BIG PICTURE – Sidney Powell Discusses Weissmann/Mueller Special Counsel Destroying Evidence of Their Conduct…


Michael Flynn defense attorney Sidney Powell appears for an interview with Liz MacDonald to discuss the developments in the Flynn case (note: Sullivan’s court appointed amicus response brief is due tomorrow), and the background information recently highlighted.  As you review this interview, retain the 30,000/ft perspective.

Ms. Powell also discusses the Weissmann/Mueller special counsel erasing evidence by wiping phones and hiding evidence of their corrupt activity.  Additionally, Liz Mac circles back to the 2017 FISA report by Rosemary Collyer to support the most recent 2019 opinion filed by the FISA court showing the NSA database search abuse is ongoing.

.

(1) We know to a demonstrable certainty the special counsel took apart the FBI investigative file of Washington Field Office Supervisory Special Agent Brian Dugan in order to protect their corrupt investigation and the collaborative effort of the Senate Intelligence Committee.  And Durham/Aldenberg knows that we know.

(2) We also know with a high degree of certainty the special counsel created a missing Woods File for the Carter Page application when the IG started sniffing around and announced his intent to review the four FISA applications. And Durham/Aldenberg knows that we have strong, very strong, evidence pointing in that direction.

(3) And now today we discover the same special counsel team destroyed their iPhones in an effort to cover their tracks.  These three events all happened within an almost identical time-frame.  C‘mon man… this is not coincidental.

 

I’m reposting a prior research outline below because something odd is happening in the background of this story. I’m not sure what it is, but there are small -seemingly disconnected- issues surfacing, that might tie back to this much bigger and purposefully avoided story.  I have learned to trust my instincts on this.

♦One – The FISA reauthorization legislation was dropped by Nancy Pelosi and all media conversation immediately vaporized.
♦Two – Crowdstrike is very concerned about this story every time it surfaces.
♦Three – If you understand the scale and scope of surveillance… does that explain the behavior of some people today [legislative (politicians), judiciary (judges), Pentagon (military)].

Were  ‘black files‘ created by the Obama Administration?

With the release of recent transcripts and the declassification of material from within the IG report on the Carter Page FISA, there is a common misconception about how the intelligence apparatus began investigating the Trump campaign. In this outline we hope to provide some deep source material that will explain the origin, and specifically why those inside the Intelligence Community began using Confidential Human Sources.

During the time-frame of December 2015 through April 2016 the NSA database was being exploited by contractors within the intelligence community doing unauthorized searches.

On March 9, 2016, oversight personnel doing a review of FBI system access were alerted to thousands of unauthorized search queries of specific U.S. persons within the NSA database.

NSA Director Mike Rogers was made aware.

Subsequently NSA Director Rogers initiated a full compliance review of the system to identify who was doing the searches; & what searches were being conducted.

On April 18, 2016, following the preliminary audit results, Director Rogers shut down all FBI contractor access to the database after he learned FISA-702 “about”(17) and “to/from”(16) search queries were being done without authorization. Thus begins the first discovery of a much bigger background story.

When you compile the timeline with the people involved; and the specific wording of the resulting review, which was then delivered to the FISA court; and overlay the activity that was taking place in the GOP primary; what we discover is a process where the metadata collected by the NSA was being searched for political opposition research and surveillance.

Additionally, tens-of-thousands of searches were identified by the FISA court as likely extending much further than the compliance review period: “while the government reports it is unable to provide a reliable estimate of the non compliant queries since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 period coincided with an unusually high error rate”.

In short, during the Obama administration the NSA database was continually used to conduct surveillance. This is the critical point that leads to understanding the origin of “Spygate”, as it unfolded in the Spring and Summer of 2016.

It was the discovery of the database exploitation and the removal of access as a surveillance tool that created their initial problem. Here’s how we can tell.

Initially in December 2015 there were 17 GOP candidates and all needed to be researched.

However, when Donald Trump won New Hampshire, Nevada and South Carolina the field was significantly whittled. Trump, Cruz, Rubio, Kasich and Carson remained.

On Super Tuesday, March 2, 2016, Donald Trump won seven states (VT, AR, VA, GA, AL, TN, MA) it was then clear that Trump was the GOP frontrunner with momentum to become the presumptive nominee. On March 5th, Trump won Kentucky and Louisiana; and on March 8th Trump won Michigan, Mississippi and Hawaii.

The next day, March 9th, NSA security alerts warned internal oversight personnel that something sketchy was going on.

This timing is not coincidental. As FISA Judge Rosemary Collyer later wrote in her report, “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” Put another way: attributes belonging to a specific individual(s) were being targeted and queried, unlawfully. Given what was later discovered, it seems obvious the primary search target, over multiple date ranges, was Donald Trump.

There were tens-of-thousands of unauthorized search queries; and as Judge Collyer stated in her report, there is no reason to believe the 85% non compliant rate was any different from the abuse of the NSA database going back to 2012.

As you will see below the NSA database was how political surveillance was being conducted during Obama’s second term in office. However, when the system was flagged, and when NSA Director Mike Rogers shut down “contractor” access to the system, the system users needed to develop another way to get access.

Mike Rogers shuts down access on April 18, 2016. On April 19, 2016, Fusion-GPS founder Glenn Simpson’s wife, Mary Jacoby visits the White House. Immediately thereafter, the DNC and Clinton campaign contract Fusion GPS… who then hire Christopher Steele.

Knowing it was federal “contractors”, outside government with access to the system, doing the unauthorized searches, the question becomes: who were the contractors?

The possibilities are quite vast. Essentially anyone the FBI or intelligence apparatus was using could have participated. Crowdstrike was a known FBI contractor; they were also contracted by the DNC. Shawn Henry was the former head of the FBI office in DC and is now the head of Crowdstrike; a rather dubious contractor for the government and a politically connected data security and forensic company.

James Comey’s special friend Daniel Richman was an unpaid FBI “special employee” with security access to the database. Nellie Ohr began working for Fusion-GPS on the Trump project in November 2015 and she was a CIA contractor; and it’s entirely likely Glenn Simpson or people within his Fusion-GPS network were also contractors for the intelligence community.

Remember the Sharyl Attkisson computer intrusions? It’s all part of this same network; Attkisson even names Shawn Henry as a defendant in her ongoing lawsuit.

All of the aforementioned names, and so many more, held a political agenda in 2016.

It seems likely if the NSA flags were never triggered then the contracted system users would have continued exploiting the NSA database for political opposition research; which would then be funneled to the Clinton team. However, once the unauthorized flags were triggered, the system users (including those inside the official intelligence apparatus) needed to find another back-door to continue… Again, the timing becomes transparent.

Immediately after NSA flags were raised March 9th; the same intelligence agencies began using confidential human sources (CHS’s) to run into the Trump campaign. By activating intelligence assets like Joseph Mifsud and Stefan Halper the IC (CIA, FBI) and system users had now created an authorized way to continue the same political surveillance operations.

When Donald Trump hired Paul Manafort on March 28, 2016, it was a perfect scenario for those doing the surveillance. Manafort was a known entity to the FBI and was previously under investigation. Paul Manafort’s entry into the Trump orbit was perfect for Glenn Simpson to sell his prior research on Manafort as a Trump-Russia collusion script two weeks later.

The shift from “unauthorized exploitation of the NSA database” to legally authorized exploitation of the NSA database was now in place. This was how they continued the political surveillance. This is the confluence of events that originated “spygate”, or what officially blossomed into the FBI investigation known as “Crossfire Hurricane” on July 31.

If the NSA flags were never raised; and if Director Rogers had never initiated the compliance audit; and if the political contractors were never blocked from access to the database; they would never have needed to create a legal back-door, a justification to retain the surveillance. The political operatives/contractors would have just continued the targeted metadata exploitation.

Once they created the surveillance door, Fusion-GPS was then needed to get the FBI known commodity of Chris Steele activated as a pipeline. Into that pipeline all system users pushed opposition research. However, one mistake from the NSA database extraction during an “about” query shows up as a New Yorker named Michael Cohen in Prague.

That misinterpreted data from a FISA-702 “about query” is then piped to Steele and turns up inside the dossier; it was the wrong Michael Cohen. It wasn’t Trump’s lawyer, it was an art dealer from New York City with the same name; the same “identifier”.

A DEEP DIVE – How Did It Work?

Start by reviewing the established record from the 99-page FISC opinion rendered by Presiding Judge Rosemary Collyer on April 26, 2017. Review the details within the FISC opinion.

I would strongly urge everyone to read the FISC report (full pdf below) because Judge Collyer outlines how the DOJ, which includes the FBI, had an “institutional lack of candor” in responses to the FISA court. In essence, the Obama administration was continually lying to the FISA court about their activity, and the rate of fourth amendment violations for illegal searches and seizures of U.S. persons’ private information for multiple years.

Unfortunately, due to intelligence terminology Judge Collyer’s brief and ruling is not an easy read for anyone unfamiliar with the FISA processes. That complexity also helps the media avoid discussing it; and as a result most Americans have no idea the scale and scope of the Obama-era surveillance issues. So we’ll try to break down the language.

.

For the sake of brevity and common understanding CTH will highlight the most pertinent segments showing just how systemic and troublesome the unlawful electronic surveillance was.

Early in 2016 NSA Director Admiral Mike Rogers was alerted of a significant uptick in FISA-702(17) “About” queries using the FBI/NSA database that holds all metadata records on every form of electronic communication.

The NSA compliance officer alerted Admiral Mike Rogers who then initiated a full compliance audit on/around March 9th, 2016, for the period of November 1st, 2015, through May 1st, 2016.

While the audit was ongoing, due to the severity of the results that were identified, Admiral Mike Rogers stopped anyone from using the 702(17) “about query” option, and went to the extraordinary step of blocking all FBI contractor access to the database on April 18, 2016 (keep these dates in mind).

Here are some significant segments:

The key takeaway from these first paragraphs is how the search query results were exported from the NSA database to users who were not authorized to see the material. The FBI contractors were conducting searches and then removing, or ‘exporting’, the results. Later on, the FBI said all of the exported material was deleted.

Searching the highly classified NSA database is essentially a function of filling out search boxes to identify the user-initiated search parameter and get a return on the search result.

♦ FISA-702(16) is a search of the system returning a U.S. person (“702”); and the “16” is a check box to initiate a search based on “To and From“. Example, if you put in a date and a phone number and check “16” as the search parameter the user will get the returns on everything “To and From” that identified phone number for the specific date. Calls, texts, contacts etc. Including results for the inbound and outbound contacts.

♦ FISA-702(17) is a search of the system returning a U.S. person (702); and the “17” is a check box to initiate a search based on everything “About” the search qualifier. Example, if you put a date and a phone number and check “17” as the search parameter the user will get the returns of everything about that phone. Calls, texts, contacts, geolocation (or gps results), account information, user, service provider etc. As a result, 702(17) can actually be used to locate where the phone (and user) was located on a specific date or sequentially over a specific period of time which is simply a matter of changing the date parameters.

And that’s just from a phone number.

Search an ip address “about” and read all data into that server; put in an email address and gain everything about that account. Or use the electronic address of a GPS enabled vehicle (about) and you can withdraw more electronic data and monitor in real time. Search a credit card number and get everything about the account including what was purchased, where, when, etc. Search a bank account number, get everything about transactions and electronic records etc. Just about anything and everything can be electronically searched; everything has an electronic ‘identifier’.

The search parameter is only limited by the originating field filled out. Names, places, numbers, addresses, etc. By using the “About” parameter there may be thousands or millions of returns. Imagine if you put “@realdonaldtrump” into the search parameter? You could extract all following accounts who interacted on Twitter, or Facebook etc. You are only limited by your imagination and the scale of the electronic connectivity.

As you can see below, on March 9th, 2016, internal auditors noted the FBI was sharing “raw FISA information, including but not limited to Section 702-acquired information”.

In plain English the raw search returns were being shared with unknown entities without any attempt to “minimize” or redact the results. The person(s) attached to the results were named and obvious. There was no effort to hide their identity or protect their 4th amendment rights of privacy; and database access was from the FBI network:

But what’s the scale here? This is where the story really lies.

Read this next excerpt carefully.

The operators were searching “U.S Persons”. The review of November 1, 2015, to May 1, 2016, showed “eighty-five percent of those queries” were unlawful or “non compliant”.

85% !! “representing [redacted number]”.

We can tell from the space of the redaction the number of searches were between 10,000 and 99,999 [six digits]. If we take the middle number of 50,000 – a non compliant rate of 85 percent means 42,500 unlawful searches out of 50,000.

The [six digit] amount (more than 10,000, less than 99,999), and 85% error rate, was captured in a six month period, November 2015 to April 2016.

Also notice this very important quote: “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” This tells us the system users were searching the same phone number, email address, electronic identifier, repeatedly over different dates.  The same people were being repeatedly queried.

Specific person(s) were being tracked/monitored.

Additionally, notice the last quote: “while the government reports it is unable to provide a reliable estimate of” these non lawful searches “since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 coincided with an unusually high error rate”.

That means the 85% unlawful FISA-702(16)(17) database abuse has likely been happening since 2012.

2012 is an important date in this database abuse because a network of specific interests is assembled that also shows up in 2016/2017:

  • Who was 2012 FBI Director? Robert Mueller, who was selected by the FBI group to become special prosecutor in 2017.
  • Who was Mueller’ chief-of-staff? Aaron Zebley, who became one of the lead lawyers on the Mueller special counsel.
  • Who was 2012 CIA Director? John Brennan (remember the ouster of Gen Petraeus)
  • Who was ODNI? James Clapper.
  • Remember, the NSA is inside the Pentagon (Defense Dept) command structure. Who was Defense Secretary? Ash Carter

Who wanted NSA Director Mike Rogers fired in 2016? Brennan, Clapper and Carter.

And finally, who wrote and signed-off-on the January 2017 Intelligence Community Assessment and then lied about the use of the Steele Dossier? The same John Brennan, and James Clapper along with James Comey.

Tens of thousands of searches over four years (since 2012), and 85% of them are illegal. The results were extracted for?…. (I believe this is all political opposition use; and I’ll explain why momentarily.)

OK, that’s the stunning scale; but who was involved?

Private contractors with access to “raw FISA information that went well beyond what was necessary to respond to FBI’s requests“:

And as noted, the contractor access was finally halted on April 18th, 2016.

[Coincidentally (or likely not), the wife of Fusion-GPS founder Glenn Simpson, Mary Jacoby, goes to the White House the very next day on April 19th, 2016.]

None of this is conspiracy theory.

All of this is laid out inside this 99-page opinion from FISC Presiding Judge Rosemary Collyer who also noted that none of this FISA abuse was accidental in a footnote on page 87: “deliberate decisionmaking“:

This specific footnote, if declassified, could be a key. Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”, this sentence has the potential to expose an internal decision; withheld from congress and the FISA court by the Obama administration; that outlines a process for access and distribution of surveillance data.

Note: “no notice of this practice was given to the FISC until 2016“, that is important.

Summary: The FISA court identified and quantified tens-of-thousands of search queries of the NSA/FBI database using the FISA-702(16)(17) system. The database was repeatedly used by persons with contractor access who unlawfully searched and extracted the raw results without redacting the information and shared it with an unknown number of entities.

The outlined process certainly points toward a political spying and surveillance operation; and we are not the only one to think that’s what this system is being used for.

Back in 2017 when House Intelligence Committee Chairman Devin Nunes was working to reauthorize the FISA legislation, Nunes wrote a letter to ODNI Dan Coats about this specific issue:

SIDEBAR: To solve the issue, well, actually attempt to ensure it never happened again, NSA Director Admiral Mike Rogers eventually took away the “About” query option permanently in 2017. NSA Director Rogers said the abuse was so inherent there was no way to stop it except to remove the process completely. [SEE HERE] Additionally, the NSA database operates as a function of the Pentagon, so the Trump administration went one step further. On his last day as NSA Director Admiral Mike Rogers -together with ODNI Dan Coats- put U.S. cyber-command, the database steward, fully into the U.S. military as a full combatant command. [SEE HERE] Unfortunately it didn’t work as shown by the 2018 FISC opinion rendered by FISC Judge James Boasberg [SEE HERE]

There is little doubt the FISA-702(16)(17) database system was used by Obama-era officials, from 2012 through April 2016, as a way to spy on their political opposition.

Quite simply there is no other intellectually honest explanation for the scale and volume of database abuse that was taking place; and keep in mind these searches were all ruled to be unlawful. Searches for repeated persons over a period time that were not authorized.

When we reconcile what was taking place and who was involved, then the actions of the exact same principle participants take on a jaw-dropping amount of clarity.

All of the actions taken by CIA Director Brennan, FBI Director Comey, ODNI Clapper and Defense Secretary Ashton Carter make sense. Including their effort to get NSA Director Mike Rogers fired.

Everything after March 9th, 2016, had a dual purpose: (1) done to cover up the weaponization of the FISA database. [Explained Here] Spygate, Russia-Gate, the Steele Dossier, and even the 2017 Intelligence Community Assessment (drawn from the dossier and signed by the above) were needed to create a cover-story and protect themselves from discovery of this four year weaponization, political surveillance and unlawful spying. Even the appointment of Robert Mueller as special counsel makes sense; he was FBI Director when this began. And (2) they needed to keep the surveillance going.

The beginning decision to use FISA(702) as a domestic surveillance and political spy mechanism appears to have started in/around 2012. Perhaps sometime shortly before the 2012 presidential election and before John Brennan left the White House and moved to CIA. However, there was an earlier version of data assembly that preceded this effort.

Political spying 1.0 was actually the weaponization of the IRS. This is where the term “Secret Research Project” originated as a description from the Obama team. It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller. It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

Why disks? Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS. All of the evidence within this sketchy operation came directly to the surface in early spring 2012.

The IRS scandal was never really about the IRS, it was always about the DOJ asking the IRS for the database of information. That is why it was transparently a conflict when the same DOJ was tasked with investigating the DOJ/IRS scandal. Additionally, Obama sent his chief-of-staff Jack Lew to become Treasury Secretary; effectively placing an ally to oversee/cover-up any issues. As Treasury Secretary Lew did just that.

Lesson Learned – It would appear the Obama administration learned a lesson from attempting to gather a large opposition research database operation inside a functioning organization large enough to have some good people that might blow the whistle.

The timeline reflects a few months after realizing the “Secret Research Project” was now worthless (June 2012), they focused more deliberately on a smaller network within the intelligence apparatus and began weaponizing the FBI/NSA database. If our hunch is correct, that is what will be visible in footnote #69:

How this all comes together in 2019/2020

Fusion GPS was not hired in April 2016 to research Donald Trump. As shown in the evidence provided by the FISC, the intelligence community was already doing surveillance and spy operations. The Obama administration already knew everything about the Trump campaign, and were monitoring everything by exploiting the FISA database.

However, after the NSA alerts in/around March 9th, 2016, and particularly after the April 18th shutdown of contractor access, the Obama intelligence community needed Fusion GPS to create a legal albeit ex post facto justification for the pre-existing surveillance and spy operations. Fusion GPS gave them that justification in the Steele Dossier.

That’s why the FBI small group, which later transitioned into the Mueller team, were so strongly committed to and defending the formation of the Steele Dossier and its dubious content.

The Steele Dossier, an outcome of the Fusion contract, contains two purposes: (1) the cover-story and justification for the pre-existing surveillance operation (protect Obama); and (2) facilitate the FBI counterintelligence operation against the Trump campaign (assist Clinton).

An insurance policy would be needed. The Steele Dossier becomes the investigative virus the FBI wanted inside the system. To get the virus into official status, they used the FISA application as the delivery method and injected it into Carter Page.

The FBI already knew Carter Page; essentially Carter Page was irrelevant, what they needed was the FISA warrant and the Dossier in the system {Go Deep}.  This also explains all of the issues with the FISA application “Woods File” being created ex post facto.

The Obama intelligence community needed Fusion GPS to give them a plausible justification for already existing surveillance and spy operations. Fusion-GPS gave them that justification and evidence for a FISA warrant with the Steele Dossier.  The Dossier was used to create the FISA application. The Dossier was used as a replacement for a valid Woods File.

Ultimately that’s why the Steele Dossier was so important; without it, the FBI would not have a tool that Mueller needed to continue the investigation of President Trump. In essence by renewing the FISA application, despite them knowing the underlying dossier was junk, the FBI was keeping the surveillance gateway open for Team Mueller to exploit later on.

Was the Peter Strzok created “EC” that initiated Crossfire Hurricane really just a massive effort to cover-up the Obama-era surveillance network?  {Go Deep}  Is that underlying surveillance network the real threat explaining why Michael Flynn had to be removed?

.

Lou Dobbs and Devin Nunes Discuss Ongoing William Aldenberg Investigation…


John Durham is a name attached to an internal DOJ investigation; however, it is William Aldenberg who is the real investigative lead.  Aldenberg is the technical center; and Aldenberg provides Durham the results of the investigation he is directing.

Lou Dobbs and Devin Nunes discuss the frustration and slow-pace of the current DOJ probe under the office of USAO John Durham.  Recently AG Bill Barr has inferred that more indictments are possible as an outcome of the background investigation. We’ll see.

 

Records Show Weissmann Special Counsel Team Erased 15 Phones After IG Requested Review…


Newly released records [SEE HERE] from a FOIA show the Weissmann/Mueller special counsel team “accidentally” wiped 15 iPhones of data early in 2018 after the phones were requested by the office of inspector general for review.

Mueller’s lead investigator Andrew Weissmann accidentally wiped two phones himself; through a lengthy process of entering the wrong passcode several times over a period of three hours; removing data to show his activity during the special counsel.  Weissmann claimed to have entered the wrong password (takes ten attempts) and that erased all the data.  Greg Andre, a former deputy assistant attorney general in the Justice Department’s criminal division, made the same claim.

Wiping your phone to hide damaging information only works if the other phone you are communicating with wipes the same data.  Guess what happened?  Yup, exactly that.

James Quarles III who worked with Mueller in private practice at the Washington office of Wilmer-Hale, claimed his iPhone magically erased itself.

Before joining the special counsel team Rush Atkinson worked under Andrew Weissmann in the DOJ’s criminal fraud section where he specialized in financial fraud.  Atkinson claims he too entered the wrong password ten times and accidentally erased all the data.

At least twelve other people assigned to the special counsel investigation had similar “phone wiped/erased” issues which blocked the inspector general from his review.

 

One “accidental” method used repeatedly was to place the iPhone in airplane mode and then lock it without providing the password.  Retrieval attempts then erased all data, and returned to factory settings after unsuccessful passcode entries.

[PDF Link Available Here]

As we have previously mentioned the two-year Weissmann/Mueller special counsel, May 2017 through April 2019, was a continuum of the corrupt DOJ and FBI efforts that originated prior to the 2016 election.  Many of the internal FBI and DOJ officials just transferred from the Clinton email investigation, into the Crossfire Hurricane investigation, and then into the Weissmann/Mueller special counsel investigation.

The corrupt activity within the special counsel tenure was actually worse than the corrupt activity that preceded it.

To give you an idea how difficult it is to wipe the iPhone, watch this video.

This was not done “accidentally”:

.

 

White House Chief of Staff Mark Meadows Interview With Maria Bartiromo – “Additional Documents”…


White House Chief of Staff Mark Meadows discusses ongoing stimulus negotiations on Capitol Hill and the issues facing the Trump administration. Additionally, Meadows recaps the status of the Durham probe as it is best known to him.

“Additional documents that I’ve been able to review say that a number of the players, the Peter Strzoks, the Andy McCabes, the James Comeys, and even others in the administration previously are in real trouble because of their willingness to participate in an unlawful act and I use the word unlawful at best, it broke all kinds of protocols and at worst people should go to jail as I mentioned previously.”..

 

Flynn Case Update: Defense, DOJ and Amicus Agree on Expedited Resolution Schedule…


The DOJ and Michael Flynn defense attorney Sidney Powell have filed a joint status report and motion for expedited hearing with Judge Emmet Sullivan. [pdf available here] According to the filing the DOJ and defense have conferred with the Sullivan appointed amicus (Gleeson) who will respond to the motion to dismiss by September 11th.

Following the Sept. 11th amicus briefing, the DOJ and defense will jointly respond and that should end the need for further briefings and replies. As a consequence the proposed date for court appearance, and hopeful final disposition, are: Sept: 23, 24, 28, 29.

 

Here’s the motion:

.

 

 

CNN Dragging Trump RIGHT-Leg Stroke Story With Drudge Report Help


Some think that Lockhart would be be best advised to go on a diet—starting with his mouth

Judi McLeod image

Re-Posted from the Canada Free Press By  —— Bio and ArchivesSeptember 1, 2020

CNN Dragging Trump RIGHT-Leg Stroke Story With Drudge Report Help

Over at the world’s Biggest Lie Factory, CNN “political analyst”, Fatso Joe Lockhart just gave President Donald Trump a “dragging right leg” supposedly left over from a 5-month-ago “secret stroke”. (via screaming front page Drudge Report headline, Sept. 1, 2020)

(Never mind that the Daily Kos had the ‘story’ a week before today’s Drudge.)

For the rest of the world, April Fools was five months ago—guess it finally cleared quarantine and lock down only today over at CNN.

Lockhart wanted to one-up images of a decapitated president, so tried for a version of a leg dragging misfit, just for sport.

Yet a video of the president deploying from Kenosha today blows fat holes in CNN’s fabricated story.

“Lockhart took to Twitter and asked, “Did @realDonaldTrump have a stroke which he is hiding from the American public?”(Fox News, Sept. 1, 2020)

It had, of course, to be a “dragging right leg, as a dragging left one would be too close to what the entire Democrat Party is now dragging all over the electoral map

“CNN political analyst Joe Lockhart publicly questioned on Monday if President Trump had a stroke that he is “hiding” from the American people.  (Fox News)

“Lockhart is no stranger to controversial tweets. Last week, the CNN analyst suggested that “karma” was involved in the trajectory of Hurricane Laura as it approached Texas and Louisiana.”

When the former Clinton press secretary’s not slandering duly elected presidents, bully Lockhart is slandering teenagers like former Covington Catholic High School student Nick Sandmann—even after his network settled a $250 million defamation lawsuit brought by lawyers for the high school student’s defamation lawsuit earlier this year.

“ Last Tuesday, CNN awkwardly aired Sandmann’s speech as part of the second night of the Republican National Convention, where he said his life “changed forever in that one moment” because the “full war machine in the mainstream media revved up into attack mode” while botching its coverage of the 2019 viral confrontation with a Native American elder that had portrayed the Kentucky teen as the aggressor. (Fox News)

This is what snarf-snacking Lockhart had to say about the teenager:

“I’m watching tonight because it’s important. But i [sic] don’t have to watch this snot nose entitled kid from Kentucky,” Lockhart tweeted. (Fox News)

The spittle-flecked Tweet bounced off young Sandmann like the proverbial water off a duck’s back.

Lockhart’s Tweet is based on CNN suspicion over President Trump’s visit to Walter Reed Medical Center last year.

“The president denied that he made an emergency visit to the hospital last year after suffering “a series of mini-strokes” after a new book claimed that Vice President Pence was on standby in the event Trump was incapacitated. (The Hill, Sept. 1, 2020)

“The president’s denial raised eyebrows, as the book from New York Times correspondent Michael Schmidt did not specifically state that Trump had suffered from a series of small strokes.

“It never ends! Now they are trying to say that your favorite President, me, went to Walter Reed Medical Center, having suffered a series of mini-strokes. Never happened to THIS candidate — FAKE NEWS,” Trump tweeted, before insinuating that Democratic presidential nominee Joe Biden may have dealt with health issues.”

Someone should tip off The Hill that Trump didn’t “insinuate”  that Biden may have dealt with health issues, but flat out stated it.

“Schmidt reported in his new book that Pence was told to be on standby to assume presidential powers last November in the event the president had to be anesthetized during a previously unscheduled visit to Walter Reed Medical Center. (The Hill)

“The White House said at the time that Trump had undergone portions of his annual physical exam in November when he had free time, but offered few other details. A White House doctor later issued a letter seeking to dispel speculation that Trump may have had a medical episode.

“Trump’s health has been a sensitive subject for the president. He has repeatedly cast doubt on Biden’s mental fitness and raised questions about whether he has the vigor and energy to be president.

“But he has aggressively pushed back whenever his own health is called into question.

“The president lashed out at the media over the speculation brought on by the Walter Reed visit last November, calling the reporting “dangerous.”

“The president has also spent an extended period of time defending an incident at West Point where he appeared to struggle to raise a glass of water to his mouth and later haltingly walked down a ramp. At a campaign rally in Tulsa, Okla., the president sipped from a water glass using one hand, prompting raucous applause from the crowd.”

Meanwhile, considering motor mouth Lockhart’s apparent obesity and girth, it is he who should be worried about “mini” strokes.

Some think that Lockhart would be be best advised to go on a diet—starting with his mouth.

Brennan Transmits His Durham Briefing to the Crew…


When you know the process, you know the methods and purposes.  Remember: CIA messaging is transmitted through the Washington Post; FBI messaging is transmitted through the New York Times; and State Dept. messaging is transmitted through CNN. This flow is the one constant in the narrative engineering process.

Ten days ago former CIA Director John Brennan was interviewed by the investigative unit led by John Durham.

Two days ago Brennan told the “small group” of politicians and corrupt Obama officials what his official line to those Durham investigators was.

Brennan tells his allies this through an Op-Ed published in the Washington Post.

The motive, intent and purpose is the same as Dianne Feinstein’s leak of the Glenn Simpson testimony… get all messaging on the same page.

Here’s the Brennan narrative to assist the “by the book” justification:

[Washington Post – John Brennan] – […] President Barack Obama already knew the Russians were hacking into the networks of U.S. presidential campaigns, but on the afternoon of July 28, 2016, I informed him in a hurriedly scheduled meeting that Russian President Vladimir Putin had authorized his intelligence services to carry out activities to hurt Democratic candidate Hillary Clinton and boost the election prospects of Donald Trump.

 

“Mr. President,” I said, “it appears that the Russian effort to undermine the integrity of the November election is much more intense, determined, and insidious than any we have seen before.”

My reference to the unprecedented scale and scope of Moscow’s efforts to harm the integrity of the election quickly riveted the president’s attention. It also triggered the immediate concern of the others in the room — including Chief of Staff Denis McDonough, who asked, after I was done speaking, “What are you planning to do on the congressional front?”

I thought for a brief moment and then recommended that the most sensitive intelligence be limited initially only to the “Gang of Eight” — the bipartisan leadership of both houses of Congress as well as the chairs and ranking minority-party members of the Intelligence Committees. I was concerned that briefing Congress more broadly on fragile intelligence sources and methods could lead to damaging leaks, harming our ability to learn more about Russian plans and capabilities.

Moreover, some U.S. persons affiliated with the Trump campaign appeared to be caught up, wittingly or unwittingly, in the Russian scheme, and I knew that the politically volatile nature of such information could have been used by Democrats to harm the Trump campaign.

In my more than 30 years of government service, I had witnessed some members of both political parties engage in unethical behavior by misusing intelligence, and I wanted to avoid that happening on the eve of a closely contested presidential election. Obama understood my concerns, but he said he wanted Congress briefed as appropriate and as required.

Congress was already on summer recess at the time, but three members of the Gang of Eight — Democrats Rep. Nancy Pelosi (Calif.), Rep. Adam B. Schiff (Calif.) and Sen. Harry M. Reid (Nev.) — made arrangements to receive the briefing in August in person or by secure phone. The other five — one Democrat and four Republicans — were briefed individually in secure congressional conference rooms on Sept. 6.

To underscore the sensitivity of the intelligence, I personally conducted all the briefings. Most of the eight immediately recognized the gravity of Russian efforts. A notable exception was Sen. Mitch McConnell (R-Ky.), who insinuated that the CIA was working with the Obama administration to prevent Trump from getting elected.

We conducted many subsequent briefings for members and staff in the run-up to the Nov. 8 presidential election.  (more)

Smart move by Brennan to bring in President Obama; although this is the first time Brennan admits to briefing the White House on the Steele Dossier information specifically on July 28th 2016.  Not accidentally three days before the official opening of FBI operation Crossfire Hurricane.

Yes, that timeline contradicts with other information provided by Lisa Page and various FBI officials in their depositions, but that can be reconciled internally, safely, based on obtuse distinctions around the actual content of the briefing itself.

Start by remembering the sworn testimony of John Brennan to congress on May 23rd, 2017.  Listen carefully to the opening statement from former the former CIA director and pay close attention to the segment at 13:35 of this video [transcribed below]:

Brennan: [13:35] “Third, through the so-called Gang-of-Eight process we kept congress apprised of these issues as we identified them.”

“Again, in consultation with the White House, I PERSONALLY briefed the full details of our understanding of Russian attempts to interfere in the election to congressional leadership; specifically: Senators Harry Reid, Mitch McConnell, Dianne Feinstein and Richard Burr; and to representatives Paul Ryan, Nancy Pelosi, Devin Nunes and Adam Schiff between 11th August and 6th September [2016], I provided the same briefing to each of the gang of eight members.”

“Given the highly sensitive nature of what was an active counter-intelligence case [that means the FBI], involving an ongoing Russian effort, to interfere in our presidential election, the full details of what we knew at the time were shared only with those members of congress; each of whom was accompanied by one senior staff member.”…

Notice a few things from this testimony.  First, where Brennan says “in consultation with the White House“.  This was the first direct connection between Brennan’s activity and President Obama, National Security Adviser Susan Rice and Chief-of-Staff Denis McDonough, each of whom would have held knowledge of what Brennan was briefing to the Go8; Brennan confirms this in his August 31, 2020, Op-ed.

Secondly, Brennan is describing raw intelligence (obviously gathered prior to the Carter Page FISA Application/Warrant – October 21st, 2016) that he went on to brief the Gang-of-Eight (pictured below).  Notice Brennan said he did briefings “individually”.

Brennan also says in his testimony that he began the briefings on August 11th, 2016.  This is a key point because former Senate Minority Leader Harry Reid sent a letter to James Comey on August 27th, 2016, as an outcome of his briefing by John Brennan. But it is the content of Reid’s letter that really matters.

In the last paragraph of Reid’s letter to Comey he notes something that is only cited within the Christopher Steele Dossier [full letter pdf here]:

This letter is August 27th, 2016.  The Trump advisor in the letter is Carter Page. The source of the information is Christopher Steele in his dossier. Two months later (October 21st, 2016) the FBI filed a FISA application against Carter Page using the Steele Dossier.

So what we are seeing here is CIA Director John Brennan briefing Harry Reid on the Steele dossier in August 2016, even before the dossier reached the FBI.  However, John Brennan has denied seeing the dossier until December of 2016.  A transparent lie.

Listen from 03:00 to 04:36:

Maltese Professor Joseph Mifsud FBI Interview Notes Released….


Last night the FBI interview notes (known as a “302 report”) with Maltese Professor Joseph Mifsud were released. The story of Mr. Mifsud and his discussions with former Trump campaign aid George Papadopoulos was said to be the originating seed for the FBI to investigate the Trump campaign contacts with Russia known as “Crossfire Hurricane”.

A narrative, pushed through a series of FBI leaks in 2017 outlining Mifsud as a Russian entity, was at the center of how the media justified the FBI targeting the Trump campaign for colluding with Russia. Later the special counsel used FBI conversations with Papadopoulos to claim he was less than honest about his contacts with Mifsud.

However, the actual FBI interview notes with Mifsud on February 10, 2017, show a remarkably different story.

 

[H/T Technofog Source]

As noted above the FBI interview of Mifsud was not very probing; and interestingly the agents did not ask may questions -or followups- about statements made by Mifsud.  This is particularly interesting when you recognize the claimed conversation between Mifsud and Papadopoulos about Russia hacking DNC/Clinton emails was said to be the epicenter of the entire FBI operation. “Russians having dirt on Clinton” etc.

New York Times – “In late April, at a London hotel, Mr. Mifsud told Mr. Papadopoulos that he had just learned from high-level Russian officials in Moscow that the Russians had “dirt” on Mrs. Clinton in the form of “thousands of emails,” according to court documents.”

Joseph Mifsud directly refutes any conversation about that important DNC/Clinton email factor, and in February 2017 the FBI agents did not ask a single clarifying question in that regard.  Note: this interview is happening seven months after the July 31, 2016, origination of the investigation.

The follow-up email from Mifsud (noted in the FBI interview notes) was previously provided to House Oversight and Government Reform committee, and is below:

The release of the Mifsud interview notes highlights the casual lack of importance the FBI seemed to be placing on the Russian “hacking” of the DNC or Clinton emails.  Additionally, there is absolutely no evidence the FBI considered Mifsud a “Russian asset” as outlined by former FBI Director James Comey.  Indeed the entire thing just gets more sketchy.

This FBI interview with Mifsud appears to be more of an approach at justifying a pre-existing investigation.  Perhaps best viewed as a ‘going-through-the-paces’ approach to defend the thin gruel pretense for the Trump surveillance of the prior year.

The FBI based the legality and justification of their Trump campaign investigation on a rumor of a conversation shared by Australian Ambassador Alexander Downer as he recalled George Papadopoulos referencing this contact with Mifsud.  The information from Downer came through unofficial channels connected to the State Department and was passed along to the FBI.

From the casual lack of inquiry it appears s the FBI interviewers knew the origination story was very thin and did not want to add aspects that would undermine the original justification.  Instead, they eventually handed the entire mess over to the special counsel where Andrew Weissmann and crew used these thin threads to piece together a fabrication that would advance the political opposition to President Trump.

Our own research has noted the Weissmann special counsel operation was actually far more corrupt than the original FBI and DOJ effort that preceded it.  Overall the Trump-Russia investigation was one long fraudulent investigative continuum, with multiple attack angles; however, it was the special counsel that took it to new levels of fraud, manipulation and purposeful narrative assembly.

An insurance policy against President Trump.

 

Sunday Talks – Devin Nunes Discusses The Vast Mailbox Conspiracy Theory…


HPSCI ranking member Devin Nunes appears on Fox News with Maria Bartiromo to discuss the Democrats conspiracy theory about President Trump removing mailboxes.

Additionally, Devin Nunes discusses the contrast between how the FBI gave Hillary Clinton a defensive briefing based on an actual risk of foreign influence, yet the FBI did not give Donald Trump a defensive briefing based on a Russian influence conspiracy they were creating with the Clinton campaign.

 

Sunday Talks – Devin Nunes Discusses Clinesmith and California Taxes…


HPSCI Ranking Member Devin Nunes appears on Fox News to discuss the recent criminal plea agreement between the DOJ and former FBI lawyer Kevin Clinesmith.