Posted originally on the Conservative tree house on August 15, 2021 | Sundance | 281 Comments
Random and related stuff that might help make sense of the next few days, weeks and months as the Taliban retake control of Afghanistan.
(1) The Muslim Brotherhood. Already reports from Qatar that MB leadership is heading back into Afghanistan. This is predictable. The Muslim Brotherhood is the political umbrella for authentic Islam (ie. extremists). The Brotherhood supports the al-Qaeda regional affiliates including the Taliban, al-Nusra, and others. Qatar is the financial center of the Muslim Brotherhood, and the Brotherhood is political Islam.
(2) China. Most people don’t realize that China shares a common border with Afghanistan and has issues with Islamic extremists and sympathizers. China has benefited from the U.S. in Afghanistan keeping the Taliban in check. A U.S. retreat now means China needs to engage with the Taliban to bolster their national security interests. China will establish diplomatic ties with the Taliban partly because Beijing uses duplicitous diplomacy as a strategy. [It ain’t because China likes the Taliban]
(3) Turkey. Unfortunately for Europe, Turkey is both a NATO member (stupid decision) and aligned in common cause with the Muslim Brotherhood. Turkish President Recep Erdogan has previously given safe harbor to the leadership of the Muslim Brotherhood upon their exit from Qatar, when the Gulf Cooperation Council (Saudi Arabia, Egypt, Kuwait, UAE, Oman, Bahrain) demanded Qatar stop supporting terrorists (the Brotherhood).
The EU will not want to recognize the Taliban, but Turkey most certainly will… regardless of what the EU wants, because Erdogan is aligned with extremist Islam. Europe is weak and always ends up acquiescing to the threats of Turkey; so don’t look for much other than pearl clutching from NATO members about it.
(4) Europe. As noted above, the EU doesn’t support Islamic extremism; however, the EU is now infiltrated with Islamic extremism, and the EU is too worried about cultural sensitivities to do anything about it. They will likely try another round of multiculturalism advocacy, which will likely end just like the last time with fracture and cultural crisis because the Islamic extremists attack, murder and rape too many EU people. It will be a mess again.
(5) Pakistan. The Pakistani government is already aligned in common purpose with the Taliban, and have been supporting them under the table the entire time the U.S. was in Afghanistan (See UBL compound etc). China has invested heavily in Pakistan and created reasonably strong ties. China needs the assistance of Pakistan to help leverage their need for regional national security from the Taliban in Afghanistan.
(6) Russia. Oddly Russia and the EU have the same outlook toward the Taliban in Afghanistan. However, where the EU is twisted in pretzel knots of political correctness, Russia is not. Look for Russian President Vladimir Putin to exploit his own interests in the EU via strength and a closer relationship. How? Because Russia can keep the Taliban and Turkey in check if the NATO members are blackmailed by Afghanistan and Erdogan.
*Note – NATO was formed to keep Russia in check…. and now we will likely watch Russia helping NATO keep their step-child, Turkey, in check. How’s that for some geopolitical irony?
Summary: Qatar (Muslim Brotherhood) will help the Taliban (al-Qaeda). China will form tenuous and conniving ties with the Taliban, likely relying on economics. Turkey will support the Taliban and look for help, eventually, to assist Erdogan re-attain the Ottoman Empire he lusts. The EU is stuck between Russia and a hard place (Turkey), and will likely end up on team Putin.
Joe Biden will eat jello…. and the leftists in the U.S. State Department will run to their proverbial Alamo, The United Nations.
Posted originally on the conservative three house on August 14, 2021 | Sundance | 142 Comments
Dr. Douglas G. Frank explains information he discovered as he reviewed election outcomes. Dr. Frank found the baseline for the 2020 vote was created by applying an algorithm that used the 2010 census to fabricate the illusion of registered voters at a state level (predetermined), and then results are controlled at a county level.
0:01 – So here’s how our elections are being stolen. In a nutshell, this is how our elections are being stolen. — Someone before the election decides what they want the outcome to be. It’s a decision ahead of time. — And then they make projections and they say “Well, we think this is what’s going to happen…” — So they want to regulate that at a county level to make sure they get the outcome they want. So what they do is they inflate the registration databases.
0:30 – Now this is before the election, and during the election, and after the election they’re manipulating the database. But beforehand they make an estimate of what they think is going to happen and they inflate the registration databases.
— So the beginning big hack… most of the hack of the election… takes place at this point beforehand. They inflate the registration databases.
0:51 – The reason they do that is because it gives them a credit line of phantom voters. In a nutshell this is how our elections are being stolen.
1:00 – Think about it. It would be a really stupid cheat to have an election happen and then afterwards you count the ballots and they don’t match the machine… That’s too easy. A recount is too easy of a thing to catch.
— So what they do instead is they bring a bunch of ballots and put them in. That way when the machines count the ballots they don’t have to cheat the machine. — The machine’s job then is not to flip votes… even though we do have cases with that… The machine’s job is just simply to report progress. — How are things going? Is it going as we predicted. If not, adjust it.
1:34 – And when you write a computer algorithm it does that kind of adjustment… It’s comparing to some target value. There’s a target value and then the computer is constantly checking saying “How is it going? Is it matching what we planned?” and then it’s constantly making adjustments.
— That’s why the machines are so important… And yes, absolutely the machines are connected to the internet. — And then before the elections they also have to program the machines.
2:01 – And just to tease it again, I’ve been going around the country talking to people in different states and every once in a while I will come across a county clerk who says “Oh no Dr. Frank, we follow all the guidelines. Our elections are totally secure.” — So I bring out the data. I show them the evidence. And they’re like “Oh, we were hacked huh?” Yup, you were. And then they’re not happy.
2:28 – And in several states now across the country people like that have said “Hey Dr. Frank, why don’t you bring your team in and let’s do a complete forensic audit of our machines.
— So you think that Maricopa is an audit? How would you like to do an audit where you have access to everything and nobody knows. — We go in we take complete images of all the machines, of all the digital software that are in them, of all the routers, of everything. — Before, during, and after the election. We record the activity during the election. — All of that at the request of the county people. We have those.
3:13 – And so it’s always kind of comical to me when people say “Oh yea, but our machines are not connected to the internet. We have an air gap between our machines…” It’s like… your phone has an air gap between your phone and the internet. Yea, right, okay. — It’s not real. Especially since we’re able to record the entire election through the internet during the election. Okay, we know they’re connected.
— So anyway. Get ready tonight.
3:45 – By the way, if someone knew that we had a complete recording of their election and it was going to expose a bunch of officials… What do you think might happen? Maybe we might have a few people that might want to come forward.
— Anyway so before the elections they program the machines. Yes?
4:09 – Then, during the election the databases continue to be hacked and tracked. — We’ve got several situations where, during the actual election, we were downloading the registration databases from the county levels and keeping track…
— And it’s amazing. You can see them adding voters… removing voters. Adding voters who request ballots and received ballots even though nothing has happened. — We’ve got records of all that happening in real time during the election.
— So that’s what’s happening during the election.
4:38 – And then after the election… You saw Patrick Colbeck sitting here. He’s been working in the state of MI for months and months on this. — He has a term for this. He calls it The “eharmony dot com” phase… — Because what happens is during the election they create all these voters… and then afterwards you have to put names onto them so that that way they can survive a subsequent audit. — So he calls that the eharmony dot com.
5:02 – So you’ll notice that the whole point here is that throughout the entire election their computer algorithm is operating. Every county in our country is essentially hacked. — Now the PCAPs (packet captures) and the electronic recordings we have show that they’re 3,009 so far.
— We haven’t even been been through all 37 terabytes. It’s just too huge of a job. It’s one of the reasons we’re having the symposium so we can bring in a bunch of cyber experts and they can help us.
— But we’ve got 3,009 of our counties already hacked. We’ve got evidence that they were hacked during the election.
5:35 – So there’s just no way that people are going to do that. It’s a computer algorithm that’s always operating that’s doing all that work.
5:45 – Don’t be afraid of that word algorithm. Algorithm is a word that we like to use in science because it’s just like a recipe. It’s a set of steps you do in order. But we like the word algorithm because that usually means there’s some equations mixed in… and some numbers mixed in.
6:11 – Now, how would you know if an algorithm was operating? — So here’s a simple way to know if an algorithm is operating. — Pretend you have a 20 sided die and you roll it 83 times. And you get a series of numbers… and you write them down.
— And so then you go over to the next county over in your state and you roll it 83 times again. And you get the exact same 83 numbers in the same order. — Is that normal? No. That ain’t natural buddy.
6:45 – And what happens is then you go to another county in your state and you get the same 83 numbers in the same order. You know that’s not real. You know there’s some kind of algorithm operating. Something is controlling what’s happening. That’s not natural.
— What if you go to every county in your state and they’re all the same? Then you know that’s not real. That’s how you can know. Now you don’t have to be a math genius, you just know… 83 times in a row? That’s just not right. — There’s a reason for “83”. I’ll tell you later. (See 22:58.)
7:20 – Let’s say we’re here in the state of South Dakota. What if I step over the border into Nebraska? — Let’s say we go into Nebraska and we start rolling the die… and as soon as we step over the border, instead of it being the same 83 numbers, it’s a new set of 83 numbers. — But every county in Nebraska has the same set of 83 numbers.
7:50 – And then let’s say we step over the border and go into Iowa and we have a whole new set of 83 numbers, but it’s the same in every county. — What you would know at that point is that the numbers are being decided for each state and that they’re being controlled in each county.
— That’s what’s happening in our election. The elections are being decided ahead of time by state and they’re controlled at the county.
8:23 – Okay so this is how I figured this out. — So because I teach at this special school for really bright kids… genius kids… it’s pretty fun… I call it recess. I go there a couple hours in the mornings during the week.
8:39 – I like to teach my differential calculus class… I like to pick a real example from real life… Because I can teach them all the calculus they’re supposed to learn in that year… probably isn’t a semester.. So I stretch it out and I put in real life examples. And we actually apply the calculus as they’re learning it.
8:55 – Number of People of Each Age in USA, 2010 – 2017 (Chart) — So this year in September I picked the United States Census. Why did I pick that? Well because all the talk is about the 2020 census. — So how do you analyze data like this? So I was teaching them how to use calculus… planning to teach them on the 2020 census when it came out. But all I had was the 2010 census.
9:18 – So I was studying the 2010 census and I prepared this graph in September before the election. And it’s a good thing because I think if I hadn’t been doing that I wouldn’t have figured this out. — And I think it’s a Divine appointment.
9:36 – So you’ll notice in the census what they do is that bat curve, the blue curve, that’s from 2010. That’s the 2010 census. And that’s the last detailed census of the whole country before the election. — And then you’ll notice that what they do is each year the United States Census just shifts it one year. Only they don’t just only shift it, they attenuate it for mortality. Because 90 year olds don’t just become 100 year olds. Some of them die off.
— So that’s what the census does. These are data from them. This is not me doing anything. I’m just showing you what they provide.
10:10 – And I’d been studying this. So all this was fresh in my mind when Kathy Barnette asked me to go to PA and study her data because her election had been stolen. — So this was all fresh in my mind.
10:23 – Pennsylvania, District 04 (chart) — Okay, so let’s just talk about her district. Pennsylvania, District 04. One of the most corrupt in the country. Another Divine appointment.
— Notice what I’ve got across here is a graph. This is 0 to 100 years old. And then here is 0 to 12,000. — How many people of each age are there? And you can notice, you can kind of see there’s some wiggles and bumps. Here are the Baby Boomers and then people pass away. — But you notice, not everybody gets to vote. Right? — Because you have to take out the 0 to 17 year olds and not everybody above 18 gets to vote. There’s about 4% of people you have to take out.
11:01 – So this is who’s registered… I mean this is who… an eligible voter in PA District 04. About 550,000 people. — Well here’s who’s registered to vote in PA District 04. (Chart shows 97.9% registered.)
— And when I showed this to the board of elections people and the legislature in PA they all said “What? No, no, no, no, no that can’t be right. It should only be 60 or 70% of the people registered.” — Yea. The election people themselves don’t know this has happened.
11:40 – So in other words, nearly everybody is registered and they didn’t even know it. — And so that’s a warning flag… that they don’t even know. — This is supposedly who voted in PA District 04. — And whenever I show this to people they say “Dr. Frank, from about 50 years up those curves look really a lot alike. The red curve just looks a little smaller than the black curve. What’s up with that?” Yea. I agree. Something’s wrong with that.
12:11 – In fact if I multiply the black curve by 86%… You notice it superimposes right on the red curve pretty well. It’s surprisingly well so of course as a scientist I know something called the correlation coefficient, this “R” number. I’ll tell you about that in a little bit. And definitely that’s a warning flag that it’s so high.
12:38 – Let me tell you about correlation coefficient. — So if a correlation coefficient is “1”, then that means it’s a perfect correlation. It means one set of data predicts another set of data perfectly. — If the “R” is “0”, that means it’s completely random versus each other. — If it’s “-1” it means one goes up, one goes down.
12:57 – So anytime you have a correlation coefficient near “1”, which this is, that’s not natural. It’s something that’s going on that’s making the two agree with each other.
— In medicine, in anything to deal with people… If you get correlation coefficients in the .7, .8 range, you’re doing amazingly well. Because anything to do with sociology or medicine, anything to do with people is usually really low. — In physics, if you’re between .8 and .9, you’re doing amazingly. — To get .99, that ain’t natural buddy.
13:31 – Alright so… this is PA District 04… except I’m showing you now the 2010 census. I’m about to compare it to PA District 04. — But this is actually the 2010 census. What I did is I shrunk it though, so that it’s the same size as PA, District 04. It’s not millions of people. It’s thousands of people.
13:55 – Now notice when I shift it 10 years to the right… because it’s not 2010 anymore, it’s 2020… and I include the mortality just like the census does… — Let me just go back so you can see me do that. I’m just going to shift it to the right and include a little mortality.
14:14 – See what I did? Because why would I want to do that? Well because it isn’t 2010 anymore. It’s 2020.
14:23 – So now when we add who’s registered in PA District 04… — This was my first clue that they were using the census to inflate the registration rolls. — Now if you think about that it totally makes sense. — Let’s say you want to add a bunch of people to a county. You want to add a bunch of phony voters. Are you just going to add a million 60 year olds? No that would stick out like a sore thumb.
14:53 – You have to add a certain number of each age. Well how many do you add? What do you compare it to? The census. And you use the best census available, the 2010 census. — You shift it 10 years. You attenuate it to the size of the county and you fill up to there.
15:11 – And if you do that, if you fill up to there… you’ll notice it’s going to take on the shape of the census.
— And a couple of the distinguishing features are these 2 peaks on the side and this peak here. — You’ll see those in every county in the country in the registration database… Because they’re filling up to the census. — So it’s like a fingerprint in every county. And I’ve done thousands of counties now across the country and it’s in every county. And you’ll notice that ain’t natural buddy.
15:45 – So now I’m just going to teach you a little math. I’m going to make up a pretend county and then I’m going to show you some real data. — So this is the census. Back to the real census again. And you’ll notice that it basically is about 4 million people of every age and then people naturally remove themselves from the voter rolls. That’s a joke. — I’ll try that again.
16:10 – So you’ll notice there are about 4 million of every age and then people naturally remove themselves from the voter rolls.
16:20 – So here’s my pretend county. And you’ll notice I’ve given 15 people of every age until they’re about 60 and then they naturally remove themselves from the voter rolls. — That’s a pretend county and it has 1,275 people in it. And the reason I picked that number is because if you take out the kids (17 and below), you end up with exactly a 1,000 people in my imaginary county. Eligible voters (18+, 1000) — And my supermoms are always saying “Dr. Frank, you’ve got to make the math easy.”
16:50 – We have 1,000 people in our imaginary county. And you’ll notice about 15 people of every age and then they die. — Now a certain percentage of those are going to be registered to vote. And I just picked this number, 13/15ths, or 87% because it fits with some other data.
17:11 – But I’ll tell you the story. When I first was developing these slides I have a dear friend who was my roommate in college who worked for Newt Gingrich for 30 years. — I was practicing on him and showing him these slides. And he said “Oh Dr. Frank, that’s a really bad example.” “Why is that Mark?” He says “Well, there’s no way a county has 87% registration.”
— I’ve already shown you much more than that huh? So in other words, a guy who’s a political expert and he’s been doing it for 30 years thinks this is ridiculous. But boy did he have something to learn didn’t he?
17:44 – Okay. And then a certain percentage of those that are registered will vote. — If I assume that’s 70%… Then you’ll notice you’ve got your population here; and then you have who is registered to vote; and then who actually voted. Make sense?
18:01 – By the way, if you know the blue curve (population) and you know the percentage (% registered to vote), you can get the black curve (# registered to vote). — If you know the black curve (# registered to vote) and you know the percentage (% registered to vote), you can get the red curve (# ballots / actual votes).
— If you know any of the curves and you know the percentages (% registered to vote), you can get any of the other curves.
18:22 – That’s how I was able to leave PA with a set of algorithms in my hand, not knowing anyone who was registered in the state of OH… and I predicted every county in the state of OH before I even knew.
— And Mike was talking about that because I was bragging how great OH was right? “Oh, yea we got to figure it out in OH… we have secure elections.” Nope. I was able to predict them all. Then I realized, nope, this is everywhere.
18:50 – And I have to admit, you know, as a scientist you’re supposed to be skeptical of yourself. And I was. I could predict all these counties in PA. — And so the state legislators, they said to me “Well, Dr. Frank have you tried any other states?” And I said “Well, no. I’ve been assuming all the corruption is here in PA.” — And they said “Why don’t you try another state where you think there isn’t any corruption?” — “Okay, I’ll do OH.” And then I was able to predict all of them. — I tried FL. Nope. 14 counties then in FL. Oops. — NC. Oops. — CO. Oops. Everywhere I was going.
— And so I was starting to doubt myself a little bit. Like wait a minute. Is there something else going on here that I’m not thinking about because how can I go around predicting this everywhere, especially in states that I think Trump won? … You would think there is no manipulation here.
19:47 – Then I meet Mike Lindell and he talks about his electronic evidence and the fact that at the time he had 2,800 counties worth of incursion data. — Oh. Now I understand. There are computer algorithms operating in every county in the country. No wonder I can predict it everywhere.
20:06 – Alright. Now here’s a real county. This is Hamilton County, OH. This is right near me. This is Cincinnati. It’s a big county. So these are real data now. Not makeup data. — You’ll notice we have age across bottom again… And how many thousands of people of each age. You can see the Millennials and the Baby Boomers nice and clearly. — This is OH now not PA.
20:28 – Here’s who’s registered to vote in Hamilton County, OH. — Oops. When I showed this to the board of elections director in Cincinnati she was shocked. — She’s like “How did that happen?” Exactly.
— Do you know why these people don’t know this has happened to them? Because these are big data sets. These are hard to work with.
20:53 – And what’s happened is the election companies give them software that allow them to work with their databases. The software that they’re given doesn’t do this. The software that they’re given just gives them totals and lists.
— And so they’re not used to even being able to do this. — It takes a data geek. It takes a scientist. It takes someone that likes graphing and exploring data to begin to do this. So just showing them this is a shock.
21:17 – By the way, just while we’re here… You see these 2 peaks on the side… that’s the census isn’t it. It’s the breadcrumbs of the census peaking its way in.
21:27 – Alright, so that’s supposedly who’s registered. That’s a warning flag (#1).
21:32 – By the way, I’m not the only person to figure this out. — In October, Judicial Watch published an article before the election showing that 353 of our counties in the United States, in 29 states, had voter registration more than the population. — Why did we let this happen? We were being told that our election was being hacked. We all didn’t listen. We didn’t understand.
22:07 – So back to Cincinnati.. — Here’s who supposedly voted in Cincinnati. Do you notice a pattern? Just like in PA from about 50 years off. It’s about a perfect match. — Let’s just compare that to make that easy for you to see.
22:22 – And if we give that number… I just chose the same number there that I did in PA, 86%… If we call that number the Registration Key… — Think of it like a code. You’ve got one set of data and you have a key to break that code that allows you to convert this set of data to this set of data. — And so that number would be 86%. That’s like a key. How do you convert this to this. You use that key.
22:48 – And the fact that that repeats… the same thing that happened… in a different state. This is OH now. The first thing I showed you was PA. (Warning flag #2.)
22:58 – But we wouldn’t have to have only one number. We wouldn’t have to have just 86%. — We could have a percent for every 18 year old, a percent for every 19 year old, a percent for every 20 year old. We could have a different percent for every age. That would be 83 numbers. — You’ve heard 83 before. 83 numbers… 18, 19, 20, 21, 22, all the way up to 100. You’ve got 83 numbers.
23:22 – So let’s say we had 83 numbers… And we could call that the key instead of just one number. It’s a collection of 83 numbers. (You need a different proportion for every age. Together they define the “Registration Key”.) — And if we do that this is what you get. — The black curve (predicted ballots) is what I would predict you would get. — The red curve (ballots) is what we actually observed.
23:40 – And when I show this to people, they wisely noticed “Well, hey Dr. Frank, if you can just get 83 numbers you should be able to make it fit perfectly. How come it doesn’t quite fit perfectly?” — Well the answer is because I didn’t use Hamilton County to get my percentages. I used Franklin County. And I used those percentages for every county in the state of OH. And it’s the same in every county.
24:07 – And this is what those 83 numbers look like. From 18 up to 100… 83 numbers. 83 percentages. — And when I show this to people they’re like “Wait a minute. That’s a smooth curve. You mean the percentages from 18 to 100 vary smoothly?” — Yes. In fact that’s called a 6th order polynomial.
24:30 – We scientists like polynomials to describe things. And what’s so fun about that is if I had put these data into Excel, which I did… I made this graph in Excel… And I right click on it and I say “Add a trend line.” Then it will say “Well what kind of line would you like to put in? Would you like it to be a 2nd order polynomial, or a 3rd order polynomial?” — And you start adding. This little scroll button… You click on it… 4th order, 5th order, 6th order.
24:59 – When you hit 6th order it won’t go any higher. It’s stuck there. Because 6th order is as high as Excel goes. — And guess what… Every state in our country I can predict this way with a 6th order polynomial.
25:10 – In other words … America was stolen by an Excel spreadsheet.
25:20 – Okay. So lets go back to this again. — So you notice, once I know the percentages … If I know one thing I can get all the others. Yea? — So all I have to do is go into any state, look at one county, and I can predict all the others… Because every state has its own key.
25:40 – Just like in the state with rolling the die 83 times. It works in every county in that state. But when you go into a new state it’s a new set of 83 numbers. So every state has its own key. Make sense?
25:54 – Okay. So, I had to pick a state so I just picked OH. Just to kind of let you see. — Now, what I’m going to do in this set of 88 slides… They’re going to go by really fast. It takes 1 minute to play. — What you want to look at is you can look at the “R” factors… How good it’s correlating… — Or you can look at these bottom two graphs (predicted ballots & ballots) — Or you can look at the black curve. (registrations)
25:16 – Let’s just review what they are: — The blue curve is the population of a county. — The black curve is who’s registered in that county. — The red curve is who’s supposedly voted in that county. — And the blue curve underneath is my prediction.
26:31 – Now what’s fun about these set of data is I’m going to make the prediction two different ways: — I’m going to make the prediction based upon the population. Pretend I don’t even know who’s registered. I’m just going to make a prediction based upon the population. — And then I’m going to make a second prediction if I did know who was registered.
26:49 – So I’m going to show you two graphs for every county. And they’re going to play… boom, boom, boom, boom… It takes about a minute to play or something like that. — And what you’re going to be looking for is these bottom two graphs. — And you’re going to notice that the population prediction isn’t quite as good as the registration prediction.
— But it makes sense. Because if I have to start from here to get to here I have to go through two numbers. So it’s harder to predict. — I can go straight from there to there. That’s one way of predicting. Or I can go from the black to the red. — So I’m going to predict them both ways for you.
27:22 – Prediction video. (88 slides) — So this is all of them. And I know it’s a lot. But I just want you to see that every county is predictable two ways. — Now I have been doing this across the country. And what I like to do is I like to get the data for a particular state; and do all the analyses; and then we release it in the state and people get all freaked out. And they say “Hey, we got a problem.” Yea, you got a problem.
27:55 – And then I’ll come out there and I’ll meet the supermoms and we have a few events. I meet with a few key legislators. We plan our event. — A couple weeks later there’s a big event. The public is all worked up about it and we have a movement going.
28:11 – Right now I’ve done that in 13 states in person and I’m working with 30 total states. Our supermoms are kicking butt I tell ya.
28:33 – (Colored map of the U.S.) — Alright, so here’s the thing. I’ve explained this to you. Now this is really just a top level analysis. I’ve got all kinds of other analyses that go down… In fact, I’ve got analyses that will take you right down to the precinct level and you can knock on doors and find phantom voters. -But this just gives you the overall view so you kind of know what’s happened.
29:09 – (Responds to a question.) That isn’t what these predictions are. Keep in mind, to predict them I have to be able to get in the minds of the people who decided ahead of time what they wanted the outcomes. — It’s not as easy as you think because sometimes the people getting elected are… you wonder, why would they elect that… you know… That’s a whole other discussion. Which we need to have that discussion.
29:35 – Okay, so I’ve just explained to you how our elections are being stolen. Now how do you explain this to your friends. — It’s hard without the graphs. — So I told you about rolling a die 83 times. — Here’s another way to explain it to your friends and I developed this metaphor with my supermoms.
29:50 – Blonde Hair Analogy — Let’s say you’re in the state of OH. Imagine you’re in the state of OH. Easy to do for the ladies in my state. — And let’s say the 2020 census just came out. And you look at it and it says that 10.0% of the people in your county have blonde hair. — And then you go to the next county over and you look at the 2020 census and it says 10.0% of the people there have blonde hair.
30:33 – And that’s a little puzzling because you’re Amish and they’re Mexican. You know as a county it’s kind of strange that they would be exactly the same percentages. — But you keep looking around the state and every single county has 10.0% blonde hair. — That just doesn’t make sense does it. You would think something is wrong with that.
30:52 – So you look at the next state over. You look at PA. And 13.4% of the people there in the very first county have blonde hair. — Now wait a minute. Everybody in OH was 10.0%, but now suddenly it’s different? — And every county in PA is 13.4%?
31:10 – So you go to FL and now every county there is the same but different than the previous. You know something is wrong with this don’t you. — You go over to CO and it’s a new percentage, but every county has the exact same percentage of blonde hair.
31:23 – You know that can’t be right. You know that it’s being decided at a state level and controlled at the county level. So that’s a way to explain that.
31:33 – But it’s worse than that really. Because you remember that 10.0%? — Imagine if that was just for 18 year olds. What if you have a different percentage for 19 year olds; and a different percentage for 20 year olds; and a different percentage for each age all the way up to 100.
31:51 – And they were all the same in every county and state. — And it didn’t matter whether you were in a large county, small county, urban county, rural county, black county, white county, green county, doesn’t matter… — The same percentages in every one. You know that isn’t real. That’s not natural.
— So that’s a simple way for you to explain to your friends. Just use the blonde hair analogy.
32:14 – Now the reason I’m going around the country is cause I’m a firm believer in the people. If they’re given the truth, they can be depended upon to meet any national crisis.
— Is this a national crisis? Yea, I think we just lost our country. — Mr. Lindell in the movie Scientific Proof… We did that together… About 15 minutes in he said “It’s a good thing that we lost the election or we wouldn’t know we lost our country.” — I wouldn’t have even have looked at this. That’s another Divine appointment.
32:42 – The great point is to bring them the real facts. And bringing them the real facts is what I’m trying to do and what Mr. Lindell is doing.
— Now the problem is I learned the bitter lesson that legislatures aren’t going to save us. — I learned the bitter lesson that our legal system isn’t going to save us. — No one is coming to save us. We are the people we are waiting for.
33:10 – And if I’ve learned anything from last year, politicians don’t start parades they join them. So you have to be the parade. — And it’s not that the politicians are evil, its they need you. They’re good politicians who need you to start the parade and need you to be in the parade… need to build the parade so that they can accomplish their legislative agenda.
33:36 – I’ve seen several politicians here this week and they’re going to be heroes, but we need to equip them and we need to start the parade for them. -So that’s what I’m doing. I’m going around starting parades.
33:47 – So I’m a physicist, so I like to use metaphors. So let’s pretend that this piece of aluminum… just a piece of aluminum. This is United States… this piece of aluminum. — And here is me spreading the truth. That’s not the microphone working, that’s really annoying like that. And I can make that really loud and really annoying. It’s kind of annoying. And it’s all pervasive.
34:21 – So this is America. This is the truth resonating in America. We just have to make it really annoying. We just have to make it unbearable. We just have to keep getting louder and not let them silence us. — So that’s it.
Posted originally on the conservative tree house on August 11, 2021 | Sundance | 73 Comments
During day #2 of the Mike Lindell Cyber Symposium, political statistician Seth Keshel gave a presentation highlighting historical voting data. {Direct Rumble Link}
As noted by Keshel there are ten statistical anomalies indicating vote fraud and manipulation in the 2020 election. WATCH:
Posted originally on the conservative tree house on August 11, 2021 | Sundance | 301 Comments
Oh dear. According to Hunter Biden the Russians have sex tapes of him doing “crazy f**king sex stuff” from drug fueled parties in Las Vegas where Russian drug dealers were partying with him.
As the story is told in his own words three Russian drug dealers were partying with him for several days with prostitutes, drugs and various debauchery; and when he woke up from passing out one night, all the recordings on his laptop were gone along with the laptop itself. “They have videos of me doing this,’ he said, referring to the filmed sex he just finished. “They have videos of me doing crazy f***ing sex f***ing, you know.”
(The Daily Mail ) – Hunter Biden claimed Russians stole another one of his laptops for blackmail while he was close to overdosing in a Las Vegas hotel room, DailyMail.com can reveal.
The alleged incident would mean Hunter lost a total of three computers – the first abandoned at a Delaware computer store and the second seized by federal agents – each likely to hold sensitive information on President Joe Biden and the embarrassing pictures, videos and communications of his son.
The third laptop still appears to be missing – and was taken by Russian drug dealers after they partied with Hunter in Vegas, he told a prostitute in a conversation caught on camera.
After filming himself having sex with the woman using his laptop in January 2019, Hunter left the camera rolling as he recounted a Vegas bender in which he spent ’18 days going round from penthouse suite to penthouse suite,’ sometimes costing $10,000 a night.
‘I spent f***ing crazy amounts of money,’ Hunter said. ‘I was with these guys. The one guy was, not like you anyway… each night he’d be like ‘there’s going to be so many people here, crazy f***ing party’ and each night it’s nobody.’ (read more)
Rome became the greatest empire that ever existed because of its organization, which included its communication system. Here we have a Roman sestertius of Emperor Nerva (96-98 AD) who issued this coin to declare that Rome would assume the costs of the imperial post, which had been shifted to the municipalities slowing communications. Clearly, the idea of the Pony Express we hear associated with the Wild West days of the United States was by no means a new invention. As much as things change, they remain very much the same. History repeats because the passions of humankind never change. But also the solution to the same problem always reappears.
Indeed, the roads were built by Rome to move conquering armies and to facilitate communications and supplies from one end of Rome’s vast empire to its most remote frontiers. Every long stretch of road had mutationes for changing horses and mansiones for lodging at night.
Julius Caesar and his army traveled so fast on those roads that it took them only eight days to go from Rome to the Rhone which ran from the Mediterranian through Gaul to Lake Geneva in Switzerland.
By using the relay and refreshment stations all along the highways, couriers could cover 500 miles on horseback in just 24 hours. Letters have been discovered showing they have traveled from Britain to Rome in about 7 days.
Communications were the key. The Pony Express was set up on the same design of relays. To those who assume history has nothing to offer, the entire insurance industry in Britain began in Llyod’s Coffee shop in London to become Llyods of London. Likewise, Starbucks has emerged with the same idea of people having business meetings while having coffee. Study history and you may come up with the next idea for a good business.
Posted originally on the conservative tree house on August 8, 2021 | Sundance | 149 Comments
Good grief these UniParty Senators are infuriating. During this interview with Maria Bartiromo, North Dakota Senator Kevin Cramer (U-DC) actually has the nerve to brag about $450 billion in infrastructure spending amid a phase-one bill that has $1.2 trillion in total. What’s the other $800 billion dollars being spent on doofus?
Another of Cramer’s advocacy points is how the U.S. Chamber of Commerce supports the bill; as if that’s a good thing. Making matters worse, Nancy Pelosi and Chuck Schumer devised a process pledging that this part of the infrastructure bill (phase-1) will only advance if it is married to the House party-line legislation (phase-2) that will spend as much as $3.5 trillion MORE on climate change action, paid leave policies, health care expansion, and other progressive agenda items.
The insufferable republicans that support the phase-one bill (The DeceptiCon crew) are, by direct consequence, advancing the $3.5 trillion phase-two bill that is entirely a Democrat spending spree on the Green New Deal and other insane initiatives. Acckkkk… we desperately need a second party in DC.
WASHINGTON DC – Politico – President Joe Biden’s bipartisan infrastructure deal cleared its final serious Senate hurdle Sunday night, putting the legislation on a glide path to passage as soon as late Monday.
In a 68-29 vote, the Senate closed down debate on a bill that spends $550 billion in new money on the nation’s physical infrastructure. Sunday’s vote came after senators spent the weekend haggling over amendments and time agreements to consider them. (read more)
Posted originally on the conservative tree house on August 8, 2021 | Sundance | 340 Comments
Why does government seem to control so much of our lives now? What significant changes happened in the past 15 years that created a social shift and allowed government to influence almost every facet of our activity? Why has the previously ordinary become so complex? Why is it more difficult to be comfortably invisible and just live out the creed of pursuing ‘life, liberty and happiness’? What is behind all this?….
We were not sleeping, we were wide awake. Perhaps distracted, yes; but we were wide awake when something shifted. A Fourth Branch of Government was quietly created, and technology allowed the tentacles of the system to touch us. That’s the root of it, and if we take the time to understand how the Fourth Branch originated questions about this perpetual angst start to make sense.
It is not my intent to outline the entire history of how we got to this place where the intelligence community now acts as the superseding fourth branch of government. Such an effort would be exhausting and likely take our discussion away from understanding the current dynamic.
History provided enough warnings from Dwight D Eisenhower (military), to John F Kennedy (CIA), to Richard Nixon (FBI), to all modern versions of warnings and frustrations from HPSCI Devin Nunes and ODNI Ric Grenell. None of those prior reference points are invalid and all documented outlines of historic reference are likely true and accurate. However, a generational review is not useful, the reference impacting us ‘right now‘ gets lost.
Instead we pick up the expansive and weaponized intelligence system as it manifests after 9/11/01, and my goal is to highlight how the modern version of the total intelligence apparatus has now metastasized into a fourth branch of government. It is this superseding branch that now touches and influences every facet of our life.
If we take the modern construct, originating at the speed of technological change, we can also see how the oversight or “check/balance” in our system of government became functionally obsolescent.
After many years of granular research about the intelligence apparatus inside our government, in the summer of 2020 I visited Washington DC to ask specific questions. My goal was to go where the influence agents within government actually operate, and to discover the people deep inside the institutions no-one elected and few people pay attention to.
It was during this process when I discovered how information is purposefully put into containment silos; essentially a formal process to block the flow of information between agencies, and between the original branches. While frustrating to discover, the silo effect was important because understanding the communication between networks leads to our ability to reconcile conflict between what we perceive and what’s actually taking place.
After days of research and meetings in DC during 2020; amid a town that was serendipitously shut down due to COVID-19; I found a letter slid under the door of my room in a nearly empty hotel with an introduction of sorts. The subsequent discussions were perhaps the most important. After many hours of specific questions and answers on specific examples I realized why our nation is in this mess. That is when I discovered the fourth and superseding branch of government, the Intelligence Branch.
I am going to explain how the Intelligence Branch works: (1) to control every other branch of government; (2) how it functions as an entirely independent branch of government with no oversight; (3) how and why it was created to be independent from oversight; (4) what is the current mission of the IC Branch, and most importantly (5) who operates it.
The intelligence branch is an independent functioning branch of government, it is no longer a subsidiary set of agencies within the executive branch as most would think. To understand the intelligence branch we need to drop the elementary school civics class lessons about three coequal branches of government, and replace that outlook with the modern system that created itself.
The intelligence branch functions, much like the State Dept, through a unique set of public-private partnerships that support it. Big Tech industry collaboration with intelligence operatives is part of that functioning; almost like an NGO. However, the process is much more important than most think. In this problematic perspective of a corrupt system of government, the process is the flaw – not the outcome.
There are people making decisions inside this little-known, unregulated and out-of-control branch of government that impact every facet of our lives.
None of the people operating deep inside the Intelligence Branch were elected; and our elected representative House members genuinely do not know how the system works. I assert this position affirmatively because I have talked to House and Senate staffers, including the chiefs of staff for multiple House & Senate committee seats. They are not malicious people; however, they are genuinely clueless of things that happen outside their silo. That is part of the purpose of me explaining it, with examples, in full detail and sunlight.
We begin….
In April of 2016 the FBI launched a counterintelligence operation against presidential candidate Donald Trump. The questioning about that operation is what New York Representative Elise Stefanik cites in March of 2017, approximately 11 months later (First Two Minutes).
Things to note:
♦ Notice how FBI Director James Comey just matter-of-factly explains no-one outside the DOJ was informed about the FBI operation. Why? Because that’s just the way things are done. His justification for unilateral operations was “because of the sensitivity of the matter“, totally ignoring any constitutional or regulatory framework for oversight; because, well, quite simply, there isn’t any. The intelligence apparatus inside the DOJ/FBI can, and does, operate based on their own independent determinations of authority.
♦ Notice also how FBI Director Comey shares his perspective that informing the National Security Council (NSC) is the equivalent of notifying the White House. The FBI leadership expressly believe they bear no responsibility to brief the chief executive. As long as they tell some unknown, unelected, bureaucratic entity inside the NSC their unwritten responsibility to inform the top of their institutional silo is complete. If the IC wants to carve out the Oval Office, they simply plant information inside the NSC and, from their perspective, their civic responsibility to follow checks-and-balances is complete. This is an intentional construct.
♦ Notice how Comey obfuscates notification to the Director of National Intelligence (DNI), by avoiding the fact James Clapper was the DNI from outset of the counterintelligence operation throughout the remainder of Obama’s term. When I get deeper into the process we will understand how the Intelligence Branch has intentionally used the creation of the DNI position (established post 9/11/01) as a method to avoid oversight, not enhance it. Keeping an oblivious doofus like James Clapper in position held strategic value [Doofus Reminder HERE].
Also, watch this. Another reminder… and it is likely many readers have forgotten… and watch closely:
That video of James Comey being questioned by Elise Stefanik was the first example given to me by someone who knew the background of everything that was taking place preceding that March 20, 2017, hearing. That FBI reference point is a key to understand how the Intelligence Branch operates with unilateral authority above congress (legislative branch), above the White House (executive branch), and even above the court system (judicial branch).
The video of James Clapper highlights how the ODNI position (created with good national security intention) ended up becoming the fulcrum for modern weaponization, and is now an office manipulated by agencies with a vested interest in retaining power. The Intelligence Branch holds power over the ODNI through their influence and partnership with the body that authorizes the power within it, the Senate Select Committee on Intelligence (SSCI).
Factually, the modern intelligence apparatus uses checks and balances in their favor. The checks create silos of proprietary information, classified information, vaults of information that work around oversight issues. The silos are part of the problem.
Ironically the Office of the Director of National Intelligence was created in the aftermath of 9/11/01 expressly to eliminate the silos of information which they felt led to a domestic terrorist attack that could have been prevented. The ODNI was created specifically upon the recommendation of the 9/11 commission.
The intent was to create a central hub of intelligence information, inside the executive branch, where the CIA, NSA, DoD, DoS, and DIA could deposit their unique intelligence products and a repository would be created so that domestic intelligence operations, like the DOJ and FBI could access them when needed to analyze threats to the U.S. This, they hoped, would ensure the obvious flags missed in the 9/11 attacks would not be missed again.
The DNI office created a problem for those who operate in the shadows of proprietary information. You’ll see how it was critical to install a person uniquely skilled in being an idiot, James Clapper, into that willfully blind role while intelligence operatives worked around the office to assemble the Intelligence Branch of government.
• The last federal budget that flowed through the traditional budgetary process was signed into law in September of 2007 for fiscal year 2008 by George W Bush. Every budget since then has been a fragmented process of continuing resolutions and individual spending bills.
Why does this matter? Because many people think defunding the Intelligence Community is a solution; it is not…. at least, not yet. Worse yet, the corrupt divisions deep inside the U.S. intelligence system can now fund themselves from multinational private sector partnerships (banks, corporations and foreign entities).
• When Democrats took over the House of Representatives in January 2007, they took office with a plan. Nancy Pelosi became Speaker and Democrats controlled the Senate where Harry Reid was Majority Leader. Barack Obama was a junior senator from Illinois.
Pelosi and Reid intentionally did not advance a budget in 2008 (for fiscal year 2009) because their plan included installing Barack Obama (and all that came with him) with an open checkbook made even more lucrative by a worsening financial crisis and a process called baseline budgeting. Baseline budgeting means the prior fiscal year budget is accepted as the starting point for the next year budget. All previous expenditures are baked into the cake within baseline budgeting.
Massive bailouts preceded Obama’s installation due to U.S. economic collapse, and massive bailouts continued after his installation. This is the ‘never let a crisis go to waste’ aspect. TARP (Troubled Asset Recovery Program), auto-bailouts (GM), and the massive stimulus spending bill, the American Recovery and Reinvestment Act (ARRA, ie. those shovel ready jobs) were all part of the non budget spending. The federal reserve assisted with Quantitative Easing (QE1 and QE2) as congress passed various Porkulous spending bills further spending and replacing the formal budget process.
Note: There has never been a budget passed in the normal/traditional process since September of 2007.
• While Obama’s radical ‘transformation‘ was triggered across a broad range of government institutions, simultaneously spending on the U.S. military was cut but spending on the intelligence apparatus expanded. We were all distracted by Obamacare, and the Republican party wanted to keep us that way. However, in the background there was a process of transformation taking place that included very specific action by Eric Holder and targeted effort toward the newest executive agency the ODNI.
The people behind Obama, those same people now behind Joe Biden, knew from years of strategic planning that ‘radical transformation’ would require control over specific elements inside the U.S. government. Eric Holder played a key role in his position as U.S. Attorney General in the DOJ.
AG Holder recruited ideologically aligned political operatives who were aware of the larger institutional objectives. One of those objectives was weaponizing the DOJ-National Security Division (DOJ-NSD) a division inside the DOJ that had no inspector general oversight. For most people the DOJ-NSD weaponization surfaced with a hindsight awakening of the DOJ-NSD targeting candidate Donald Trump many years later. However, by then the Holder crew had executed almost eight full years of background work.
• The second larger Obama/Holder objective was control over the FBI. Why was that important? Because the FBI does the domestic investigative work on anyone who needs or holds a security clearance. The removal of security clearances could be used as a filter to further build the internal ideological army they were assembling. Additionally, with new power in the ODNI created as a downstream consequence of the Patriot Act, new protocols for U.S. security clearances were easy to justify.
Carefully selecting fellow ideological travelers was facilitated by this filtration within the security clearance process. How does that issue later manifest?… just look around at how politicized every intelligence agency has become, specifically including the FBI.
• At the exact same time this new background security clearance process was ongoing, again everyone distracted by the fight over Obamacare, inside the Department of State (Secretary Hillary Clinton) a political alignment making room for the next phase was being assembled. Names like Samantha Power, Susan Rice and Hillary Clinton were familiar on television while Lisa Monaco worked as a legal liaison between the Obama White House and Clinton State Department.
Through the Dept of State (DoS) the intelligence apparatus began working on their first steps to align Big Tech with a larger domestic institutional objective. Those of you who remember the “Arab Spring”, some say “Islamist Spring”, will remember it was triggered by Barack Obama’s speech in Cairo – his first foreign trip. The State Department worked with grassroots organizers (mostly Muslim Brotherhood) in Egypt, Syria, Bahrain, Qatar and Libya. Obama leaned heavily on the organizational network of Turkish President Recep Erdogan for contacts and support.
Why does this aspect matter to us? Well, you might remember how much effort the Obama administration put into recruiting Facebook and Twitter as resources for the various mid-east rebellions the White House and DoS supported. This was the point of modern merge between the U.S. intelligence community and Big Tech social media.
In many ways the coordinated political outcomes in Libya and Egypt were the beta test for the coordinated domestic political outcomes we saw in the 2020 U.S. presidential election. The U.S. intelligence community working with social media platforms and political operatives.
Overlaying all of that background activity was also a new alignment of the Obama-era intelligence apparatus with ideological federal “contractors“. Where does this contractor activity manifest? In the FISA Court opinion of Rosemary Collyer who cited the “interagency memorandum of understanding”, or MOU.
Hopefully you can see a small part of how tentacled the system to organize/weaponize the intelligence apparatus was. None of this was accidental, all of this was by design and the United States Senate was responsible for intentionally allowing most of this to take place.
That’s the 30,000/ft level backdrop history of what was happening as the modern IC was created. Next we will go into how all these various intelligence networks began working in unison and how they currently control all of the other DC institutions under them; including how they can carve out the President from knowing their activity.
♦ When Barack Obama was installed in January 2009, the Democrats held a 60 seat majority in the U.S. Senate. As the people behind the Obama installation began executing their longer-term plan, the Senate Select Committee on Intelligence was a tool to create the Intelligence Branch; it was not an unintentional series of events.
When Obama was installed, Dianne Feinstein was the Chair of the Senate Select Committee on Intelligence (SSCI), and Democrat operative Dan Jones was her lead staffer. Feinstein was completely controlled by those around her including Senate Majority Leader Harry Reid. The CIA was in the process of turning over personnel following the Bush era, and as a result of a massive multi-year narrative of diminished credibility (Iraq WMD), a deep purge was underway. Obama/Holder were in the process of shifting intelligence alignment and the intensely political Democrat Leader Harry Reid was a key participant.
THE TRAP – Many people say that congress is the solution to eliminating the fourth and superseding branch of government, The Intelligence Branch. This is an exercise in futility because the legislative branch, specifically the SSCI, facilitated the creation of the Intelligence Branch. The SSCI cannot put the genie they created back in the bottle without admitting they too are corrupt; and the background story of their corruption is way too intense to be exposed now.
Every member of the SSCI is compromised in some controlling manner. Those Senators who disliked the control over them; specifically disliked because the risk of sunlight was tenuous and, well, possible; have either left completely or stepped down from the committee. None of the SSCI members past or present would ever contemplate saying openly what their tenure involved.
[Note: You might remember when Vice-chairman Mark Warner’s text messages surfaced there was a controlled Republican SSCI member who came to his defense in February of 2018. It was not accidental that exact senator later became the chair of the SSCI himself. That republican senator is Marco Rubio, now vice-chair since the Senate re-flipped back to the optics of Democrat control in 2021.]
All of President Obama’s 2009 intelligence appointments required confirmation from the Senate. The nominees had to first pass through the Democrat controlled SSCI, and then to a full senate vote where Democrats held a 60 vote majority. Essentially, Obama got everyone he wanted in place easily. Rahm Emmanuel was Obama’s chief of staff and Valerie Jarrett was senior advisor.
Tim Geithner was Treasury Secretary in 2010 when the joint DOJ/FBI and IRS operation to target the Tea Party took place after the mid-term “shellacking” caused by Obamacare backlash. Mitch McConnell was minority leader in the Senate but supported the targeting of the Tea Party as his senate colleagues were getting primaried by an angry and effective grassroots campaign. McConnell’s friend Senator Bob Bennett getting beaten in Utah was the final straw.
Dirty Harry and Mitch McConell saw the TEA Party through the same prism. The TEA Party took Kennedy’s seat in Massachusetts (Scott Brown); Sharon Angle was about to take out Harry Reid in Nevada; Arlen Spector was taken down in Pennsylvania; Senator Robert Byrd died; Senator Lisa Murkowski lost her primary to Joe Miller in Alaska; McConnell’s nominee Mike Castle lost to Christine O’Donnell in Delaware; Rand Paul won in Kentucky. This is the background. The peasants were revolting…. and visibly angry Mitch McConnell desperately made a deal with the devil to protect himself.
In many ways the TEA Party movement was/is very similar to the MAGA movement. The difference in 2010 was the absence of a head of the movement, in 2015 Donald Trump became that head figure who benefited from the TEA Party energy. Trump came into office in 2017 with the same congressional opposition as the successful TEA Party candidates in 2011.
Republicans took control of the Senate following the 2014 mid-terms. Republicans took control of the SSCI in January 2015. Senator Richard Burr became chairman of the SSCI and Dianne Feinstein shifted to Vice-Chair. Dirty Harry Reid left the Senate and Mitch McConnell took power again.
Republicans were in control of the Senate Intelligence Committee in 2015 when the intelligence branch operation against candidate Donald Trump was underway. [Feinstein’s staffer, Dan Jones, left the SSCI so he could act as a liaison and political operative between private-sector efforts (Fusion GPS, Chris Steele) and the SSCI.] The SSCI was a participant in that Fusion-GPS/Chris Steele operation, and as a direct consequence Republicans were inherently tied to the problem with President Trump taking office in January of 2017. Indiana Republican Senator Dan Coats was a member of the SSCI.
Bottom line…. When it came to the intelligence system targeting Donald Trump during the 2015/2016 primary, the GOP was just as much at risk as their Democrat counterparts.
When Trump unexpectedly won the 2016 election, the SSCI was shocked more than most. They knew countermeasures would need to be deployed to protect themselves from any exposure of their intelligence conduct. Dianne Feinstein stepped down, and Senator Mark Warner was elevated to Vice-Chairman.
Indiana’s own Mike Pence, now Vice-President, recommended fellow Hoosier, SSCI Senator Dan Coats, to become President Trump’s Director of National Intelligence (ODNI). [Apply hindsight here]
• To give an idea of the Intelligence Branch power dynamic, remind yourself how House Permanent Select Committee on Intelligence (HPSCI), Chairman Devin Nunes, tried to get access to the DOJ/FBI records of the FISA application used against the Trump campaign via Carter Page. Remember Nunes only saw a portion of the FISA trail from his review of a Presidential Daily Brief (PDB) previously given to President Obama. Chairman Nunes had to review the PDB at the White House SCIF due to compartmented intelligence, another example of the silo benefit.
Remember the massive stonewalling and blocking of the DOJ/FBI toward Nunes? Remember the back and forth battle over declassification surrounding the Nunes memo? Remember, after Nunes went directly to House Speaker Paul Ryan for help (didn’t get any), the DOJ only permitted two members from each party within the HPSCI to review the documents, and only at the DOJ offices of main justice?
Contrast that amount of House Intel Committee railroading and blocking by intelligence operatives in the DOJ, DOJ-NSD and FBI, with the simple request by Senate Intelligence Vice-Chair Mark Warner asking to see the Carter Page FISA application and immediately a copy being delivered to him on March 17th 2017.
Can you see which intelligence committee is aligned with the deepest part of the deep state?
The contrast of ideological alignment between the House, Senate and Intelligence Branch is crystal clear when viewed through the prism of cooperation. You can see which legislative committee holds the power and support of the Intelligence Branch. The senate intel committee facilitates the corrupt existence of the IC Branch, so the IC Branch only cooperates with the senate intel committee. It really is that simple.
• The Intelligence Branch carefully selects its own members by controlling how security clearances are investigated and allowed (FBI). The Intelligence Branch also uses compartmentalization of intelligence as a way to keep each agency, and each downstream branch of government (executive, legislative and judicial), at arms length as a method to stop anyone from seeing the larger picture of their activity. I call this the “silo effect“, and it is done by design.
I have looked at stunned faces when I presented declassified silo product from one agency to the silo customers of another. You would be astonished at what they don’t know because it is not in their ‘silo’.
Through the advise and consent rules, the Intelligence Branch uses the SSCI to keep out people they consider dangerous to their ongoing operations. Any appointee to the intelligence community must first pass through the Senate Select Committee on Intelligence, before they get a full Senate vote. If the SSCI rejects the candidate, they simply refuse to take up the nomination. The president is then blocked from that appointment. This is what happened with President Trump over-and-over again.
• Additionally, the Intelligence Branch protects itself, and its facilitating allies through the formal classification process. The Intelligence Branch gets to decide unilaterally what information will be released and what information will be kept secret. There is no entity outside the Intelligence Branch, and yes that includes the President of the United States, who can supersede the classification authority of the Intelligence Branch. {Go Deep} and {Go Deep} This is something 99.9% of the people on our side get totally and frustratingly wrong.
No-one can declassify, or make public, anything the Intelligence Branch will not agree to. Doubt this?… ask Ric Grenell, John Ratcliffe, or even President Trump himself.
• The classification process is determined inside the Intelligence Branch, all by themselves. They get to choose what rank of classification exists on any work-product they create; and they get to decide what the classification status is of any work-product that is created by anyone else. The Intelligence Branch has full control over what is considered classified information and what is not. The Intelligence Branch defines what is a “national security interest” and what is not. A great technique for hiding fingerprints of corrupt and illegal activity.
[For familiar reference see the redactions to Lisa Page and Peter Strzok text messages. The Intelligence Branch does all redactions.]
• Similarly the declassification process is a request by an agency, even a traditionally superior agency like the President of the United States, to the Intelligence Branch asking for them to release the information. The Intelligence Branch again holds full unilateral control. If the head of the CIA refuses to comply with the declassification instruction of the President, what can the president do except fire him/her? {Again, GO DEEP} How does the President replace the non-compliant cabinet member?… They have to go through the SSCI confirmation… See the problem?
Yes there are ways to break up the Intelligence Branch, but they do not start with any congressional effort. As you can see above, the process is the flaw – not the solution. Most conservative pundits have their emphasis on the wrong syllable. Their cornerstone is false.
For their own self-preservation; the Intelligence Branch has been interfering in our elections for years. The way to tear this apart begins with STATE LEVEL election reform that blocks the legislative branch from coordinating with the intelligence branch.
The extreme federalism approach is critical and also explains why Joe Biden has instructed Attorney General Merrick Garland to use the full power of the DOJ to stop state-level election reform efforts. The worry of successful state-level election control is also why the Intelligence Branch now needs to support the federal takeover of elections.
Our elections have been usurped by the Intelligence Branch. Start with honest elections and we will see just how much Democrat AND Republican corruption is dependent on manipulated election results. Start at the state level. Start there…. everything else is downstream.
♦ People want examples, reference points for work the Intelligence Branch conducts, specifically how it protects itself. Here is an example: Julian Assange.
Yes, the history of the U.S. national security apparatus goes back decades; however, the weaponization of that apparatus, the creation of an apex branch of government, the Intelligence Branch, originated –as we currently feel it– under President Barack Obama.
Obama took the foundational tools created by Bill Clinton and George W Bush and used the intelligence system architecture to create a weapon for use in his fundamental transformation. An alliance of ideologues within government (intel community) and the private sector (big tech and finance) was assembled, and the largest government weapon was created. Think about this every time you take your shoes off at an airport.
After the weapon was assembled and tested (Arab Spring), the legislative branch was enjoined under the auspices of a common enemy, Donald J Trump, an outsider who was a risk to every entity in the institutional construct of Washington DC. Trillions were at stake, and years of affluence and influence were at risk as the unholy alliance was put together.
To understand the risk that Julian Assange represented to U.S. Intelligence Branch interests, it is important to understand just how extensive the operations of the FBI/CIA were in 2016.
It is within the network of foreign and domestic intel operations where Intelligence Branch political tool, FBI Agent Peter Strzok, was working as a bridge between the CIA and FBI counterintelligence operations.
By now, people are familiar with the construct of CIA operations involving Joseph Mifsud, the Maltese professor generally identified as a western intelligence operative who was tasked by the FBI/CIA to run an operation against Trump campaign official George Papadopoulos in both Italy (Rome) and London. {Go Deep}
In a similar fashion the FBI tasked U.S. intelligence asset Stefan Halper to target another Trump campaign official, Carter Page. Under the auspices of being a Cambridge Professor Stefan Halper also targeted General Michael Flynn. Additionally, using assistance from a female FBI agent under the false name Azra Turk, Halper also targeted Papadopoulos.
The initial operations to target Flynn, Papadopoulos and Page were all based overseas. This seemingly makes the CIA exploitation of the assets and the targets much easier.
HPSCI Ranking Member Devin Nunes outlined how very specific exculpatory evidence was known to the FBI and yet withheld from the FISA application used against Carter Page that also mentions George Papadopoulos. The FBI also fabricated information in the FISA.
However, there is an aspect to the domestic U.S. operation that also bears the fingerprints of the international intelligence apparatus; only this time due to the restrictive laws on targets inside the U.S. the CIA aspect is less prominent. This is where FBI Agent Peter Strzok working for both agencies was important.
Remember, it’s clear in the text messages Strzok had a working relationship with what he called their “sister agency”, the CIA. Additionally, former CIA Director John Brennan has admitted Strzok helped write the January 2017 Intelligence Community Assessment (ICA) which outlines the Russia narrative; and Peter Strzok wrote the July 31st, 2016, “Electronic Communication” that originated FBI operation “Crossfire Hurricane.” Strzok immediately used that EC to travel to London to debrief allied intelligence officials connected to the Australian Ambassador to the U.K, Alexander Downer.
In short, Peter Strzok acted as a bridge between the CIA and the FBI. The perfect type of FBI career agent for the Intelligence Branch and CIA Director John Brennan to utilize.
Fusion-GPS founder Glenn Simpson hired CIA Open Source analyst Nellie Ohr toward the end of 2015; at appropriately the same time as “FBI Contractors” were identified exploiting the NSA database and extracting information on a specific set of U.S. persons, the 2015 GOP candidates for President.
It was also Fusion-GPS founder Glenn Simpson who was domestically tasked with a Russian lobbyist named Natalia Veselnitskaya. A little reported Russian Deputy Attorney General named Saak Albertovich Karapetyan was working double-agents for the CIA and Kremlin. Karapetyan was directing the foreign operations of Natalia Veselnitskaya, and Glenn Simpson was organizing her inside the U.S.
Glenn Simpson managed Veselnitskaya through the 2016 Trump Tower meeting with Donald Trump Jr. However, once the CIA/Fusion-GPS operation using Veselnitskaya started to unravel with public reporting… back in Russia Deputy AG Karapetyan died in a helicopter crash.
Simultaneously timed in late 2015 through mid 2016, there was a domestic FBI operation using a young Russian named Maria Butina tasked to run up against republican presidential candidates. According to Patrick Byrne, Butina’s private sector handler [NOTE: remember, the public-private sector partnership], it was FBI agent Peter Strzok who was giving Patrick Byrne the instructions on where to send Butina. {Go Deep}
All of this context outlines the extent to which the FBI/CIA was openly involved in constructing a political operation that eventually settled upon anyone in candidate Donald Trump’s orbit. The international operations of the Intelligence Branch were directed by the FBI/CIA; and the domestic operations were coordinated by Peter Strzok operating with a foot in both agencies. [Strzok gets CIA service coin]
Recap: ♦Mifsud tasked against Papadopoulos (CIA). ♦Halper tasked against Flynn (CIA), Page (CIA), and Papadopoulos (CIA). ♦Azra Turk, pretending to be Halper asst, tasked against Papadopoulos (FBI). ♦Veselnitskaya tasked against Donald Trump Jr (CIA, Fusion-GPS). ♦Butina tasked against Donald Trump Jr (FBI). All of these activities were coordinated.
Additionally, Christopher Steele was a British intelligence officer, hired by Fusion-GPS to assemble and launder fraudulent intelligence information within his dossier. And we cannot forget Oleg Deripaska, a Russian oligarch, who was recruited by Asst. FBI Director Andrew McCabe to participate in running an operation against the Trump campaign and create the impression of Russian involvement. However, Deripaska refused to participate.
All of this foreign and domestic engagement was directly controlled by collaborating U.S. intelligence agencies from inside the Intelligence Branch. And all of this coordinated activity was intended to give a specific Russia influence/interference impression.
♦ The key point of all that background context is to see how committed the Intelligence Branch was to the constructed narrative of Russia interfering with the 2016 election. The CIA, FBI, and by extension the DOJ and DOJ-NSD, put a hell of a lot of work into it.
We also know that John Durham looked at the construct of the Intelligence Community Assessment (ICA); and talked to CIA analysts who participated in the construct of the January 2017 report that bolstered the false appearance of Russian interference in the 2016 election. This is important because it ties in to the next part that involves Julian Assange and Wikileaks.
On April 11th, 2019, the Julian Assange indictment was unsealed in the EDVA. From the indictment we discover it was under seal since March 6th, 2018:
The FBI investigation took place prior to December 2017, it was coordinated through the Eastern District of Virginia (EDVA) where Dana Boente was U.S. Attorney at the time. The grand jury indictment was sealed from March of 2018 until after Mueller completed his investigation, April 2019.
Why the delay?
What was the DOJ waiting for?
Here’s where it gets interesting….
The FBI submission to the Grand Jury in December of 2017 was four months after congressman Dana Rohrabacher talked to Julian Assange in August of 2017: “Assange told a U.S. congressman … he can prove the leaked Democratic Party documents … did not come from Russia.”
(August 2017, The Hill Via John Solomon) Julian Assange told a U.S. congressman on Tuesday he can prove the leaked Democratic Party documents he published during last year’s election did not come from Russia and promised additional helpful information about the leaks in the near future.
Rep. Dana Rohrabacher, a California Republican who is friendly to Russia and chairs an important House subcommittee on Eurasia policy, became the first American congressman to meet with Assange during a three-hour private gathering at the Ecuadorian Embassy in London, where the WikiLeaks founder has been holed up for years.
Rohrabacher recounted his conversation with Assange to The Hill.
“Our three-hour meeting covered a wide array of issues, including the WikiLeaks exposure of the DNC [Democratic National Committee] emails during last year’s presidential election,” Rohrabacher said, “Julian emphatically stated that the Russians were not involved in the hacking or disclosure of those emails.”
Pressed for more detail on the source of the documents, Rohrabacher said he had information to share privately with President Trump. (read more)
Knowing how much effort the Intelligence Branch put into the false Russia collusion-conspiracy narrative, it would make sense for the FBI to take keen interest after this August 2017 meeting between Rohrabacher and Assange, monitor all activity, and why the FBI would quickly gather specific evidence (related to Wikileaks and Bradley Manning) for a grand jury by December 2017.
Within three months of the EDVA grand jury the DOJ generated an indictment and sealed it in March 2018.
The DOJ sat on the indictment while the Mueller/Weissmann probe was ongoing.
As soon as the Mueller/Weissmann probe ended, on April 11th, 2019, a planned and coordinated effort between the U.K. and U.S. was executed; Julian Assange was forcibly arrested and removed from the Ecuadorian embassy in London, and the EDVA indictment was unsealed (link).
As a person who has researched this fiasco; including the ridiculously false 2016 Russian hacking/interference narrative: “17 intelligence agencies”, Joint Analysis Report (JAR) needed for Obama’s anti-Russia narrative in December ’16; and then a month later the ridiculously political Intelligence Community Assessment (ICA) in January ’17; this timing against Assange is too coincidental.
It doesn’t take a deep researcher to see the aligned Deep State motive to control Julian Assange. The Weissmann/Mueller report was dependent on Russia cybercrimes for justification, and that narrative was contingent on the Russia DNC hack story which Julian Assange disputes.
♦ This is critical. The Weissmann/Mueller report contains claims that Russia hacked the DNC servers as the central element to the Russia interference narrative in the U.S. election. This claim is directly disputed by WikiLeaks and Julian Assange, as outlined during the Dana Rohrabacher interview, and by Julian Assange on-the-record statements.
The predicate for Robert Mueller’s investigation was specifically due to Russian interference in the 2016 election.
The fulcrum for this Russia interference claim is the intelligence community assessment; and the only factual evidence claimed within the ICA is that Russia hacked the DNC servers; a claim only made possible by relying on forensic computer analysis from Crowdstrike, a DNC and FBI contractor.
The CIA holds a self-interest in upholding the Russian hacking claim; the FBI holds an interest in maintaining that claim; the U.S. media hold an interest in maintaining that claim. All of the foreign countries whose intelligence apparatus participated with Brennan and Strzok also have a self-interest in maintaining that Russia hacking and interference narrative.
Julian Assange is the only person with direct knowledge of how Wikileaks gained custody of the DNC emails; and Assange has claimed he has evidence it was not from a hack.
This “Russian hacking” claim was ultimately important to the CIA, FBI, DOJ, ODNI and U.K intelligence apparatus, it forms the corner of their justification. With that level of importance, well, right there is the obvious motive to shut Julian Assange down as soon as intelligence officials knew the Weissmann/Mueller report was going to be public.
…. and that’s exactly what they did. They threw a bag over Assange.
♦ COLLAPSED OVERSIGHT – The modern system to ‘check’ the executive branch was the creation of the legislative “Gang of Eight,” a legislative oversight mechanism intended to provide a bridge of oversight between the authority of the intelligence community within the executive branch.
The Go8 construct was designed to allow the President authority to carry out intelligence operations and provide the most sensitive notifications to a select group within Congress.
The Go8 oversight is directed to the position, not the person, and consists of: (1) The Speaker of the House; (2) The Minority Leader of the House; (3) The Chair of the House Permanent Select Committee on Intelligence, HPSCI; (4) The Ranking Member (minority) of the HPSCI; (5) The Leader of the Senate; (6) The Minority Leader of the Senate; (7) The Chair of the Senate Select Committee on Intelligence, SSCI; and finally (8) the Vice-Chair of the SSCI.
Example: When the Chief Executive (the President) initiates an intelligence operation on behalf of the United States, the President triggers a “finding memo.” In essence the instruction to the intel agency or agencies to authorize a covert operation. When that process takes place, the Go8 are the first people notified. Depending on the sensitivity of the operation, sometimes the G08 are notified immediately after the operation is conducted. The notification can be a phone call or an in-person briefing.
Because of the sensitivity of their intelligence information, the Gang of Eight hold security clearances that permit them to receive and review all intelligence operations. The intelligence community are also responsible for briefing the Go8 with the same information they use to brief the President.
~ 2021 Gang of Eight ~
The Go8 design is intended to put intelligence oversight upon both political parties in Congress; it is designed that way by informing the minority leaders of both the House and Senate as well as the ranking minority members of the SSCI and HPSCI. Under the concept, the President cannot conduct an intelligence operation; and the intelligence community cannot carry out intelligence gathering operations without the majority and minority parties knowing about it.
The modern design of this oversight system was done to keep rogue and/or corrupt intelligence operations from happening. However, as we shared in the preview to this entire discussion, the process was usurped during the Obama era. {GO DEEP}
Former FBI Director James Comey openly admitted to Congress on March 20, 2017, that the FBI, FBI Counterintelligence Division, DOJ and DOJ-National Security Division, together with the Office of the Director of National Intelligence (ODNI) and the CIA, had been conducting independent investigations of Donald Trump for over a year without informing the Go8. Comey justified the lack of informing Go8 oversight by saying “because of the sensitivity of the matter.”
Stupidly, Congress never pressed James Comey on that issue. The arrogance was astounding, and the acceptance by Congress was infuriating. However, that specific example highlighted just how politically corrupt the system had become. In essence, Team Obama usurped the entire design of congressional oversight…. and Congress just brushed it off.
Keep in mind, Comey did not say the White House was unaware; in fact he said exactly the opposite, he said “the White House was informed through the National Security Council,” (the NSC). The implication, the very direct and specific implication; the unavoidable implication and James Comey admission that everyone just brushed aside; was that President Obama’s National Security Advisor, Susan Rice, was totally informed of the intelligence operation(s) against Donald Trump. After all, the NSC reports to the National Security Advisor.
Does the January 20, 2017, Susan Rice memo look different now?
Again, no-one saw the immediate issue. What Comey just described on that March day in 2017 was the total usurpation of the entire reason the Gang of Eight exists; to eliminate the potential for political weaponization of the Intelligence Community by the executive branch. The G08 notifications to the majority and minority are specifically designed to make sure what James Comey admitted to doing was never supposed to happen.
Team Obama carried out a political operation using the intelligence community and the checks-and-balances in the system were intentionally usurped. This is an indisputable fact.
Worse still, the entire legislative branch of Congress, which specifically includes the Republicans that now controlled the House and Senate, did nothing. They just ignored what was admitted. The usurpation was willfully ignored….. The mechanism of the G08 was bypassed without a twitch of condemnation or investigation…. because the common enemy was Donald Trump.
This example highlights the collapse of the system. Obama, the executive branch, collapsed the system by usurping the process; in essence the process became the bigger issue and the lack of immediate legislative branch reaction became evidence of open acceptance. The outcomes of the usurpation played out over the next four years, Donald J Trump was kneecapped and lost his presidency because of it. However, the bigger issue of the collapse still exists.
The downstream consequence of the legislative branch accepting the executive branch usurpation meant both intelligence committees were compromised. Additionally, the leadership of both the House and Senate were complicit. Think about this carefully. The legislative branch allowance of the intelligence usurpation meant the legislative branch was now subservient to the Intelligence Branch.
That’s where we are.
Right now.
That’s where we are.
Term-3 Obama is now back in the White House with Joe Biden.
Term-1 and Term-2 Obama usurped the ‘check and balance‘ within the system and weaponized the intelligence apparatus. During Trump’s term that weaponization was covered up by a compliant congress, and not a single member of the oversight called it out. Now, Term-3 Obama steps back-in to continue the cover-up and continue the weaponization.
Hopefully, you can now see the scale of the problem that surrounds us with specific citation for what has taken place. What I just explained to you above is not conspiracy theory, it is admitted fact that anyone can look upon. Yet….
Have you seen this mentioned anywhere? Have you seen this called out by anyone in Congress? Have you seen anyone in media (ally or adversary) call this out? Have you seen any member of the judicial branch stand up and say wait, what is taking place is not okay? Have you seen a single candidate for elected office point this out? Have you seen anyone advising a candidate point this out?
This is our current status. It is not deniable. The truth exists regardless of our comfort.
Not a single person in power will say openly what has taken place. They are scared of the Fourth Branch. The evidence of what has taken place is right there in front of our face. The words, actions and activities of those who participated in this process are not deniable.
There are only two members of the Gang of Eight who have existed in place from January 2007 (the real beginning of Obama’s term, two years before he took office when the Congress flipped). Only two members of the G08 have been consistently in place from January of 2007 to right now, today. All the others came and went but two members of the Gang of Eight have been part of that failed and collapsed oversight throughout the past 15 years, Nancy Pelosi and Mitch McConnell.
♦ TECHNOLOGY – On a global scale – the modern intelligence gathering networks are now dependent on data collection to execute their intelligence missions. In the digital age nations have been executing various methods to gather that data. Digital surveillance has replaced other methods of interception. Those surveillance efforts have resulted in a coalescing of regional data networks based on historic multi-national relationships.
We have a recent frame of reference for the “U.S. data collection network” within the NSA. Through the allied process the Five Eyes nations all rely on the NSA surveillance database (U.K, Australia, Canada, New Zealand and U.S.) The NSA database provides the digital baseline for intelligence operations in defense of our allies. The portals into the NSA database are essentially an assembly of allies in like-minded ideological connection to the United States.
Unfortunately, there have been some revelations about the NSA database being used to monitor our allies, like in the example of Germany and surveillance on Angela Merkel’s phone. As long as “the good guys” are operating honorably, allies of the United States can feel confident about having protection from the NSA surveillance of global digital data. We warn our friends if we detect something dangerous etc.
The U.S. has nodes on communication pipelines to intercept and extract data. We have also launched hundreds, perhaps thousands, of satellites to conduct surveillance and gather up data. All of this data is fed into the NSA database where it is monitored (presumably) as a national security mechanism, and in defense of our allies.
However, what about data collection or data networks that are outside the NSA database? What do our enemies do? The NSA database is just one intelligence operation of digital surveillance amid the entire world, and we do not allow access by adversaries we are monitoring. So what do they do? What do our allies do who might not trust the United States due to past inconsistencies, ie. the Middle-East?
The answers to those questions highlight other data collection networks. So a brief review of the major players is needed.
♦ CHINA – China operates their own database. They, like the NSA, scoop up data for their system. Like us, China launches satellites and deploys other electronic data collection methods to download into their database. This is why the issues of electronic devices manufactured in China becomes problematic. Part of the Chinese data collection system involves the use of spyware, hacking and extraction.
Issues with Chinese communication company Huawei take on an added dimension when you consider the goal of the Chinese government to conduct surveillance and assemble a network of data to compete with the United States via the NSA. Other Chinese methods of surveillance and data-collection are less subversive, as in the examples of TicTok and WeChat. These are Chinese social media companies that are scraping data just like the NSA scrapes data from Facebook, Twitter and other Silicon Valley tech companies. [ Remember, the Intelligence Branch is a public-private partnership. ]
♦ RUSSIA – It is very likely that Russia operates their own database. We know Russia launches satellites, just like China and the USA, for the same purposes. Russia is also very proficient at hacking into other databases and extracting information to store and utilize in their own network. The difference between the U.S., China and Russia is likely that Russia spends more time on the hacking aspect because they do not generate actual technology systems as rapidly as the U.S. and China.
The most recent database creation is an outcome of an ally having to take action because they cannot rely on the ideology of the United States remaining consistent as the administrations ping-pong based on ideology….
♦ SAUDI ARABIA – Yes, in 2016 we discovered that Saudi Arabia was now operating their own intelligence data-gathering operation. It would make sense, given the nature of the middle-east and the constant fluctuations in political support from the United States. It is a lesson the allied Arab community and Gulf Cooperation Council learned quickly when President Obama went to Cairo in 2009 and launched the Islamist Spring (Arab Spring) upon them.
I have no doubt the creation of the Saudi intelligence network was specifically because the Obama administration started supporting radical Islamists within the Muslim Brotherhood, and threw fuel on the fires of extremism all over the Arab world.
Think about it., What would you do if you were Saudi Arabia, Egypt, Bahrain, Kuwait, the UAE, Jordan, Oman or Yemen and you knew the United States could just trigger an internal uprising of al-Qaeda, ISIS and the political arm of the Muslim Brotherhood to seek your destruction?
Without a doubt, those urgent lessons from 2009, 2010, 2011 triggered the formation of the Arab Intelligence Network as a network to defend itself with consistency. They assembled the network and activated it in 2017 as pictured above.
♦ Israel – Along a similar outlook to the Arab network, no doubt Israel operates an independent data collection system as a method of protecting itself from ever-changing U.S. politics amid a region that is extremely hostile to its very existence. Like the others, Israel launches proprietary satellites, and we can be sure they use covert methods to gather electronic data just like the U.S. and China.
As we have recently seen in the Pegasus story, Israel creates spyware programs that are able to track and monitor cell phone communications of targets. The spyware would not work unless Israel had access to some network where the phone meta-data was actually stored. So yeah, it makes sense for Israel to operate an independent intelligence database.
♦ Summary: As we understand the United States Intelligence Branch of government as the superseding entity that controls the internal politics of our nation, we also must consider that multiple nations have the same issue. There are major intelligence networks around the world beside the NSA “Five-Eyes” database. China, Russia, Saudi Arabia and Israel all operate proprietary databases deploying the same tools and techniques for assembly.
The geopolitical conflict that has always existed has now shifted into a digital battle-space. The Intelligence Agencies from these regions are now operating as the backbone of the government that uses them, and has become dependent on them. [<- Reread that].
Once you accept the digital-era intelligence apparatus of China, Russia, Saudi-Arabia, The United States and Israel, are now the primary national security mechanisms for stabilization of government; then you accept the importance of those intelligence operations.
Once you understand how foundational those modern intelligence operations have become for the stability and continuity of those governments…… then you begin to understand just how the United States intelligence community became more important than the government that created it.
♦ Public Private Partnership – The modern Fourth Branch of government is only possible because of a Public-Private partnership with the intelligence apparatus. You do not have to take my word for it, the partnership is so brazen they have made public admissions.
The biggest names in Big Tech announced in June their partnership with the Five Eyes intelligence network, ultimately controlled by the NSA, to: (1) monitor all activity in their platforms; (2) identify extremist content; (3) look for expressions of Domestic Violent Extremism (DVE); and then, (4) put the content details into a database where the Five Eyes intelligence agencies (U.K., U.S., Australia, Canada, New Zealand) can access it.
Facebook, Twitter, Google and Microsoft are all partnering with the intelligence apparatus. It might be difficult to fathom how openly they admit this, but they do. Look at this sentence in the press release (emphasis mine):
[…] “The Group will use lists from intelligence-sharing group Five Eyes adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.”
Think about that sentence structure very carefully. They are “adding to” the pre-existing list…. admitting the group (aka Big Tech) already have access to the the intelligence-sharing database… and also admitting there is a pre-existing list created by the Five Eyes consortium.
Obviously, who and what is defined as “extremist content” will be determined by the Big Tech insiders themselves. This provides a gateway, another plausible deniability aspect, to cover the Intelligence Branch from any oversight.
When the Intelligence Branch within government wants to conduct surveillance and monitor American citizens, they run up against problems due to the Constitution of the United States. They get around those legal limitations by sub-contracting the intelligence gathering, the actual data-mining, and allowing outside parties (contractors) to have access to the central database.
The government cannot conduct electronic searches (4th amendment issue) without a warrant; however, private individuals can search and report back as long as they have access. What is being admitted is exactly that pre-existing partnership. The difference is that Big Tech will flag the content from within their platforms, and now a secondary database filled with the extracted information will be provided openly for the Intelligence Branch to exploit.
The volume of metadata captured by the NSA has always been a problem because of the filters needed to make the targeting useful. There is a lot of noise in collecting all data that makes the parts you really want to identify more difficult to capture. This new admission puts a new massive filtration system in the metadata that circumvents any privacy protections for individuals.
Previously, the Intelligence Branch worked around the constitutional and unlawful search issue by using resources that were not in the United States. A domestic U.S. agency, working on behalf of the U.S. government, cannot listen on your calls without a warrant. However, if the U.S. agency sub-contracts to say a Canadian group, or foreign ally, the privacy invasion is no longer legally restricted by U.S. law.
What was announced in June 2021 is an alarming admission of a prior relationship along with open intent to define their domestic political opposition as extremists.
July 26 (Reuters) – A counterterrorism organization formed by some of the biggest U.S. tech companies including Facebook (FB.O) and Microsoft (MSFT.O) is significantly expanding the types of extremist content shared between firms in a key database, aiming to crack down on material from white supremacists and far-right militias, the group told Reuters.
Until now, the Global Internet Forum to Counter Terrorism’s (GIFCT) database has focused on videos and images from terrorist groups on a United Nations list and so has largely consisted of content from Islamist extremist organizations such as Islamic State, al Qaeda and the Taliban.
Over the next few months, the group will add attacker manifestos – often shared by sympathizers after white supremacist violence – and other publications and links flagged by U.N. initiative Tech Against Terrorism. It will use lists from intelligence-sharing group Five Eyes, adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.
The firms, which include Twitter (TWTR.N) and Alphabet Inc’s (GOOGL.O) YouTube, share “hashes,” unique numerical representations of original pieces of content that have been removed from their services. Other platforms use these to identify the same content on their own sites in order to review or remove it. (read more)
The influence of the Intelligence Branch now reaches into our lives, our personal lives. In the decades before 9/11/01 the intelligence apparatus intersected with government, influenced government, and undoubtedly controlled many institutions with it. The legislative oversight function was weak and growing weaker, but it still existed and could have been used to keep the IC in check. However, after the events of 9/11/01 and the short-sighted legislative reactions opened the door to allow the surveillance state to weaponized.
After the patriot act was triggered, not coincidentally only six weeks after 9/11, a slow and dangerous fuse was lit that ends with the intelligence apparatus being granted a massive amount of power. The problem with assembled power is always what happens when a Machiavellian network takes control over that power and begins the process to weaponize the tools for their own malicious benefit. That is exactly what the installation of Barack Obama was all about.
The Obama network took pre-assembled intelligence weapons we should never have allowed to be created, and turned those weapons into tools for his radical and fundamental change. The target was the essential fabric of our nation. Ultimately this corrupt political process gave power to create the Fourth Branch of Government, the Intelligence Branch. From that perspective the fundamental change was successful.
♦ WHAT NOW? There is a way to stop the Intelligence Branch, but it requires some outside-the-box thinking and reliance on the Constitution as a tool to radically change one element within government. In the interim, we must remain focused on the three tiers that we need for success.
• Tier One is “tactical civics” at a local level. Engaged and active citizen participation at the community, city, town and hamlet level of society. This is what might be described as grassroots level. School Board level; City Council level; County Commissioner level.
• Tier Two is “extreme federalism” at a state level. Engaged and active citizen participation through your State House and State Senate representative. This is state level assembly and action demands upon the House, Senate and State Governor.
• Tier Three the challenge of “federal offices” on a national level. This is where CTH will present a singular action that can be taken upstream that allows the first two tiers to retake control over federal offices. This is where we throw the One Ring into the fire of Mordor.
I am confident that ultimately We The People will win. Details on the “One Ring” solution will come soon; in the interim, tactical civics and extreme federalism are doable right now, in this next 2022 election cycle.
A trillion here A trillion there, and you’re talking about real money
The bottom line here is Congress is clearing the decks in order to shove through a 2,700-page infrastructure bill that’s filled from stem to stern with amendments that have little to do with infrastructure and a lot to do with pork and tyranny.
Congress continues to spend like drunken sailors. If they’re successful in launching their $1 trillion bill, it will be followed by more bills and more trillions of dollars wasted. Only a small percentage be spent on “infrastructure.”
A trillion here and a trillion there and pretty soon it adds up to real money. Let’s hope their infrastructure bill sinks upon launch. Otherwise, the ship of our Republic will sink.
We’re sunk as a nation if we allow Biden to continue at the helm.
COMMENT: So far you gave the impression, that our friends BG / KS would not win 👻 Lately you seem not to be so sure ?? Just on principle , I reject the shot
RM
REPLY: No they lose. Governments have grabbed this opportunity because the system is failing even if they were not around. Politicians are hoping to retain power by restoring to this COVID scam. It is a virus that they created, but once created it will mutate in ways even they do not know.
Just as they tried to assassinate Hitler, I would expect assassination attempts on Gates, Soros, and Schwab. They have destroyed a lot of lives and caused many suicides. There are people who will eventually respond in a violent way – that is what history warns. People who try to alter the way everyone else lives to reshape it the way they think they should live are called tyrants. History is very clear what happens to tyrants.
I have created this site to help people have fun in the kitchen. I write about enjoying life both in and out of my kitchen. Life is short! Make the most of it and enjoy!
This is a library of News Events not reported by the Main Stream Media documenting & connecting the dots on How the Obama Marxist Liberal agenda is destroying America