Sunday Talks: Devin Nunes Discusses Upcoming Mueller Testimony…


HPSCI ranking member Devin Nunes appears on Fox News Weekend to discuss the upcoming congressional testimony of special counsel Robert Mueller.  Additionally, Nunes discusses the aggregate issues with the FBI and DOJ.

The Gang-of-Eight meeting Nunes notes McCabe attempted to get him removed from was the May 17th, 2017, meeting by Rod Rosenstein and Andrew McCabe where they briefed the Go8 on the appointment of Robert Mueller as special counsel prior to the public release.

During that 3/17/17 meeting DAG Rod Rosenstein and FBI Deputy Director Andrew McCabe were concerned that Devin Nunes would support President Trump’s position when McCabe and Rosenstein launched the corrupt and fraudulent Special Counsel.

For deep-weed CTH readers: After listening to Nunes strongly implying he expects a full DC cover-up of the entire weaponized DC operation against candidate, president-elect and President Trump. I started a new intelligence research project to identify what might lie at the center of that concern.

Many of you know I work with old school research filing systems and timelines. One aspect that stands out; and considering Nunes has been a Go8 member since Rep. Mike Rogers resigned – therefore he has a particularly valuable insight; is the strong possibility that all of the Obama-era surveillance was actually a political CIA operation.

There are a host of small details -and individual characters- that only have one commonality, the CIA.

Starting with the footnote from FISA Judge Rosemary Collyer:

The pre-existing MOU, suspected origination in around 2012, is a key piece of this puzzle. If the Terror Threat Integration Center (TTIC) is the premise behind how the FBI and CIA memo of understanding connects shared information from NSA database extraction (I think it does), then John Brennan is actually the originator of this contractor problem.

At the very beginning of the Office of Director of National Intelligence (ODNI) origination, the task was to synergize the CIA and FBI.   John Brennan was THE GUY, (back in 2003) who was given this task:

On 1 May 2003, the Terrorist Threat Integration Center (TTIC) opened its doors. Led by its first Director, John Brennan, TTIC filled its ranks with approximately three dozen detailees from across the US Government (USG) and was mandated to integrate CT capabilities and missions across the government.

Prior to the establishment of TTIC, individual Federal departments and agencies (largely CIA and FBI) provided the President their own assessments of the terrorist threat. (link)

It would make sense that Brennan and Mueller (pre-comey) set up the standard of the CIA and FBI working together on domestic surveillance efforts.   It does not seem coincidental that Brennan was made CIA Director in 2012, at the exact same time as Obama and Holder dropped the IRS ‘secret research project’ and shifted to NSA database extraction.

The timing here is too damned coincidental.

FISA Judge Rosemary Collyer didn’t pick the year 2012 out of thin air when she noted the government’s unreliable “non-compliance rate” since that time frame.  In essence, based on admissions to the court, the FISA-702 contractor database search abuse began at the same time Brennan became CIA Director, and likely the same time as that FBI and CIA (or ODNI and TTIC – matters not) Memorandum of Understanding.

You put all of that together with Brennan’s 2016 “Working Group” and the “Deputies Meetings“, and then stand back and look at who the known participants were in/around the exact same time…. and, well, the one constant is the C.I.A.

The Working Group operated out of the Central Intelligence Agency Headquarters, where it worked in secrecy away from the other members of the various intelligence agencies. Agents that participated in the Working Group had to sign non-disclosure agreements to access the shared intelligence of the Central Intelligence Agency, the Federal Bureau of Investigation and the National Security Agency. It has also been described as “informal”.

The Crossfire Hurricane investigation team, in conjunction with a number of agents at the Eastern District of Virginia under United States Attorney Dana Boente, reported to the Working Group, including the Central Intelligence Agency.

Robert Hannigan GCHQ meets with Brennan (CIA) instead of Mike Rogers (NSA).

Joseph Mifsud – CIA

Stephan Halper – CIA

Peter Strzok – CIA

Carter Page – CIA (admitted)

Oleg Deripaska – CIA (attempted recruitment)

The London Center – CIA

The Cambridge Symposium – CIA

Erika Thompson – (Western Intelligence) (CIA)

Charles Tawil – (Israeli Intelligence) (CIA)

Nellie Ohr – CIA

The list goes on and on.

If you drill down the curriculum vitae of any key participants in the 2016 events you will find a direct connection to the CIA; not an indirect or obscure connection, but rather an admitted direct relationship between their professional endeavors and the CIA.

Given the nature of Devin Nunes open concerns about accountability; and when you honestly take a ‘big picture’ look at the participants in/around the activity he is talking about…. what you end up with is a sense that Nunes concern is related to how all of the players are enmeshed with the CIA.

Heck, it’s enough to make you ask if  the DOJ “Russia” angle, which we can clearly see is transparently fraudulent -and was pushed by DAG Rod Rosenstein and Robert Mueller, was actually created to hide the 2016 fingerprints of the CIA?

Wait, what-the….

Yeah, think about it.

How would you best hide the fingerprints of the CIA trying to influence a U.S. presidential election?

Maybe, blame the Russians?

Now the reason for the WaPo and NYT recent stories about AG Barr and the inquisition into the CIA start to make more sense…. and that further backstops Nunes public concern.

View image on TwitterView image on Twitter

The_War_Economy@The_War_Economy

Durham is literally going to interview somebody at the CIA’s Counterintelligence Mission Center.https://www.nytimes.com/2019/06/12/us/politics/russia-investigation-cia.html 

Flynn Case Highlights Multiple 2016 “Insurance Policy” Motives by DOJ and FBI Operatives…


Former National Security Advisor Lt. Gen. Michael Flynn is involved in two heavily connected legal cases that came from the special counsel appointment of Robert Mueller.  One direct case is in DC District Court, Judge Emmet Sullivan; and one indirect case in the Eastern District of Virginia (EDVA), Judge Anthony Trenga.

The DC case is the direct case against Michael Flynn where Flynn took a plea deal and has been in a rather tentacled sentencing phase since November 2017.  The EDVA case is the FARA case against Flynn’s former business associate Bijan Rafiekian where Flynn was going to be a witness (now cancelled).

While the larger issues connecting both cases are somewhat complex, some details released last week reveal a concerning bigger picture that originated long before Robert Mueller became special counsel in May 2017.  [Back story HERE and HERE and HERE]

I’m going to make the assumption the reader is familiar with the backstory noted above; and additionally, in full disclosure for the reader, this is openly written for the research benefit of the Flynn defense team – with whom I’ve had no contact.

Of particular interest to me was the revelation that DOJ National Security Division head David Laufman engaged with Flynn in January 2017, and was the lead point of contact within the DOJ-NSD when Flynn was filing FARA compliance documents, as part of the transition into the Trump administration.

Laufman is particularly interesting -within this specific timeline- because he is at the heart of the DOJ/FBI small group activity in 2015/2016 when the group goal was Clinton’s exoneration and Trump’s surveillance/investigation.  While Laufman’s name is not as well known as Peter Strzok or Lisa Page, his Main Justice activity is just as consequential.

We know and accept from prior records [pg 12 Mueller report] that Michael Flynn was under some form of official and unofficial surveillance and investigation by the Obama administration from sometime in 2015 all the way to his first weeks in the Trump administration in January/February 2017.

That collective monitoring could have included authorized Title-3 electronic surveillance or Title-1 (FISA) surveillance.  My best guess is Title-III until the publication of the Turkish Op-Ed, and that opened the door to Title-I.  The change requires the target to do something that would allow the DOJ to jump and claim “acting as an agent of a foreign power”.   The  November 8th, 2016 op-ed advocacy, without notation of the contract, would provide the DOJ-NSD with the ability to make that claim.

David Laufman was head of the DOJ-NSD office that would have been watching.  In hindsight, the leaked reporting to the Wall Street Journal in 2017 confirms this:

WASHINGTON—The investigation into former national security adviser Mike Flynn began soon after a Justice Department staffer noticed a Nov. 8, 2016, op-ed article by the retired Army general in the congressional publication The Hill, according to a person familiar with the matter.

[…] In the article, Mr. Flynn championed closer U.S. ties with Turkish President Recep Tayyip Erdogan and maligned the Turkish government’s No. 1 foe, U.S.-based cleric Fethullah Gulen.

The piece didn’t disclose Mr. Flynn’s business relationship with Turkish interests.

The Justice Department staffer, who works in the office that enforces the Foreign Agents Registration Act, or FARA, checked the database of people registered to represent foreign interests. He found no entry for Mr. Flynn and sent him a letter inquiring about the article, according to this person, who said the staffer’s query triggered the FARA investigation.  (read more)

We know that FARA investigations were used by the Lynch/Yates DOJ to gain FISA surveillance on DC targets.  Given that Flynn was already a high profile target it would be almost guaranteed the Obama administration quickly gained a FISA warrant on Flynn in the days immediately following the public advocacy (November 2016).

So when Flynn was engaged with David Laufman in December ’16/January ’17 in the completion of the FARA compliance forms, it is certain that Laufman knew much more about the background of who hired the Flynn Intel Group, than Flynn himself.  Hence, Laufman pressured a FARA filing that was later used by Mueller to claim Flynn filed a misleading FARA notification.   It was all a set up.

Heck, knowing how foreign intelligence units were used by the FBI and CIA to engage the Trump campaign (pure politics); and keeping the entire sketchy intel operation around the killing of Jamal Kashoggi in mind (more politics); I’m now of the opinion someone in/around the Obama White House worked with someone in/around Recep Erdogan (Turkish Govt.) to set up that entire 2016 Flynn lobbying scenario using a Dutch front group.  The DOJ-NSD was waiting to exploit it.

So yesterday, there were some court arguments as the EDVA case against Flynn’s partner is about to start….  The transcript is not yet public, but Techno-Fog gained access.  Pay attention to this snippet Techno released:

Please pay attention to this part: “because of Flynn’s relationship with an ongoing presidential campaign without any reference to the defendant or FIG”…

The word “campaign” is a written Freudian slip, a *tell* per se’, that informs those paying attention of the history of the government’s activity and foreknowledge.

So here’s where I’m at….   The granules are small, but the granules are all assembled in the same part of the same picture.  The Dutch/Turkish lobbying contract was a set-up; just like the Trump Tower meeting was a set-up; just like the London meeting with Alexander Downer was a set-up; just like the $10,000 from Charles Tawil to George Papadopoulos was a set-up; just like Mifsud was a set-up… etc. etc.

In the foreground you’ve got Brennan and the White House (Brennan’s working group), and Fusion GPS, and Nellie Ohr, and Christopher Steele etc… In the background you’ve got Yates, and Carlin, and Laufman, and McCord, and Weissmann (DOJ-NSD team); together with Comey, and McCabe, and Baker, and Strzok, and Page (FBI team)… and essentially the bridge, Bruce Ohr, acting as a carrier smidgen taking information from the working group to the FBI to the DOJ….

These are the basic elements of the seditious small group within the DOJ-NSD and FBI.

Additionally, this gets more interesting when you think about the scale of what they were doing, and how intensely they were committed to it.

When the network was failing in their impeachment effort; when the insurance policy was not working; and when they were falling back in logical sequence to various defensive positions throughout 2018; where did David Laufman resurface?

See the scale of this?

New York Field office FBI agent Monica McLean was the handler who initiated her best friend Dr. Christine Blasey-Ford against Supreme Court nominee Judge Kavanaugh.  Who was Monica McLean’s lawyer?…. David Laufman.

Who was Blasey-Ford’s lawyer?…. Michael Bromwich; he’s also the lawyer for Andrew McCabe.

Why?

What possible reason would the same ‘small group’ participants have for going from the 2016 election effort, and 2017 impeachment effort, to the 2018 SCOTUS manipulation effort?  [Also intended to influence the 2018 mid-term]

The “small group” activity was/is so illegal (literally seditious), it was a reasonable part of the concentric defense to try and block a SCOTUS nomination and influence the outcome of the 2018 mid-term election.

That’s the scale of this.

And given the scale of this….

Sunday Talks: American Pravda Discuss North Korea…


Mike Morell was the Deputy CIA Director when President Obama and Hillary Clinton botched the joint 2011 CIA and State Department operation “Zero Footprint” in Libya.

“Zero Footprint” was the covert operation initiated by Secretary of State Clinton and CIA Director Leon Panetta.  Director Panetta left the CIA just before the operation went sideways and resulted in the attack on the Benghazi State Dept./CIA annex September 11th, 2012.  General David Petraeus was the new CIA Director when the Benghazi attack happened.  Immediately, General Petraeus became a risk.  [Deep Background]

After the Benghazi attack, the relationship between journalist Paula Broadwell and General Petraeus was used by ODNI James Clapper to remove the CIA Director.

Immediately after the election of 2012 CIA Director David Petraeus resigned (Nov 9th) and interim CIA Director Morrel took over. This is why Petraeus never testified about CIA operations to the Senate panel investigating Benghazi, Mike Morrel took his place.

Morrel’s job was to provide cover for the background operation (2010, Zero Footprint) where Obama, Clinton and Panetta provided covert weapons, including shoulder fired missiles, to Libyan “rebels”, aka Libyan al-Qaeda.  AND Morrel’s second role was to cover for the extended CIA operation (2011-2012) where the CIA was buying back those missiles and shipping them into Syria for use overthrowing the Assad regime; the second operation was based out of the secret (at the time) State Dept/CIA facility in Benghazi.

Morrel was essentially the CIA narrative ‘fixer’.  He was up to his eyeballs in the cover-up behind Benghazi 2012 and 2013.  After Acting Deputy Morrel testified to congress about the CIA involvement around Benghazi, and the issues of terrorism vs. Islamic movie (happy squirrel chase) etc. Mike Morrel was replaced at the CIA by John Brennan.

To reward for services rendered, both Hillary Clinton and CBS immediately hired Mike Morrel. CBS News President David Rhodes -who hired Morrel- is the brother of the White House’s Ben Rhodes; who wrote the false ‘talking points’ about the You Tube video as motive for the Benghazi attack.

Morrel provided the cover for President Obama, Secretary Clinton, Director Panetta and all of the schemes surrounding the covert missile delivery to Libya, redistribution to Syria, and financing through Qatar.

Fast forward to today…. Now a CBS News senior national security contributor, Michael Morell appears with The Wilson Center’s Jean Lee to discuss the future of North Korean relations after President Trump’s historic meeting with Kim Jong Un.

Everything about this interview, including the narrative surrounding Kim Jong-Un, is pure CIA horsepucky…. all of it.  Notice how Morell is reliant upon the affirmation of specific talking points on the page notes in front of him.

This is all part of one big con-job by over indulged institutionalists who have held court over Washington DC for years.  Once you see the strings on the Marionettes, you just can’t watch the pantomime without seeing them.

.

All of the opposition to Donald Trump is one long continuum of self-interest and risk management.

A Fairy & Wishes


DOJ Admits FBI Never Saw Crowdstrike Report on DNC Russian Hacking Claim…


The foundation for the Russian election interference narrative is built on the claim of Russians hacking the servers of the Democrat National Committee (DNC), and subsequently releasing damaging emails that showed the DNC worked to help Hillary Clinton and eliminate Bernie Sanders.

Despite the Russian ‘hacking’ claim the DOJ previously admitted the DNC would not let FBI investigators review the DNC server.  Instead the DNC provided the FBI with analysis of a technical review done through a cyber-security contract with Crowdstrike.

The narrative around the DNC hack claim was always sketchy; many people believe the DNC email data was downloaded onto a flash drive and leaked.  In a court filing (full pdf below) the scale of sketchy has increased exponentially.

Suspecting they could prove the Russian hacking claim was false, lawyers representing Roger Stone requested the full Crowdstrike report on the DNC hack.  When the DOJ responded to the Stone motion they made a rather significant admission.  Not only did the FBI not review the DNC server, the FBI/DOJ never even saw the Crowdstrike report.

Yes, that is correct.  The FBI and DOJ were only allowed to see a “draft” report prepared by Crowdstrike, and that report was redacted… and that redacted draft is the “last version of the report produced”; meaning, there are no unredacted & final versions.

Whiskey-Tango-Foxtrot!

This means the FBI and DOJ, and all of the downstream claims by the intelligence apparatus; including the December 2016 Joint Analysis Report and January 2017 Intelligence Community Assessment, all the way to the Weissmann/Mueller report and the continued claims therein; were based on the official intelligence agencies of the U.S. government and the U.S. Department of Justice taking the word of a hired contractor for the Democrat party….. despite their inability to examine the server and/or actually see an unredacted technical forensic report from the investigating contractor.

The entire apparatus of the U.S. government just took their word for it…

…and used the claim therein as an official position….

…which led to a subsequent government claim, in court, of absolute certainty that Russia hacked the DNC.

Think about that for a few minutes.

The full intelligence apparatus of the United States government is relying on a report they have never even been allowed to see or confirm; that was created by a paid contractor for a political victim that would not allow the FBI to investigate their claim.

The DNC server issue is foundation, and cornerstone, of the U.S. government’s position on “Russia hacking” and the election interference narrative; and that narrative is based on zero factual evidence to affirm the U.S. government’s position.

…”the government does not need to prove at the defendant’s trial that the Russians hacked the DNC”… (pg 3)

Ridiculous.

You couldn’t make this nonsense up if you tried…

Here’s the full filing (h/t Techno Fog) :

.

 

What Comes After Trump is What We Need to be Concerned About


QUESTION: You said you are worried about what comes after Trump you mean after the next four years right? There is no way Trump can lose this election right?

Thank You

S

ANSWER: My concern is not a specific time, but who could possibly replace him as a person. There is nobody I know of who would step up against the bureaucracy. This means that the stronger likelihood would be a career politician. I fear that the public discontent will not accept that, and then we have this intense battle going on between left and right.

Even a Trump victory in 2020 will still result in civil unrest or if he were to lose (which the system does not favor just yet) we will see the same result. It just appears that in 2020 into 2022, no one will accept whoever wins.

FBI reveals Uranium One investigation informant


Fox Business

Published on Nov 16, 2017
Fox News national security strategist Sebastian Gorka on the FBI informant regarding Uranium One deal

 

Guilty Until Proven Innocent: Mueller Upends Rule of Law, In Final Appearance—Sidney Powell


When special counsel Robert Mueller formally closed the Russia investigation on May 29th, he opened the door to wide-ranging speculation as to the intent behind his statement. In the eyes of Former Texas Prosecutor Sidney Powell, Mueller’s words stood the rule of law and the presumption of innocence on their heads. This is American Thought Leaders, and I’m Jan Jekielek. Today we sit down with Sidney Powell, who is the author of LICENSED TO LIE: Exposing Corruption in the Department of Justice. She was lead counsel in more than 500 appeals in the Fifth Circuit, and she’s is ranked by her Texas peers as a “Super Lawyer.” We discuss the implications of Special Counsel Mueller’s May 29 press conference, the recent DOJ decision to not prosecute a serial leaker, corruption in the DOJ in general, and what can be done to correct it. More related ATL Videos: Declassification May Help Reveal Deep Obama-Era Corruption—Tom Fitton, Judicial Watch: https://youtu.be/USpa_aAP6sU Carter Page: Spygate, FISA Warrants, Mueller Investigation, “Trump Movement,” & Declassification: https://youtu.be/rWmHH544RTw Lara Trump On Being a Trump in the Era of Fake News, Women’s Vote, Socialism, Border & 2020 Strategy: https://youtu.be/hYsyxwrUl6E Victor Davis Hanson: Mueller Probe Could Backfire on Those Who Fabricated Russia-Collusion Narrative: https://youtu.be/gn9q7JEscqY Michael Anton: FISA Spying, Mueller Report and Barr Hearing Vindicate “Flight 93 Election” Essay: https://youtu.be/SAHy51O0dVg Larry Elder Talks Mueller Report, Jussie Smollett & Most Credible 2020 Democratic Candidate: https://youtu.be/CRNlhtX-V7g Russia Collusion Peddlers Will Turn on Each Other—Trump 2020 Adviser Steven Rogers: https://youtu.be/QyHzXWI6plM Tom Fitton: Spygate “The Worst Corruption Scandal in American History”: https://youtu.be/Z4IDSTrSvXE Rep. Louie Gohmert: Why We Need to Investigate the FISA Process: https://youtu.be/V5LqhIun-s8 Jasper Fakkert: Conclusion of Mueller Russia Collusion Probe Confirms Epoch Times’ Reporting: https://youtu.be/vL2Kj-Qk3hE Jason Meister: Trump Campaign Adviser Calls for Investigation Into Origins of Russia Collusion Narrative: https://youtu.be/sR41OmbwL4I

 

The “Secret Research Project” – an IRS List, an NSA Database, and Resulting “Files” on Americans…


A carefully redacted footnote within a report by FISA Court Presiding Judge Rosemary Collyer has always appeared to be a clue to a domestic surveillance program.  Now details behind the redactions tell a concerning story.

A brief refresher is needed for those new to the story. In April 2017 Judge Collyer wrote a highly critical FISA Court opinion following discoveries by Director Admiral Rogers of government contractors accessing the NSA database, and extracting illegal search results from the electronic records of every American.

The scale of abuse was incredible [SEE HERE] and the surveillance issues had been covered up for years.  Collyer cited the Obama administration as having “an institutional lack of candor” in their responses to her and the FISA court.  The judge focused her criticism after a review of the period 2012 through April 2016.

Using the non-compliant admissions by NSA Director Mike Rogers and the results of the compliance audit, Judge Collyer used the period of November 2015 through April 2016 to gauge the scale of abuse at 85 percent. Eighty-five percent of all database search queries were unlawful, and she extended her analysis to say:

“while the government reports it is unable to provide a reliable estimate of [these non lawful searches] since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 period coincided with an unusually high error rate”.

Also this very important:

“many of these non-compliant queries involved the use of the same identifiers over different date ranges.”

Eight-five percent of all use/extraction of the NSA database was unlawful; and they were searching many of the same Americans (“identifier”), repeatedly, over different dates. This means specific Americans were being targeted, tracked and monitored… unlawfully.

Within the 99-page opinion from Judge Rosemary Collyer  she noted none of this FISA-702 database abuse was accidental. In a key footnote on page 87: Collyer outlined the years of unlawful violations was the result of “deliberate decisionmaking“:

This specific footnote, is key to peeling back the onion.

Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”.  This sentence exposes an internal decision; withheld from congress and the FISA court by the Obama administration; and outlines a process for access and distribution of surveillance data. Note: “no notice of this practice was given to the FISC until 2016“.

We feel confident we’ve now found the source of the “memorandum of understanding” that lies at the heart of the issue [Raw Doc Guidelines].

In March 2012 the Obama administration through Attorney General Eric Holder made changes to the exploitation of intelligence databases as noted in this Wall Street Journal article later in the year:

(December 2012 – WSJ) Top U.S. intelligence officials gathered in the White House Situation Room in March to debate a controversial proposal. Counterterrorism officials wanted to create a government dragnet, sweeping up millions of records about U.S. citizens—even people suspected of no crime.

Not everyone was on board. “This is a sea change in the way that the government interacts with the general public,” Mary Ellen Callahan, chief privacy officer of the Department of Homeland Security, argued in the meeting, according to people familiar with the discussions.

A week later, the attorney general signed the changes into effect.

The rules now allow the little-known National Counterterrorism Center to examine the government files of U.S. citizens for possible criminal behavior, even if there is no reason to suspect them. That is a departure from past practice, which barred the agency from storing information about ordinary Americans unless a person was a terror suspect or related to an investigation.

Now, NCTC can copy entire government databases—flight records, casino-employee lists, the names of Americans hosting foreign-exchange students and many others. The agency has new authority to keep data about innocent U.S. citizens for up to five years, and to analyze it for suspicious patterns of behavior. Previously, both were prohibited. Data about Americans “reasonably believed to constitute terrorism information” may be permanently retained.

The changes also allow databases of U.S. civilian information to be given to foreign governments for analysis of their own. In effect, U.S. and foreign governments would be using the information to look for clues that people might commit future crimes.  (more)

The 2012 changes, instituted by Eric Holder, permitted files of specific Americans to be generated under the auspices of potential terror threats.  The NSA databases could be exploited by the National Counterterrorism Center to extract content that would be contained within these files on targeted Americans.

Keep in mind this is early 2012, John Brennan is Deputy National Security Advisor and Asst. to President Obama for Homeland Security.

When Attorney General Eric Holder empowered the National Counterterrorism Center with this new authority, the office assigned to the data-collection was the Terrorist Threat Integration Center (TTIC).  The founder of the TTIC was John Brennan:

On 1 May 2003, the Terrorist Threat Integration Center (TTIC) opened its doors. Led by its first Director, John Brennan, TTIC filled its ranks with approximately three dozen detailees from across the US Government (USG) and was mandated to integrate CT capabilities and missions across the government. (link)

Also note the date of this DOJ Memorandum is March 2012:

Under the new rules issued in March, the National Counterterrorism Center, known as NCTC, can obtain almost any database the government collects that it says is “reasonably believed” to contain “terrorism information.”  (link)

The March 2012 date is right before the IRS scandal hit the headlines.

The IRS targeting scandal is where the term “Secret Research Project” originated as a description from the Obama team. It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller. It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

Why disks? Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS. All of the evidence within this sketchy operation came directly to the surface in spring 2012.

Here’s how it looks:

♦ In 2010 Eric Holder asked the IRS to send him the records of 501(c) non profit groups and individuals representing conservative voters. [LINK] Lois Lerner sent the DOJ 1.1 million pages of 501(c)(4) tax filing data. Including a very specific set of “33 Schedule B attachment files”. The Schedule B’s were specific to Large Conservative 501(c)(4) groups operating and organized to oppose the agenda of President Obama. The Schedule B’s include the donor lists of specific people and sub-groups attached to the 501(c)(4).

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

♦ In 2012 Eric Holder authorizes the use of government databases to search records of Americans and assemble “files” on potential targets. [Link] “The agency has new authority to keep data about innocent U.S. citizens for up to five years, and to analyze it for suspicious patterns of behavior.”

♦ In the period of 2012 through April 2016, According to FISA Judge Rosemary Collyer, there were tens of thousands of illegal (“non-compliant”) search queries of the NSA database targeting Americans.  The search results were unlawfully “extracted” to unknown entities.  Eighty-five out of every hundred searches were illegal (85% non-compliant rate).

Consider purposeful actions, as a political targeting operation, by weaponizing the systems of government.  Steps:

  • First, identify the targets (IRS Database).
  • Second, research the targets (NSA Database).
  • Third assemble files on the targets (DOJ Authorization).
  • Fourth use the files to leverage/destroy your opposition.

We now have evidence of the first three steps; and my hunch is if we apply hindsight a lot of unusual activity will now make sense.  We have been living inside the fourth step for a few years.  We noticed the consequences… but we only had suspicions, until now.

Fusion GPS was not hired to research Trump, the intelligence community was already doing surveillance and spy operations. The intelligence community needed Fusion GPS to give them a plausible justification for already existing surveillance and spy operations.

Fusion-GPS gave the Obama administration the justification they needed for a FISA warrant with the Steele Dossier. Ultimately that’s why the Steele Dossier is so important; without it, the DOJ and FBI are naked with their surveillance and database abuse.

At 12:15pm on January 20th, 2017, Obama’s outgoing National Security Advisor Susan Rice wrote a memo-to-self.  Many people have called this her “CYA” memo, from the position that Susan Rice was protecting herself from consequences if the scheme against President Trump was discovered.  Here’s the email:

On January 5, following a briefing by IC leadership on Russian hacking during the 2016 Presidential election, President Obama had a brief follow-on conversation with FBI Director Jim Comey and Deputy Attorney General Sally Yates in the Oval Office. Vice President Biden and I were also present.

President Obama began the conversation by stressing his continued commitment to ensuring that every aspect of this issue is handled by the Intelligence and law enforcement communities “by the book“.

The President stressed that he is not asking about, initiating or instructing anything from a law enforcement perspective. He reiterated that our law enforcement team needs to proceed as it normally would by the book.

From a national security perspective, however, President Obama said he wants to be sure that, as we engage with the incoming team, we are mindful to ascertain if there is any reason that we cannot share information fully as it relates to Russia.

[Redacted Classified Section of Unknown length]

The President asked Comey to inform him if anything changes in the next few weeks that should affect how we share classified information with the incoming team. Comey said he would.

Susan Rice ~ (pdf link)

Evidence of Obama Administration Political Surveillance Beginning Mid-2012….


Repost by Request – Considering the upcoming declassification window…between Trump’s state visit in Japan (5/25 – 5/28) and the state visit with the U.K (6/3 – 6/5).

Bucket Five – Intelligence documents that were presented to the Gang of Eight in 2016 that pertain to the FISA application used against U.S. person Carter Page; including all exculpatory intelligence documents that may not have been presented to the FISA Court.  Presumably this would include the recently revealed State Dept Kavalac email; and the FBI transcripts from wiretaps of George Papadopoulos (also listed in Carter Page FISA).

Now that we have significant research files on the 2015 and 2016 political surveillance program; which includes the trail evident within the Weissmann/Mueller report; in combination with the Obama-era DOJ “secret research project” (their words, not mine); we are able to overlay the entire objective and gain a full understanding of how political surveillance was conducted over a period of approximately four to six years.

This is why there’s panic.

Working with a timeline, but also referencing origination material in 2015/2016 – CTH hopes to show how the program operated. This explains an evolution from The IRS Files in 2010 to the FISA Files in 2016.

More importantly, research indicates the modern political exploitation of the NSA database, for weaponized intelligence surveillance of politicians, began mid 2012.

The FISA-702 database extraction process, and utilization of the protections within the smaller intelligence community, was the primary process. We start by reviewing the established record from the 99-page FISC opinion rendered by Presiding Judge Rosemary Collyer on April 26th, 2017; and explain the details within the FISC opinion.

I would strongly urge everyone to read the FISC report (full pdf below) because Judge Collyer outlines how the DOJ, which includes the FBI, had an “institutional lack of candor” in responses to the FISA court. In essence, the Obama administration was continually lying to the court about their activity, and the rate of fourth amendment violations for illegal searches and seizures of U.S. persons’ private information for multiple years.

Unfortunately, due to intelligence terminology Judge Collyer’s brief and ruling is not an easy read for anyone unfamiliar with the FISA processes outlined. The complexity also helps the media avoid discussing, and as a result most Americans have no idea the scale and scope of the issues. So we’ll try to break down the language.

.For the sake of brevity and common understanding CTH will highlight the most pertinent segments showing just how systemic and troublesome the unlawful electronic surveillance was.

Early in 2016 NSA Director Admiral Mike Rogers was alerted of a significant uptick in FISA-702(17) “About” queries using the FBI/NSA database that holds all metadata records on every form of electronic communication.

The NSA compliance officer alerted Admiral Mike Rogers who then initiated a full compliance audit on/around March 9th, 2016, for the period of November 1st, 2015, through May 1st, 2016.

While the audit was ongoing, due to the severity of the results that were identified, Admiral Mike Rogers stopped anyone from using the 702(17) “about query” option, and went to the extraordinary step of blocking all FBI contractor access to the database on April 18, 2016(keep these dates in mind).

Here are some significant segments:

The key takeaway from these first paragraphs is how the search query results were exported from the NSA database to users who were not authorized to see the material. The FBI contractors were conducting searches and then removing, or ‘exporting’, the results. Later on, the FBI said all of the exported material was deleted.

Searching the highly classified NSA database is essentially a function of filling out search boxes to identify the user-initiated search parameter and get a return on the search result.

FISA-702(16) is a search of the system returning a U.S. person (“702”); and the “16” is a check box to initiate a search based on “To and From“. Example, if you put in a date and a phone number and check “16” as the search parameter the user will get the returns on everything “To and From” that identified phone number for the specific date. Calls, texts, contacts etc. Including results for the inbound and outbound contacts.

FISA-702(17) is a search of the system returning a U.S. person (702); and the “17” is a check box to initiate a search based on everything “About” the search qualifier. Example, if you put a date and a phone number and check “17” as the search parameter the user will get the returns of everything about that phone. Calls, texts, contacts, geolocation (or gps results), account information, user, service provider etc. As a result, 702(17) can actually be used to locate where the phone (and user) was located on a specific date or sequentially over a specific period of time which is simply a matter of changing the date parameters.

And that’s just from a phone number.

Search an ip address “about” and read all data into that server; put in an email address and gain everything about that account. Or use the electronic address of a GPS enabled vehicle (about) and you can withdraw more electronic data and monitor in real time. Search a credit card number and get everything about the account including what was purchased, where, when, etc. Search a bank account number, get everything about transactions and electronic records etc. Just about anything and everything can be electronically searched; everything has an electronic ‘identifier’.

The search parameter is only limited by the originating field filled out. Names, places, numbers, addresses, etc. By using the “About” parameter there may be thousands or millions of returns. Imagine if you put “@realdonaldtrump” into the search parameter? You could extract all following accounts who interacted on Twitter, or Facebook etc. You are only limited by your imagination and the scale of the electronic connectivity.

As you can see below, on March 9th, 2016, internal auditors noted the FBI was sharing “raw FISA information, including but not limited to Section 702-acquired information”.

In plain English the raw search returns were being shared with unknown entities without any attempt to “minimize” or redact the results. The person(s) attached to the results were named and obvious. There was no effort to hide their identity or protect their 4th amendment rights of privacy:

But what’s the scale here? This is where the story really lies.

Read this next excerpt carefully.

The operators were searching “U.S Persons”. The review of November 1, 2015, to May 1, 2016, showed “eighty-five percent of those queries” were unlawful or “non compliant”.

85% !! “representing [redacted number]”.

We can tell from the space of the redaction the number of searches were between 1,000 and 9,999 [five digits]. If we take the middle number of 5,000 – that means 4,250 unlawful searches out of 5,000.

The [five digit] amount (more than 1,000, less than 10,000), and 85% error rate, was captured in a six month period.

Also notice this very important quote: “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” So they were searching the same phone number, email address, electronic “identifier”, or people, repeatedly over different dates. Specific people were being tracked/monitored.

Additionally, notice the last quote: “while the government reports it is unable to provide a reliable estimate of” these non lawful searches “since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 coincided with an unusually high error rate”.

That means the 85% unlawful FISA-702(16)(17) database abuse has likely been happening since 2012. (Again, remember that date, 2012) Who was FBI Director? Who was his chief-of-staff? Who was CIA Director? ODNI? etc. Remember, the NSA is inside the Pentagon (Defense Dept) command structure. Who was Defense Secretary? And finally, who wrote and signed-off-on the January 2017 Intelligence Community Assessment?

Tens of thousands of searches over four years (since 2012), and 85% of them are illegal. The results were extracted for?…. (I believe this is all political opposition use; and I’ll explain why momentarily.)

OK, that’s the stunning scale; but who was involved?

Private contractors with access to “raw FISA information that went well beyond what was necessary to respond to FBI’s requests“:

And as noted, the contractor access was finally halted on April 18th, 2016.

[Coincidentally (or not), the wife of Fusion-GPS founder Glenn Simpson, Mary Jacoby, goes to the White House the next day on April 19th, 2016.]

None of this is conspiracy theory.

All of this is laid out inside this 99-page opinion from FISC Presiding Judge Rosemary Collyer who also noted that none of this FISA abuse was accidental in a footnote on page 87: “deliberate decisionmaking“:

This specific footnote, if declassified, would be key.  Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”, this sentence has the potential to expose an internal decision; withheld from congress and the FISA court by the Obama administration; that outlines a process for access and distribution of surveillance data.

Note: “no notice of this practice was given to the FISC until 2016“, that is important.

Summary of this aspect: The FISA court identified and quantified tens-of-thousands of search queries of the NSA/FBI database using the FISA-702(16)(17) system. The database was repeatedly used by persons with contractor access who unlawfully searched and extracted the raw results without redacting the information and shared it with an unknown number of entities.

The outlined process certainly points toward a political spying and surveillance operation; and we are not the only one to think that’s what this system is being used for.

Back in 2017 when House Intelligence Committee Chairman Devin Nunes was working to reauthorize the FISA legislation, Nunes wrote a letter to ODNI Dan Coats about this specific issue:

SIDEBAR: To solve the issue, well, actually attempt to ensure it never happened again, NSA Director Admiral Mike Rogers eventually took away the “About” query option permanently in 2017. NSA Director Rogers said the abuse was so inherent there was no way to stop it except to remove the process completely. [SEE HERE] Additionally, the NSA database operates as a function of the Pentagon, so the Trump administration went one step further. On his last day as NSA Director Admiral Mike Rogers -together with ODNI Dan Coats- put U.S. cyber-command, the database steward, fully into the U.S. military as a full combatant command. [SEE HERE]

There is little doubt the FISA-702(16)(17) database system was used by Obama-era officials, from 2012 through April 2016, as a way to spy on their political opposition. Quite simply there is no other intellectually honest explanation for the scale and volume of database abuse that was taking place.

When we reconcile what was taking place and who was involved, then the actions of the exact same principle participants take on a jaw-dropping amount of clarity.

All of the action taken by CIA Director Brennan, FBI Director Comey, ODNI Clapper and Defense Secretary Ashton Carter make sense. Including their effort to get NSA Director Mike Rogers fired.

Everything after March 9th, 2016, was done to cover up the weaponization of the FISA database. [Explained Here] Spygate, Russia-Gate, the Steele Dossier, and even the 2017 Intelligence Community Assessment (drawn from the dossier and signed by the above) were needed to create a cover-story and protect themselves from discovery of this four year weaponization, political surveillance and unlawful spying. Even the appointment of Robert Mueller as special counsel makes sense; he was FBI Director when this began.

The beginning decision to use FISA(702) as a domestic surveillance and political spy mechanism appears to have started in/around 2012. Perhaps sometime shortly before the 2012 presidential election and before John Brennan left the White House and moved to CIA. However, there was an earlier version of data assembly that preceded this effort.

Political spying 1.0 was actually the weaponization of the IRS. This is where the term “Secret Research Project” originated as a description from the Obama team. It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller. It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

Why disks? Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS. All of the evidence within this sketchy operation came directly to the surface in early spring 2012.

The IRS scandal was never really about the IRS, it was always about the DOJ asking the IRS for the database of information. That is why it was transparently a conflict when the same DOJ was tasked with investigating the DOJ/IRS scandal. Additionally, Obama sent his chief-of-staff Jack Lew to become Treasury Secretary; effectively placing an ally to oversee/cover-up any issues. As Treasury Secretary Lew did just that.

Lesson Learned – It would appear the Obama administration learned a lesson from attempting to gather a large opposition research database operation inside a functioning organization large enough to have some good people that might blow the whistle.

The timeline reflects a few months after realizing the “Secret Research Project” was now worthless (June 2012), they focused more deliberately on a smaller network within the intelligence apparatus and began weaponizing the FBI/NSA database.  If our hunch is correct, that is what will be visible in footnote #69:

How this all comes together in 2019

Fusion GPS was not hired in April 2016 to research Donald Trump. As shown in the evidence provided by the FISC, the intelligence community was already doing surveillance and spy operations. The Obama administration already knew everything about the Trump campaign, and were monitoring everything by exploiting the FISA database.

However, after the NSA alerts in/around March 9th, 2016, and particularly after the April 18th shutdown of contractor access, the Obama intelligence community needed Fusion GPS to create a legal albeit ex post facto justification for the pre-existing surveillance and spy operations. Fusion GPS gave them that justification in the Steele Dossier.

That’s why the FBI small group, which later transitioned into the Mueller team, are so strongly committed to and defending the formation of the Steele Dossier and its dubious content. The Steele Dossier contains the cover-story and justification for the pre-existing surveillance operation.

During a rather innocuous podcast discussion panel April 12th, 2019, one of President Trump’s personal lawyers Jay Sekulow mentioned the FBI had three FISA applications denied by the FISA court in 2016. [Podcast Here – Note comment at 25:05] The denials were always suspected; however, until now no-one in/around the administration has ever confirmed.

If Sekulow is accurate, this adds additional context to the actions of the FBI in the aftermath of Admiral Mike Rogers and an increased urgency in gaining legal justification for surveillance and spy operation unlawfully taking place. A valid FISA warrant would help the FBI cover-up the surveillance. The likely targets were Manafort, Flynn and Papadopoulos…. but it appears the DOJ/FBI were rebuked.

These FISC denials would then initiate institutional panic dependent on the election outcome. An insurance policy would be needed. The Steele Dossier becomes the investigative virus the FBI wanted inside the system. To get the virus into official status, they used the FISA application as the delivery method and injected it into Carter Page. The FBI already knew Carter Page; essentially Carter Page was irrelevant, what they needed was the FISA warrant and the Dossier in the system {Go Deep}.

Fusion GPS was not hired to research Trump, the intelligence community was already doing surveillance and spy operations. The intelligence community needed Fusion GPS to give them a plausible justification for already existing surveillance and spy operations.

Fusion-GPS gave them the justification they needed for a FISA warrant with the Steele Dossier. Ultimately that’s why the Steele Dossier is so important; without it, the DOJ and FBI are naked with their FISA-702 abuse as outlined by John Ratcliffe.

No-one really knows the extent of the current documents and/or information that may be subject to the AG Bill Barr declassification. However, this is the original list as outlined in September 2018, and the agencies who would be involved in the declassification process:

  1. All versions of the Carter Page FISA applications (DOJ) (DoS) (FBI) (ODNI).
  2. All of the Bruce Ohr 302’s filled out by the FBI. (FBI) (ODNI)
  3. All of Bruce Ohr’s emails (FBI) (DOJ) (CIA) (ODNI), and supportive documents and material provided by Bruce Ohr to the FBI. (FBI)
  4. All relevant documents pertaining to the supportive material within the FISA application. (FBI) (DOJ-NSD ) (DoS) (CIA) (DNI) (NSA) (ODNI);
  5. All intelligence documents that were presented to the Gang of Eight in 2016 that pertain to the FISA application used against U.S. person Carter Page; including all exculpatory intelligence documents that may not have been presented to the FISA Court. (CIA) (FBI) (DOJ) (ODNI) (DoS) (NSA)
  6. All unredacted text messages and email content between Lisa Page and Peter Strzok on all devices. (FBI) (DOJ) (DOJ-NSD) (ODNI)
  7. The originating CIA “EC” or two-page electronic communication from former CIA Director John Brennan to FBI Director James Comey that started Operation Crossfire Hurricane in July 2016. (CIA) (FBI) (ODNI)

♦ President Trump can prove the July 31st, 2016, Crossfire Hurricane counterintelligence operation originated from a scheme within the intelligence apparatus by exposing the preceding CIA operation that created the originating “Electronic Communication” memo. Declassify that two-page “EC” document that Brennan gave to Comey.  [The trail is found within the Weissmann report and the use of Alexander Downer – SEE HERE]

♦ Release and declassify all of the Comey memos that document the investigative steps taken by the FBI as an outcome of the operation coordinated by CIA Director John Brennan in early 2016.  [The trail was memorialized by James Comey – SEE HERE]

♦ Reveal the November 2015 through April 2016 FISA-702 search query abuse by declassifying the April 2017 court opinion written by FISC Presiding Judge Rosemary Collyer. Show the FBI contractors behind the 85% fraudulent search queries. [Crowdstrike? Fusion-GPS? Nellie Ohr? Daniel Richman?]  This was a weaponized surveillance and domestic political spying operation. [The trail was laid down in specific detail by Judge Collyer – SEE HERE]

♦ Subpoena former DOJ-NSD (National Security Division) head John Carlin, or haul him in front of a grand jury, and get his testimony about why he hid the abuse from the FISA court in October 2016; why the DOJ-NSD rushed the Carter Page application to beat NSA Director Admiral Mike Rogers to the FISA court; and why Carlin quit immediately thereafter.

♦ Prove the Carter Page FISA application (October 2016) was fraudulent and based on deceptions to the FISA Court. Declassify the entire document, and release the transcripts of those who signed the application(s); and/or depose those who have not yet testified. The creation of the Steele Dossier was the cover-up operation. [SEE HERE]

♦ Release all of the Lisa Page and Peter Strzok text messages without redactions. Let sunlight pour in on the actual conversation(s) that were taking place when Crossfire Hurricane (July ’16) and the FISA Application (Oct ’16) were taking place.  The current redactions were made by the people who weaponized the intelligence system for political surveillance and spy operation.  This is why Page and Strzok texts are redacted!

♦ Release all of Bruce Ohr 302’s, FBI notes from interviews and debriefing sessions, and other relevant documents associated with the interviews of Bruce Ohr and his internal communications. Including exculpatory evidence that Bruce Ohr may have shared with FBI Agent Joseph Pientka. [And get a deposition from this Pientka fella] Bruce Ohr is the courier, carrying information from those outside to those on the inside.

♦ Release the August 2nd, 2017, two-page scope memo provided by DAG Rod Rosenstein to special counsel Robert Mueller to advance the fraudulent Trump investigation, and initiate the more purposeful obstruction of justice investigation. Also Release the October 20th, 2017, second scope memo recently discovered.  The Scope Memos are keys to unlocking the underlying spy/surveillance cover-up. [SEE HERE and SEE HERE]