning of former FBI Director James Comey; and contrasts Comey’s current sanctimony against the reality of what FBI Special Agent Peter Strzok expressed.

SSCI Vice-Chairman Mark Warner Tells Intelligence Community to Defy Barr and Democrats Will Protect Them…


All of the same deep state actors/manipulators keep surfacing and resurfacing, like a game of whac-a-mole, as sunlight gets closer to revealing their corrupt behavior.

In the most recent example the familiar Senate Intelligence Committee Vice-Chairman Mark Warner pops his head-up to write a letter to the intelligence community telling them to defy the executive branch declassification directive, and turn to democrats in the legislative branch to defend them:

(Via AP) […] Sen. Mark Warner of Virginia, in a letter obtained by The Associated Press, said he fears Trump is giving Barr “the right to selectively declassify certain information for purposes of political gain.” He asked that the leaders of the nation’s spy agencies contact lawmakers if Barr’s investigation threatens their work.  (read more)

Laughably, predictably, and certainly not coincidentally, former FBI Director James Comey jumps quick to the typeset and writes a supportive op-ed for the Washinton Post:

As director, I was determined that the work would be done carefully, professionally and discreetly. We were just starting. If there was nothing to it, we didn’t want to smear Americans. If there was something to it, we didn’t want to let corrupt Americans know we were onto them. So, we kept it secret. That’s how the FBI approaches all counterintelligence cases.

Blah, blah, blah… squeal, squeal, squeal.

[…] We investigated. We didn’t gather information about the campaign’s strategy. We didn’t “spy” on anyone’s campaign. We investigated to see whether it was true that Americans associated with the campaign had taken the Russians up on any offer of help. By late October, the investigators thought they had probable cause to get a federal court order to conduct electronic surveillance of a former Trump campaign adviser named Carter Page. Page was no longer with the campaign, but there was reason to believe he was acting as an agent of the Russian government.  (read more)

So the most ‘competent’ investigative unit in the U.S. apparatus, had “reason to believe” Carter Page was an agent of the Russian government (he wasn’t/isn’t) and yet couldn’t figure that out after six months of investigative review?

That’s his story and Comey is sticking to it…  “By-the-book” etc.

Ridiculous.

Embarrassing.

And let us not forget, the FBI -led by Christopher Wray- is still fighting to keep the memos written by James Comey hidden from public review:

(Source pdf)

Following the conclusion of the Mueller probe, FBI Agent David Archey was moved. Effective March 8, 2019, Archey became head of the Richmond, VA, FBI field office. (link) Due to the corrupt nature of the special counsel, this is somewhat concerning. I digress…

The first three pages of the filing consist of David Archey explaining to the court that some of the material can be released, but other material must be withheld. He then goes on to reference two prior sealed attachments outlined as “Exhibit A” and “Exhibit B”.

“Exhibit A” is a filing from the FBI on January 31st, 2018, essentially supporting an earlier “in camera ex parte declaration” requesting continuance of a prior court order to keep the background material sealed from public view. In essence, the FBI didn’t want the public to know what was/is contained within the Comey memos (including the scale thereof).

“Exhibit B” is where the action is.

This is the original declaration outlining to the court on October 13th, 2017, why the Comey memos must be sealed. It is inside this exhibit where we discover there are many more memos than previously understood, and the content of those memos is far more exhaustive because James Comey documented the FBI investigation.

In essence Comey created these memos to cover his ass. (pg 13):

FBI Agent Archey then goes on to explain what is inside the memos: It is in this section where we discover that Comey made notes of his meetings and conversations with investigators.

Along with writing notes of the meetings and conversations, apparently Comey also made notes of the sources and methods associated with the investigation. Why would Comey generate classified information in these notes (sources and methods) unless he was just covering his ass because he knew the investigation itself was a risk…

The content of the memos seems rather exhaustive; it appears Comey is keeping a diary for use in the event this operation went sideways. (page #14, exhibit B)

All of those investigative elements would likely be contained in official FBI files and notes by the investigative agents. There is no need for a contemporaneous personal account of meeting content unless Comey was constructing memos for his own protection. These memos appear to be motivated by the same mindset that caused Susan Rice to generate her email to self on inauguration day.

In the next section FBI Agent David Archey explains the scale of the memos. There are obviously far more than previously discussed or disclosed publicly. Additionally, look carefully at the way the second part is worded.

Archey is saying Comey’s written recollections should be withheld because it might affect the testimony of people familiar with the “memorialized conversations”. (page #15, Exhibit B)

This is an October 2017 filing, Comey was fired May 9th. FBI Agent Archey is outlining Trump as the target who might have adjusted his testimony. Again, more evidence of the special counsel focus being motivated by the obstruction case they were hoping to build. [Reminder, Comey was still FBI director at the time these memos were written]

The next section gets to the heart of why the FBI wants to keep the Comey memos hidden and not released.

In this section Archey outlines how FBI Director James Comey wrote down who the sources were; what code-names were assigned; how those confidential sources engaged with FISA coverage initiated by the FBI; what foreign governments were assisting with their effort; and what the plans were for the investigation.

Again, why memorialize all of this classified information unless the Comey memos were intended as CYA protection for himself?

The good news is that AG William Barr can declassify the Comey Memos.  We now know there is a set of documents, a diary of sorts, that could be released.

The Mueller investigation is over.  If the FBI was running an honest and genuine investigation; what do they have to fear from the release of the Comey Memos now that the investigation is over.

Here’s the full filing:

Christopher Steele Refuses to be Questioned by DOJ Investigator John Durham…


Reuters is reporting the DNC paid Dossier author, Christopher Steele, is refusing to be questioned by DOJ investigator John Durham.  This follows a pattern of Chris Steele refusing to talk to congress and also refusing to talk to Inspector General Michael Horowitz.  Obviously, he has multiple somethings to hide….

WASHINGTON (Reuters) – The former British spy who produced a dossier describing alleged links between Donald Trump and Russia will not cooperate with a prosecutor assigned by U.S. Attorney General William Barr to review how the investigations of Trump and his 2016 election campaign began, a source with knowledge of the situation said.

Christopher Steele, a former Russia expert for the British spy agency MI6, will not answer questions from prosecutor John Durham, named by Barr to examine the origins of the investigations into Trump and his campaign team, said the source close to Steele’s London-based private investigation firm, Orbis Business Intelligence.

Trump has given Barr broad authority to declassify intelligence materials related to the investigations. Last week Trump ordered the heads of U.S. spy and law enforcement agencies to cooperate with Durham.  (read more)

The “Secret Research Project” – an IRS List, an NSA Database, and Resulting “Files” on Americans…


A carefully redacted footnote within a report by FISA Court Presiding Judge Rosemary Collyer has always appeared to be a clue to a domestic surveillance program.  Now details behind the redactions tell a concerning story.

A brief refresher is needed for those new to the story. In April 2017 Judge Collyer wrote a highly critical FISA Court opinion following discoveries by Director Admiral Rogers of government contractors accessing the NSA database, and extracting illegal search results from the electronic records of every American.

The scale of abuse was incredible [SEE HERE] and the surveillance issues had been covered up for years.  Collyer cited the Obama administration as having “an institutional lack of candor” in their responses to her and the FISA court.  The judge focused her criticism after a review of the period 2012 through April 2016.

Using the non-compliant admissions by NSA Director Mike Rogers and the results of the compliance audit, Judge Collyer used the period of November 2015 through April 2016 to gauge the scale of abuse at 85 percent. Eighty-five percent of all database search queries were unlawful, and she extended her analysis to say:

“while the government reports it is unable to provide a reliable estimate of [these non lawful searches] since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 period coincided with an unusually high error rate”.

Also this very important:

“many of these non-compliant queries involved the use of the same identifiers over different date ranges.”

Eight-five percent of all use/extraction of the NSA database was unlawful; and they were searching many of the same Americans (“identifier”), repeatedly, over different dates. This means specific Americans were being targeted, tracked and monitored… unlawfully.

Within the 99-page opinion from Judge Rosemary Collyer  she noted none of this FISA-702 database abuse was accidental. In a key footnote on page 87: Collyer outlined the years of unlawful violations was the result of “deliberate decisionmaking“:

This specific footnote, is key to peeling back the onion.

Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”.  This sentence exposes an internal decision; withheld from congress and the FISA court by the Obama administration; and outlines a process for access and distribution of surveillance data. Note: “no notice of this practice was given to the FISC until 2016“.

We feel confident we’ve now found the source of the “memorandum of understanding” that lies at the heart of the issue [Raw Doc Guidelines].

In March 2012 the Obama administration through Attorney General Eric Holder made changes to the exploitation of intelligence databases as noted in this Wall Street Journal article later in the year:

(December 2012 – WSJ) Top U.S. intelligence officials gathered in the White House Situation Room in March to debate a controversial proposal. Counterterrorism officials wanted to create a government dragnet, sweeping up millions of records about U.S. citizens—even people suspected of no crime.

Not everyone was on board. “This is a sea change in the way that the government interacts with the general public,” Mary Ellen Callahan, chief privacy officer of the Department of Homeland Security, argued in the meeting, according to people familiar with the discussions.

A week later, the attorney general signed the changes into effect.

The rules now allow the little-known National Counterterrorism Center to examine the government files of U.S. citizens for possible criminal behavior, even if there is no reason to suspect them. That is a departure from past practice, which barred the agency from storing information about ordinary Americans unless a person was a terror suspect or related to an investigation.

Now, NCTC can copy entire government databases—flight records, casino-employee lists, the names of Americans hosting foreign-exchange students and many others. The agency has new authority to keep data about innocent U.S. citizens for up to five years, and to analyze it for suspicious patterns of behavior. Previously, both were prohibited. Data about Americans “reasonably believed to constitute terrorism information” may be permanently retained.

The changes also allow databases of U.S. civilian information to be given to foreign governments for analysis of their own. In effect, U.S. and foreign governments would be using the information to look for clues that people might commit future crimes.  (more)

The 2012 changes, instituted by Eric Holder, permitted files of specific Americans to be generated under the auspices of potential terror threats.  The NSA databases could be exploited by the National Counterterrorism Center to extract content that would be contained within these files on targeted Americans.

Keep in mind this is early 2012, John Brennan is Deputy National Security Advisor and Asst. to President Obama for Homeland Security.

When Attorney General Eric Holder empowered the National Counterterrorism Center with this new authority, the office assigned to the data-collection was the Terrorist Threat Integration Center (TTIC).  The founder of the TTIC was John Brennan:

On 1 May 2003, the Terrorist Threat Integration Center (TTIC) opened its doors. Led by its first Director, John Brennan, TTIC filled its ranks with approximately three dozen detailees from across the US Government (USG) and was mandated to integrate CT capabilities and missions across the government. (link)

Also note the date of this DOJ Memorandum is March 2012:

Under the new rules issued in March, the National Counterterrorism Center, known as NCTC, can obtain almost any database the government collects that it says is “reasonably believed” to contain “terrorism information.”  (link)

The March 2012 date is right before the IRS scandal hit the headlines.

The IRS targeting scandal is where the term “Secret Research Project” originated as a description from the Obama team. It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller. It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

Why disks? Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS. All of the evidence within this sketchy operation came directly to the surface in spring 2012.

Here’s how it looks:

♦ In 2010 Eric Holder asked the IRS to send him the records of 501(c) non profit groups and individuals representing conservative voters. [LINK] Lois Lerner sent the DOJ 1.1 million pages of 501(c)(4) tax filing data. Including a very specific set of “33 Schedule B attachment files”. The Schedule B’s were specific to Large Conservative 501(c)(4) groups operating and organized to oppose the agenda of President Obama. The Schedule B’s include the donor lists of specific people and sub-groups attached to the 501(c)(4).

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

♦ In 2012 Eric Holder authorizes the use of government databases to search records of Americans and assemble “files” on potential targets. [Link] “The agency has new authority to keep data about innocent U.S. citizens for up to five years, and to analyze it for suspicious patterns of behavior.”

♦ In the period of 2012 through April 2016, According to FISA Judge Rosemary Collyer, there were tens of thousands of illegal (“non-compliant”) search queries of the NSA database targeting Americans.  The search results were unlawfully “extracted” to unknown entities.  Eighty-five out of every hundred searches were illegal (85% non-compliant rate).

Consider purposeful actions, as a political targeting operation, by weaponizing the systems of government.  Steps:

  • First, identify the targets (IRS Database).
  • Second, research the targets (NSA Database).
  • Third assemble files on the targets (DOJ Authorization).
  • Fourth use the files to leverage/destroy your opposition.

We now have evidence of the first three steps; and my hunch is if we apply hindsight a lot of unusual activity will now make sense.  We have been living inside the fourth step for a few years.  We noticed the consequences… but we only had suspicions, until now.

Fusion GPS was not hired to research Trump, the intelligence community was already doing surveillance and spy operations. The intelligence community needed Fusion GPS to give them a plausible justification for already existing surveillance and spy operations.

Fusion-GPS gave the Obama administration the justification they needed for a FISA warrant with the Steele Dossier. Ultimately that’s why the Steele Dossier is so important; without it, the DOJ and FBI are naked with their surveillance and database abuse.

At 12:15pm on January 20th, 2017, Obama’s outgoing National Security Advisor Susan Rice wrote a memo-to-self.  Many people have called this her “CYA” memo, from the position that Susan Rice was protecting herself from consequences if the scheme against President Trump was discovered.  Here’s the email:

On January 5, following a briefing by IC leadership on Russian hacking during the 2016 Presidential election, President Obama had a brief follow-on conversation with FBI Director Jim Comey and Deputy Attorney General Sally Yates in the Oval Office. Vice President Biden and I were also present.

President Obama began the conversation by stressing his continued commitment to ensuring that every aspect of this issue is handled by the Intelligence and law enforcement communities “by the book“.

The President stressed that he is not asking about, initiating or instructing anything from a law enforcement perspective. He reiterated that our law enforcement team needs to proceed as it normally would by the book.

From a national security perspective, however, President Obama said he wants to be sure that, as we engage with the incoming team, we are mindful to ascertain if there is any reason that we cannot share information fully as it relates to Russia.

[Redacted Classified Section of Unknown length]

The President asked Comey to inform him if anything changes in the next few weeks that should affect how we share classified information with the incoming team. Comey said he would.

Susan Rice ~ (pdf link)

Joe diGenova Discusses Declassification and Origin of Obama Political Surveillance Operation…


Former U.S. Attorney to the District of Columbia, Joe diGenova, discusses the declassification of intelligence documents relating to political surveillance; and the origin of the database abuses outlined by FISC Presiding Judge Rosemary Collyer…

.

With President Trump returning from Japan tomorrow (5/28); and with the upcoming state visit to the U.K. coming June 3rd; a declassification “window of opportunity” opens between this Wednesday 5/29 and Saturday 6/2.

Given last weeks visit to Main Justice by congressman Mark Meadows; and considering the visit was specifically to review unredacted Page-Strzok-McCabe messages; it could be surmised the first series of declassified documents might be those communiques. Additionally, John Solomon has stated “Bucket Five” is likely the first release prior to the IG report:

Bucket Five – Intelligence documents that were presented to the Gang of Eight in 2016 that pertain to the FISA application used against U.S. person Carter Page; including all exculpatory intelligence documents that may not have been presented to the FISA Court.  Presumably this would include the recently revealed State Dept Kavalac email; and the FBI transcripts from wiretaps of George Papadopoulos (also listed in Carter Page FISA).

Now that we have significant research files on the 2015 and 2016 political surveillance program; which includes the trail evident within the Weissmann/Mueller report; in combination with the Obama-era DOJ “secret research project” (their words, not mine); we are able to overlay the entire objective and gain a full understanding of how political surveillance was conducted over a period of approximately four to six years.

This is likely why there is institutional panic.

Working with a timeline, but also referencing origination material in 2015/2016 – CTH has tried to show how the program operated. The exploitation of government collected information explains an evolution from the IRS Files in 2010 to the FISA Files in 2016.

More importantly, research indicates the modern political exploitation of the NSA database, for weaponized intelligence surveillance of politicians, began mid 2012.

The FISA-702 database extraction process, and utilization of the protections within the smaller intelligence community, was the primary process. We start by reviewing the established record from the 99-page FISC opinion rendered by Presiding Judge Rosemary Collyer on April 26th, 2017; and explain the details within the FISC opinion.

I would strongly urge everyone to read the FISC report (full pdf below) because Judge Collyer outlines how the DOJ, which includes the FBI, had an “institutional lack of candor” in responses to the FISA court. In essence, the Obama administration was continually lying to the court about their activity, and the rate of fourth amendment violations for illegal searches and seizures of U.S. persons’ private information for multiple years.

Unfortunately, due to intelligence terminology Judge Collyer’s brief and ruling is not an easy read for anyone unfamiliar with the FISA processes outlined. The complexity also helps the media avoid discussing, and as a result most Americans have no idea the scale and scope of the issues. So we’ll try to break down the language.

.

For the sake of brevity and common understanding CTH will highlight the most pertinent segments showing just how systemic and troublesome the unlawful electronic surveillance was.

Early in 2016 NSA Director Admiral Mike Rogers was alerted to a significant uptick in FISA-702(17) “About” queries; these are searches using the FBI/NSA database that holds all metadata records on every form of electronic communication.

The NSA compliance officer alerted NSA Director Admiral Mike Rogers who then initiated a full compliance audit on/around March 9th, 2016, for the period of November 1st, 2015, through May 1st, 2016.

While the audit was ongoing, due to the severity of the results that were identified, Admiral Mike Rogers stopped anyone from using the 702(17) “about query” option, and went to the extraordinary step of blocking all FBI contractor access to the database on April 18, 2016(keep these dates in mind).

Here are some significant segments:

The key takeaway from these first paragraphs is how the search query results were exported from the NSA database to users who were not authorized to see the material. The FBI contractors were conducting searches and then removing, or ‘exporting’, the results. Later on, the FBI said all of the exported material was deleted.

Searching the highly classified NSA database is essentially a function of filling out search boxes to identify the user-initiated search parameter and get a return on the search result.

FISA-702(16) is a search of the system returning a U.S. person (“702”); and the “16” is a check box to initiate a search based on “To and From“. Example, if you put in a date and a phone number and check “16” as the search parameter the user will get the returns on everything “To and From” that identified phone number for the specific date. Calls, texts, contacts etc. Including results for the inbound and outbound contacts.

FISA-702(17) is a search of the system returning a U.S. person (702); and the “17” is a check box to initiate a search based on everything “About” the search qualifier. Example, if you put a date and a phone number and check “17” as the search parameter the user will get the returns of everything about that phone. Calls, texts, contacts, geolocation (or gps results), account information, user, service provider etc. As a result, 702(17) can actually be used to locate where the phone (and user) was located on a specific date or sequentially over a specific period of time which is simply a matter of changing the date parameters.

And that’s just from a phone number.

Search an ip address “about” and read all data into that server; put in an email address and gain everything about that account. Or use the electronic address of a GPS enabled vehicle (about) and you can withdraw more electronic data and monitor in real time. Search a credit card number and get everything about the account including what was purchased, where, when, etc. Search a bank account number, get everything about transactions and electronic records etc. Just about anything and everything can be electronically searched; everything has an electronic ‘identifier’.

The search parameter is only limited by the originating field filled out. Names, places, numbers, addresses, etc. By using the “About” parameter there may be thousands or millions of returns. Imagine if you put “@realdonaldtrump” into the search parameter? You could extract all following accounts who interacted on Twitter, or Facebook etc. You are only limited by your imagination and the scale of the electronic connectivity.

As you can see below, on March 9th, 2016, internal auditors noted the FBI was sharing “raw FISA information, including but not limited to Section 702-acquired information”.

In plain English the raw search returns were being shared with unknown entities without any attempt to “minimize” or redact the results. The person(s) attached to the results were named and obvious. There was no effort to hide their identity or protect their 4th amendment rights of privacy:

But what’s the scale here? This is where the story really lies.

Read this next excerpt carefully.

The operators were searching “U.S Persons”. The review of November 1, 2015, to May 1, 2016, showed “eighty-five percent of those queries” were unlawful or “non compliant”.

85% !! “representing [redacted number]”.

We can tell from the space of the redaction the number of searches were between 1,000 and 9,999 [five digits]. If we take the middle number of 5,000 – that means 4,250 unlawful searches out of 5,000.

The [five digit] amount (more than 1,000, less than 10,000), and 85% error rate, was captured in a six month period.

Also notice this very important quote: “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” So they were searching the same phone number, email address, electronic “identifier”, or people, repeatedly over different dates. Specific people were being tracked/monitored.

Additionally, notice the last quote: “while the government reports it is unable to provide a reliable estimate of” these non lawful searches “since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 coincided with an unusually high error rate”.

That means the 85% unlawful FISA-702(16)(17) database abuse has likely been happening since 2012. (Again, remember that date, 2012) Who was FBI Director? Who was his chief-of-staff? Who was CIA Director? ODNI? etc. Remember, the NSA is inside the Pentagon (Defense Dept) command structure. Who was Defense Secretary? And finally, who wrote and signed-off-on the January 2017 Intelligence Community Assessment?

Tens of thousands of searches over four years (since 2012), and 85% of them are illegal. The results were extracted for?…. (I believe this is all political opposition use; and I’ll explain why momentarily.)

OK, that’s the stunning scale; but who was involved?

Private contractors with access to “raw FISA information that went well beyond what was necessary to respond to FBI’s requests“:

And as noted, the contractor access was finally halted on April 18th, 2016.

[Coincidentally (or not), the wife of Fusion-GPS founder Glenn Simpson, Mary Jacoby, goes to the White House the next day on April 19th, 2016.]

None of this is conspiracy theory.

All of this is laid out inside this 99-page opinion from FISC Presiding Judge Rosemary Collyer who also noted that none of this FISA abuse was accidental in a footnote on page 87: “deliberate decisionmaking“:

This specific footnote, if declassified, would be key. Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”, this sentence has the potential to expose an internal decision; withheld from congress and the FISA court by the Obama administration; that outlines a process for access and distribution of surveillance data.

Note: “no notice of this practice was given to the FISC until 2016“, that is important.

Now, consider this footnote, and then reference THIS from 2012:

December 17, 2012

The Honorable Eric H. Holder, Jr.

Attorney General of the United States

United States Department of Justice

Washington, DC 20530

Dear General Holder:

Recently, the “Wall Street Journal” (WSJ) reported you granted the National Counterterrorism Center (NCTC) new powers to store dossiers on United States citizens, even if said citizens are not suspected of any criminal activity.

With these new powers, the NCTC would have the ability to copy entire government databases holding information on flight records, casino-employee lists, the names of Americans hosting foreign-exchange students, as well as other data.

The WSJ goes on to report the new rules allow the NCTC to keep data about innocent United States citizens for up to five years and to analyze it for suspicious patterns of behavior. Previously, both were prohibited.

If the WSJ report is accurate, these new powers represent a sweeping departure from past practices, which barred the NCTC from storing information about ordinary Americans unless a person was a terror suspect or the information sought was related to an investigation.

If the WSJ report is accurate, it raises numerous concerns and questions. As elected Representatives and members of the House Judiciary Committee, we are concerned such sweeping, fundamental changes would be made to existing policy without public input and Congressional approval. Changes, which fundamentally alter the relationship between the government and the governed, should only be made with input from the people by and through their elected Representatives. (more)

Summary of this aspect: The FISA court identified and quantified tens-of-thousands of search queries of the NSA/FBI database using the FISA-702(16)(17) system. The database was repeatedly used by persons with contractor access; who unlawfully searched and extracted the raw results without redacting the information; and shared it with an unknown number of entities.

The outlined process certainly points toward a political spying, surveillance, and file-building operation; and we are not the only one to think that’s what this system is being used for.

Back in 2017 when House Intelligence Committee Chairman Devin Nunes was working to reauthorize the FISA legislation, Nunes wrote a letter to ODNI Dan Coats about this specific issue:

SIDEBAR: To solve the issue, well, actually attempt to ensure it never happened again, NSA Director Admiral Mike Rogers eventually took away the “About” query option permanently in 2017. NSA Director Rogers said the abuse was so inherent there was no way to stop it except to remove the process completely. [SEE HERE] Additionally, the NSA database operates as a function of the Pentagon, so the Trump administration went one step further. On his last day as NSA Director Admiral Mike Rogers -together with ODNI Dan Coats- put U.S. cyber-command, the database steward, fully into the U.S. military as a full combatant command. [SEE HERE]

There is little doubt the FISA-702(16)(17) database system was used by Obama-era officials, from 2012 through April 2016, as a way to spy on their political opposition. Quite simply there is no other intellectually honest explanation for the scale and volume of database abuse that was taking place.

When we reconcile what was taking place and who was involved, then the actions of the exact same principle participants take on a jaw-dropping amount of clarity.

All of the action taken by CIA Director Brennan, FBI Director Comey, ODNI Clapper and Defense Secretary Ashton Carter make sense. Including their effort to get NSA Director Mike Rogers fired.

Everything after March 9th, 2016, was done to cover up the weaponization of the FISA database. [Explained Here] Spygate, Russia-Gate, the Steele Dossier, and even the 2017 Intelligence Community Assessment (drawn from the dossier and signed by the above) were needed to create a cover-story and protect themselves from discovery of this four year weaponization, political surveillance and unlawful spying. Even the appointment of Robert Mueller as special counsel makes sense; he was FBI Director when this began.

The beginning decision to use FISA(702) as a domestic surveillance and political spy mechanism appears to have started in/around 2012. Perhaps sometime shortly before the 2012 presidential election and before John Brennan left the White House and moved to CIA. However, there was an earlier version of data assembly that preceded this effort.

Political spying 1.0 was actually the weaponization of the IRS. This is where the term “Secret Research Project” originated as a description from the Obama team. It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller. It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

Why disks? Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS. All of the evidence within this sketchy operation came directly to the surface in early spring 2012.

The IRS scandal was never really about the IRS, it was always about the DOJ asking the IRS for the database of information. That is why it was transparently a conflict when the same DOJ was tasked with investigating the DOJ/IRS scandal. Additionally, Obama sent his chief-of-staff Jack Lew to become Treasury Secretary; effectively placing an ally to oversee/cover-up any issues. As Treasury Secretary Lew did just that.

Lesson Learned – It would appear the Obama administration learned a lesson from attempting to gather a large opposition research database operation inside a functioning organization large enough to have some good people that might blow the whistle.

The timeline reflects a few months after realizing the “Secret Research Project” was now worthless (June 2012), they focused more deliberately on a smaller network within the intelligence apparatus and began weaponizing the FBI/NSA database. If our hunch is correct, that is what will be visible in footnote #69:

Additionally, Matt Gaetz appears to have seen “a memo held in the Congressional Sensitive Compartmented Information Facility (SCIF) that contained previously-undisclosed information involving the Federal Bureau of Intelligence (FBI) and Department of Justice (DOJ).” [LINK]  Which sounds like the MOU in the footnote, and the memo that Trey Gowdy and Jason Chaffetz inquired about.

How this all comes together in 2019

Fusion GPS was not hired in April 2016 to research Donald Trump. As shown in the evidence provided by the FISC, the intelligence community was already doing surveillance and spy operations. The Obama administration already knew everything about the Trump campaign, and were monitoring everything by exploiting the FISA database.

However, after the NSA alerts in/around March 9th, 2016, and particularly after the April 18th shutdown of contractor access, the Obama intelligence community needed Fusion GPS to create a legal albeit ex post facto justification for the pre-existing surveillance and spy operations. Fusion GPS gave them that justification in the Steele Dossier.

That’s why the FBI small group, which later transitioned into the Mueller team, are so strongly committed to and defending the formation of the Steele Dossier and its dubious content. The Steele Dossier contains the cover-story and justification for the pre-existing surveillance operation.

During a rather innocuous podcast discussion panel April 12th, 2019, one of President Trump’s personal lawyers Jay Sekulow mentioned the FBI had three FISA applications denied by the FISA court in 2016. [Podcast Here – Note comment at 25:05] The denials were always suspected; however, until now no-one in/around the administration has ever confirmed.

If Sekulow is accurate, this adds additional context to the actions of the FBI in the aftermath of Admiral Mike Rogers and an increased urgency in gaining legal justification for surveillance and spy operation unlawfully taking place. A valid FISA warrant would help the FBI cover-up the surveillance. The likely targets were Manafort, Flynn and Papadopoulos…. but it appears the DOJ/FBI were rebuked.

These FISC denials would then initiate institutional panic dependent on the election outcome. An insurance policy would be needed. The Steele Dossier becomes the investigative virus the FBI wanted inside the system. To get the virus into official status, they used the FISA application as the delivery method and injected it into Carter Page. The FBI already knew Carter Page; essentially Carter Page was irrelevant, what they needed was the FISA warrant and the Dossier in the system {Go Deep}.

Fusion GPS was not hired to research Trump, the intelligence community was already doing surveillance and spy operations. The intelligence community needed Fusion GPS to give them a plausible justification for already existing surveillance and spy operations.

Fusion-GPS gave them the justification they needed for a FISA warrant with the Steele Dossier. Ultimately that’s why the Steele Dossier is so important; without it, the DOJ and FBI are naked with their FISA-702 abuse as outlined by John Ratcliffe.

No-one really knows the extent of the current documents and/or information that may be subject to the AG Bill Barr declassification. However, this is the original list as outlined in September 2018, and the agencies who would be involved in the declassification process:

  1. All versions of the Carter Page FISA applications (DOJ) (DoS) (FBI) (ODNI).
  2. All of the Bruce Ohr 302’s filled out by the FBI. (FBI) (ODNI)
  3. All of Bruce Ohr’s emails (FBI) (DOJ) (CIA) (ODNI), and supportive documents and material provided by Bruce Ohr to the FBI. (FBI)
  4. All relevant documents pertaining to the supportive material within the FISA application. (FBI) (DOJ-NSD ) (DoS) (CIA) (DNI) (NSA) (ODNI);
  5. All intelligence documents that were presented to the Gang of Eight in 2016 that pertain to the FISA application used against U.S. person Carter Page; including all exculpatory intelligence documents that may not have been presented to the FISA Court. (CIA) (FBI) (DOJ) (ODNI) (DoS) (NSA)
  6. All unredacted text messages and email content between Lisa Page and Peter Strzok on all devices. (FBI) (DOJ) (DOJ-NSD) (ODNI)
  7. The originating CIA “EC” or two-page electronic communication from former CIA Director John Brennan to FBI Director James Comey that started Operation Crossfire Hurricane in July 2016. (CIA) (FBI) (ODNI)

♦ President Trump can prove the July 31st, 2016, Crossfire Hurricane counterintelligence operation originated from a scheme within the intelligence apparatus by exposing the preceding CIA operation that created the originating “Electronic Communication” memo. Declassify that two-page “EC” document that Brennan gave to Comey. [The trail is found within the Weissmann report and the use of Alexander Downer – SEE HERE]

♦ Release and declassify all of the Comey memos that document the investigative steps taken by the FBI as an outcome of the operation coordinated by CIA Director John Brennan in early 2016. [The trail was memorialized by James Comey – SEE HERE]

♦ Reveal the November 2015 through April 2016 FISA-702 search query abuse by declassifying the April 2017 court opinion written by FISC Presiding Judge Rosemary Collyer. Show the FBI contractors behind the 85% fraudulent search queries. [Crowdstrike? Fusion-GPS? Nellie Ohr? Daniel Richman?] This was a weaponized surveillance and domestic political spying operation. [The trail was laid down in specific detail by Judge Collyer – SEE HERE]

♦ Subpoena former DOJ-NSD (National Security Division) head John Carlin, or haul him in front of a grand jury, and get his testimony about why he hid the abuse from the FISA court in October 2016; why the DOJ-NSD rushed the Carter Page application to beat NSA Director Admiral Mike Rogers to the FISA court; and why Carlin quit immediately thereafter.

♦ Prove the Carter Page FISA application (October 2016) was fraudulent and based on deceptions to the FISA Court. Declassify the entire document, and release the transcripts of those who signed the application(s); and/or depose those who have not yet testified. The creation of the Steele Dossier was the cover-up operation. [SEE HERE]

♦ Release all of the Lisa Page and Peter Strzok text messages without redactions. Let sunlight pour in on the actual conversation(s) that were taking place when Crossfire Hurricane (July ’16) and the FISA Application (Oct ’16) were taking place. The current redactions were made by the people who weaponized the intelligence system for political surveillance and spy operation. This is why Page and Strzok texts are redacted!

♦ Release all of Bruce Ohr 302’s, FBI notes from interviews and debriefing sessions, and other relevant documents associated with the interviews of Bruce Ohr and his internal communications. Including exculpatory evidence that Bruce Ohr may have shared with FBI Agent Joseph Pientka. [And get a deposition from this Pientka fella] Bruce Ohr is the courier, carrying information from those outside to those on the inside.

♦ Release the August 2nd, 2017, two-page scope memo provided by DAG Rod Rosenstein to special counsel Robert Mueller to advance the fraudulent Trump investigation, and initiate the more purposeful obstruction of justice investigation. Also Release the October 20th, 2017, second scope memo recently discovered. The Scope Memos are keys to unlocking the underlying spy/surveillance cover-up. [SEE HERE and SEE HERE]

Consequences of the EU Elections


Greek Prime Minister Alexis Tsipras has called a snap election after disappointing results from his party in the European Elections. His Syriza party was estimated to have received just 23.94% of votes in the elections, trailing behind its main opposition party New Democracy, which received 33.28%. A far-right party in Italy’s of Deputy Prime Minister Matteo Salvini has come out on top in Italy’s European parliamentary elections based on the exit polls. It certainly appears that Nigel Farage will come out on top in the UK. So far, we are looking at truly a sea-change in Europe.

Nevertheless, the European People’s Party in the European Parliament has influence in all the EU’s institutions and it will most likely remain with the greatest number of seats probably around 23%. It has been the largest political group in the European Parliament since 1999. In the European Council, 9 out of 28 Heads of State and Government belong to the EPP family and in the European Commission, 13 out of 27 Commissioners come from EPP parties. The EPP looks to be losing more than 40 seats.

The parties who seem to want reform should combine about 200 seats against about 540 seats. The question that will rise is how will Brussels react? Ignore it and push on or reform? It appears that there will not be a reform movement and Brussels will most likely try to paint this as a temporary populace fluke as did Washington Republicans with Trump