Woke Corporatism Expands – Major League Baseball Pulls All Star Game from Georgia Due to Voter Integrity Law


Posted originally on the conservative tree house April 2, 2021 | Sundance | 362 Comments

This is another step on the continuum.  It is remarkable how many corporations; and yes, professional sports are corporations first and foremost; are willing to collapse their business model on behalf of wokeism and political ideology.   However, that said, this is a predictable step when you think about our earlier discussions of blue regions and red regions and how they would break-down in a soft civil war surrounding politics and freedom.

Major League Baseball (MLB) has announced they will not hold the All Star game in Georgia due to the recently passed law ensuring voting integrity.

If we are to follow the progression of this continuum, we will see further division of our nation based on leftist politics.  Eventually you get to a situation where the Red State -vs- Blue State issues (Red Region/Blue Region) will break down into liberty and freedom zones (red), and totalitarian control or communal zones (blue).

Exactly as we have been predicting for over a decade.

Corporate Woke Culture (Delta Airlines, Coca Cola, Apple) Targets Georgia Politics and Voter ID Laws


Posted originally on the conservative tree house April 1, 2021 | Sundance | 217 Comments

Let’s first get things in the correct perspective.  The loud voices of the far-left (Media Matters, Act Blue, Share Blue, and all sub-groups therein) do an excellent job pressuring private industry to go along with their cultural wokeisms.  They are a minority group, but they are loud and their Big Tech allies control the mechanisms that make the appearance of their voice seem bigger and larger than it is.

This approach has been progressively true since 2007.  As a consequence they have an organized activation system to immediately target corporations to put pressure on them to respond to the approved politics of the left.

In the aftermath of the 2020 election, the Georgia legislature went to work reforming their election laws to make voter fraud harder, and election integrity a priority.  This triggered the activist network; who then notify their leftist subsidiaries to swarm their corporate contacts.  Now we are seeing the results of that activation.

What results is a major hypocritical position from the corporations who concede to the demands of the wokeists.  Delta airlines puts out a statement against the Georgia election reform… but you need an ID to board a Delta flight.  Apple puts out a statement deriding the Georgia election reform…. but you need an Apple ID to engage with Apple products, and there’s a password on an Apple phone for a reason, DUH!

But yet again, always remember…. In order for the far left to advance their political ideology they have to pretend not to know things.  That is the essential underpinning of the hypocrisy they must ignore.

♦ Via NBC – CEOs for Delta Airlines and Coca-Cola came out in strong opposition to Georgia’s recently passed voting law on Wednesday, both calling the law “unacceptable.”

On Wednesday morning, Delta CEO Ed Bastian said in a memo to employees that the law is “unacceptable and does not match Delta’s values.”

“Let me be crystal clear and unequivocal, this legislation is unacceptable,” Coca-Cola CEO James Quincey said later that day on CNBC. (read more)

♦ WASHINGTON  – Apple CEO Tim Cook criticized Georgia’s new voting law in an interview with Axios published on Thursday, joining a growing number of CEOs who have condemned the new measure, which is seen as making it more difficult for Blacks and other minority groups to vote.

“The right to vote is fundamental in a democracy. American history is the story of expanding the right to vote to all citizens, and Black people, in particular, have had to march, struggle and even give their lives for more than a century to defend that right,” Cook told Axios.

The Georgia voting legislation was signed by Gov. Brian Kemp (R) last week. The laws limit the use of ballot drop boxes, create new voter ID requirements and prohibit people other than poll workers from giving food and drink to voters standing in line at polls. (read more)

.

Corporatism merges with Technocrats

Here’s The Trump Interview Facebook Banned – Lara Trump Interviews President Donald J Trump


Posted originally on the conservative tree house March 31, 2021 | Sundance | 172 Comments

Facebook and Instagram have banned all sharing of President Trump (or his surrogates that speak on his behalf) from their platform.  Here is the interview that precipitated their action.

Wherever and whenever possible, throw sand into the BIG TECH machine…  Advance the message.  Rally to the standard.

The radical leftists (communists) are scared.  Control is a reaction to fear.

Notice From Eric Trump – All First Person Trump Content, in Trump Voice or Surrogate Statement, is Banned From Facebook and Instagram


Posted originally on the conservative tree house March 31, 2021 | Sundance | 251 Comments

Wow.  Big Tech is taking the censorship and deplatforming of President Donald J Trump to entirely new levels according to new information provided by Eric Trump.  In  a twitter message today, Eric Trump shares the following:

(Source)

This is quite a stunning statement from Facebook; even considering the prior ideological position(s) of Big Tech.

If the message is accurate, anyone who speaks on behalf of Donald Trump, and/or anyone show shares communication, statements or official replies from the “voice” of Donald Trump, will have their content removed.  This applies to any/all campaign surrogates and spokespeople for President Trump.

This “guidance” is simply an outlandish position that only highlights how Big Tech views President Trump, and by extension his MAGA supporters, as a threat to advancing their political ideology.   Banning and removing content based on the origination of that content is a control effort on steroids.

Control is a reaction to fear, never forget that.

This approach is beyond fascism and far beyond socialism… this is totalitarianism.

I have never advocated for departure from any social media platform because I strongly believe we fight where the enemy is.  Retreat is not an option, fight them where they exist and do not pull-back from the ideological argument because MAGA is the message of the American majority.  Some may be inclined to withdraw from Facebook and Instagram based on this new “guidance” as expressed.  Fair enough…. However…..

If you have already made the decision to withdraw from the social media battlespace, let me propose another approach, MAKE THEM BAN YOU!

If mentally you have already made the decision to depart, there is nothing to lose.  Do not take your voice out of the fight, without making them target and remove your voice.  Proclaim your voice.  Proudly proclaim your position.  Do not just simply withdraw, make them deal with you as an insurgent or dissident voice in the ideological combat.

Taking this approach shows them our numbers.  Taking this approach forces them to see, forces them into engagement, and forces them to take action upon their chosen position.   Do not go quietly into that collectivist good-night.  Stand in the position of righteousness.   Stand defiantly and force them to remove you.  Do not just withdraw.

What approach that confrontation takes is entirely up to you.  However, one additional benefit is the community of your friends and family on those social media platforms will see what content their ideological hatred is opposed to.

Consider the example of CTH deplatforming.  By refusing to silence or moderate our voice with WordPress/Automattic we forced them to a position where they would have to take action to remove  that voice.  When WP/AutoMattic took that action they showed the world community what they were doing.  CTH had nothing to fear, we had done nothing wrong; we were transparent.  However, the audience who reviewed our analysis, and many of them are not in alignment with the CTH outlook, were stunned by the WordPress/Automattic decision.

Sunlight is the best disinfectant.  Do not let the enemy succeed by walking away from the engagement.  Force them to surface.

If you have already chosen to disengage, you have nothing to lose.  Post pro-Trump content on your social media (FaceBook/Instagram), and share the Trump voice from him and surrogates as you would normally.  Do not voluntarily disengage.  Show them your voice, and by extention show them the size of our community.  Make them take the action.

The Danger of Deplatforming Trump


Armstrong Economics Blog/Conspiracy Re-Posted Mar 31, 2021 by Martin Armstrong

I really do not care if Karl Marx had a Twitter today and was posting all sorts of things. BigTech is censoring content that they do not like. This is destroying the internet and it always seems to come back to this idea of monopoly and control, no different than the robber barons of the late 19th century. When Facebook and Twitter first began, they were what us coders call open platform. There were people who were even setting up Twitter APIs. Then the robber baron idea took hold, which shut open access down and built a wall around their platform to create a monopoly.

The robber barons of the 19th century were seen as evil. Their ideas of control, competition, and monopolies are certainly alive and well today in Big Tech. The entire Anti-Trust action forced Bill Gates to step down as Microsoft’s dominant control was due to his constant drive to put any competition out of business. The case was over Netscape, which was really the first internet browser. To put them out of business, Gates included a browser for free.

The business model that all of these new robber barons use is to sell your private information to others. Microsoft constantly updates your computer, not for your benefit, but to see what you are searching for to create a profile to sell to others. Google tracks everything you search. Facebook does the same and all of these robber barons have systematically destroyed the internet. No one really understood what they were doing until they rigged the 2020 Presidential election when they permanently de-platformed Donald Trump in a deliberate move to prevent him from running again. They did the same to Nigel Farage in Britain when he was going to try to form another party. This time, they refused to cover anything he had in mind to ensure that the COVID-19 agenda would destroy the British economy. It is now a £5000 fine if you lie and take a vacation outside of Britain. They have created the new version of the Berlin Wall that should just be called Johnson’s Anti-Human Rights Wall.

The excuse to ban Trump was that the protest on the Capitol might lead to violence. Yet, Black Lives Matter protesters and Antifa protesters are routinely marching, yelling to burn the Capitol down, and that does not seem to be an issue. In Washington, the National Guard was armed. In Seatle, they were unarmed.

Among programmers, we have what is called “open source,” meaning you have access to the code to make alterations. The new Big Tech robber barons have shut down the internet and now have control to de-platform anyone at any time. They have destroyed the original design and purpose of the internet and pose a serious threat to our liberty and society’s development going forward. They are not moved by the sharp rise in teenage suicides. No doubt, they celebrate behind closed doors that they are reducing the population. Even this vaccine causes the body to produce antibodies, but there is no understanding of whether it generates antibodies for some other purpose. Many are deeply concerned that this experiment may backfire and eradicate natural immunities to diseases that were once cured. They refuse to respond and just call such questions “conspiracy theory” rather than address anything of substance. Yet, Big Tech goes out of its way to remove any challenge to vaccines whatsoever as if they are new medical experts.

The idea that the internet would expand the human knowledge base with its open-source structure has now been destroyed by the Big Tech robber barons. The Sherman Anti-Trust Act was designed to end the age of robber barons. Today, the Democrats support them because they also want to shut down free speech and all dissent. Of course, this is impacting governments worldwide who do not see this as a good idea. The open door structure of the internet is coming to an end. Now that politics is involved, those who think they can create a new open internet using blockchain overlook one small problem — politics. When Amazon was faced with allowing employees to mail-in ballots to see if they should unionize, they immediately challenged mail-in voting as unreliable.

What began with Trump spread like a bush fire in California and engulfed everything. It set a precedent that anyone can be canceled, and therein lies the tyranny. The internet’s very survival suddenly comes into question, for as YouTube has demonstrated, anything that offends their political agenda violates their community guidelines.

Congressman Matt Gaetz Claims Former DOJ Lawyer David McGee Was Extorting Him Amid a Bizarre FBI Sting Operation


Posted originally on the conservative tree house March 30, 2021 | Sundance | 266 Comments

Two people inside the DOJ leaked a story about Matt Gaetz (R-FL) being under DOJ/FBI investigation to the New York Times.  The essential elements of the article are that Gaetz had a relationship with a 17-year-old woman, and paid for her to travel; ergo the DOJ/FBI is investigating “sex trafficking.”   Presumably AG Bill Barr opened the investigation. However, Matt Gaetz vehemently denies everything about the claims, and instead says the FBI and DOJ were recently conducting a sting operation -with his cooperation- against a former DOJ lawyer named David McGee who was extorting Gaetz for $25 million.

According to Gaetz his father was contacted by McGee in March of this year and told he would release the details of a relationship with the woman if Gaetz did not pay $25 million.  Gaetz contacted the FBI, and his father wore a wire in his conversation with McGee where the FBI were recording the extortion attempt.  Now that someone has leaked the erroneous background of the investigation to the New York Times, Gaetz is demanding the DOJ release the tapes of the extortion attempt.

Tonight Matt Gaetz appeared on Tucker Carlson to discuss the details of the situation.  Apparently there was an FBI sting operation underway which included a payment tomorrow.  The New York Times article tipped-off McGee to the sting.  Congressman Gaetz denies any wrongdoing, legal or otherwise, and denies paying for a minor to cross state lines to meet him.  When Carlson asked Gaetz who was the former DOJ official attempting extortion, Gaetz named David McGee, a former DOJ lawyer currently working for Beggs and Lane lawfirm.  WATCH:

Matt Gaetz: “What is happening is an extortion of me and my family involving a former Department of Justice official. On March 16th, my father got a text message demanding a meeting wherein a person demanded $25 million in exchange for making horrible sex trafficking allegations of me go away. Our family was so troubled by that we went to the local FBI and the FBI and the Department of Justice were so concerned about this, that they asked my dad to wear a wire. Which he did with the former Department of Justice official. Tonight I am demanding that the Department of Justice and the FBI release the audio recordings that were made under their supervision and at their direction which will prove me innocence. These allegations are true and they were meant to bleed my family. This former Department of Justice official tomorrow was supposed to be contacted by my father so that specific instructions could be given regarding the wiring of $4.5 million as a down payment on this bribe. I don’t think it’s a coincidence that tonight somehow The New York Times is leaking this information, smearing me and ruining the investigation.”

Tucker Carlson: …”First of all, who is this Department of Justice former employee who is trying to extort the money from you.”

Gaetz: “His name is David McGee

.

Why Biden’s First Executive Order was Illegal


Armstrong Economics Blog/Rule of Law Re-Posted Mar 30, 2021 by Martin Armstrong

QUESTION: Mr. Armstrong, you have been silent about the border crisis that Biden seems to have created while blaming Trump claiming the people were already on their way here. It seems like he shut down the funding simply because it was a Trump initiative. Would you comment, please?

HS

ANSWER: What Biden did was illegal. Trump made border wall construction a key 2016 campaign promise. He had to fight many battles with Congress over that bill. Interestingly, on his very first day in office, Biden used his executive authority to stop building the wall. That was ILLEGAL because Congress approved $1.4 billion for the measure as part of a $900 billion stimulus package bill to offset losses incurred by the COVID-19 pandemic. This is the problem. You will never know the real people who are running the country. They make up these executive orders, and Biden just signs them. Nobody bothered to check that the funding was authorized by Congress, which an executive order cannot nullify. Then they talk openly about giving illegal aliens citizenship, and a hoard of people are heading for the USA. You can bet that terrorists are also now sneaking in the same way.

If Congress passes a law, then the president cannot simply write an executive order that reverses the decision. What he did violated the very foundation of a republic, but the press will never challenge him on anything.

Sidney Powell – Her Side


Armstrong Economics Blog/Opinion Re-Posted Mar 24, 2021 by Martin Armstrong

As I stated, Sidney Powell’s legal argument was simply that there was no harm even if she had just made up the story, which she states she did not. CNN misrepresented what her brief states:

“Powell, who repeatedly pressed unfounded claims of voter fraud on the airwaves and in court, now says that “reasonable” people would not accept her statements as “fact” because the legal process hadn’t yet played out. It was a stunning admission from a woman who served for a time as one of Trump’s top legal lieutenants.”

CNBC also engaged in Fake News saying “‘no reasonable person’ believes election claims were ‘statements of fact’ when the bref is quoting the legal standard id/p27. The leftist press is cherry-picking words and trying to say that Powell has admitted her statements were false. Nowhere in the brief does she admit such a fact.

I have gotten a copy of her reply brief (read here: Powell Reply Brief) and I must say, Fake News is twisting the story again. The pertinent section reads:

“All the allegedly defamatory statements attributed to Defendants were made as part of the normal

process of litigating issues of momentous significance and immense public interest,”

Reasonable people understand that the “language of the political arena, like the language
used in labor disputes … is often vituperative, abusive and inexact.” Watts v. United States, 394
U.S. 705, 708 (1969). It is likewise a “well recognized principle that political statements are
inherently prone to exaggeration and hyperbole.” Planned Parenthood of Columbia/Willamette,
Inc. v. Am. Coal. of Life Activists, 244 F.3d 1007, 1009 (9th Cir. 2001). Given the highly charged
and political context of the statements, it is clear that Powell was describing the facts on which she
based the lawsuits she filed in support of President Trump. Indeed, Plaintiffs themselves
characterize the statements at issue as “wild accusations” and “outlandish claims.” Id. at ¶¶ 2, 60,
97, 111. They are repeatedly labelled “inherently improbable” and even “impossible.” Id. at ¶¶
110, 111, 114, 116 and 185. Such characterizations of the allegedly defamatory statements further
support Defendants’ position that reasonable people would not accept such statements as fact but
view them only as claims that await testing by the courts through the adversary process.
Furthermore, Sidney Powell disclosed the facts upon which her conclusions were based.
“[W]hen a defendant provides the facts underlying the challenged statements, it is ‘clear that

the challenged statements represent his own interpretation of those facts,’ which ‘leav[es] the reader
free to draw his own conclusions.’” Bauman, 377 F. Supp. 3d at 11 at n. 7 (citations omitted). The
documents supporting the various lawsuits were made available to the public on the DTR website,
as the Complaint makes clear. See, e.g., Compl. at ¶¶ 6, 77, 82, 85, 87, 89. Similarly, all the
documents related to the election lawsuits filed were publicly available through the websites of the
various courts.12 Likewise, on December 23, 2020, the Complaint alleges, Powell published a 270-
page document to the Zenger News website. She added a link to the Zenger website on her own
website with the caption, “READ IT: SIDNEY POWELL BINDER OF ELECTION FRAUD
EVIDENCE.” Id. at ¶ 149.

Most of the brief deals with the fact that they deliberately filed in Washington assuming that is a Democrat-controlled court so they are seeking political favoritism. Sidney Powell really had no connection to Washington and claiming she represented Flynn in DC has nothing to do with this case. It should be dismissed or sent to Texas where she is a resident but neither Dominion nor Powell are in DC. That is very strange, to begin with.

The claim that “no reasonable person would have believed” which some media claims to have quoted, simply does not exist in her reply brief. They are quoting cases that people normally assume political speech “is often vituperative, abusive and inexact.”

As I said, I understand her legal argument, but she should have known that arguing EVEN IF the statements were wrong, is still political speech, and protected by the First Amendment was not the best argument. As I have also said, the only way to prove allegations of fraud against Dominion will require access to the program code. That cannot be determined from the results. I still believe that the fraud was with the mail-in ballots. It may have existed in the machine counts, but that could only be established by accessing the programs. If I were her, I would not go after all the program source code, the names of every programmer who EVER worked on the project. Dominion must have been out of their mind to file such a lawsuit.

Stunning DOJ Hubris – Prosecutor Claims Charges of Sedition Possible in January 6th Protest


Posted originally on the conservative March 22, 2021 | Sundance | 317 Comments

The DOJ and FBI appear to be maintaining an aggressive posture against their political opposition on behalf of the ongoing ‘domestic extremist’ narrative.  In a remarkable statement prosecutor Michael Sherwin claims that charges of sedition are possible for those who attended the January 6th protest in DC against the outcome of the 2020 election.

Conducting political surveillance, abusing the NSA database by extracting personal information in violation of the fourth amendment, lying to a FISA court to get a title-1 surveillance warrant against Donald Trump’s campaign, fabricating a false Trump-Russia conspiracy theory, pushing knowingly false information to the media to support a fraudulent investigation, initiating a special counsel to hide the trail of wrongdoing; and the FBI conducting political operations against the Trump administration, was apparently no big deal. However, attend a protest against the corrupt interests of the deep state in DC and you are guilty of “sedition.”

The weaponized institutions of government are openly displaying their intent now.

WASHINGTON DC – Michael Sherwin, the federal prosecutor tasked with investigating the Jan. 6 riot at the Capitol, told “60 Minutes” in an interview that aired Sunday night evidence collected thus far likely meets the threshold to charge some suspects with sedition.

Any person charged with sedition is effectively accused of attempting to overthrow the U.S. government and faces up to 20 years in prison if convicted.

Scott Pelley, the correspondent, pointed out that the U.S. government has not charged anyone tied to the riot with sedition, but he quoted the statute and said that it seems like a “very low bar” to bring the charge.

Sherwin disagreed.  “But I will tell you this,” he said. “I personally believe the evidence is trending towards that, and probably meets those elements.” (read more)

WATCH THE SEGMENT:

Consider…. During the time-frame of December 2015 through April 2016 the NSA database was being exploited by contractors within the intelligence community doing unauthorized searches.

On March 9, 2016, oversight personnel doing a review of FBI system access were alerted to thousands of unauthorized search queries of specific U.S. persons within the NSA database.

NSA Director Admiral Mike Rogers was made aware.

Subsequently NSA Director Rogers initiated a full compliance review of the system to identify who was doing the searches; & what searches were being conducted.

On April 18, 2016, following the preliminary audit results, Director Rogers shut down all FBI contractor access (Crowstrike) to the database after he learned FISA-702 “about”(17) and “to/from”(16) search queries were being done without authorization. Thus begins the first discovery of a much bigger background story.

When you compile the timeline with the people involved; and the specific wording of the resulting review, which was then delivered to the FISA court; and overlay the activity that was taking place in the GOP primary; what we discover is a process where the metadata collected by the NSA was being searched for political opposition research and surveillance.

Additionally, tens-of-thousands of searches were identified by the FISA court as likely extending much further than the compliance review period: “while the government reports it is unable to provide a reliable estimate of the non compliant queries since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 period coincided with an unusually high error rate”.

In short, during the Obama administration the NSA database was continually used to conduct surveillance. This is the critical point that leads to understanding the origin of “Spygate”, as it unfolded in the Spring and Summer of 2016.

It was the discovery of the database exploitation and the removal of access as a surveillance tool that created their initial problem. Here’s how we can tell.

Initially in December 2015 there were 17 GOP candidates and all needed to be researched.

However, when Donald Trump won New Hampshire, Nevada and South Carolina the field was significantly whittled. Trump, Cruz, Rubio, Kasich and Carson remained.

On Super Tuesday, March 2, 2016, Donald Trump won seven states (VT, AR, VA, GA, AL, TN, MA) it was then clear that Trump was the GOP frontrunner with momentum to become the presumptive nominee. On March 5th, Trump won Kentucky and Louisiana; and on March 8th Trump won Michigan, Mississippi and Hawaii.

The next day, March 9th, NSA security alerts warned internal oversight personnel that something sketchy was going on.

This timing is not coincidental. As FISA Judge Rosemary Collyer later wrote in her report, “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” Put another way: attributes belonging to a specific individual(s) were being targeted and queried, unlawfully. Given what was later discovered, it seems obvious the primary search target, over multiple date ranges, was Donald Trump.

There were tens-of-thousands of unauthorized search queries; and as Judge Collyer stated in her report, there is no reason to believe the 85% non compliant rate was any different from the abuse of the NSA database going back to 2012.

As you will see below the NSA database was how political surveillance was being conducted during Obama’s second term in office. However, when the system was flagged, and when NSA Director Mike Rogers shut down “contractor” access to the system, the system users needed to develop another way to get access.

Mike Rogers shuts down access on April 18, 2016. On April 19, 2016, Fusion-GPS founder Glenn Simpson’s wife, Mary Jacoby visits the White House. Immediately thereafter, the DNC and Clinton campaign contract Fusion GPS… who then hire Christopher Steele.

Knowing it was federal “contractors”, outside government with access to the system, doing the unauthorized searches, the question becomes: who were the contractors?

The possibilities are quite vast. Essentially anyone the FBI or intelligence apparatus was using could have participated. Crowdstrike was a known FBI contractor; they were also contracted by the DNC. Shawn Henry was the former head of the FBI office in DC and was the President of Crowdstrike Services; a rather dubious contractor for the government and a politically connected data security and forensic company. James Comey’s special friend Daniel Richman was an unpaid FBI “special employee” with security access to the database. Nellie Ohr began working for Fusion-GPS on the Trump project in November 2015 and she was a CIA contractor; and it’s entirely likely Glenn Simpson or people within his Fusion-GPS network were also contractors for the intelligence community.

Remember the Sharyl Attkisson computer intrusions? It’s all part of this same network; Attkisson even names Shawn Henry as a defendant in her ongoing lawsuit.

All of the aforementioned names, and so many more, held a political agenda in 2016.

It seems likely if the NSA flags were never triggered then the contracted system users would have continued exploiting the NSA database for political opposition research; which would then be funneled to the Clinton team. However, once the unauthorized flags were triggered, the system users (including those inside the official intelligence apparatus) needed to find another back-door to continue… Again, the timing becomes transparent.

Immediately after NSA flags were raised March 9th; the same intelligence agencies began using confidential human sources (CHS’s) to run into the Trump campaign. By activating intelligence assets like Joseph Mifsud and Stefan Halper the IC (CIA, FBI) and system users had now created an authorized way to continue the same political surveillance operations.

When Donald Trump hired Paul Manafort on March 28, 2016, it was a perfect scenario for those doing the surveillance. Manafort was a known entity to the FBI and was previously under investigation. Paul Manafort’s entry into the Trump orbit was perfect for Glenn Simpson to sell his prior research on Manafort as a Trump-Russia collusion script two weeks later.

The shift from “unauthorized exploitation of the NSA database” to legally authorized exploitation of the NSA database was now in place. This was how they continued the political surveillance. This is the confluence of events that originated “spygate”, or what officially blossomed into the FBI investigation known as “Crossfire Hurricane” on July 31.

If the NSA flags were never raised; and if Director Rogers had never initiated the compliance audit; and if the political contractors were never blocked from access to the database; they would never have needed to create a legal back-door, a justification to retain the surveillance. The political operatives/contractors would have just continued the targeted metadata exploitation.

Once they created the surveillance door, Fusion-GPS was then needed to get the FBI known commodity of Chris Steele activated as a pipeline. Into that pipeline all system users pushed opposition research. However, one mistake from the NSA database extraction during an “about” query shows up as a New Yorker named Michael Cohen in Prague.

That misinterpreted data from a FISA-702 “about query” is then piped to Steele and turns up inside the dossier; it was the wrong Michael Cohen. It wasn’t Trump’s lawyer, it was an art dealer from New York City with the same name; the same “identifier”.

A DEEP DIVE – How Did It Work?

Start by reviewing the established record from the 99-page FISC opinion rendered by Presiding Judge Rosemary Collyer on April 26, 2017. Review the details within the FISC opinion.

I would strongly urge everyone to read the FISC report (full pdf below) because Judge Collyer outlines how the DOJ, which includes the FBI, had an “institutional lack of candor” in responses to the FISA court. In essence, the Obama administration was continually lying to the FISA court about their activity, and the rate of fourth amendment violations for illegal searches and seizures of U.S. persons’ private information for multiple years.

Unfortunately, due to intelligence terminology Judge Collyer’s brief and ruling is not an easy read for anyone unfamiliar with the FISA processes. That complexity also helps the media avoid discussing it; and as a result most Americans have no idea the scale and scope of the Obama-era surveillance issues. So we’ll try to break down the language.

For the sake of brevity and common understanding CTH will highlight the most pertinent segments showing just how systemic and troublesome the unlawful electronic surveillance was.

Early in 2016 NSA Director Admiral Mike Rogers was alerted of a significant uptick in FISA-702(17) “About” queries using the FBI/NSA database that holds all metadata records on every form of electronic communication.

The NSA compliance officer alerted Admiral Mike Rogers who then initiated a full compliance audit on/around March 9th, 2016, for the period of November 1st, 2015, through May 1st, 2016.

While the audit was ongoing, due to the severity of the results that were identified, Admiral Mike Rogers stopped anyone from using the 702(17) “about query” option, and went to the extraordinary step of blocking all FBI contractor access to the database on April 18, 2016 (keep these dates in mind).

Here are some significant segments:

The key takeaway from these first paragraphs is how the search query results were exported from the NSA database to users who were not authorized to see the material. The FBI contractors were conducting searches and then removing, or ‘exporting’, the results. Later on, the FBI said all of the exported material was deleted.

Searching the highly classified NSA database is essentially a function of filling out search boxes to identify the user-initiated search parameter and get a return on the search result.

♦ FISA-702(16) is a search of the system returning a U.S. person (“702”); and the “16” is a check box to initiate a search based on “To and From“. Example, if you put in a date and a phone number and check “16” as the search parameter the user will get the returns on everything “To and From” that identified phone number for the specific date. Calls, texts, contacts etc. Including results for the inbound and outbound contacts.

♦ FISA-702(17) is a search of the system returning a U.S. person (702); and the “17” is a check box to initiate a search based on everything “About” the search qualifier. Example, if you put a date and a phone number and check “17” as the search parameter the user will get the returns of everything about that phone. Calls, texts, contacts, geolocation (or gps results), account information, user, service provider etc. As a result, 702(17) can actually be used to locate where the phone (and user) was located on a specific date or sequentially over a specific period of time which is simply a matter of changing the date parameters.

And that’s just from a phone number.

Search an ip address “about” and read all data into that server; put in an email address and gain everything about that account. Or use the electronic address of a GPS enabled vehicle (about) and you can withdraw more electronic data and monitor in real time. Search a credit card number and get everything about the account including what was purchased, where, when, etc. Search a bank account number, get everything about transactions and electronic records etc. Just about anything and everything can be electronically searched; everything has an electronic ‘identifier’.

The search parameter is only limited by the originating field filled out. Names, places, numbers, addresses, etc. By using the “About” parameter there may be thousands or millions of returns. Imagine if you put “@realdonaldtrump” into the search parameter? You could extract all following accounts who interacted on Twitter, or Facebook etc. You are only limited by your imagination and the scale of the electronic connectivity.

As you can see below, on March 9th, 2016, internal auditors noted the FBI was sharing “raw FISA information, including but not limited to Section 702-acquired information”.

In plain English the raw search returns were being shared with unknown entities without any attempt to “minimize” or redact the results. The person(s) attached to the results were named and obvious. There was no effort to hide their identity or protect their 4th amendment rights of privacy; and database access was from the FBI network:

But what’s the scale here? This is where the story really lies.

Read this next excerpt carefully.

The operators were searching “U.S Persons”. The review of November 1, 2015, to May 1, 2016, showed “eighty-five percent of those queries” were unlawful or “non compliant”.

85% !! “representing [redacted number]”.

We can tell from the space of the redaction the number of searches were between 10,000 and 99,999 [six digits]. If we take the middle number of 50,000 – a non compliant rate of 85 percent means 42,500 unlawful searches out of 50,000.

The [six digit] amount (more than 10,000, less than 99,999), and 85% error rate, was captured in a six month period, November 2015 to April 2016.

Also notice this very important quote: “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” This tells us the system users were searching the same phone number, email address, electronic identifier, repeatedly over different dates.

Specific person(s) were being tracked/monitored.

Additionally, notice the last quote: “while the government reports it is unable to provide a reliable estimate of” these non lawful searches “since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 coincided with an unusually high error rate”.

That means the 85% unlawful FISA-702(16)(17) database abuse has likely been happening since 2012.

2012 is an important date in this database abuse because a network of specific interests is assembled that also shows up in 2016/2017:

  • Who was 2012 FBI Director? Robert Mueller, who was selected by the FBI group to become special prosecutor in 2017.
  • Who was Mueller’ chief-of-staff? Aaron Zebley, who became one of the lead lawyers on the Mueller special counsel.
  • Who was 2012 CIA Director? John Brennan (remember the ouster of Gen Petraeus)
  • Who was ODNI? James Clapper.
  • Remember, the NSA is inside the Pentagon (Defense Dept) command structure. Who was Defense Secretary? Ash Carter

Who wanted NSA Director Mike Rogers fired in 2016? Brennan, Clapper and Carter.

And finally, who wrote and signed-off-on the January 2017 Intelligence Community Assessment and then lied about the use of the Steele Dossier? The same John Brennan, and James Clapper along with James Comey.

Tens of thousands of searches over four years (since 2012), and 85% of them are illegal. The results were extracted for?…. (I believe this is all political opposition use; and I’ll explain why momentarily.)

OK, that’s the stunning scale; but who was involved?

Private contractors with access to “raw FISA information that went well beyond what was necessary to respond to FBI’s requests“:

And as noted, the contractor access was finally halted on April 18th, 2016.

[Coincidentally (or likely not), the wife of Fusion-GPS founder Glenn Simpson, Mary Jacoby, goes to the White House the very next day on April 19th, 2016.]

None of this is conspiracy theory.

All of this is laid out inside this 99-page opinion from FISC Presiding Judge Rosemary Collyer who also noted that none of this FISA abuse was accidental in a footnote on page 87: “deliberate decisionmaking“:

This specific footnote, if declassified, could be a key. Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”, this sentence has the potential to expose an internal decision; withheld from congress and the FISA court by the Obama administration; that outlines a process for access and distribution of surveillance data.

Note: “no notice of this practice was given to the FISC until 2016“, that is important.

Summary: The FISA court identified and quantified tens-of-thousands of search queries of the NSA/FBI database using the FISA-702(16)(17) system. The database was repeatedly used by persons with contractor access who unlawfully searched and extracted the raw results without redacting the information and shared it with an unknown number of entities.

The outlined process certainly points toward a political spying and surveillance operation; and we are not the only one to think that’s what this system is being used for.

Back in 2017 when House Intelligence Committee Chairman Devin Nunes was working to reauthorize the FISA legislation, Nunes wrote a letter to ODNI Dan Coats about this specific issue:

SIDEBAR: To solve the issue, well, actually attempt to ensure it never happened again, NSA Director Admiral Mike Rogers eventually took away the “About” query option permanently in 2017. NSA Director Rogers said the abuse was so inherent there was no way to stop it except to remove the process completely. [SEE HERE] Additionally, the NSA database operates as a function of the Pentagon, so the Trump administration went one step further. On his last day as NSA Director Admiral Mike Rogers -together with ODNI Dan Coats- put U.S. cyber-command, the database steward, fully into the U.S. military as a full combatant command. [SEE HERE] Unfortunately it didn’t work as shown by the 2018 FISC opinion rendered by FISC Judge James Boasberg [SEE HERE]

There is little doubt the FISA-702(16)(17) database system was used by Obama-era officials, from 2012 through April 2016, as a way to spy on their political opposition.

Quite simply there is no other intellectually honest explanation for the scale and volume of database abuse that was taking place; and keep in mind these searches were all ruled to be unlawful. Searches for repeated persons over a period time that were not authorized.

When we reconcile what was taking place and who was involved, then the actions of the exact same principle participants take on a jaw-dropping amount of clarity.

All of the action taken by CIA Director Brennan, FBI Director Comey, ODNI Clapper and Defense Secretary Ashton Carter make sense. Including their effort to get NSA Director Mike Rogers fired.

Everything after March 9th, 2016, had a dual purpose: (1) done to cover up the weaponization of the FISA database. [Explained Here] Spygate, Russia-Gate, the Steele Dossier, and even the 2017 Intelligence Community Assessment (drawn from the dossier and signed by the above) were needed to create a cover-story and protect themselves from discovery of this four year weaponization, political surveillance and unlawful spying. Even the appointment of Robert Mueller as special counsel makes sense; he was FBI Director when this began. And (2) they needed to keep the surveillance going.

The beginning decision to use FISA(702) as a domestic surveillance and political spy mechanism appears to have started in/around 2012. Perhaps sometime shortly before the 2012 presidential election and before John Brennan left the White House and moved to CIA. However, there was an earlier version of data assembly that preceded this effort.

Political spying 1.0 was actually the weaponization of the IRS. This is where the term “Secret Research Project” originated as a description from the Obama team. It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller. It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

Why disks? Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS. All of the evidence within this sketchy operation came directly to the surface in early spring 2012.

The IRS scandal was never really about the IRS, it was always about the DOJ asking the IRS for the database of information. That is why it was transparently a conflict when the same DOJ was tasked with investigating the DOJ/IRS scandal. Additionally, Obama sent his chief-of-staff Jack Lew to become Treasury Secretary; effectively placing an ally to oversee/cover-up any issues. As Treasury Secretary Lew did just that.

Lesson Learned – It would appear the Obama administration learned a lesson from attempting to gather a large opposition research database operation inside a functioning organization large enough to have some good people that might blow the whistle.

The timeline reflects a few months after realizing the “Secret Research Project” was now worthless (June 2012), they focused more deliberately on a smaller network within the intelligence apparatus and began weaponizing the FBI/NSA database. If our hunch is correct, that is what will be visible in footnote #69:

How this all comes together in 2019/2020

Fusion GPS was not hired in April 2016 just to research Donald Trump. As shown in the evidence provided by the FISC, the intelligence community was already doing surveillance and spy operations. The Obama administration already knew everything about the Trump campaign, and were monitoring everything by exploiting the FISA database.

However, after the NSA alerts in/around March 9th, 2016, and particularly after the April 18th shutdown of contractor access, the Obama intelligence community needed Fusion GPS to create a legal albeit ex post facto justification for the pre-existing surveillance and spy operations. Fusion GPS gave them that justification in the Steele Dossier.

That’s why the FBI small group, which later transitioned into the Mueller team, were so strongly committed to and defending the formation of the Steele Dossier and its dubious content.

The Steele Dossier, an outcome of the Fusion contract, contains three insurance policy purposes: (1) the cover-story and justification for the pre-existing surveillance operation (protect Obama); and (2) facilitate the FBI counterintelligence operation against the Trump campaign (assist Clinton); and (3) continue the operation with a special counsel (protect both).

An insurance policy would be needed. The Steele Dossier becomes the investigative virus the FBI wanted inside the system. To get the virus into official status, they used the FISA application as the delivery method and injected it into Carter Page. The FBI already knew Carter Page; essentially Carter Page was irrelevant, what they needed was the FISA warrant and the Dossier in the system {Go Deep}.

The Obama intelligence community needed Fusion GPS to give them a plausible justification for already existing surveillance and spy operations. Fusion-GPS gave them that justification and evidence for a FISA warrant with the Steele Dossier.

Ultimately that’s why the Steele Dossier was so important; without it, the FBI would not have a tool that Mueller needed to continue the investigation of President Trump. In essence by renewing the FISA application, despite them knowing the underlying dossier was junk, the FBI was keeping the surveillance gateway open for Team Mueller to exploit later on.  Additionally, without the Steele Dossier the DOJ and FBI are naked with their FISA-702 abuse.

…. But sedition charges are reserved for Capitol Hill protestors.

Have Journalists become Traitors to the United States?


Armstrong Economics Blog/Press Re-Posted Mar 22, 2021 by Martin Armstrong

Those in management at most of the mainstream media should be dragged from their offices and charged with conspiracy to overthrow the United States government and to eradicate the US. Constitution. The Washington Post displays its motto “Democracy Dies in Darkness” and indeed they are at war against the United States just as Klaus Schwab and his World Economic Forum which is out to remove the United States as a superpower and transfer that status to the United Nations. Their report, along with CNN, New York Times, ABC, NBC, and CBS along with most others, are indeed conspiring to overthrow the United States and if they were put on trial using their own words, any unbiased jury would find them guilty.

The Supreme Court’s key decision in 1964 in New York Times Co. v. Sullivan, 376 U.S. 254 (1964), which has since protected many media outlets from lawsuits. It is time that it should be scrapped along with total immunity for vaccine companies. If you buy a car and you turn on the ignition and it blows up, is not the auto-manufacturer liable? In every other field, companies are responsible for the products they produce. Why is the media and vaccine companies have any immunity whatsoever? In that case, Supreme Court reversed a libel damages judgment against the New York Times. The decision established the important principle that the First Amendment guarantees freedom of speech and press may protect libelous words about a public official in order to foster vigorous debate about government and public affairs. To sustain a claim of defamation or libel, the First Amendment requires that the plaintiff show that the defendant knew that a statement was false or was reckless in deciding to publish the information without investigating whether it was accurate.
Facts

I believe that the deliberate bias in the media is historically the first step taken by any potential authoritarian or dictatorial regime is to gain control of communications, especially the delivery of news. The one-party control of the press and media in the United States and worldwide is a serious threat to a viable democracy and human rights. This is giving support for the unelected movement of Klaus Schwab and his World Economic Forum working with the United Nations to usurp control of the global environment without ever allowing the people to vote. The media is simply taken up the role of propaganda agent no different than Pravda during the communist days of Russia.

The First Amendment guarantees a free press to foster a vibrant trade in ideas. However, when the press is so biased, they are deliberately distorting the marketplace and the rights of the people. The media is advocating positions from unelected entities and denying any right to allow the people to vote. Hence the motto of the Washington Post “Democr4acy Dies in Darkness” is precisely their new objective. Since mainstream media has proven its eagerness to distort the news, it is profoundly unjustified in any legal foundation to provide any immunity whatsoever and they are deliberately engaging in treasonous conduct and should be hauled into court where ONLY a jury is allowed to decide the facts.