Episode 4774: Cutting Out The Cancer From The Political Process


Posted originally on Rumble on By Bannon’s War Room on: September, 13, 2025

Tej Gill On His Experience Dealing With Radical Left Antifa Militants


Posted originally on Rumble on By Bannon’s War Room on: September, 12, 2025

President Trump and First Lady Melania Trump Attend 911 Victim Tribute at the Pentagon


Posted originally on CTH on September 11, 2025 | Sundance 

President Donald Trump and First Lady Melania Trump attend a 911 remembrance event at the Pentagon.  President Trump delivers powerful remarks below. WATCH:

.

The full event video is below:

.

The Freedoms Lost Under the Patriot Act


Posted originally on Sep 11, 2025 by Martin Armstrong |

Surveilence

The Patriot Act was drafted and pushed through with lightning speed, something that could not have been written overnight. This was the beginning of warrantless surveillance, indefinite detention, and a wholesale reversal of constitutional rights. I have said many times: governments do not waste a good crisis. They wait for the right moment to impose measures that would never pass during normal times. Americans may be unaware of the freedoms that have been stripped away from them after October 26, 2001, when the Patriot Act was signed into law.

The Patriot Act, officially titled “the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001,” provided the government with unlimited surveillance powers. Terrorism became the premise to bypass the checks and balances of the legal system. Need a warrant? One could be obtained in any district or area where terrorism was suspected. Of course, warrantless searches were permitted under the guise of terrorism and deemed “sneak and peek” searches, where the government could enter a business or personal residence immediately and without warning to conduct an investigation.

NSA Chip

Neither party has repealed the Patriot Act, and politicians on both sides of the aisle will NEVER relinquish these powers. The Patriot Act destroyed the Fourth Amendment and legally permitted the NSA to spy on all Americans. October 26, 2001, marked the day that the United States of America officially became a surveillance state. We The People were branded as potential terrorists, and “the land of the free” was permanently placed under the watchful eye of government. “The War on Terror” has no clear end or defined enemy. The real target was always domestic — the American people themselves. By creating an atmosphere of fear, Washington justified trillions in spending, the invasion of foreign countries, and the slow strangulation of the very liberties the terrorists supposedly hated.

911

Surveillance spread to the financial sector, naturally, as the government can control the masses by controlling their spending. The government is legally permitted to seize funds from foreign and domestic bank accounts if terrorism is suspected. As we saw under the Biden Administration, banks openly share transaction data with the government, and the government can mandate that banks halt any activity under the premise of money laundering or terrorism. The government requires banks to file Suspicious Activity Reports (SAR) to FinCEN to track any “suspicious” financial activity. The scope is deliberately vague. As mentioned, under the Biden Administration, purchases of Bibles or donations to conservative parties were cause for “suspicion.”

Law enforcement agencies have no barriers to sharing information. In Florida, for example, all law enforcement agencies can see every citizen’s personal data, including medical history and any pharmaceuticals they have been prescribed. They can see where a person lives, has lived, and where they commonly visit. Law enforcement agencies can monitor phone calls, text messages, emails, and internet searches. GPS and cell tower tracking can pinpoint an individual’s current location and any previous movement. As the law as progressed, law enforcement agencies have been provided access to social media activity.

AI technology has enabled the government to utilize facial recognition to identify individuals in crowds or track their day-to-day whereabouts. It is not an exaggeration to say that there are cameras everywhere. Some nations openly promote the use of public surveillance cameras, but most Americans are unaware that they are constantly under the government’s watchful eye.

The Patriot Act was far more than merely increased security at the airport. The true nature of the act was to provide the government with unrestrained power to spy on the people. The government can obtain any banking record without judicial oversight and freeze funds without notice. “Terrorism” or “money laundering” can be used to attack citizens for any reason or without reason. Suspicion is the only criterion, and under the Patriot Act, everyone is considered a terrorist and a threat to the established order.

“Art Must Always Tell The Truth”


Posted originally on CTH on September 10, 2025 | Sundance

Popular artist Banksy created a graffiti mural in London depicting the current state of the UK censorship system using the courts to trample the rights of British citizens:

[SOURCE]

It did not take long for the authorities to cover the mural and eventually attempt to remove it.

However, what remained of the artwork was the essential core of the truth.

I particularly like the fact the govt turned the CCTV camera, so they can monitor who might visit the scene of the criminal dissent.

Apparently, the British government doesn’t quite see the irony.

ALEX DEGRASSE: The Census’s Own Audit Admits The 2020 Census Heavily Favored Blue States By Faulty Counts And Illegal Immigrants


Posted originally on Rumble on By Bannon’s War Room on: September, 9, 2025

Bureau of Labor and Statistics Announces 911,000 Fewer Jobs Created April ’24 through March ’25


Posted originally on CTH on September 9, 2025 | Sundance

Treasury Secretary Scott Bessent noted, when you add the previous Biden revision of -577,000 to the current revision of -911,000 the Bureau of Labor and Statistics (BLS) had overreported Biden’s job growth by almost 1.5 million jobs.

The BLS reports today [SEE DATA HERE] an annual revision of 911,000 fewer jobs that previously reported.  These further puts President Trump’s decision to fire the head of the BLS into context.

[SOURCE]

White House Press Secretary Karoline Leavitt Delivers a Briefing – 1:00pm ET Livestream


Posted originally on CTH on September 9, 2025 | Sundance

White House Press Secretary Karoline Leavitt will be delivering a press briefing today at 1:00pm ET.  Livestream Links Below:

.

.

.

The Truth Has No Agenda


Posted originally on CTH on September 9, 2025

Everything that preceded the 2020 federal election was a complex system of control by a network of ideologues, federal agencies, allies in the private sector, financial stakeholders and corrupt interests all working toward a common goal.

There’s no need to go through the background of how the election was manipulated and how the government and private sector, specifically social media, worked to influence the 2020 outcome because you have all seen it.

Whether it was local election officials working to control outcomes, federal agencies working to support them (CISA, FBI, DHS), financial interests working to fund them (Zuckerberg et al), or social media platforms controlling the visible content and discussion (Twitter Files, Google, Facebook etc.), the objective was all the same.  It was a massive one-sided operation against the free will of the American voter.

In the aftermath of the 2020 election, those same system operators, govt officials, corporate media, private sector groups and social media platforms then circled the wagons to scatter the evidence of their conduct.  If you questioned anything, you were a threat.  That’s the context to the dynamic that unfolded.

Lawfare operatives joined forces with Democrat staffers, and allies in social media platforms all worked in concert to target the voices of anyone who would rise in opposition to the corruption that was stunningly clear in the outcome of the election process.  Corporate media then labeled, isolated, ridiculed and marginalized anyone who dared to point out the obvious.

When AG Merrick Garland says this of January 6, 2021: […] “the Justice Department has conducted one of the largest, most complex, and most resource-intensive investigations in our history. We have worked to analyze massive amounts of physical and digital data. We have recovered devices, decrypted electronic messages, triangulated phones, and pored through tens of thousands of hours of video. We have also benefited from tens of thousands of tips we received from the public. Following these digital and physical footprints, we were able to identify hundreds of people.” {link} The targeting operation needs context.

Do you remember on April 27, 2024, when DOJ Inspector General Michael Horowitz said, “more than 3.4 million search queries into the NSA database took place between Dec. 1st, 2020 and Nov. 30th, 2021, by government officials and/or contractors working on behalf of the federal government.”  The result was “more than 1 million searches of private documents and communication of Americans that were illegal and non-compliant,” and over “10,000 federal employees have access to that database.” {OIG Testimony}.

Put the statement from Garland together with the statement from Horowitz, and you get an understanding of what was done.

Hundreds of stakeholders in the Lawfare network joined forces with hundreds of people who became staff researchers for a weaponized Congress.  Hundreds more social media background agents then poured thousands of hours into feeding private information to the DOJ, FBI, J6 Committee and all of their hired staff working on the project.

How do I know?…

…I was one of their targets.

Before telling the rest of the story, some background is needed.

I am well versed in the ways of the administrative state and the corrupt systems, institutions and silos that make up our weaponized government. I can (a) see them; (b) predict their activity, and (c) know where their traps and operations are located.

Traveling the deep investigative weeds of the administrative state eventually gives you a set of skills.  When people ask how the outlines on this website can seem so far ahead of the sunlight that eventually falls upon the outlined corruption, this is essentially why.  When you take these skills on the road, you learn to be a free-range scout, and after a long while you learn how to track the activity.

When I was outlining how the Fourth Branch of Government works, and/or Jack’s Magic Coffee Shop and the DHS system operating inside it, I wasn’t shooting from the hip. However, people will always seek to dismiss the uncomfortable truth.

Sometimes you just have to wait for the evidence you know exists to surface, or for a situation to unfold that is driven by a self-fulfilling prophecy. The often uncomfy CTH predictions turn out to be the truth of the issue, because they are based on the factual evidence of the issue.

That level of how the system works came in very handy when I received this subpoena from Chairman Bennie Thompson and the J6 Committee.  [Warning, things could get uncomfortable if you don’t accept the scale of corruption that exists.]

Pay attention to the red box on the page shown. This is essentially the probable cause that justifies the subpoena itself.  I have redacted a name in the box for reasons you will see that follow.

I was never in Washington DC on January 6, 2021, nor did I work with or communicate with anyone who was involved in any of the activities that were subject to the J6 Committee investigative authority.

I’m going to skip a lot of background noise, irrelevant legal stuff, jurisdictional issues, discoveries from discussions with lawyers and the experience gained in association with this ridiculous subpoena.  Instead, I am going to focus on the biggest story within it.

Sticking to the information in the Red Box above, notice how the J6 Committee has evidence, “public-source information and documents on file”, showing my participation, communication, and contact with people and technology that are material interests to the Committee.

Here’s the kicker…. I had no clue what the hell they were talking about.

There’s not a single aspect of their outline that I had any knowledge or connection of.

I had no idea what Zello was. I had no idea who 1% watchdog might be. I had never heard of “Stop the Steal J6” or associated “channel.”  I had never heard of the person redacted, and I had never communicated with any Oath Keeper, any communication system, or platform, or anyone or anything – nothing – that is outlined in that subpoena.

Those points of evidence outlined in the subpoena had no connection to me at all.

The subpoena might as well have been asking me to appear in Michigan, because my Red Ferrari was involved in a hit and run accident, during my trip to Detroit.

I don’t own a Ferrari; I have never been to Michigan; I certainly never had an accident; I wasn’t on a trip and have never visited Detroit.

The entire construct of their probable cause for the subpoena was silly – complete and utter nonsense.

That said, how could there be “public records” and “documentary” evidence of something that never happened?

At first, I thought this was some silly case of mistaken identity, and they just sent a subpoena to the wrong person.  However, the investigators were adamant the evidence existed, and the need for testimony was required.

After taking advice from several smart people, and after discovering the costs associated with just the reply to the Committee and/or representation therein; suddenly I realized there might be more value for me in this subpoena than the Committee.  After all, how can there be public-records and documents that I own a red Ferrari and went to Michigan when I don’t and never did.

After several back and forths, I discovered, through their admissions of their own research, and through documents they extracted as an outcome of their tasks to prove the merit of their claims, that someone *inside* Twitter had created a fictitious identity of me associated with the networks and communications as the investigators described them.

Think about what was discovered here.

Someone inside the Twitter platform, an employee of Twitter or a person who had the ability to access their administrative system (ie. FBI), had made a decision to target me. As a result: (a) they had been doing this for a long time with a specific goal in mind; and (b) they created an elaborate trail of background activity and identity that was entirely fabricated.

Eventually, my assigned investigative unit admitted this.  Think about it.  How could they clear me, without them having the underlying evidence that proved my innocence?

Once, the federal investigators realized what took place, they wanted to get rid of me -and my snark filled curiosity- with great urgency.  They also had an ‘oh shit’ moment, when they contemplated everything, including what they had revealed to me from the outset of my contact, now several months prior.

What I discovered in this experience was that DHS, and by extension DOJ/FBI and the January 6 investigators, had direct administrative level backdoors into all social media platforms.

Overlay the Twitter files now, and then expand your thinking.  Do you remember Elon Musk promising, several times, that he would provide end-to-end encryption on the Twitter Direct Messages?  Remember that?  It never happened, did it.  Why not?

In their quest to prove that I owned a Red Ferrari, traveled to Michigan and had a hit-and-run accident, these investigators outlined to me how the United States Government, through their DHS authority, has employees, agents and contractors with open portals into all social media platforms.

Yes, the federal government is inside the mechanics of the systems (Twitter, Facebook, Meta, Instagram, Google, YouTube, WhatsApp, Zello, etc) and they have administrative access in real time to monitor, review, extract and evaluate everything, soup-to-nuts.

It was only because the investigators and forensic data knuckleheads have these portals, that they were able to locate the source of the fabricated evidence they were originally attributing to me.  This was an investigative process and research discovery being conducted in the data processing systems of Twitter in real time as they questioned me.

Once they realized what had taken place, and as soon as I started asking how they were making these admissions (now carrying an apologetic certainty), suddenly the investigators wanted no further contact or communication with me.  You’re good, whoopsie daisy, our bad, sorry.

Now, take some time to fully digest and absorb what I have just shared.

The U.S. government is worried about TikTok, because U.S. citizen data might be extracted?

Meanwhile, the U.S. government, at a fully unrestricted administrative level, is inside Twitter, Facebook, Meta, Insta, YouTube etc., running amok and extracting anything – including private messages… and they’re somehow worried about protecting us from TikTok data collection?  Think about it.

Maybe the thing that worried them is not that administrators within TikTok were data mining; maybe, just maybe, the thing that really worried them is that they’re not the administrators.

Ears of an elephant, eyes of a mouse.

Full Spectrum Surveillance Lies Behind the J6 Committee Motive to Delete all Investigative Material


Posted originally on CTH on September 9, 2025 

There’s a reason why the J6 Committee deleted the records of their activity, an angle missed by most.  When you understand what they hid and why they did it, you then understand why current Speaker of The House Mike Johnson will not go near the subject.

The J6 Committee used interfaces with the NSA database and pre-existing portals with aligned DHS Social Media databases (including Twitter, see prior “Twitter Files”), as research and evidence gathering mechanisms for their investigations.

The J6 targets were identified through a collaboration between the legislative research group and the FBI. [That’s unlawful by the way – but that’s another matter]. The FBI contracted Palantir to identify the targets using facial recognition software and private sector databases.

Once identified, the targets were then searched in the NSA database for a fulsome context of identity. All subsequent electronic metadata of the targets was retrieved and utilized in prosecution; however, no one ever discovered this was the collaborative method. That has not come out yet.

Ultimately, the J6 Committee hiding and deleting their files and operational techniques was due to several issues. They really didn’t have a choice given the unknowns of an incoming republican majority.

First, the collaboration with the FBI is unconstitutional. Legislative officers are not law enforcement officers. There is a separation of powers issue.

Second, ultimately – and most consequentially – all of the participants did not want the American public aware of the mass surveillance techniques that were carried out as part of the ’round up.’

Wait to see what the next NSA compliance audit looks like. Remember, these reports are more than a year behind the activity they highlight.

This is where a complete mental reset is needed.

The modern application of the fifty-year-old concept around FISA as a constitutional mechanism to search the private papers (data) of American citizens, is a fraud, a complete ruse.

The Foreign Intelligence Surveillance Act, FISA, represents the method used by the intelligence apparatus of the FBI to conduct surveillance. It was purposefully designed, as a method to avoid the problems with 4th amendment protections. However, the modern application of the FISA justification has no lawful basis.

♦CONTEXT – Beginning in/around 2012, after the Dept of Justice National Security Division was created by President Barack Obama and Attorney General Eric Holder, the use of FISA warrants were extended to include electronic searches of captured information held within the National Security Agency (NSA).  This was the database into which former NSA employee Edward Snowden was creating the search engine software.

The capturing of information was relatively new; technology was still being developed.  Rapid scale-ups of archives and data processing was underway.  Various iterations of the search tools and processes were being tested and deployed.

Prior to 2010/2012 we were mostly talking about emails, phone calls and text messages.  However, as more and more technology was deployed, the interfaces expanded.  Today, almost every electronic interface is captured/stored within either the NSA database, or a private sector database with connections to the NSA search portals.

Arguably, all of the underlying data captures were unconstitutional, and when the captures were originally discovered there was some intense conversations about fourth amendment protections and Americans privacy.  To set aside the concerns and justify the existence of electronic search measures, the American government justified existence via the FISA court process, which extended to cover the new capabilities.

Currently, almost every American interfaces electronically with some system that captures their data.  In the private sector that data is then assembled, attributed and used for consumer product micro-targeting, i.e., all data is commercially monetized.

Local and state governments also interface with the federal government database. As a consequence, all data eventually flows to the NSA capture points where searches of the total assembly are possible.

As noted in various explanations of government collaboration with social media, DHS has access to the various databases which house information inside the private sector.  The lines between govt and private sector data captures are nonexistent as both public information and private information databases can be searched through the same network.

This is the baseline to understand the scope of data collection.

The important part to understand is all of the data collected is searchable.  Then you move on to ‘how’ can the data be searched.

The ‘how’ is where FISA comes into the picture as the justifiable mechanism that permits the federal government to search the database.

The existence of the database is no longer argued.  The govt has now moved beyond justifying the existence of the stored data, and now the only point of contention is ‘how’ and ‘when’ the government may exploit it.

This is where the DOJ-NSD, FBI, U.S. Intelligence Community, Congress and even the Judicial Branch claim the FISA laws protect the unlawful exploitation of the search capability.  However, did you know there is not a single example of a FISA search application to the FISA Court that has ever passed Inspector General review.

Prior to President Trump’s authorization of the OIG in 2017, no one was ever permitted to review, check or audit the government submissions to the FISA Court.  From the moment the DOJ National Security Division was created to permit the enhanced search review, not a single oversight mechanism was ever in place.

Factually, in the timeline of FISA use not a single oversight mechanism was ever in place.  The entire process, and think of searching the database as a process, was/is based on the ‘honor system’. That explains why it was so easy to weaponize by Obama/Holder.

As soon as President Trump permitted the Office of Inspector General to start looking at filled out FISA applications, and justified FISA search documents created by users who were searching through the database, what they discovered was a non-existent accountability system.

After the DOJ Office of Inspector General (OIG), Michael Horowitz, presented his December 2019 findings of the FISA application used against U.S person Carter Page, the gross deficiencies and intentional fraud were so extensive the IG said he was going to review a sample of FISA applications to identify if the fraud and abuse was widespread.

The OIG began reviewing FISA applications from eight field offices (the proverbial “rank and file”).  The OIG selected 29 FISA applications from those field offices over the period of October 2014 to September 2019.

Additionally, every field office and the DOJ-NSD generate internal “Accuracy Reviews”, or self-checks on FISA applications; so, the OIG inspected 42 of the accuracy review FISA files to determine if they were compliant.

The results were so bad the IG produced an interim memorandum to the DOJ and FBI [pdf link here].  Within the 17-page-memo the IG notified Attorney General Bill Barr and FBI Director Chris Wray that all of the claimed FISA processes, in every field office, are grossly deficient, and in most cases, there is zero compliance with FISA standards.

The IG memorandum was presented before the Inspector General even looked at the specifics of the non-compliance.

Below is the report/memorandum.  Additionally, I am summarizing the stunning top-lines identified by the IG memo:

  • The IG reviewed 29 FISA applications, surveillance warrants, used against U.S. persons.
  • The 29 FISA applications were from eight different field offices.
  • The FISA applications were from Oct/2014 through Sept/2019.
  • All of the FISA applications reviewed were approved by the FISA court.

The ‘Woods File’ is the mandatory FBI evidence file that contains the documentary proof to verify all statements against U.S. persons that are contained in the FISA application.  Remember, this is a secret court, the FISA applications result in secret Title-1 surveillance and wiretaps against U.S. persons outside the fourth amendment.

♦ Within the 29 FISA applications reviewed, four were completely missing the Woods File.  Meaning there was zero supportive evidence for any of the FBI claims against U.S. persons underpinning the FISA application.  [ie. The FBI just made stuff up]

♦ Of the remaining 25 FISA applications, 100% of them, all of them, were materially deficient on the woods file requirement; and the average number of deficiencies per file was 20.  Meaning an average of twenty direct statements against the target, supporting the purpose of the FISA application, sworn by the FBI affiant, were unsubstantiated.  [The low was 5, the high was 63, the average per file was 20]

♦ Half of the FISA applications reviewed used Confidential Human Sources (CHS’s).  The memo outlines that “many” of applications containing CHS claims had no supportive documentation attesting to the dependability of the CHS.

♦ Two of the 25 FISA applications reviewed had renewals; meaning the FISA applications were renewed to extended surveillance, wiretaps, etc. beyond the initial 90-days.  None of the renewals had any re-verification.  Both FISAs that used renewals were not compliant.

Keep in mind, all of these applications/justifications to engage title-1 surveillance against suspects, were approved by the FISA court.  How is this possible, unless the FISA Court is intentionally just a false front for a nonexistent process.

That’s my position now.  There is no FISA process in place at all.  It’s as if there’s a traffic light at an intersection, but the power is turned off.  What good is the traffic light, other than to say there’s a traffic light at this intersection.

But wait… it gets worse.

The DOJ and FBI have an internal self-check mechanism.  The DOJ National Security Division (DOJ-NSD) chief counsel, and the chief counsel for every FBI field office are required to conduct an “Accuracy Review” of selected FISA applications.

One review per FBI field office (25 to 30 field offices), which are also sent to DOJ-NSD (main justice) for general counsel inspection.

Keep in mind, these “accuracy reviews” are known in advance, so the FBI has all the time in the world to select the best FISA file for review.

Additionally, I surmise the OIG wanted to inspect the “accuracy review” FISA’s because they would show the best light on the overall system itself.  The OIG was looking for the best, most compliant, product to report on.

However, when the OIG inspected 42 of these Accuracy Reviews, the IG identified that only three of them had accurately assembled documents (Woods File) supporting the application.  The error rate within the files self-checked was over 93%.

So the best FBI files are selected to undergo the FBI and DOJ-NSD accuracy review.  The accuracy review takes place by FBI legal counsel and DOJ-NSD legal counsel.  However, the IG finds that only three FBI applications in the accuracy reviews were compliant.

The error rate in the files undertaken by the internal accuracy review was over 93% (3 compliant out of 42 reviewed).  These were the FISA submissions with the greatest possibility of being accurate.

This is the baseline to understand what comes next.

Summary:  The justification of FISA or FISA (702) as a mechanism to protect the American people from illegal searches of the NSA database IS A FRAUD.  The searching of the NSA database not only continues but has factually expanded through today.  There are no established limits on search use, only false claims that are fed to the public for popular consumption.

The DOJ and FBI are aware of this.  The OIG is aware of this. The Intelligence Community is aware of this.  The NSA is aware of this.  The FISA Court is aware of this.  The Supreme Court, which oversees the FISA Court, is aware of this.  The Legislative Branch is aware of this.

We have the evidence and receipts.

More soon…