Posted originally on the conservative tree house on April 25, 2021 | Sundance | 84 Comments
Arizona Republican Party Chairwoman Dr. Kelli Ward appears with Newsmax TV to discuss the status of the Maricopa county ballot audit. Rob Schmitt asks Dr. Ward what is the likely outcome for other states who are watching what happens in Arizona.
As the Chairwoman notes they are looking at digitally adjudicated ballots (pollworkers determining voter intent) as well as the mailing system, voting machines, software, hardware, physical ballots, voting logs; “we are looking at everything.” Dr. Ward also notes no-one is certain what will be the outcome for Arizona or any other state that may initiate a similar audit; however, the overall goal of voting integrity will remain a priority.
Posted originally on the conservative tree house April 25, 2021 | Sundance | 176 Comments
The people auditing the Maricopa County, Arizona, ballots are off today. The Veterans Memorial Coliseum CCTV system remains active [SEE HERE] as a public security and integrity issue.
Additionally, THIS is the official page of the Arizona Senate Liaison for the Maricopa County Election audit. “Under the direction of The Honorable Ken Bennett, former Arizona Secretary of State, an audit is underway to ensure transparency and integrity in the Maricopa County, AZ 2020 election audit.”
“PHOENIX (AP) — Months after former President Donald Trump’s election defeat, legislative Republicans in Arizona are challenging the outcome as they embark on an unprecedented effort to audit the results in the state’s most populous county.
[…] The process is alarming election professionals who fear the auditors are not up to the complex task and will severely undermine faith in democracy.” (more)
Obviously, in typical Alinsky fashion, the intent of the AP narrative is to isolate, ridicule and marginalize supporters of the Maricopa audit.
Meanwhile, below is a video update on this Arizona issue which includes a passionate speech by Bobby Piton who wrote a letter to the Democrats and Republicans in the Arizona State Senate.
Re-Posted from American Thinker on April 20,2021 By Leo Goldstein
I have added this note to clarify why this was done. The deep state wants to cancel our real president Donald J. Trump so what they have done is create a false narrative about a revolution by White supremacists taking over the country by an armed assault on the capital on January 6, 2021. With this executive order they could declare trump the leader of the rebellion and therefor a domestic terrorist and seize all his and his spouses and kids assets!
On April 15, Preident Biden signed an Executive Order on Blocking Property with Respect to Specified Harmful Foreign Activities of the Government of the Russian Federation. Contrary to its title, this EO is not about Russia. It is designed to allow the Biden administration to deprive American citizens and organizations of their rights and property by arbitrarily linking those persons to real, imagined, or vaguely defined activities of the Russian government.
The Biden administration unilaterally makes the determination and requires neither criminal acts nor intent. The punishment is blocking assets and a prohibition on any dealing with the accused person. Spouses and adult children of individuals found guilty by accusation under this EO are punished, too.
The EO was preceded by some distracting maneuvers, both diplomatic (hostile rhetoric toward Russia) and military (sending naval ships toward the Black Sea and recalling them back, as if dealing with Russian threats). Thus, many people assumed that the EO was directed at Russia, and completely missed the fact that it is directed at dissent here, at home.
Over the past four years, the Democrat Party, Fake News, and Big Tech have been frequently portraying their opponents as Russian trolls or Russian misinformation operators. The Russian collusion narrative, initially invented to overthrow the Trump administration, has been used to smear many conservative movements. Now this effort has been crowned by an Executive Order.
Biden’s administration has been recently pushing so many other radical changes, such as packing the Supreme Court, eliminating the filibuster, restricting Second Amendment rights, etc., that the real ramifications of this new EO went completely unnoticed. In my opinion, this EO is the most dangerous of them all. It allows the Biden regime to eliminate its opposition, quickly and quietly.
Section 1 of the EO enumerates prohibited activities and defines guilty persons as those “determined” by the Secretary of Treasury and/or Secretary of State in consultation with the Attorney General to be:
(a)(ii) responsible for or complicit in, or to have directly or indirectly engaged or attempted to engage in, any of the following for or on behalf of, or for the benefit of, directly or indirectly, the Government of the Russian Federation:
(A) malicious cyber-enabled activities;
(B) interference in a United States or other foreign government election;
(C) actions or policies that undermine democratic processes or institutions in the United States or abroad;
(D) transnational corruption;
Some of the language in this EO borrows from another: EO-13224 – Blocking Property and Prohibiting Transactions With Persons Who Commit, Threaten To Commit, or Support Terrorism. George W. Bush signed EO-13224 on September 23, 2001, in response to 9/11.
However, Biden’s EO is as similar to Bush’s EO as an atomic bomb is to a sniper rifle. Bush’s EO targeted financing terrorism. It defined terrorism clearly and narrowly. It minimized legal jeopardy to US persons. It did not strip away the standard for criminal liability requirements of action and intent. It did not target spouses or children of accused individuals. Additionally, Bush made a legally meaningful promise to use it with due regard to culpability and the Bush administration used it with restraint. Even so, Democrats criticized it harshly, opposed it, and fought it in courts.
In contrast, Biden’s new EO is directed mostly at US persons. It criminalizes speech and political activities, based on whimsical and arbitrary definitions. The Biden administration can define “malicious activities,” “democratic processes or institutions,” and the activities that undermine them as it wants.
The Biden administration is also free to interpret what constitutes “interests of the Russian Government.” Such broad and vague language allows the Biden regime to select US citizens and political organizations arbitrarily, and then deprive them of their property and rights without anything reminiscent of due process. The EO does not even require that anybody commit an actual crime somewhere. False cyber-attribution or fake bounty claims are sufficient. Biden’s remarks to the EO showed no regard to the culpability of any targeted US citizens or other persons.
Leftist pseudo-elites have been eager to ban speech based on allegations that such speech may be beneficial to Russia. Such ideation has been present among Big Tech influencers for a long time. This EO effectively gives Big Tech, banks, and credit card companies a new pretext to deplatform conservatives and anyone else who opposes the Biden regime by claiming that they are now engaged in illegal activity.
Biden’s EO appears to allow the Democrat party to deny Americans the right to advocate against it in future federal elections. This might be accomplished through a “determination” that Russia is interfering in elections against democratic candidates. Thus, any US citizens who also oppose Democrats could be found to acting for Russia’s benefit, directly or indirectly.
The list of prohibited activities justifying a Biden administration “determination” to deprive American persons of their property and other rights (referred to here as a “Deprived Person”) states:
[a] (iii) to be or have been a leader, official, senior executive officer, or member of the board of directors of: … (C) an entity whose property and interests in property are blocked pursuant to this order;
For comparison, Bush’s EO only covered the leaders of terrorist-supporting entities, not multiple officials, executives, or directors.
Unprecedently, Biden’s EO targets children and spouses:
[a] (v) to be a spouse or adult child of any person whose property and interests in property are blocked pursuant to subsection (a)(ii) or (iii) of this section;
and countless associations:
[a] (vi) to have materially assisted, sponsored, or provided financial, material, or technological support for, or goods or services to or in support of:
(A) any activity described in subsection (a)(ii) of this section; or
(B) any person whose property and interests in property are blocked pursuant to this order …
[a] (vii) to be owned or controlled by, or to have acted or purported to act for or on behalf of, directly or indirectly, … any person whose property and interests in property are blocked pursuant to this order.
Notice the infinite reach these subsections afford. Those connected to a “Deprived Person” can receive the same designation, and so on. There is no limit to the number of iterations.
“Deprived Persons” essentially become untouchables, as dealing with them in any way is expressly prohibited without additional determinations:
Sec. 2. The prohibitions in section 1 of this order include:
(a) the making of any contribution or provision of funds, goods, or services by, to, or for the benefit of any person whose property and interests in property are blocked pursuant to this order; and
(b) the receipt of any contribution or provision of funds, goods, or services from any such person.
Giving legal representation, hosting the website, selling food, and giving medical care to a “Deprived Person” is automatically prohibited. Section 4 prohibits transactions that “cause a violation” of this EO, even absent intent or knowledge. This serves as a hint to pre-emptively cut ties with anyone the Biden regime targets.
Section 9 exempts UN bodies and “related organizations” (NGOs) from any responsibility for interfering in US elections and other activities under this order.
The Russian Federation is mixed into the EO only for distraction and as a primer, triggering expanding layers of culpability.
I do not expect any putative human rights organizations or large media outlets to hold the Biden regime accountable for how it applies this EO or to defend its victims. So far, these outlets have either ignored it or defended it.
In all honesty, what people call “natural law” is simply a vague body of moral principles regarded as a basis for all human conduct. There is no written law, nor is there some great principle shared among nations. There is international law, and there is the international definition of human rights. But there is no such body of written “natural law” to which Biden says only lawyers know. These are simply ideas with no statutory authority and would never be cited in any Supreme Court case.
There is a serious question about Biden’s competency, and that makes him the absolute perfect president to push this Great Reset agenda upon the world. He was never regarded as very intelligent, to begin with. He has been caught using other people’s work many times. This time they did not want a president who would dare to think for himself. They went completely in the opposite direction from Trump, who Washington hated because he thought a president was actually supposed to run the country.
Posted originally on the conservative tree house on April 24, 2021 | Sundance | 137 Comments
Baltimore Mayor Catherine Pugh was arrested for using her authorship of a book as a pay-to-play scheme for personal financial gain {Go Deep}. In what appears to be a similar situation, unaccompanied alien children (UAC’s) are being given a book authored by Kamala Harris.
CALIFORNIA – Vice President Kamala Harris hasn’t been to the border to address a crisis she was tasked to help fix — but a children’s book she wrote is waiting there for young migrants who are being welcomed into the country.
Unaccompanied migrant kids brought from the U.S.-Mexico border to a new shelter in Long Beach, Calif., will be given a copy of her 2019 children’s book, “Superheroes are Everywhere,” in their welcome kits.
[…] In the 30 days since President Biden asked Harris to lead the US response to the record surge in migrants, she has yet to visit the border or hold a press conference on the matter. (read more)
You can be sure that if Trump books were being purchased with taxpayer funds to be distributed to thousands of people, the leftists would immediately demand an investigation. However, when Kamala Harris does it… crickets.
In an interesting side note: Kamala Harris was in New Hampshire Friday and Jill Biden was in Arizona Friday. Both Arizona and New Hampshire are conducting ballot audits. Interesting coincidence…
Posted originally on the conservative tree house on April 24, 2021 | Sundance | 609 Comments
The Arizona Senates’ hand count of all 2.1 million Maricopa County ballots cast in November’s presidential election is underway. You can watch all of the security cameras at THIS LINK.
The auditors are trying to be as transparent as possible knowing the outcome, if it turns out as predicted to find significant fraud, will be legally challenged. [Twitter Account Here] There is also a YouTube livestream of the events as they take place
The importance of continuing to challenge the election really has nothing to do with reversing the election to remove Biden. That will NEVER happen. The real issue here is that election fraud has reached new levels, and it is not limited to simply presidential candidates. The risk that this will be used in the 2022 election for Congress is highly likely, and if this is not addressed, it will only lead to blood in the streets.
Posted originally on the conservative tree house April 23, 2021 | Sundance | 62 Comments
Journalist Lee Smith hits the sweet spot in his discussion of the U.S. Postal Service conducting surveillance on Americans. As Smith notes the targeting is not to identify the political ideology of “all Americans”, rather the objective is surveillance of people who likely did not vote for Joe Biden.
.
Again it is important to repeat, this type of activity is one long continuum. The IRS was previously used; federal contractors for the FBI have previously been used; allied Big Tech companies have been used; and now the United States Postal Service is running a covert surveillance program against Americans that sounds suspiciously like the prior DHS announcement.
Yahoo – The law enforcement arm of the U.S. Postal Service has been quietly running a program that tracks and collects Americans’ social media posts, including those about planned protests, according to a document obtained by Yahoo News.
The details of the surveillance effort, known as iCOP, or Internet Covert Operations Program, have not previously been made public. The work involves having analysts trawl through social media sites to look for what the document describes as “inflammatory” postings and then sharing that information across government agencies. (read more)
Now compare that description to what we previously outlined:
Treehouse – The U.S. Department of Homeland Security is now getting ready to hire public companies, individual contractors outside government, to scour public data and social media in order to provide information for the new “domestic terror watch lists.” From the description it appears DHS is going to pay “big tech” (Google, Facebook, YouTube, Instagram, SnapChat, Twitter, etc.), via contracts, to hire and organize internal monitoring teams to assist the government by sending information on citizens they deem “dangerous.” (read more)
The Treehouse citation included the following NBC article.
[…] DHS is planning to expand its relationships with companies that scour public data for intelligence, one of the senior officials said, and also to better harness the vast trove of data it already collects on Americans, including travel and commercial data through Customs and Border Protection, Immigration and Customs Enforcement, the Coast Guard, the Secret Service and other DHS components. (read more)
…It’s the same program.
Expand your thinking to what was initiated with the COVID model for “contact tracing” and you can quickly see how physical proximity to a rogue dissident, a person with wrong thoughts – aka a domestic extremist, can result in you being labeled along with that dissident…. and you are on the list. Then overlay the efforts of Big Tech to assist the administrative state with an electronic trail of your habits, contacts, phone calls, text messages and internet patterns…. and you are on the list.
Remind yourself what FBI “contractors’ with access to the NSA database already did in their quest for political opposition research and surveillance {Go Deep}. Then overlay all of the above and you get an alarming picture that is not something to dispatch.
BACKSTORY – During the time-frame of December 2015 through April 2016 the NSA database was being exploited by contractors within the intelligence community doing unauthorized searches.
On March 9, 2016, oversight personnel doing a review of FBI system access were alerted to thousands of unauthorized search queries of specific U.S. persons within the NSA database.
NSA Director Mike Rogers was made aware.
Subsequently NSA Director Rogers initiated a full compliance review of the system to identify who was doing the searches; & what searches were being conducted.
On April 18, 2016, following the preliminary audit results, Director Rogers shut down all FBI contractor access to the database after he learned FISA-702 “about”(17) and “to/from”(16) search queries were being done without authorization. Thus begins the first discovery of a much bigger background story.
When you compile the timeline with the people involved; and the specific wording of the resulting review, which was then delivered to the FISA court; and overlay the activity that was taking place in the GOP primary; what we discover is a process where the metadata collected by the NSA was being searched for political opposition research and surveillance.
Additionally, tens-of-thousands of searches were identified by the FISA court as likely extending much further than the compliance review period: “while the government reports it is unable to provide a reliable estimate of the non compliant queries since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 period coincided with an unusually high error rate”.
In short, during the Obama administration the NSA database was continually used to conduct surveillance. This is the critical point that leads to understanding the origin of “Spygate”, as it unfolded in the Spring and Summer of 2016.
It was the discovery of the database exploitation and the removal of access as a surveillance tool that created their initial problem. Here’s how we can tell.
Initially in December 2015 there were 17 GOP candidates and all needed to be researched.
However, when Donald Trump won New Hampshire, Nevada and South Carolina the field was significantly whittled. Trump, Cruz, Rubio, Kasich and Carson remained.
On Super Tuesday, March 2, 2016, Donald Trump won seven states (VT, AR, VA, GA, AL, TN, MA) it was then clear that Trump was the GOP frontrunner with momentum to become the presumptive nominee. On March 5th, Trump won Kentucky and Louisiana; and on March 8th Trump won Michigan, Mississippi and Hawaii.
The next day, March 9th, NSA security alerts warned internal oversight personnel that something sketchy was going on.
This timing is not coincidental. As FISA Judge Rosemary Collyer later wrote in her report, “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” Put another way: attributes belonging to a specific individual(s) were being targeted and queried, unlawfully. Given what was later discovered, it seems obvious the primary search target, over multiple date ranges, was Donald Trump.
There were tens-of-thousands of unauthorized search queries; and as Judge Collyer stated in her report, there is no reason to believe the 85% non compliant rate was any different from the abuse of the NSA database going back to 2012.
As you will see below the NSA database was how political surveillance was being conducted during Obama’s second term in office. However, when the system was flagged, and when NSA Director Mike Rogers shut down “contractor” access to the system, the system users needed to develop another way to get access.
Mike Rogers shuts down access on April 18, 2016. On April 19, 2016, Fusion-GPS founder Glenn Simpson’s wife, Mary Jacoby visits the White House. Immediately thereafter, the DNC and Clinton campaign contract Fusion GPS… who then hire Christopher Steele.
Knowing it was federal “contractors”, outside government with access to the system, doing the unauthorized searches, the question becomes: who were the contractors?
The possibilities are quite vast. Essentially anyone the FBI or intelligence apparatus was using could have participated. Crowdstrike was a known FBI contractor; they were also contracted by the DNC. Shawn Henry was the former head of the FBI office in DC and became and executive within Crowdstrike; a rather dubious contractor for the government and a politically connected data security and forensic company.
James Comey’s special friend Daniel Richman was an unpaid FBI “special employee” with security access to the database. Nellie Ohr began working for Fusion-GPS on the Trump project in November 2015 and she was a CIA contractor; and it’s entirely likely Glenn Simpson or people within his Fusion-GPS network were also contractors for the intelligence community.
Remember the Sharyl Attkisson computer intrusions? It’s all part of this same network; Attkisson even names Shawn Henry as a defendant in her ongoing lawsuit.
All of the aforementioned names, and so many more, held a political agenda in 2016.
It seems likely if the NSA flags were never triggered then the contracted system users would have continued exploiting the NSA database for political opposition research; which would then be funneled to the Clinton team. However, once the unauthorized flags were triggered, the system users (including those inside the official intelligence apparatus) needed to find another back-door to continue… Again, the timing becomes transparent.
Immediately after NSA flags were raised March 9th; the same intelligence agencies began using confidential human sources (CHS’s) to run into the Trump campaign. By activating intelligence assets like Joseph Mifsud and Stefan Halper the IC (CIA, FBI) and system users had now created an authorized way to continue the same political surveillance operations.
When Donald Trump hired Paul Manafort on March 28, 2016, it was a perfect scenario for those doing the surveillance. Manafort was a known entity to the FBI and was previously under investigation. Paul Manafort’s entry into the Trump orbit was perfect for Glenn Simpson to sell his prior research on Manafort as a Trump-Russia collusion script two weeks later.
The shift from “unauthorized exploitation of the NSA database” to legally authorized exploitation of the NSA database was now in place. This was how they continued the political surveillance. This is the confluence of events that originated “spygate”, or what officially blossomed into the FBI investigation known as “Crossfire Hurricane” on July 31.
If the NSA flags were never raised; and if Director Rogers had never initiated the compliance audit; and if the political contractors were never blocked from access to the database; they would never have needed to create a legal back-door, a justification to retain the surveillance. The political operatives/contractors would have just continued the targeted metadata exploitation.
Once they created the surveillance door, Fusion-GPS was then needed to get the FBI known commodity of Chris Steele activated as a pipeline. Into that pipeline all system users pushed opposition research. However, one mistake from the NSA database extraction during an “about” query shows up as a New Yorker named Michael Cohen in Prague.
That misinterpreted data from a FISA-702 “about query” is then piped to Steele and turns up inside the dossier; it was the wrong Michael Cohen. It wasn’t Trump’s lawyer, it was an art dealer from New York City with the same name; the same “identifier”.
A DEEP DIVE – How Did It Work?
Start by reviewing the established record from the 99-page FISC opinion rendered by Presiding Judge Rosemary Collyer on April 26, 2017. Review the details within the FISC opinion.
I would strongly urge everyone to read the FISC report (full pdf below) because Judge Collyer outlines how the DOJ, which includes the FBI, had an “institutional lack of candor” in responses to the FISA court. In essence, the Obama administration was continually lying to the FISA court about their activity, and the rate of fourth amendment violations for illegal searches and seizures of U.S. persons’ private information for multiple years.
Unfortunately, due to intelligence terminology Judge Collyer’s brief and ruling is not an easy read for anyone unfamiliar with the FISA processes. That complexity also helps the media avoid discussing it; and as a result most Americans have no idea the scale and scope of the Obama-era surveillance issues. So we’ll try to break down the language.
.
For the sake of brevity and common understanding CTH will highlight the most pertinent segments showing just how systemic and troublesome the unlawful electronic surveillance was.
Early in 2016 NSA Director Admiral Mike Rogers was alerted of a significant uptick in FISA-702(17) “About” queries using the FBI/NSA database that holds all metadata records on every form of electronic communication.
The NSA compliance officer alerted Admiral Mike Rogers who then initiated a full compliance audit on/around March 9th, 2016, for the period of November 1st, 2015, through May 1st, 2016.
While the audit was ongoing, due to the severity of the results that were identified, Admiral Mike Rogers stopped anyone from using the 702(17) “about query” option, and went to the extraordinary step of blocking all FBI contractor access to the database on April 18, 2016 (keep these dates in mind).
Here are some significant segments:
The key takeaway from these first paragraphs is how the search query results were exported from the NSA database to users who were not authorized to see the material. The FBI contractors were conducting searches and then removing, or ‘exporting’, the results. Later on, the FBI said all of the exported material was deleted.
Searching the highly classified NSA database is essentially a function of filling out search boxes to identify the user-initiated search parameter and get a return on the search result.
♦ FISA-702(16) is a search of the system returning a U.S. person (“702”); and the “16” is a check box to initiate a search based on “To and From“. Example, if you put in a date and a phone number and check “16” as the search parameter the user will get the returns on everything “To and From” that identified phone number for the specific date. Calls, texts, contacts etc. Including results for the inbound and outbound contacts.
♦ FISA-702(17) is a search of the system returning a U.S. person (702); and the “17” is a check box to initiate a search based on everything “About” the search qualifier. Example, if you put a date and a phone number and check “17” as the search parameter the user will get the returns of everything about that phone. Calls, texts, contacts, geolocation (or gps results), account information, user, service provider etc. As a result, 702(17) can actually be used to locate where the phone (and user) was located on a specific date or sequentially over a specific period of time which is simply a matter of changing the date parameters.
And that’s just from a phone number.
Search an ip address “about” and read all data into that server; put in an email address and gain everything about that account. Or use the electronic address of a GPS enabled vehicle (about) and you can withdraw more electronic data and monitor in real time. Search a credit card number and get everything about the account including what was purchased, where, when, etc. Search a bank account number, get everything about transactions and electronic records etc. Just about anything and everything can be electronically searched; everything has an electronic ‘identifier’.
The search parameter is only limited by the originating field filled out. Names, places, numbers, addresses, etc. By using the “About” parameter there may be thousands or millions of returns. Imagine if you put “@realdonaldtrump” into the search parameter? You could extract all following accounts who interacted on Twitter, or Facebook etc. You are only limited by your imagination and the scale of the electronic connectivity.
As you can see below, on March 9th, 2016, internal auditors noted the FBI was sharing “raw FISA information, including but not limited to Section 702-acquired information”.
In plain English the raw search returns were being shared with unknown entities without any attempt to “minimize” or redact the results. The person(s) attached to the results were named and obvious. There was no effort to hide their identity or protect their 4th amendment rights of privacy; and database access was from the FBI network:
But what’s the scale here? This is where the story really lies.
Read this next excerpt carefully.
The operators were searching “U.S Persons”. The review of November 1, 2015, to May 1, 2016, showed “eighty-five percent of those queries” were unlawful or “non compliant”.
85% !! “representing [redacted number]”.
We can tell from the space of the redaction the number of searches were between 10,000 and 99,999 [six digits]. If we take the middle number of 50,000 – a non compliant rate of 85 percent means 42,500 unlawful searches out of 50,000.
The [six digit] amount (more than 10,000, less than 99,999), and 85% error rate, was captured in a six month period, November 2015 to April 2016.
Also notice this very important quote: “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” This tells us the system users were searching the same phone number, email address, electronic identifier, repeatedly over different dates. The same people were being repeatedly queried.
Specific person(s) were being tracked/monitored.
Additionally, notice the last quote: “while the government reports it is unable to provide a reliable estimate of” these non lawful searches “since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 coincided with an unusually high error rate”.
That means the 85% unlawful FISA-702(16)(17) database abuse has likely been happening since 2012.
2012 is an important date in this database abuse because a network of specific interests is assembled that also shows up in 2016/2017:
Who was 2012 FBI Director? Robert Mueller, who was selected by the FBI group to become special prosecutor in 2017.
Who was Mueller’ chief-of-staff? Aaron Zebley, who became one of the lead lawyers on the Mueller special counsel.
Who was 2012 CIA Director? John Brennan (remember the ouster of Gen Petraeus)
Who was ODNI? James Clapper.
Remember, the NSA is inside the Pentagon (Defense Dept) command structure. Who was Defense Secretary? Ash Carter
Who wanted NSA Director Mike Rogers fired in 2016? Brennan, Clapper and Carter.
And finally, who wrote and signed-off-on the January 2017 Intelligence Community Assessment and then lied about the use of the Steele Dossier? The same John Brennan, and James Clapper along with James Comey.
Tens of thousands of searches over four years (since 2012), and 85% of them are illegal. The results were extracted for?…. (I believe this is all political opposition use; and I’ll explain why momentarily.)
OK, that’s the stunning scale; but who was involved?
Private contractors with access to “raw FISA information that went well beyond what was necessary to respond to FBI’s requests“:
And as noted, the contractor access was finally halted on April 18th, 2016.
[Coincidentally (or likely not), the wife of Fusion-GPS founder Glenn Simpson, Mary Jacoby, goes to the White House the very next day on April 19th, 2016.]
None of this is conspiracy theory.
All of this is laid out inside this 99-page opinion from FISC Presiding Judge Rosemary Collyer who also noted that none of this FISA abuse was accidental in a footnote on page 87: “deliberate decisionmaking“:
This specific footnote, if declassified, could be a key. Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”, this sentence has the potential to expose an internal decision; withheld from congress and the FISA court by the Obama administration; that outlines a process for access and distribution of surveillance data.
Note: “no notice of this practice was given to the FISC until 2016“, that is important.
Summary: The FISA court identified and quantified tens-of-thousands of search queries of the NSA/FBI database using the FISA-702(16)(17) system. The database was repeatedly used by persons with contractor access who unlawfully searched and extracted the raw results without redacting the information and shared it with an unknown number of entities.
The outlined process certainly points toward a political spying and surveillance operation; and we are not the only one to think that’s what this system is being used for.
Back in 2017 when House Intelligence Committee Chairman Devin Nunes was working to reauthorize the FISA legislation, Nunes wrote a letter to ODNI Dan Coats about this specific issue:
SIDEBAR: To solve the issue, well, actually attempt to ensure it never happened again, NSA Director Admiral Mike Rogers eventually took away the “About” query option permanently in 2017. NSA Director Rogers said the abuse was so inherent there was no way to stop it except to remove the process completely. [SEE HERE] Additionally, the NSA database operates as a function of the Pentagon, so the Trump administration went one step further. On his last day as NSA Director Admiral Mike Rogers -together with ODNI Dan Coats- put U.S. cyber-command, the database steward, fully into the U.S. military as a full combatant command. [SEE HERE] Unfortunately it didn’t work as shown by the 2018 FISC opinion rendered by FISC Judge James Boasberg [SEE HERE]
There is little doubt the FISA-702(16)(17) database system was used by Obama-era officials, from 2012 through April 2016, as a way to spy on their political opposition.
Quite simply there is no other intellectually honest explanation for the scale and volume of database abuse that was taking place; and keep in mind these searches were all ruled to be unlawful. Searches for repeated persons over a period time that were not authorized.
When we reconcile what was taking place and who was involved, then the actions of the exact same principle participants take on a jaw-dropping amount of clarity.
All of the actions taken by CIA Director Brennan, FBI Director Comey, ODNI Clapper and Defense Secretary Ashton Carter make sense. Including their effort to get NSA Director Mike Rogers fired.
Everything after March 9th, 2016, had a dual purpose: (1) done to cover up the weaponization of the FISA database. [Explained Here] Spygate, Russia-Gate, the Steele Dossier, and even the 2017 Intelligence Community Assessment (drawn from the dossier and signed by the above) were needed to create a cover-story and protect themselves from discovery of this four year weaponization, political surveillance and unlawful spying. Even the appointment of Robert Mueller as special counsel makes sense; he was FBI Director when this began. And (2) they needed to keep the surveillance going.
The beginning decision to use FISA(702) as a domestic surveillance and political spy mechanism appears to have started in/around 2012. Perhaps sometime shortly before the 2012 presidential election and before John Brennan left the White House and moved to CIA. However, there was an earlier version of data assembly that preceded this effort.
Political spying 1.0 was actually the weaponization of the IRS. This is where the term “Secret Research Project” originated as a description from the Obama team. It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller. It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:
The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)
Why disks? Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS. All of the evidence within this sketchy operation came directly to the surface in early spring 2012.
The IRS scandal was never really about the IRS, it was always about the DOJ asking the IRS for the database of information. That is why it was transparently a conflict when the same DOJ was tasked with investigating the DOJ/IRS scandal. Additionally, Obama sent his chief-of-staff Jack Lew to become Treasury Secretary; effectively placing an ally to oversee/cover-up any issues. As Treasury Secretary Lew did just that.
Lesson Learned – It would appear the Obama administration learned a lesson from attempting to gather a large opposition research database operation inside a functioning organization large enough to have some good people that might blow the whistle.
The timeline reflects a few months after realizing the “Secret Research Project” was now worthless (June 2012), they focused more deliberately on a smaller network within the intelligence apparatus and began weaponizing the FBI/NSA database. If our hunch is correct, that is what will be visible in footnote #69:
How this all came together in 2019/2020
Fusion GPS was not hired in April 2016 to research Donald Trump. As shown in the evidence provided by the FISC, the intelligence community was already doing surveillance and spy operations. The Obama administration already knew everything about the Trump campaign, and were monitoring everything by exploiting the FISA database.
However, after the NSA alerts in/around March 9th, 2016, and particularly after the April 18th shutdown of contractor access, the Obama intelligence community needed Fusion GPS to create a legal albeit ex post facto justification for the pre-existing surveillance and spy operations. Fusion GPS gave them that justification in the Steele Dossier.
That’s why the FBI small group, which later transitioned into the Mueller team, were so strongly committed to and defending the formation of the Steele Dossier and its dubious content.
The Steele Dossier, an outcome of the Fusion contract, contains two purposes: (1) the cover-story and justification for the pre-existing surveillance operation (protect Obama); and (2) facilitate the FBI counterintelligence operation against the Trump campaign (assist Clinton).
An insurance policy would be needed. The Steele Dossier becomes the investigative virus the FBI wanted inside the system. To get the virus into official status, they used the FISA application as the delivery method and injected it into Carter Page. The FBI already knew Carter Page; essentially Carter Page was irrelevant, what they needed was the FISA warrant and the Dossier in the system {Go Deep}.
The Obama intelligence community needed Fusion GPS to give them a plausible justification for already existing surveillance and spy operations. Fusion-GPS gave them that justification and evidence for a FISA warrant with the Steele Dossier.
Ultimately that’s why the Steele Dossier was so important; without it, the FBI would not have a tool that Mueller needed to continue the investigation of President Trump. In essence by renewing the FISA application, despite them knowing the underlying dossier was junk, the FBI was keeping the surveillance gateway open for Team Mueller to exploit later on.
Posted originally on the conservative tree house April 23, 2021 | Sundance | 179 Comments
This interview by the woke BBC network in the U.K. is likely to disappear soon. Former police officer Brandon Tatum was asked to appear on BBC to discuss the Chauvin verdict and systemic racism. After a few dozen major truth bombs, the BBC narrative engineer cut the interview off. WATCH:
Posted originally on the conservative tree house April 23, 2021 | Sundance | 285 Comments
Just like that the ballot audit in Maricopa County, Arizona, is back on.
The pause granted by a judge today in response to a democrat lawsuit was contingent upon the democrats putting up a $1 million bond to cover the expenses incurred from the pause. The democrats refused to put up the bond, so the audit will continue back on schedule.
ARIZONA – A brief weekend pause in the Arizona Senate’s election audit that a judge ordered on Friday won’t happen because the Arizona Democratic Party declined to put up a $1 million bond that the judge requested to cover any expenses that the Senate wrongfully incurs due to the halt.
Maricopa County Superior Court Judge Christopher Coury ruled that the audit must halt from 5 p.m. Friday to noon on Monday. But that order was contingent on the Arizona Democratic Party, which brought the lawsuit seeking to block the audit, posting a $1 million bond to cover any expenses that the Senate wrongfully incurs due to the delay. The Senate’s lease of Veterans Memorial Coliseum, where the audit is being conducted, ends on May 14.
Roopali Desai, the Democrats’ attorney, said the party won’t put up the bond. That means the audit will continue uninterrupted. (read more)
[Full Backstory Here] The physical hand count of the Maricopa county ballots in Arizona will restart immediately. In addition to physical ballot auditing, a physical canvassing of some voters and addresses will take place to match the ballot to the voter. The pre-selected addresses contain multiple ballot returns, some in the thousands.
If there was any doubt something fishy was happening in/around Phoenix Arizona in the 2020 election, those doubts can be eliminated. Something sketchy is afoot.
A few weeks ago a judge agreed with the republican Arizona senate that an audit of Maricopa County ballots was justified. The judge agreed with the Arizona Senate that subpoenas were validly presented, there was information that supported the suspicion behind that ballot audit request, and the state had authority to reach into the Maricopa county election system and audit everything, soup-to-nuts.
Then April 1st the Maricopa County election board held a closed-door emergency meeting as the Senate subpoena was about to be executed. Again, if the board of elections have nothing to fear, then the officials would not be opposed to a public hearing of their “emergency” concerns. After all, sunlight is the best disinfectant.
However, the board result was to throw another impediment upon the pending audit by saying they would not facilitate the use of their Maricopa tabulations center for the audit. In a legally obtuse letter [pdf here], from the legal representatives of the board to the State senate, the board of elections said they would deliver the ballots to another venue, but they would not permit the ballots -or the electronic tabulation machines- to be audited in their current physical location.
This week – Wednesday the tabulation machines were transferred, under custody and with support of sheriffs department, to the Veterans Memorial Coliseum (Arizona Exposition and State Fairgrounds). The physical ballots arrived Thursday following a similar chain of custody and security transport.
The auditors are trying to be as transparent as possible knowing the outcome, if it turns out as predicted to find significant fraud, will be legally challenged. [Twitter Account Here] There is also a livestream of the events as they take place:
I have created this site to help people have fun in the kitchen. I write about enjoying life both in and out of my kitchen. Life is short! Make the most of it and enjoy!
This is a library of News Events not reported by the Main Stream Media documenting & connecting the dots on How the Obama Marxist Liberal agenda is destroying America