Rescue Operations Halted in Surfside Florida As Remaining Structure Shifts and Becomes Too Unstable, Biden Visits Rescue Workers


Posted originally on the conservative tree house on July 1, 2021 | Sundance | 139 Comments

There are numerous laser guided measuring devices located in and around the remaining structure of the collapsed condominiums in Surfside, Florida.  Overnight those devices detected significant movement in the remaining building as well as large cracks developing in the underground garage area.

As a result rescue and recovery workers were pulled from the building as engineers contemplate how to move forward.

(Herald) […] Miami-Dade Fire Rescue Chief Alan Cominsky confirmed the development during a press briefing on Thursday morning. The agonizing decision, he said, was made just after 2 a.m. Cominsky described the threat of a large concrete column hanging over a subterranean parking area, which has moved six to 12 inches. He added that crews were also alerted to widening cracks and “slight movement” in a concrete slab on the southern side of the building.

High-tech monitors aimed at the tenuous pile of debris were responsible for making rescue workers aware of the dangerous shifts. Moments later, they were forced to lower cranes and pull back crews under the darkness of the early morning. (link)

Before the efforts were suspended the recovery workers had pulled more bodies from the rubble. 18 bodies have now been recovered and 145 people remain missing. These unfortunate developments occur as the installed occupant of the White House arrived to thank first-responders and rescue workers for their efforts.

Biden met with around 50 uniformed first responders in a hotel ballroom. “I just wanted to come down and say thanks,” he said, as his monitor Jill Biden stood closely behind him in case her dementia patient started to lose more marbles. Florida Governor Ron DeSantis told the visiting entourage “We thank you for the support, there’s been no bureaucracy. What we need now is we need a little bit of luck, a little bit of prayer.”

The instability of the rescue site provided serendipitous cover for the DC crowd to avoid going to the horrific site of the building collapse. FEMA personnel, The Red Cross, people with the State of Emergency Response Team, and teams from Israel and Mexico are on-site helping with rescue efforts.

Additionally, Tropical Storm Elsa is anticipated to move close to the South Florida area this weekend and early next week [NHC SITE].  In addition to the instability of the rescue site, the weather has been an ongoing battle.

Supreme Court Upholds Arizona Voting Reforms With 6-3 Ruling – Justice Alito: Preventing Voter Fraud is a “strong and entirely legitimate state interest”


Posted originally on the conservative tree house on July 1, 2021 | Sundance | 215 Comments

A major win for voting integrity laws in the Supreme Court today will enhance the ability of all state legislatures, and further define the parameters and hurdles for lower court activists before they can rule against the rights of states to secure their elections.

The 6-3 ruling (Bryer, Sotomayor, Kagan in dissent) stems from a challenge to the 2016 Arizona election reform that banned ballot harvesting (with some exceptions) and nullified any ballot cast in the wrong precinct.  Democrats and political activists argued the Arizona rules were targeted to restrict minority votes; however, the majority of the court dispatched that argument and went a step further to define how lower courts should approach claims of ‘disparate impact’.

Front row, left to right: Associate Justice Samuel A. Alito, Jr., Associate Justice Clarence Thomas, Chief Justice John G. Roberts, Jr., Associate Justice Stephen G. Breyer, and Associate Justice Sonia Sotomayor. Back row, left to right: Associate Justice Brett M. Kavanaugh, Associate Justice Elena Kagan, Associate Justice Neil M. Gorsuch, and Associate Justice Amy Coney Barrett.

Justice Samuel Alito wrote the decision [pdf available HERE] and strongly defended the ability of states to put voting rules in place that eliminates voter fraud.  Alito concluded the ruling of the majority by stating courts should look at the reason why states want to impose a particular voting rule. Wanting to prevent voter fraud is, Alito made clear, a “strong and entirely legitimate state interest.”

The result is a complete win for the State of Arizona [Brnovich v. Democratic National Committee] and a strong boost for all state legislatures who are currently in the process of creating legislation to combat the voting fraud created by excessive use of mail-in ballots, ultimately the strategy purposefully behind the creation of COVID-19.

SCOTUS BLOG – […] “The Democratic National Committee went to federal court in 2016, arguing that both restrictions violated Section 2 of the Voting Rights Act. The U.S. Court of Appeals for the 9th Circuit agreed, but the Supreme Court decided to review that decision, and on Thursday it reversed.

In his opinion, Alito observed that the Supreme Court has never weighed in on a Section 2 challenge to a law regulating the “time, place, or manner” of voting. Rather, voting-rights advocates have typically used Section 2 to bring “vote-dilution” lawsuits – challenges to redistricting maps that are alleged to dilute minorities’ voting power.

The “core” of Section 2, Alito emphasized, is the “requirement that voting be ‘equally open.’” And the determination of whether voting is “equally open” to all, he added, should be made taking all of the circumstances into account.  (continue reading)

Democrats and the installed current occupant of the White House, a cognitively declining figurehead who benefited from wholesale voter fraud and mail-in ballot manipulation, are apoplectic at the decision by the supreme court. Joe Biden issued a statement criticizing the supreme court’s decision to uphold two voting restrictions in Arizona.

“I am deeply disappointed in today’s decision by the United States Supreme Court that undercuts the Voting Rights Act, and upholds what Justice Kagan called ‘a significant race-based disparity in voting opportunities,’” the installed executive decried.   The people behind the installation shake their fists because the court’s decision comes as various state legislators are making it much more difficult to cheat.   [White House Statement HERE]

House Votes to Approve January 6th Select Committee 222-190, Cheney and Kinzinger Vote With Pelosi and 19 Republicans Did Not Vote


Posted originally on the conservative tree house on June 30, 2021 | Sundance | 253 Comments

The House of Representatives voted today to approve a House Select Committee to investigate the January 6th DC protest.  The vote was 222-190 [LINK] to approve House Resolution 503, with Liz Cheney and Adam Kinzinger voting to support the Pelosi mid-term election scheme.

The January 6th House Select Committee investigation is to MAGA voters what the Mueller Investigation was to President Trump. A tool to attack political opposition and frame a narrative for the 2022 mid-term election. Nothing more.

Beyond the votes to approve there were 19 representatives who did not vote.  It does not go unnoticed that every single non-vote was a republican representative.  [link]

The Republicans who did not vote include: Jodey C Arrington (TX-19th CD), Jim Banks (IN-3rd CD), Earl “Buddy” Carter (GA-1st CD), Michael Cloud (TX-7th CD), Russ Fulcher (ID-1st CD), Louie Gohmert (TX-1st CD), Bob Good (VA-5th CD), Yvette Herrell (NM-2nd CD), Clay Higgins (LA-3rd CD), Darrell Issa (CA-50th CD), Ronny Jackson (TX-13th CD), Mike Johnson (LA-4th CD), Mary Miller (IL-15th CD), August Pfluger (TX-11th CD), John Rose (TN-6th CD), Chip Roy (TX-21st CD), Thomas Tiffany (WI-7th CD), Randy Weber (TX-14th CD), Roger Williams (TX-25th CD).

A non-vote is essentially a vote to approve.  Keep in mind, some of the Texas delegation may have been at the U.S-Mexico border event with President Trump; bad timing, but ok.  However, the rest of the Republican non-votes should be must be questioned by their constituents for why they are essentially supporting Nancy Pelosi’s scheme by not voting against it.  This is a critical point in history, question your representatives.

[Pictured Above, “did not vote” – NOTE: Roger Williams (TX-25th CD) missing from group picture]

WASHINGTON DC – […] Speaker Nancy Pelosi will have the final say over the panel’s GOP members, assuming House Minority Leader Kevin McCarthy appoints them at all. But many in her caucus are still anxious about the prospect of Republicans starting another bitter fight by trying to appoint members who voted against certifying President Joe Biden’s win.

[…] Pelosi has signaled she wants one of her eight appointments to the Jan. 6 committee to be a Republican, and Democrats speculate that outspoken Trump critics like Cheney and Kinzinger could be chosen. The speaker declined to say Tuesday whether she would veto any GOP select panel members who opposed certifying Biden’s victory, and declined again Wednesday to discuss the committee’s makeup.

[…]  Asked about his five picks for the panel, McCarthy has repeatedly declined to comment on who he might choose. He might also decline to appoint members at all, a decision that could help the GOP leader avoid such a highly charged issue within his conference. Out of their roughly 200-member conference, two-thirds voted not to certify the president’s Electoral College win.

Rep. Jim Jordan (R-Ohio), a close Trump ally, told POLITICO that no decisions had been made yet by McCarthy (read more).

January 6th Select Committee will be entirely run by democrats and their Lawfare operatives within staff. The purpose of the select committee will carry the same intents as the Mueller investigation in 2017 through 2019: to frame a narrative against their political opposition. The difference this time will be that President Trump is not the sole target; the Pelosi January 6th committee will be using Alinsky methods to target Trump voters.

Because the larger mid-term election operation requires it, the House Select Committee was a foregone conclusion.  The only question was how many DeceptiCons would join with Pelosi to execute it.  If Republicans are smart, not likely, the entire GOP House caucus should boycott the insufferable pantomime, leave the stage, let the Democrats do their silly show…. and use Alinsky moves against the Left by ridiculing and marginalizing their performances in real time.

Alas, the GOP are an insufferably annoying and predictable bunch of purposeful idiots, and -as a result- they will likely end up participating because they will say they need to counter the Leftist narrative or something… and the only way they can do that is by providing the democrats with legitimacy. This is how DeceptiCons roll.

Do not be naive to think the GOP want the FBI involvement in the January 6 events to be exposed any more than the Republican wing of the UniParty wanted to see the IRS targeting of conservative groups exposed. The vast majority of DC republicans want to see the MAGA base destroyed just like they wanted to see the Tea Party base destroyed so they could get back to the business of self-indulgence in 2012.

Investigations are only done by DC to serve their own interests.  Sometimes those interests are in throwing a bag over DC corruption: Fast n Furious, Benghazi Committee, IRS scandal and the VA scandal for recent reference points.  However, sometimes those DC interests are best protected by targeting opposition to DC itself, just like the Weissmann/Mueller special counsel and the upcoming House Select Committee.

Again, the legislative branch was/is working with the executive branch on the common objectives of a corrupt intelligence apparatus, that includes the FBI {examples here}. So the legislative branch is not going to investigate intelligence community or FBI corruption.  The HPSCI and SSCI are participants in the corruption, they will not investigate themselves regardless of whether Democrats or Republicans control the chambers.  This is not a partisan issue.

The Senate Select Committee on Intelligence (SSCI) was not only involved in the intelligence targeting of President Trump through surveillance and counterintelligence operations; the SSCI was actively participating in that targeting and doing everything they could to assist the FBI, DOJ and Intelligence community (IC) on that goal.

The MAGA voters (the republican base) will be targeted, ridiculed and marginalized in the run up to the 2022 election. They will be made to look like domestic terrorists, “Domestic Violent Extremists”, and much worse as defined by narrative engineering between a corrupt House, corrupt FBI, and a corrupt U.S. corporate media. That is the entire purpose of Nancy Pelosi’s House Select Committee.

The only way to avoid the scheme is not to play the game.

As we always note, watch who wants to participate from the GOP side of the aisle.  Those are the DeceptiCons, the implants into the system purchased by larger elements like BlackRock financial.  DeceptiCons are essentially interchangeable with BlackRock Republicans.  The system, the administrative state, is designed this way….  The parties are clubs presented to give the illusion of choice.  Those who control the outcomes of government are never on a ballot.

Tucker Carlson Pushing Back Against NSA Surveillance, However The Intelligence Branch of Government is Much Larger Than Most Consider


Posted originally on the conservative tree house on July 1, 2021 | Sundance | 26 Comments

Tucker Carlson used his TV broadcast on Wednesday night to continue pushing-back against NSA operational data collection that appears to have caught him in their surveillance dragnet.  However, what Carlson (and many others) have yet to reconcile is the totality of control held by the newest branch of government, the Intelligence Branch.

CTH has been contacted by numerous interested stakeholders in the larger dynamic.  Tomorrow we hope to be able to give readers an explanation of exactly how each traditional branch of government; including the administrative agencies within them; have been taken over by a methodical expansion of the Intelligence Community.  Everything is now controlled by the Intelligence Branch, and the underlying mechanisms of government have abdicated, perhaps even abandoned, their oversight.

In the interim, here’s the latest segment from Carlson along with one of CTH earlier outlines on how the NSA database became a surveillance tool for President Barack Obama.  We are almost 15 years into a process that facilitates the Intelligence Branch as the most powerful -and unelected- governmental system.  After the Carlson segment remind yourself how President Obama exploited a process he created.

There is no workable solution to debate until the American people and congressional representatives admit and accept the totality of the current corrupt system.  In essence, until everyone realizes there is a fourth branch of government now in control.

The process to create the Intelligence Branch started around the time the office of the DNI was created (post 9/11/01).  However, it was President Obama and AG Eric Holder who took advantage of the framework the ODNI system created with an immediate and methodical plan in 2008.  The effectiveness of what they constructed shows up toward the end of the Obama presidency when they were using that system to assist Hillary Clinton.

That is the context to remember a time-frame between December 2015 and April 2016 when the NSA database was being exploited by contractors within the intelligence community, using windows opened by the Obama-era DOJ/FBI, to facilitate unauthorized searches.

On March 9, 2016, oversight personnel doing a review of FBI system access were alerted to thousands of unauthorized search queries of specific U.S. persons within the NSA database.

NSA Director Mike Rogers was made aware.

Subsequently NSA Director Rogers initiated a full compliance review of the system to identify who was doing the searches; & what searches were being conducted.

On April 18, 2016, following the preliminary audit results, Director Rogers shut down all FBI contractor access to the database after he learned FISA-702 “about”(17) and “to/from”(16) search queries were being done without authorization. Thus begins the first discovery of a much bigger background story.

When you compile the timeline with the people involved; and the specific wording of the resulting review, which was then delivered to the FISA court; and overlay the activity that was taking place in the GOP primary; what we discover is a process where the metadata collected by the NSA was being searched for political opposition research and surveillance.

Additionally, tens-of-thousands of searches were identified by the FISA court as likely extending much further than the compliance review period: “while the government reports it is unable to provide a reliable estimate of the non compliant queries since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 period coincided with an unusually high error rate”.

In short, during the Obama administration the NSA database was continually used to conduct surveillance. This is the critical point that leads to understanding the origin of “Spygate”, as it unfolded in the Spring and Summer of 2016.

It was the discovery of the database exploitation and the removal of access as a surveillance tool that created their initial problem. Here’s how we can tell.

Initially in December 2015 there were 17 GOP candidates and all needed to be researched.

However, when Donald Trump won New Hampshire, Nevada and South Carolina the field was significantly whittled. Trump, Cruz, Rubio, Kasich and Carson remained.

On Super Tuesday, March 2, 2016, Donald Trump won seven states (VT, AR, VA, GA, AL, TN, MA) it was then clear that Trump was the GOP frontrunner with momentum to become the presumptive nominee. On March 5th, Trump won Kentucky and Louisiana; and on March 8th Trump won Michigan, Mississippi and Hawaii.

The next day, March 9th, NSA security alerts warned internal oversight personnel that something sketchy was going on.

This timing is not coincidental. As FISA Judge Rosemary Collyer later wrote in her report, “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” Put another way: attributes belonging to a specific individual(s) were being targeted and queried, unlawfully. Given what was later discovered, it seems obvious the primary search target, over multiple date ranges, was Donald Trump.

There were tens-of-thousands of unauthorized search queries; and as Judge Collyer stated in her report, there is no reason to believe the 85% non compliant rate was any different from the abuse of the NSA database going back to 2012.

As you will see below the NSA database was how political surveillance was being conducted during Obama’s second term in office. However, when the system was flagged, and when NSA Director Mike Rogers shut down “contractor” access to the system, the system users needed to develop another way to get access.

Mike Rogers shuts down access on April 18, 2016. On April 19, 2016, Fusion-GPS founder Glenn Simpson’s wife, Mary Jacoby visits the White House. Immediately thereafter, the DNC and Clinton campaign contract Fusion GPS… who then hire Christopher Steele.

Knowing it was federal “contractors”, outside government with access to the system, doing the unauthorized searches, the question becomes: who were the contractors?

The possibilities are quite vast. Essentially anyone the FBI or intelligence apparatus was using could have participated. Crowdstrike was a known FBI contractor; they were also contracted by the DNC. Shawn Henry was the former head of the FBI office in DC and is now the head of Crowdstrike; a rather dubious contractor for the government and a politically connected data security and forensic company. James Comey’s special friend Daniel Richman was an unpaid FBI “special employee” with security access to the database. Nellie Ohr began working for Fusion-GPS on the Trump project in November 2015 and she was a CIA contractor; and it’s entirely likely Glenn Simpson or people within his Fusion-GPS network were also contractors for the intelligence community.

Remember the Sharyl Attkisson computer intrusions? It’s all part of this same network; Attkisson even names Shawn Henry as a defendant in her ongoing lawsuit.

All of the aforementioned names, and so many more, held a political agenda in 2016.

It seems likely if the NSA flags were never triggered then the contracted system users would have continued exploiting the NSA database for political opposition research; which would then be funneled to the Clinton team. However, once the unauthorized flags were triggered, the system users (including those inside the official intelligence apparatus) needed to find another back-door to continue… Again, the timing becomes transparent.

Immediately after NSA flags were raised March 9th; the same intelligence agencies began using confidential human sources (CHS’s) to run into the Trump campaign. By activating intelligence assets like Joseph Mifsud and Stefan Halper the IC (CIA, FBI) and system users had now created an authorized way to continue the same political surveillance operations.

When Donald Trump hired Paul Manafort on March 28, 2016, it was a perfect scenario for those doing the surveillance. Manafort was a known entity to the FBI and was previously under investigation. Paul Manafort’s entry into the Trump orbit was perfect for Glenn Simpson to sell his prior research on Manafort as a Trump-Russia collusion script two weeks later.

The shift from “unauthorized exploitation of the NSA database” to legally authorized exploitation of the NSA database was now in place. This was how they continued the political surveillance. This is the confluence of events that originated “spygate”, or what officially blossomed into the FBI investigation known as “Crossfire Hurricane” on July 31.

If the NSA flags were never raised; and if Director Rogers had never initiated the compliance audit; and if the political contractors were never blocked from access to the database; they would never have needed to create a legal back-door, a justification to retain the surveillance. The political operatives/contractors would have just continued the targeted metadata exploitation.

Once they created the surveillance door, Fusion-GPS was then needed to get the FBI known commodity of Chris Steele activated as a pipeline. Into that pipeline all system users pushed opposition research. However, one mistake from the NSA database extraction during an “about” query shows up as a New Yorker named Michael Cohen in Prague.

That misinterpreted data from a FISA-702 “about query” is then piped to Steele and turns up inside the dossier; it was the wrong Michael Cohen. It wasn’t Trump’s lawyer, it was an art dealer from New York City with the same name; the same “identifier”.

A DEEP DIVE – How Did It Work?

Start by reviewing the established record from the 99-page FISC opinion rendered by Presiding Judge Rosemary Collyer on April 26, 2017. Review the details within the FISC opinion.

I would strongly urge everyone to read the FISC report (full pdf below) because Judge Collyer outlines how the DOJ, which includes the FBI, had an “institutional lack of candor” in responses to the FISA court. In essence, the Obama administration was continually lying to the FISA court about their activity, and the rate of fourth amendment violations for illegal searches and seizures of U.S. persons’ private information for multiple years.

Unfortunately, due to intelligence terminology Judge Collyer’s brief and ruling is not an easy read for anyone unfamiliar with the FISA processes. That complexity also helps the media avoid discussing it; and as a result most Americans have no idea the scale and scope of the Obama-era surveillance issues. So we’ll try to break down the language.

.For the sake of brevity and common understanding CTH will highlight the most pertinent segments showing just how systemic and troublesome the unlawful electronic surveillance was.

Early in 2016 NSA Director Admiral Mike Rogers was alerted of a significant uptick in FISA-702(17) “About” queries using the FBI/NSA database that holds all metadata records on every form of electronic communication.

The NSA compliance officer alerted Admiral Mike Rogers who then initiated a full compliance audit on/around March 9th, 2016, for the period of November 1st, 2015, through May 1st, 2016.

While the audit was ongoing, due to the severity of the results that were identified, Admiral Mike Rogers stopped anyone from using the 702(17) “about query” option, and went to the extraordinary step of blocking all FBI contractor access to the database on April 18, 2016 (keep these dates in mind).

Here are some significant segments:

The key takeaway from these first paragraphs is how the search query results were exported from the NSA database to users who were not authorized to see the material. The FBI contractors were conducting searches and then removing, or ‘exporting’, the results. Later on, the FBI said all of the exported material was deleted.

Searching the highly classified NSA database is essentially a function of filling out search boxes to identify the user-initiated search parameter and get a return on the search result.

♦ FISA-702(16) is a search of the system returning a U.S. person (“702”); and the “16” is a check box to initiate a search based on “To and From“. Example, if you put in a date and a phone number and check “16” as the search parameter the user will get the returns on everything “To and From” that identified phone number for the specific date. Calls, texts, contacts etc. Including results for the inbound and outbound contacts.

♦ FISA-702(17) is a search of the system returning a U.S. person (702); and the “17” is a check box to initiate a search based on everything “About” the search qualifier. Example, if you put a date and a phone number and check “17” as the search parameter the user will get the returns of everything about that phone. Calls, texts, contacts, geolocation (or gps results), account information, user, service provider etc. As a result, 702(17) can actually be used to locate where the phone (and user) was located on a specific date or sequentially over a specific period of time which is simply a matter of changing the date parameters.

And that’s just from a phone number.

Search an ip address “about” and read all data into that server; put in an email address and gain everything about that account. Or use the electronic address of a GPS enabled vehicle (about) and you can withdraw more electronic data and monitor in real time. Search a credit card number and get everything about the account including what was purchased, where, when, etc. Search a bank account number, get everything about transactions and electronic records etc. Just about anything and everything can be electronically searched; everything has an electronic ‘identifier’.

The search parameter is only limited by the originating field filled out. Names, places, numbers, addresses, etc. By using the “About” parameter there may be thousands or millions of returns. Imagine if you put “@realdonaldtrump” into the search parameter? You could extract all following accounts who interacted on Twitter, or Facebook etc. You are only limited by your imagination and the scale of the electronic connectivity.

As you can see below, on March 9th, 2016, internal auditors noted the FBI was sharing “raw FISA information, including but not limited to Section 702-acquired information”.

In plain English the raw search returns were being shared with unknown entities without any attempt to “minimize” or redact the results. The person(s) attached to the results were named and obvious. There was no effort to hide their identity or protect their 4th amendment rights of privacy; and database access was from the FBI network:

But what’s the scale here? This is where the story really lies.

Read this next excerpt carefully.

The operators were searching “U.S Persons”. The review of November 1, 2015, to May 1, 2016, showed “eighty-five percent of those queries” were unlawful or “non compliant”.

85% !! “representing [redacted number]”.

We can tell from the space of the redaction the number of searches were between 10,000 and 99,999 [six digits]. If we take the middle number of 50,000 – a non compliant rate of 85 percent means 42,500 unlawful searches out of 50,000.

The [six digit] amount (more than 10,000, less than 99,999), and 85% error rate, was captured in a six month period, November 2015 to April 2016.

Also notice this very important quote: “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” This tells us the system users were searching the same phone number, email address, electronic identifier, repeatedly over different dates.

Specific person(s) were being tracked/monitored.

Additionally, notice the last quote: “while the government reports it is unable to provide a reliable estimate of” these non lawful searches “since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 coincided with an unusually high error rate”.

That means the 85% unlawful FISA-702(16)(17) database abuse has likely been happening since 2012.

2012 is an important date in this database abuse because a network of specific interests is assembled that also shows up in 2016/2017:

  • Who was 2012 FBI Director? Robert Mueller, who was selected by the FBI group to become special prosecutor in 2017.
  • Who was Mueller’ chief-of-staff? Aaron Zebley, who became one of the lead lawyers on the Mueller special counsel.
  • Who was 2012 CIA Director? John Brennan (remember the ouster of Gen Petraeus)
  • Who was ODNI? James Clapper.
  • Remember, the NSA is inside the Pentagon (Defense Dept) command structure. Who was Defense Secretary? Ash Carter

Who wanted NSA Director Mike Rogers fired in 2016? Brennan, Clapper and Carter.

And finally, who wrote and signed-off-on the January 2017 Intelligence Community Assessment and then lied about the use of the Steele Dossier? The same John Brennan, and James Clapper along with James Comey.

Tens of thousands of searches over four years (since 2012), and 85% of them are illegal. The results were extracted for?…. (I believe this is all political opposition use; and I’ll explain why momentarily.)

OK, that’s the stunning scale; but who was involved?

Private contractors with access to “raw FISA information that went well beyond what was necessary to respond to FBI’s requests“:

And as noted, the contractor access was finally halted on April 18th, 2016.

[Coincidentally (or likely not), the wife of Fusion-GPS founder Glenn Simpson, Mary Jacoby, goes to the White House the very next day on April 19th, 2016.]

None of this is conspiracy theory.

All of this is laid out inside this 99-page opinion from FISC Presiding Judge Rosemary Collyer who also noted that none of this FISA abuse was accidental in a footnote on page 87: “deliberate decisionmaking“:

This specific footnote, if declassified, could be a key. Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”, this sentence has the potential to expose an internal decision; withheld from congress and the FISA court by the Obama administration; that outlines a process for access and distribution of surveillance data.

Note: “no notice of this practice was given to the FISC until 2016“, that is important.

Summary: The FISA court identified and quantified tens-of-thousands of search queries of the NSA/FBI database using the FISA-702(16)(17) system. The database was repeatedly used by persons with contractor access who unlawfully searched and extracted the raw results without redacting the information and shared it with an unknown number of entities.

The outlined process certainly points toward a political spying and surveillance operation; and we are not the only one to think that’s what this system is being used for.

Back in 2017 when House Intelligence Committee Chairman Devin Nunes was working to reauthorize the FISA legislation, Nunes wrote a letter to ODNI Dan Coats about this specific issue:

[SIDEBAR: To solve the issue, well, actually attempt to ensure it never happened again, NSA Director Admiral Mike Rogers eventually took away the “About” query option permanently in 2017. NSA Director Rogers said the abuse was so inherent there was no other way to stop it except to remove the process completely. [SEE HERE]

Additionally, the NSA database operates as a function of the Pentagon, so the Trump administration went one step further. On his last day as NSA Director Admiral Mike Rogers -together with ODNI Dan Coats- put U.S. cyber-command, the database steward, fully into the U.S. military as a full combatant command. [SEE HERE] Unfortunately it didn’t work as shown by the 2018 FISC opinion rendered by FISC Judge James Boasberg [SEE HERE]   NOTE: In hindsight I believe Coats and Rogers moved Cyber-Command into the Pentagon in order to bury the corruption more deeply away from any potential oversight.]

There is little doubt the FISA-702(16)(17) database system was used by Obama-era officials, from 2012 through April 2016, as a way to spy on their political opposition.

Quite simply there is no other intellectually honest explanation for the scale and volume of database abuse that was taking place; and keep in mind these searches were all ruled to be unlawful. Searches for repeated persons over a period time that were not authorized.

When we reconcile what was taking place and who was involved, then the actions of the exact same principle participants take on a jaw-dropping amount of clarity.

All of the action taken by CIA Director Brennan, FBI Director Comey, ODNI Clapper and Defense Secretary Ashton Carter make sense. Including their effort to get NSA Director Mike Rogers fired.

Everything after March 9th, 2016, had a dual purpose: (1) done to cover up the weaponization of the FISA database. [Explained Here] Spygate, Russia-Gate, the Steele Dossier, and even the 2017 Intelligence Community Assessment (drawn from the dossier and signed by the above) were needed to create a cover-story and protect themselves from discovery of this four year weaponization, political surveillance and unlawful spying. Even the appointment of Robert Mueller as special counsel makes sense; he was FBI Director when this began. And (2) they needed to keep the surveillance going.

The beginning decision to use FISA(702) as a domestic surveillance and political spy mechanism appears to have started in/around 2012. Perhaps sometime shortly before the 2012 presidential election and before John Brennan left the White House and moved to CIA. However, there was an earlier version of data assembly that preceded this effort.

Political spying 1.0 was actually the weaponization of the IRS. This is where the term “Secret Research Project” originated as a description from the Obama team. It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller. It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

Why disks? Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS. All of the evidence within this sketchy operation came directly to the surface in early spring 2012.

The IRS scandal was never really about the IRS, it was always about the DOJ asking the IRS for the database of information. That is why it was transparently a conflict when the same DOJ was tasked with investigating the DOJ/IRS scandal. Additionally, Obama sent his chief-of-staff Jack Lew to become Treasury Secretary; effectively placing an ally to oversee/cover-up any issues. As Treasury Secretary Lew did just that.

Lesson Learned – It would appear the Obama administration learned a lesson from attempting to gather a large opposition research database operation inside a functioning organization large enough to have some good people that might blow the whistle.

The timeline reflects a few months after realizing the “Secret Research Project” was now worthless (June 2012), they focused more deliberately on a smaller network within the intelligence apparatus and began weaponizing the FBI/NSA database. If our hunch is correct, that is what will be visible in footnote #69:

How this all comes together in 2019/2020

Fusion GPS was not hired in April 2016 to research Donald Trump. As shown in the evidence provided by the FISC, the intelligence community was already doing surveillance and spy operations. The Obama administration already knew everything about the Trump campaign, and were monitoring everything by exploiting the FISA database.

However, after the NSA alerts in/around March 9th, 2016, and particularly after the April 18th shutdown of contractor access, the Obama intelligence community needed Fusion GPS to create a legal albeit ex post facto justification for the pre-existing surveillance and spy operations. Fusion GPS gave them that justification in the Steele Dossier.

That’s why the FBI small group, which later transitioned into the Mueller team, were so strongly committed to and defending the formation of the Steele Dossier and its dubious content.

The Steele Dossier, an outcome of the Fusion contract, contains two purposes: (1) the cover-story and justification for the pre-existing surveillance operation (protect Obama); and (2) facilitate the FBI counterintelligence operation against the Trump campaign (assist Clinton).

An insurance policy would be needed. The Steele Dossier becomes the investigative virus the FBI wanted inside the system. To get the virus into official status, they used the FISA application as the delivery method and injected it into Carter Page. The FBI already knew Carter Page; essentially Carter Page was irrelevant, what they needed was the FISA warrant and the Dossier in the system {Go Deep}.

The Obama intelligence community needed Fusion GPS to give them a plausible justification for already existing surveillance and spy operations. Fusion-GPS gave them that justification and evidence for a FISA warrant with the Steele Dossier.

Ultimately that’s why the Steele Dossier was so important; without it, the FBI would not have a tool that Mueller needed to continue the investigation of President Trump. In essence by renewing the FISA application, despite them knowing the underlying dossier was junk, the FBI was keeping the surveillance gateway open for Team Mueller to exploit later on.

Additionally, without the Steele Dossier the DOJ and FBI would be naked with their FISA-702 abuse as outlined by John Ratcliffe.

In this video NSA Director Mike Rogers explains how he was notified of what was happening and what he did after the notification.  It should be noted, as explained by Director Rogers, that after the NSA purged their files of the unlawful search results, the compliance officer kept the audit logs of who was doing the illegal queries.  If we did not have a completely compromised legislative and executive branch, those NSA audit logs would be a good place for any inspector general to start digging. 

.

President Trump Returns to the U.S-Mexico Border, Full Remarks With Governor Greg Abbott, Video


Posted originally on the conservative tree house on June 30, 2021 | Sundance | 119 Comments

President Donald J Trump returns to the U.S-Mexico border in Texas.

Full video of speech below, but first the intro a little fun video/audio mix (turn up volume) which includes Liz Harrington, Steven Miller and Dan Scavino arriving with President Trump and Texas Governor Greg Abbott at the partially completed border wall Joe Biden abandoned. [Rumble Link]

.

Here’s the video of President Trump’s remarks at the border wall with Texas Governor Greg Abbott:

Supreme Court of PA Overturns Conviction and Releases Bill Cosby


Posted originally on the conservative tree house on June 30, 2021 | Sundance | 259 Comments

Jumpin’ jello molds… The supreme court of Pennsylvania has found the Philadelphia DA violated an immunity agreement with Bill Cosby and overturned his conviction saying: “it is the only remedy that comports with society’s reasonable expectations of its elected prosecutors and our criminal justice system.”  The court called the arrest of Mr. Cosby “an affront to fundamental fairness, particularly when it results in a criminal prosecution that was forgone for more than a decade.”

The prior conviction of the 83-year-old Cosby was overturned and any future prosecution is barred; a substantive position from the judiciary.

PENNSYLVANIA – PHILADELPHIA (AP) — Pennsylvania’s highest court threw out Bill Cosby’s sexual assault conviction and released him from prison Wednesday in a stunning reversal of fortune for the comedian once known as “America’s Dad,” ruling that the prosecutor who brought the case was bound by his predecessor’s agreement not to charge Cosby.

Cosby, 83, had served nearly three years of a three- to 10-year sentence after being found guilty of drugging and violating Temple University sports administrator Andrea Constand at his suburban Philadelphia home in 2004. He was the first celebrity tried and convicted in the #MeToo era.

The former “Cosby Show” star was arrested in 2015, when a district attorney armed with newly unsealed evidence — the comic’s damaging deposition in a lawsuit filed by Constand — brought charges against him days before the 12-year statute of limitations was about to run out. (READ MORE)

President Trump and Texas Governor Greg Abbott Hold a Border Security Briefing


Posted originally on the conservative tree house on June 30, 2021 | Sundance | 144 Comments

Democrats, the MSM and the administrative state writ large are pulling out all the stops to distract from toxic headlines running against their interests today.  One of the important stories today is President Trump traveling to Texas for a border security meeting with Governor Greg Abbott.

The president and governor hold a roundtable briefing with some media present. Video Below:

New York City Mayoral Race Becomes a Hot Mess of Electronic Errors, Wrong Votes, Tabulation Mistakes and Uncertain Results


Posted originally on the conservative tree house on June 30, 2021 | Sundance | 121 Comments

Wait, it’s impossible for election results to be electronically manipulated yet the New York city board of elections is now saying the entire mayoral race was messed up because electronic tabulation errors and test ballots and stuff.

The same officials who denounce any questions about voting outcomes in the 2020 presidential race are now saying the tabulation of the 2021 Mayoral race was wrong.  The Democrat New York City Mayor even calls for a full and immediate recanvassing today, while the Democrat DOJ says recanvassing the vote in Arizona is akin to voter intimidation.

It’s all a hot mess… because, well, communists are generally hypocritical by intent.

NEW YORK (AP) — The Democratic primary for mayor of New York City was thrown into a state of confusion Tuesday when election officials retracted their latest report on the vote count after realizing it had been corrupted by test data never cleared from a computer system.

The bungle was a black mark on New York City’s first major foray into ranked choice voting and seemed to confirm worries that the city’s Board of Elections, which is jointly run by Democrats and Republicans, was unprepared to implement the new system.

[…] Then the Board of Elections tweeted that it was aware of “a discrepancy” in its report on ranked choice voting results. It didn’t initially explain what that discrepancy was, even as it pulled the data from its website.

Just before 10:30 p.m. it released a statement saying that 135,000 ballot images it had put into its computer system for testing purposes had never been cleared.

“The Board apologizes for the error and has taken immediate measures to ensure the most accurate up to date results are reported,” it said in a statement. (continue reading)

Barr Didn’t Find Election Fraud


Posted Originally on GrrrGraphics.com on JUN 28, 2021 AT 3:39 PM

I see nothing!

Bill Barr didn’t see the ballot fraud around him because he refused to look for it and now he says it never existed! The Deep State Swamp promised Barr that he would become a ‘rising star’ in the Republican party if he thwarted Trump.

Backstabber Barr tarnished his own Attorney General star by doing so.

Barr belongs in the Swamp along with the rest of the RINOs who readily and eagerly backstabbed the president.

—Ben Garrison

Deep State puppet Trojan horse Joe Biden signed a “New Atlantic Charter”



First published on BITCHUTE at 23:04 UTC on June 28th, 2021 by The New America

Deep State puppet Trojan horse Joe Biden signed a “New Atlantic Charter” that lays the groundwork for more globalism and Big Government, warns Behind The Deep State host Alex Newman in this episode. The new charter, a play off FDR’s “Atlantic Charter” with Winston Churchill, calls for all the globalist Deep State’s policies to be implemented internationally. The plan also calls for stepping up the fight against critics of this diabolical agenda.

video image