Birthers on the Left: Why Democrats Can’t Let Go of the Mueller Report


Published on Apr 22, 2019

SUBSCRIBED 125K
The desperation on the Left to wring some impeachable offense from the Mueller Report is reminiscent of the “birthers” who couldn’t let go after Barack Obama released his official certificate. Will House Judiciary Chairman Nadler’s subpoena and hearings find anything that will sway a single vote in the 2020 presidential election? Bill Whittle Now is a production of the Members who are true citizen-producers, with their own interactive website for vigorous inquiry, rational analysis, principled debate and frequent fun among a band of liberty lovers. If that sounds like your home team, and you want 44 new episodes each month, plus a deep archive of common sense and decency, join us today at https://BillWhittle.com/register/

 

Rudy Giuliani Discusses Background and Downstream Consequences of Weissmann/Mueller Report….


Responding to criticisms made by Hillary Clinton, President Trump’s attorney Rudy Giuliani discusses the political landscape after the Weissmann/Mueller report; including the sketchy Ukrainian connections to the origin of the fiasco.

BIG! – NSA Recommends Dropping Phone Surveillance Program….


Perhaps the weaponization of the NSA database was the biggest research project we ever took on.  That said, CTH prudence requires a lack of commentary.  For a background on this story see the [“SIDE NOTE“] previously presented HERE.  “The candle is not worth the flame.”

(WASHINGTON DC) The National Security Agency has recommended that the White House abandon a U.S. surveillance program that collects information about Americans’ phone calls and text messages, saying the logistical and legal burdens of keeping it outweigh its intelligence benefits, according to people familiar with the matter.

The recommendation against seeking the renewal of the once-secret spying program amounts to an about-face by the agency, which had long argued in public and to congressional overseers that the program was vital to the task of finding and disrupting terrorism plots against the U.S.

The latest view is rooted in a growing belief among senior intelligence officials that the spying program provides limited value to national security and has become a logistical headache.

Frustrations about legal-compliance issues forced the NSA to halt use of the program earlier this year, the people said. Its legal authority will expire in December unless Congress reauthorizes it.  (read more)

…”It is up to the White House, not the NSA, to decide whether to push for legislation to renew the phone-records program. The White House hasn’t yet reached a policy decision about the surveillance program, according to the people familiar with the matter.

The White House National Security Council and the NSA declined to comment.”…

[…] In remarks over the past month, Gen. Paul Nakasone, the director of the NSA and chief of U.S. Cyber Command, has declined to offer specifics about the status of conversations about the metadata program, but he has acknowledged officials are reviewing whether it is necessary.

“It’s a collaborative process, and the administration will make the decision,” Mr. Nakasone said this month at a Marshall Forum event in Washington. “We are taking a look at it, what is the value of it, what are we able to get from it…I think the question becomes, is this a tool that we continue to need to have for our nation’s security?” (link)

May God continue to bless Admiral Mike Rogers…

Do not go about your day without contemplating the scale of this decision; and more importantly the ideological shift on the freedom continuum.  97% of our nation will have no comprehension of the importance of this story.

One of the hurdles in revealing the scale of the story behind the abused FISA process are the current interests of the intelligence community.  Those who benefited from the abuse of the system have used “national security interests” as a shield to avoid revealing the history of Obama-era political surveillance and spying.

However, if the intelligence apparatus says they no longer want/need the surveillance system; that is, the specific aspect used for prior abuse; well, the shield is removed;… and, as a consequence, the history of how the NSA database was abused for political spy operation can then be revealed.

Love to all.

Wolverines !!

Former State Department Employee Pleads Guilty to Spying for Chinese Agents…


[U.S. DOJ] […] Candace Marie Claiborne, a former employee of the U.S. Department of State, pleaded guilty today to a charge of conspiracy to defraud the United States, by lying to law enforcement and background investigators, and hiding her extensive contacts with, and gifts from, agents of the People’s Republic of China (PRC), in exchange for providing them with internal documents from the U.S. State Department.

[…] According to the plea documents, Claiborne, 63, began working as an Office Management Specialist for the Department of State in 1999. She served overseas at a number of posts, including embassies and consulates in Baghdad, Iraq, Khartoum, Sudan, and Beijing and Shanghai, China. As a condition of her employment, Claiborne maintained a TOP SECRET security clearance. Claiborne also was required to report any contacts with persons suspected of affiliation with a foreign intelligence agency as well as any gifts she received from foreign sources over a certain amount.

Despite such a requirement, Claiborne failed to report repeated contacts with two agents of the People’s Republic of China Intelligence Service, even though these agents provided tens of thousands of dollars in gifts and benefits to Claiborne and her family over five years.

The gifts and benefits included cash wired to Claiborne’s USAA account, Chinese New Year’s gifts, international travel and vacations, tuition at a Chinese fashion school, a fully furnished apartment, a monthly stipend and numerous cash payments. Some of these gifts and benefits were provided directly to Claiborne, while others were provided to a close family member of Claiborne’s.

In exchange for these gifts and benefits, as stated in the plea documents, Claiborne provided copies of internal documents from the State Department on topics ranging from U.S. economic strategies to visits by dignitaries between the two countries.

Claiborne noted in her journal that she could “Generate 20k in 1 year” working with one of the PRC agents. That same agent at one point tasked her with providing internal U.S. Government analyses on a U.S.-Sino Strategic Economic Dialogue that had just concluded.

Claiborne, who confided to a co-conspirator that the PRC agents were “spies,” willfully misled State Department background investigators and FBI investigators about her contacts with those agents, the plea documents state. After the State Department and FBI investigators contacted her, Claiborne also instructed her co-conspirators to delete evidence connecting her to the PRC agents. She was arrested on March 28, 2017, following a law enforcement investigation.

Judge Moss scheduled sentencing for July 9, 2019. Claiborne, of Washington, D.C., was ordered detained pending sentencing, but will self-surrender for said detention on June 5, 2019. (DOJ Link)

Link to Plea Agreement.

Original Criminal Complaint Below:

.

President Trump: “It is now just a question of time before the truth comes out, and when it does, it will be a beauty!”…


EVERYTHING After March 9th, 2016 Was A Cover Up Operation

President Trump notes pending discoveries of the political surveillance and spy operations undeniably evident in the margins of the larger 2016 election story.

♦ President Trump can prove the July 31st, 2016, Crossfire Hurricane counterintelligence operation originated from a scheme within the intelligence apparatus by exposing the preceding CIA operation that created the originating “Electronic Communication” memo. Declassify that two-page “EC” document that Brennan gave to Comey.  [The trail is found within the Weissmann report and the use of Alexander Downer – SEE HERE]

♦ Release and declassify all of the Comey memos that document the investigative steps taken  by the FBI as an outcome of the operation coordinated by CIA Director John Brennan in early 2016.  [The trail was memorialized by James Comey – SEE HERE]

♦ Reveal the November 2015 through April 2016 FISA-702 search query abuse by declassifying the April 2017 court opinion written by FISC Presiding Judge Rosemary Collyer. Show the FBI contractors behind the 85% fraudulent search queries. [Crowdstrike? Fusion-GPS? Nellie Ohr? Daniel Richman?]  The was a weaponized surveillance and domestic political spying operation. [The trail was laid down in specific detail by Judge Collyer – SEE HERE]

♦ Subpoena former DOJ-NSD (National Security Division) head John Carlin, or haul him in front of a grand jury, and get his testimony about why he hid the abuse from the FISA court in October 2016; why the DOJ-NSD rushed the Carter Page application to beat NSA Director Admiral Mike Rogers to the FISA court; and why Carlin quit immediately thereafter. Squeeze this bastard’s nuts in the proverbial legal vice.

♦ Prove the Carter Page FISA application (October 2016) was fraudulent and based on deceptions to the FISA Court. Declassify the entire document, and release the transcripts of those who signed the application(s); and/or depose those who have not yet testified. The creation of the Steele Dossier was the cover-up operation. [SEE HERE]

♦ Release all of the Lisa Page and Peter Strzok text messages without redactions. Let sunlight pour in on the actual conversation(s) that were taking place when Crossfire Hurricane (July ’16) and the FISA Application (Oct ’16) were taking place.  The current redactions were made by the people who weaponized the intelligence system for political surveillance and spy operation.  This is why Page and Strzok texts are redacted!

♦ Release all of Bruce Ohr 302’s, FBI notes from interviews and debriefing sessions, and other relevant documents associated with the interviews of Bruce Ohr and his internal communications. Including exculpatory evidence that Bruce Ohr may have shared with FBI Agent Joseph Pientka. [And get a deposition from this Pientka fella] Bruce Ohr is the courier, carrying information from those outside to those on the inside.

♦ Release the August 2nd, 2017, two-page scope memo provided by DAG Rod Rosenstein to special counsel Robert Mueller to advance the fraudulent Trump investigation, and initiate the more purposeful obstruction of justice investigation. Also Release the October 20th, 2017, second scope memo recently discovered.  The Scope Memos are keys to unlocking the underlying spy/surveillance cover-up. [SEE HERE and SEE HERE]

If the documents within these specific eight bullet-points were released -in full and unredacted form- the Administrative State/Deep State network would be laid bare.

It is unfathomable, genuinely outside of comprehension, how this level of sunlight could forever change and completely reset the structures of U.S. federal government.

This is not a partisan issue.  This is the Uniparty.  This is the Big Club stuff.

The amount of inside pressure on President Trump to stay away from this approach will come from all three branches of government.  Releasing this material is the nuclear ‘big ugly‘ plutonium material that would alter the DC topography.

I suspect every measure of outside leverage and inside influence is currently advising President Trump not to declassify and/or release these documents.  However, if his political enemies keep pushing, keep attacking, and keep threatening his office, their advice will hold less value.

It’s doubtful President Trump wants his legacy to be based on the collapse of others. He is proposing modest terms… but it is also clear he will not relent on the MAGA agenda.

The DC opposition to Trump are playing a dangerous game with exceptionally volatile material.  Many politicians of lesser forethought are dancing around in an oblivious frenzy while political nitro glycerine edges closer to the end of the table….

Remember, Donald Trump is the outsider in this dynamic.  His standard of life exists outside of political office; he doesn’t need this.  President Trump’s life of affluence and influence is not dependent on a perpetuating DC system of mutually beneficial scheme and graft.  Patience has limits.

Why Trump Approval Gets No Post-Mueller Report Bump


Published on Apr 23, 2019

SUBSCRIBED 125K
Poll analyst Nate Silver at fivethirtyeight advances six theories on why the approval rating for President Trump gets no post-Mueller report bump. The men of Right Angle — Bill Whittle, Scott Ott and Stephen Green — mansplain it to Nate. Right Angle is a production of the Members at https://BillWhittle.com

 

Backfire: How Subpoena of Unredacted Mueller Report Will Hurt Democrats


Published on Apr 23, 2019

SUBSCRIBED 125K

The House Judiciary Committee, on a party-line vote, subpoenas the unredacted Mueller report. Bill Whittle illustrates what real openness in government can mean. Will the Democrats’ demand backfire and hurt their own prospects in 2020 and beyond? Bill Whittle Now is a production of the Members who joined team liberty at https://BillWhittle.com/register/

James Comey’s Unpaid “Special Government Employee” Daniel Richman…


When considering who were the FBI contractors, with special program access to the NSA database, conducting unauthorized searches and extracting results… there’s a specific type of contractor described by FISA Judge Rosemary Collyer.  One who was able to work around the security protocols: [Page 21] “systems …. that do not interface with NSA’s query audit system“.

In 2018 congressman Jim Jordan made mention of an issue where James Comey had a special employee on assignment ‘off-the-books’.  People started asking questions and Fox News Catherine Herridge detailed how Daniel Richman held special access privileges to the FBI, as an outcome of former FBI Director James Comey authorizing his friend as a “Special Government Employee” or SGE.

(VIA FOX) […] The professor, Daniel Richman, confirmed the special status in response to an inquiry from Fox News, while referring other questions, including on the scope of his work, to the FBI.

“I did indeed have SGE status with the Bureau (for no pay),” Richman wrote in an email.

Richman emerged last year as the former FBI director’s contact for leaking memos documenting his private discussions with President Trump – memos that are now the subject of an inspector general review over the presence of classified material. Sources familiar with Richman’s status at the FBI told Fox News that he was assigned to “special projects” by Comey, and had a security clearance as well as badge access to the building. Richman’s status was the subject of a Memorandum of Understanding. (read more)

Wait, let’s look at something here.

From the article the benefits included: “Sources familiar with Richman’s status at the FBI told Fox News that he was assigned to “special projects” by Comey, and had a security clearance as well as badge access to the building. Richman’s status was the subject of a Memorandum of Understanding.”

A few paragraphs later, this: “Richman’s portfolio included the use of encrypted communications by terror suspects.”

Oh my. Well, well, well… You see what’s being described here. There’s only one way to gain access to “encrypted communications” and that means having access to the FBI and NSA database.

Accepting he obviously had such access…. what would be the probability that Daniel Richman was one of these?

.

The Obama Use of FISA-702 as a Domestic Political Surveillance Program….


Now that we have significant research files on the 2015 and 2016 political surveillance program; which includes the trail evident within the Weissmann/Mueller report; in combination with the Obama-era DOJ “secret research project” (their words, not mine); we are able to overlay the entire objective and gain a full understanding of how political surveillance was conducted over a period of approximately four to six years.

Working with a timeline, but also referencing origination material in 2015/2016 – CTH hopes to show how the program operated.  This explains an evolution from The IRS Files in 2010 to the FISA Files in 2016.

The FISA-702 database extraction process, and utilization of the protections within the smaller intelligence community, was the primary process.  We start by reviewing the established record from the 99-page FISC opinion rendered by Presiding Judge Rosemary Collyer on April 26th, 2017; and explain the details within the FISC opinion.

I would strongly urge everyone to read the FISC report (full pdf below) because Judge Collyer outlines how the DOJ, which includes the FBI, had an “institutional lack of candor” in responses to the FISA court.  In essence, they were continually lying to the court about their activity, and the rate of fourth amendment violations for illegal searches and seizures of U.S. persons’ private information for multiple years.

Unfortunately, due to intelligence terminology Judge Collyer’s brief and ruling is not an easy read for anyone unfamiliar with the FISA processes outlined. The complexity also helps the media avoid discussing, and as a result most Americans have no idea the scale and scope of the issues.  So we’ll try to break down the language.

.For the sake of brevity and common understanding CTH will highlight the most pertinent segments showing just how systemic and troublesome the unlawful electronic surveillance was.

Early in 2016 NSA Director Admiral Mike Rogers was alerted of a significant uptick in FISA-702(17) “About” queries using the FBI/NSA database that holds all metadata records on every form of electronic communication.

The NSA compliance officer alerted Admiral Mike Rogers who then initiated a full compliance audit on/around March 9th, 2016, for the period of November 1st, 2015, through May 1st, 2016.

While the audit was ongoing, due to the severity of the results that were identified, Admiral Mike Rogers stopped anyone from using the 702(17) “about query” option, and went to the extraordinary step of blocking all FBI contractor access to the database on April 18, 2016(keep these dates in mind).

Here are some significant segments:

The key takeaway from these first paragraphs is how the search query results were exported from the NSA database to users who were not authorized to see the material.  The FBI contractors were conducting searches and then removing, or ‘exporting’, the results.  Later on, the FBI said all of the exported material was deleted.

Searching the highly classified NSA database is essentially a function of filling out search boxes to identify the user-initiated search parameter and get a return on the search result.

FISA-702(16) is a search of the system returning a U.S. person (“702”); and the “16” is a check box to initiate a search based on “To and From“.   Example, if you put in a date and a phone number and check “16” as the search parameter the user will get the returns on everything “To and From” that identified phone number for the specific date.  Calls, texts, contacts etc.  Including results for the inbound and outbound contacts.

FISA-702(17) is a search of the system returning a U.S. person (702); and the “17” is a check box to initiate a search based on everything “About” the search qualifier.  Example, if you put a date and a phone number and check “17” as the search parameter the user will get the returns of everything about that phone.  Calls, texts, contacts, geolocation (or gps results), account information, user, service provider etc.  As a result, 702(17) can actually be used to locate where the phone (and user) was located on a specific date or sequentially over a specific period of time which is simply a matter of changing the date parameters.

And that’s just from a phone number.

Search an ip address “about” and read all data into that server; put in an email address and gain everything about that account. Or use the electronic address of a GPS enabled vehicle (about) and you can withdraw more electronic data and monitor in real time.  Search a credit card number and get everything about the account including what was purchased, where, when, etc.  Search a bank account number, get everything about transactions and electronic records etc.  Just about anything and everything can be electronically searched; everything has an electronic ‘identifier’.

The search parameter is only limited by the originating field filled out.  Names, places, numbers, addresses, etc. By using the “About” parameter there may be thousands or millions of returns.  Imagine if you put “@realdonaldtrump” into the search parameter? You could extract all following accounts who interacted on Twitter, or Facebook etc.  You are only limited by your imagination and the scale of the electronic connectivity.

As you can see below, on March 9th, 2016, internal auditors noted the FBI was sharing “raw FISA information, including but not limited to Section 702-acquired information”.

In plain English the raw search returns were being shared with unknown entities without any attempt to “minimize” or redact the results.  The person(s) attached to the results were named and obvious.  There was no effort to hide their identity or protect their 4th amendment rights of privacy:

But what’s the scale here?  This is where the story really lies.

Read this next excerpt carefully.

The operators were searching “U.S Persons”.  The review of November 1, 2015,  to May 1, 2016, showed “eighty-five percent of those queries” were unlawful or “non compliant”.

85% !!  “representing [redacted number]”.

We can tell from the space of the redaction the number of searches were between 1,000 and 9,999 [five digits].  If we take the middle number of 5,000 – that means 4,250 unlawful searches out of 5,000.

The [five digit] amount (more than 1,000, less than 10,000), and 85% error rate, was captured in a six month period.

Also notice this very important quote: “many of these non-compliant queries involved the use of the same identifiers over different date ranges.”   So they were searching the same phone number, email address, electronic “identifier”, or people, repeatedly over different dates.  Specific people were being tracked/monitored.

Additionally, notice the last quote: “while the government reports it is unable to provide a reliable estimate of” these non lawful searches “since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 coincided with an unusually high error rate”.

That means the 85% unlawful FISA-702(16)(17) database abuse has likely been happening since 2012.  (Again, remember that date, 2012) Who was FBI Director? Who was his chief-of-staff? Who was CIA Director? ODNI? etc.  Remember, the NSA is inside the Pentagon (Defense Dept) command structure.  Who was Defense Secretary? And finally, who wrote and signed-off-on the January 2017 Intelligence Community Assessment?

Tens of thousands of searches over four years (since 2012), and 85% of them are illegal.  The results were extracted for?…. (I believe this is all political opposition use; and I’ll explain why momentarily.)

OK, that’s the stunning scale; but who was involved?

Private contractors with access to “raw FISA information that went well beyond what was necessary to respond to FBI’s requests“:

And as noted, the contractor access was finally halted on April 18th, 2016.

[Coincidentally (or not), the wife of Fusion-GPS founder Glenn Simpson, Mary Jacoby, goes to the White House the next day on April 19th, 2016.]

None of this is conspiracy theory.

All of this is laid out inside this 99-page opinion from FISC Presiding Judge Rosemary Collyer who also noted that none of this FISA abuse was accidental in a footnote on page 87:  “deliberate decisionmaking“:

Summary of this aspect: The FISA court identified and quantified tens-of-thousands of search queries of the NSA/FBI database using the FISA-702(16)(17) system.  The database was repeatedly used by persons with contractor access who unlawfully searched and extracted the raw results without redacting the information and shared it with an unknown number of entities.

The outlined process certainly points toward a political spying and surveillance operation; and we are not the only one to think that’s what this system is being used for.

Back in 2017 when House Intelligence Committee Chairman Devin Nunes was working to reauthorize the FISA legislation, Nunes wrote a letter to ODNI Dan Coats about this specific issue:

SIDEBAR: To solve the issue, well, actually attempt to ensure it never happened again, NSA Director Admiral Mike Rogers eventually took away the “About” query option permanently in 2017. NSA Director Rogers said the abuse was so inherent there was no way to stop it except to remove the process completely. [SEE HERE]  Additionally, the NSA database operates as a function of the Pentagon, so the Trump administration went one step further.  On his last day as NSA Director Admiral Mike Rogers -together with ODNI Dan Coats- put U.S. cyber-command, the database steward, fully into the U.S. military as a full combatant command. [SEE HERE]

There is little doubt the FISA-702(16)(17) database system was used by Obama-era officials, from 2012 through April 2016, as a way to spy on their political opposition.  Quite simply there is no other intellectually honest explanation for the scale and volume of database abuse that was taking place.

When we reconcile what was taking place and who was involved, then the actions of the exact same principle participants take on a jaw-dropping amount of clarity.

All of the action taken by CIA Director Brennan, FBI Director Comey, ODNI Clapper and Defense Secretary Ashton Carter make sense.  Including their effort to get NSA Director Mike Rogers fired.

Everything after March 9th, 2016, was done to cover up the weaponization of the FISA database. [Explained Here]  Spygate, Russia-Gate, the Steele Dossier, and even the 2017 Intelligence Community Assessment (drawn from the dossier and signed by the above) were needed to create a cover-story and protect themselves from discovery of this four year weaponization, political surveillance and unlawful spying.  Even the appointment of Robert Mueller as special counsel makes sense; he was FBI Director when this began.

The beginning decision to use FISA(702) as a domestic surveillance and political spy mechanism appears to have started in/around 2012. Perhaps sometime shortly before the 2012 presidential election and before John Brennan left the White House and moved to CIA.  However, there was an earlier version of data assembly that preceded this effort.

Political spying 1.0 was actually the weaponization of the IRS.  This is where the term “Secret Research Project” originated as a description from the Obama team.  It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller.  It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

Why disks?  Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS.  All of the evidence within this sketchy operation came directly to the surface in early spring 2012.

The IRS scandal was never really about the IRS, it was always about the DOJ asking the IRS for the database of information.  That is why it was transparently a conflict when the same DOJ was tasked with investigating the DOJ/IRS scandal.  Additionally, Obama sent his chief-of-staff Jack Lew to become Treasury Secretary; effectively placing an ally to oversee/cover-up any issues.  As Treasury Secretary Lew did just that.

Lesson Learned – It would appear the Obama administration learned a lesson from attempting to gather a large opposition research database operation inside a functioning organization large enough to have some good people that might blow the whistle.

The timeline reflects a few months after realizing the “Secret Research Project” was now worthless (June 2012), they focused more deliberately on a smaller network within the intelligence apparatus and began weaponizing the FBI/NSA database.

How this all comes together in 2019

Fusion GPS was not hired in April 2016 to research Donald Trump.  As shown in the evidence provided by the FISC, the intelligence community was already doing surveillance and spy operations. The Obama administration already knew everything about the Trump campaign, and were monitoring everything by exploiting the FISA database.

However, after the NSA alerts in/around March 9th, 2016, and particularly after the April 18th shutdown of contractor access, the Obama intelligence community needed Fusion GPS to create a legal albeit ex post facto justification for the pre-existing surveillance and spy operations.  Fusion GPS gave them that justification in the Steele Dossier.

That’s why the FBI small group, which later transitioned into the Mueller team, are so strongly committed to and defending the formation of the Steele Dossier and its dubious content.  The Steele Dossier contains the cover-story and justification for the surveillance operation.

During a rather innocuous podcast discussion panel April 12th, 2019, one of President Trump’s personal lawyers Jay Sekulow mentioned the FBI had three FISA applications denied by the FISA court in 2016. [Podcast Here – Note comment at 25:05]   The denials were always suspected; however, until now no-one in/around the administration has ever confirmed.

If Sekulow is accurate, this adds additional context to the actions of the FBI in the aftermath of Admiral Mike Rogers and an increased urgency in gaining legal justification for surveillance and spy operation unlawfully taking place.  A valid FISA warrant would help the FBI cover-up the surveillance.   The likely targets were Manafort, Flynn and Papadopoulos…. but it appears the DOJ/FBI were rebuked.

These FISC denials would then initiate institutional panic dependent on the election outcome.  An insurance policy would be needed.   The Steele Dossier becomes the investigative virus the FBI wanted inside the system. To get the virus into official status, they used the FISA application as the delivery method and injected it into Carter Page. The FBI already knew Carter Page; essentially Carter Page was irrelevant, what they needed was the FISA warrant and the Dossier in the system {Go Deep}.

Fusion GPS was not hired to research Trump, the intelligence community was already doing surveillance and spy operations. The intelligence community needed Fusion GPS to give them a plausible justification for already existing surveillance and spy operations.

Fusion-GPS gave them the justification they needed for a FISA warrant with the Steele Dossier.  Ultimately that’s why the Steele Dossier is so important; without it, the DOJ and FBI are naked with their FISA-702 abuse as outlined by John Ratcliffe.

.

♦ Prove the July 31st, 2016, Crossfire Hurricane operation originated from fraud by exposing the CIA operation that created the originating “Electronic Communication” memo. Declassify that two-page “EC” document that Brennan gave to Comey.

♦ Release and declassify all of the Comey memos that document the investigative steps taken  by the FBI as an outcome of the operation coordinated by CIA Director John Brennan in early 2016.

♦ Reveal the November 2015 through April 2016 FISA-702 search query abuse by declassifying the April 2017 court opinion written by FISC Presiding Judge Rosemary Collyer. Show the FBI contractors behind the 85% fraudulent search queries. [Crowdstrike? Fusion-GPS? Nellie Ohr?]

♦ Subpoena former DOJ-NSD (National Security Division) head John Carlin, or haul him in front of a grand jury, and get his testimony about why he hid the abuse from the FISA court in October 2016; why the DOJ-NSD rushed the Carter Page application to beat NSA Director Admiral Mike Rogers to the FISA court; and why Carlin quit immediately thereafter. Squeeze this bastard’s nuts in the proverbial legal vice.

♦ Prove the Carter Page FISA application (October 2016) was fraudulent and based on deceptions to the FISA Court. Declassify the entire document, and release the transcripts of those who signed the application(s); and/or depose those who have not yet testified.

♦ Release all of the Lisa Page and Peter Strzok text messages without redactions. Let sunlight pour in on the actual conversation(s) that were taking place when Crossfire Hurricane (July ’16) and the FISA Application (Oct ’16) were taking place.

♦ Release all of Bruce Ohr 302’s, FBI notes from interviews and debriefing sessions, and other relevant documents associated with the interviews of Bruce Ohr and his internal communications. Including exculpatory evidence that Bruce Ohr may have shared with FBI Agent Joseph Pientka. [And get a deposition from this Pientka fella]

♦ Release the August 2nd, 2017, two-page scope memo provided by DAG Rod Rosenstein to special counsel Robert Mueller to advance the fraudulent Trump investigation, and initiate the more purposeful obstruction of justice investigation. Also Release the October 20th, 2017, second scope memo recently discovered.

Watch the Biden Launch…


[…] “They’re going to launch strategically all over the country,” an operative with knowledge of Biden’s strategy said. “They’ll have people in place in Iowa, New Hampshire, Nevada, South Carolina and roll out endorsements from elected officials all over the country, so when they come out they can have this show of force.”  (read more)

Watch the launch. Remember, nothing about the DNC club plan is happenstance; nothing is organic; everything is astroturf; everything is planned.  Planning, strategy, coordination and conniving scheme to position optics and narratives is the expertise of the club. This is what they do; this is all they do.  Pelosi and Schumer are part of the operational plan.

The DNC is predictable; it’s a club.  Inside the club the board members control everything. From the outside, it appears Joe Biden still holds the most board member votes.  The test run to bring out all the ‘creepy Joe’ trouble appears to have worked.  He goes silent and re-emerges having left the creepy memes in the past.  Smart play.

Again, planning and strategy is one of the key elements of the Democrat party.  It might seem weird at first, but the DNC club is not chaotic; and that is their weakness. It makes them predictable.

The chosen-one would generally come into play immediately after the democrats have set down a larger trumpeted baseline. The chosen-one roll out would be designed to flow from the Club’s baseline political narrative. The Democrats rarely, if ever, go off script….

Knowing it’s likely the ♦UniParty DNC is following a similar ♦UniParty RNC strategy, we can start to put the personal characteristics and political traits together and contrast them against 2016. Here’s the way it looks so far:

  • Senator Ted Cruz was to 2016…. as Senator Elizabeth Warren is to 2020
  • ♦Governor Jeb Bush was to 2016 as….
  • Senator Marco Rubio was to 2016… as Mayor Pete Buttigieg is to 2020
  • Governor John Kasich was to 2016… as Senator Bernie Sanders is to 2020
  • Senator Lindsey Graham was to 2016 as… Senator Kirsten Gillibrand is to 2020
  • Governor Mike Huckabee was to 2016… as Senator Corey Booker is to 2020
  • Senator Rand Paul was to 2016…. as Congresswoman Tulsi Gabbard is to 2020
  • Dr. Ben Carson was to 2016… as Robert Francis “Beto” O’Rourke is to 2020
  • Governor Chris Christie was to 2016 as… Governor J. Hickenlooper is to 2020
  • Governor Scott Walker was to 2016 as… Governor Jay Inslee is to 2020
  • Senator Rick Santorum was to 2016…. as Senator Sherrod Brown is to 2020
  • Governor George Pataki was to 2016 as…. Eric Swalwell is to 2020
  • Governor Rick Perry was to 2016…. as Senator Kamala Harris is to 2020
  • Governor Bobby Jindal was to 2016…. as Julian Castro is to 2020
  • Carly Fiorina was to 2016 as…. Senator Amy Klobuchar is to 2020
  • Governor Jim Gilmore was to 2016 as… Rep. Tim Ryan is to 2020

Reminder, despite their current stumbling with their executive suite efforts, anyone who is announcing their presidential bid ahead of Speaker Pelosi and the DNC delivering the election narrative (impeachment or similar) is not part of the DNC plan.

Pelosi and Club leadership will not easily give up on an impeachment plan that took months of effort.  They will work to modify it, shift angles of attack, adjust to Barr and yet still hope to retain the goal for as long as possible.

They don’t give up on these schemes easily….. As we saw admitted two weekends ago from Jerry Nadler, and reaffirmed this week, they are modifying their plans as each roadblock presents.

The “Chosen One” will surface during the April/May to June/July period when the legislative ‘impeachment‘ crew, the DNC crew and the media crew have been able to align the scheme for maximum political benefit.

We will most likely be able to identify the “Chosen One” by: (#1) the Pelosi narrative (when cemented) and everyone falls in line; and (#2) the “roll out” that accompanies the announcement. [ex. remember the Greek columns, trumpets, pomp, etc.?]

Watch the launch.