CNN Iowa Poll: Creepy 24%, Crazy 16%, Dopey 14%, Spank Me 7%, and How 15%…


Making the assumption that Iowa voters are the most engaged current Democrats; and considering that all candidates have spent the most time there so far; it’s worth taking a look at how Iowa Democrat voters are aligning with their field of candidates.

According to the latest CNN Poll of likely Iowa voters, Creepy Joe leads the way with 34%; followed by Crazy Bernie at 16%; Indian Liz sneaking up with 15%; Dopey Buttigieg jumping to the four position with 14%; and media darling Spank-Me Harris at 7%.

(Full Poll pdf Here)

All other candidates, including Booker and Beto, are not attracting much Iowa support beyond their campaign team paychecks.  Down twinkles…

WASHINGTON (CNN) – Joe Biden leads as the top choice of likely participants in the first-in-the-nation Iowa Democratic caucuses, but his advantage there is smaller than the one he has held in recent national polling, even as just five candidates out of a field of 23 crack 5% support.

A new CNN/Des Moines Register/Mediacom poll conducted by Selzer and Co., finds Biden leads among both those who plan to participate in the caucuses the traditional, in-person way, or via a new process for caucusing virtually.

Overall, 24% say they favor the former vice president, with 16% backing Vermont Sen. Bernie Sanders, 15% Massachusetts Sen. Elizabeth Warren, and 14% South Bend, Indiana, Mayor Pete Buttigieg. California Sen. Kamala Harris rounds out the five over 5% with 7% support.

Biden has regularly been above 30% in national polling since announcing his candidacy in April, with his nearest competitor trailing by double-digits. But there hasn’t been high-quality polling in Iowa since his entry to the race. (read more)

Obviously it’s still early, but barring an unforeseen late entry, it looks like the Iowa final tier is going to be Biden, Sanders, Warren, Buttigieg, and Harris.

Statistically, barring some unpredictable event, however the polling data aligns July 1st, 2019 through August 1st, 2019, will be the exact same line-up outcome when the first 2020 primary is held seven months later. It won’t change much (if at all) between August 1st 2019, and the 2020 Iowa caucus.

The DNC has a LOW-ENERGY problem, and a lack of authenticity problem, and they know it. Yes, it’s still a hot mess….

.

Knowing it’s likely the ♦UniParty DNC is following a similar ♦UniParty RNC strategy, we can combine the personal characteristics and political traits together and contrast them against the similarly sized GOP field in 2016. Here’s the way it looks:

  • ♦Governor Jeb Bush was to 2016 as…. Vice-President Joe Biden is to 2020
  • Senator Ted Cruz was to 2016…. as Senator Elizabeth Warren is to 2020
  • Governor John Kasich was to 2016… as Senator Bernie Sanders is to 2020
  • Senator Marco Rubio was to 2016… as Mayor Pete Buttigieg is to 2020
  • Dr. Ben Carson was to 2016… as Robert Francis “Beto” O’Rourke is to 2020
  • Governor Rick Perry was to 2016…. as Senator Kamala Harris is to 2020
  • Senator Lindsey Graham was to 2016 as… Senator Kirsten Gillibrand is to 2020
  • Governor Mike Huckabee was to 2016… as Senator Corey Booker is to 2020
  • Senator Rand Paul was to 2016…. as Congresswoman Tulsi Gabbard is to 2020
  • Governor Chris Christie was to 2016 as… Governor J. Hickenlooper is to 2020
  • Governor Scott Walker was to 2016 as… Governor Jay Inslee is to 2020
  • Senator Rick Santorum was to 2016…. as Senator Andrew Yang is to 2020
  • Governor George Pataki was to 2016 as…. John Delaney is to 2020
  • Governor Bobby Jindal was to 2016…. as Julian Castro is to 2020
  • Carly Fiorina was to 2016 as…. Senator Amy Klobuchar is to 2020
  • Governor Jim Gilmore was to 2016 as… Rep. Tim Ryan is to 2020
  • Gas Station Sushi was to 2016 as… Eric Swalwell is to 2020
  • Eating Steak with a Spork was to 2016 as… Michael Bennet is to 2020
  • Drinking a bucket of sweat was to 2016 as… Steve Bullock is to 2020
  • Inhaling a fly was to 2016 as…. Marianne Williamson is to 2020
  • Free Chinese WiFi was to 2016…. as Wayne Messam is to 2020

Resistance is futile…

Advertisements

What Comes After Trump is What We Need to be Concerned About


QUESTION: You said you are worried about what comes after Trump you mean after the next four years right? There is no way Trump can lose this election right?

Thank You

S

ANSWER: My concern is not a specific time, but who could possibly replace him as a person. There is nobody I know of who would step up against the bureaucracy. This means that the stronger likelihood would be a career politician. I fear that the public discontent will not accept that, and then we have this intense battle going on between left and right.

Even a Trump victory in 2020 will still result in civil unrest or if he were to lose (which the system does not favor just yet) we will see the same result. It just appears that in 2020 into 2022, no one will accept whoever wins.

FBI reveals Uranium One investigation informant


Fox Business

Published on Nov 16, 2017
Fox News national security strategist Sebastian Gorka on the FBI informant regarding Uranium One deal

 

Guilty Until Proven Innocent: Mueller Upends Rule of Law, In Final Appearance—Sidney Powell


When special counsel Robert Mueller formally closed the Russia investigation on May 29th, he opened the door to wide-ranging speculation as to the intent behind his statement. In the eyes of Former Texas Prosecutor Sidney Powell, Mueller’s words stood the rule of law and the presumption of innocence on their heads. This is American Thought Leaders, and I’m Jan Jekielek. Today we sit down with Sidney Powell, who is the author of LICENSED TO LIE: Exposing Corruption in the Department of Justice. She was lead counsel in more than 500 appeals in the Fifth Circuit, and she’s is ranked by her Texas peers as a “Super Lawyer.” We discuss the implications of Special Counsel Mueller’s May 29 press conference, the recent DOJ decision to not prosecute a serial leaker, corruption in the DOJ in general, and what can be done to correct it. More related ATL Videos: Declassification May Help Reveal Deep Obama-Era Corruption—Tom Fitton, Judicial Watch: https://youtu.be/USpa_aAP6sU Carter Page: Spygate, FISA Warrants, Mueller Investigation, “Trump Movement,” & Declassification: https://youtu.be/rWmHH544RTw Lara Trump On Being a Trump in the Era of Fake News, Women’s Vote, Socialism, Border & 2020 Strategy: https://youtu.be/hYsyxwrUl6E Victor Davis Hanson: Mueller Probe Could Backfire on Those Who Fabricated Russia-Collusion Narrative: https://youtu.be/gn9q7JEscqY Michael Anton: FISA Spying, Mueller Report and Barr Hearing Vindicate “Flight 93 Election” Essay: https://youtu.be/SAHy51O0dVg Larry Elder Talks Mueller Report, Jussie Smollett & Most Credible 2020 Democratic Candidate: https://youtu.be/CRNlhtX-V7g Russia Collusion Peddlers Will Turn on Each Other—Trump 2020 Adviser Steven Rogers: https://youtu.be/QyHzXWI6plM Tom Fitton: Spygate “The Worst Corruption Scandal in American History”: https://youtu.be/Z4IDSTrSvXE Rep. Louie Gohmert: Why We Need to Investigate the FISA Process: https://youtu.be/V5LqhIun-s8 Jasper Fakkert: Conclusion of Mueller Russia Collusion Probe Confirms Epoch Times’ Reporting: https://youtu.be/vL2Kj-Qk3hE Jason Meister: Trump Campaign Adviser Calls for Investigation Into Origins of Russia Collusion Narrative: https://youtu.be/sR41OmbwL4I

 

The “Secret Research Project” – an IRS List, an NSA Database, and Resulting “Files” on Americans…


A carefully redacted footnote within a report by FISA Court Presiding Judge Rosemary Collyer has always appeared to be a clue to a domestic surveillance program.  Now details behind the redactions tell a concerning story.

A brief refresher is needed for those new to the story. In April 2017 Judge Collyer wrote a highly critical FISA Court opinion following discoveries by Director Admiral Rogers of government contractors accessing the NSA database, and extracting illegal search results from the electronic records of every American.

The scale of abuse was incredible [SEE HERE] and the surveillance issues had been covered up for years.  Collyer cited the Obama administration as having “an institutional lack of candor” in their responses to her and the FISA court.  The judge focused her criticism after a review of the period 2012 through April 2016.

Using the non-compliant admissions by NSA Director Mike Rogers and the results of the compliance audit, Judge Collyer used the period of November 2015 through April 2016 to gauge the scale of abuse at 85 percent. Eighty-five percent of all database search queries were unlawful, and she extended her analysis to say:

“while the government reports it is unable to provide a reliable estimate of [these non lawful searches] since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 period coincided with an unusually high error rate”.

Also this very important:

“many of these non-compliant queries involved the use of the same identifiers over different date ranges.”

Eight-five percent of all use/extraction of the NSA database was unlawful; and they were searching many of the same Americans (“identifier”), repeatedly, over different dates. This means specific Americans were being targeted, tracked and monitored… unlawfully.

Within the 99-page opinion from Judge Rosemary Collyer  she noted none of this FISA-702 database abuse was accidental. In a key footnote on page 87: Collyer outlined the years of unlawful violations was the result of “deliberate decisionmaking“:

This specific footnote, is key to peeling back the onion.

Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”.  This sentence exposes an internal decision; withheld from congress and the FISA court by the Obama administration; and outlines a process for access and distribution of surveillance data. Note: “no notice of this practice was given to the FISC until 2016“.

We feel confident we’ve now found the source of the “memorandum of understanding” that lies at the heart of the issue [Raw Doc Guidelines].

In March 2012 the Obama administration through Attorney General Eric Holder made changes to the exploitation of intelligence databases as noted in this Wall Street Journal article later in the year:

(December 2012 – WSJ) Top U.S. intelligence officials gathered in the White House Situation Room in March to debate a controversial proposal. Counterterrorism officials wanted to create a government dragnet, sweeping up millions of records about U.S. citizens—even people suspected of no crime.

Not everyone was on board. “This is a sea change in the way that the government interacts with the general public,” Mary Ellen Callahan, chief privacy officer of the Department of Homeland Security, argued in the meeting, according to people familiar with the discussions.

A week later, the attorney general signed the changes into effect.

The rules now allow the little-known National Counterterrorism Center to examine the government files of U.S. citizens for possible criminal behavior, even if there is no reason to suspect them. That is a departure from past practice, which barred the agency from storing information about ordinary Americans unless a person was a terror suspect or related to an investigation.

Now, NCTC can copy entire government databases—flight records, casino-employee lists, the names of Americans hosting foreign-exchange students and many others. The agency has new authority to keep data about innocent U.S. citizens for up to five years, and to analyze it for suspicious patterns of behavior. Previously, both were prohibited. Data about Americans “reasonably believed to constitute terrorism information” may be permanently retained.

The changes also allow databases of U.S. civilian information to be given to foreign governments for analysis of their own. In effect, U.S. and foreign governments would be using the information to look for clues that people might commit future crimes.  (more)

The 2012 changes, instituted by Eric Holder, permitted files of specific Americans to be generated under the auspices of potential terror threats.  The NSA databases could be exploited by the National Counterterrorism Center to extract content that would be contained within these files on targeted Americans.

Keep in mind this is early 2012, John Brennan is Deputy National Security Advisor and Asst. to President Obama for Homeland Security.

When Attorney General Eric Holder empowered the National Counterterrorism Center with this new authority, the office assigned to the data-collection was the Terrorist Threat Integration Center (TTIC).  The founder of the TTIC was John Brennan:

On 1 May 2003, the Terrorist Threat Integration Center (TTIC) opened its doors. Led by its first Director, John Brennan, TTIC filled its ranks with approximately three dozen detailees from across the US Government (USG) and was mandated to integrate CT capabilities and missions across the government. (link)

Also note the date of this DOJ Memorandum is March 2012:

Under the new rules issued in March, the National Counterterrorism Center, known as NCTC, can obtain almost any database the government collects that it says is “reasonably believed” to contain “terrorism information.”  (link)

The March 2012 date is right before the IRS scandal hit the headlines.

The IRS targeting scandal is where the term “Secret Research Project” originated as a description from the Obama team. It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller. It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

Why disks? Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS. All of the evidence within this sketchy operation came directly to the surface in spring 2012.

Here’s how it looks:

♦ In 2010 Eric Holder asked the IRS to send him the records of 501(c) non profit groups and individuals representing conservative voters. [LINK] Lois Lerner sent the DOJ 1.1 million pages of 501(c)(4) tax filing data. Including a very specific set of “33 Schedule B attachment files”. The Schedule B’s were specific to Large Conservative 501(c)(4) groups operating and organized to oppose the agenda of President Obama. The Schedule B’s include the donor lists of specific people and sub-groups attached to the 501(c)(4).

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

♦ In 2012 Eric Holder authorizes the use of government databases to search records of Americans and assemble “files” on potential targets. [Link] “The agency has new authority to keep data about innocent U.S. citizens for up to five years, and to analyze it for suspicious patterns of behavior.”

♦ In the period of 2012 through April 2016, According to FISA Judge Rosemary Collyer, there were tens of thousands of illegal (“non-compliant”) search queries of the NSA database targeting Americans.  The search results were unlawfully “extracted” to unknown entities.  Eighty-five out of every hundred searches were illegal (85% non-compliant rate).

Consider purposeful actions, as a political targeting operation, by weaponizing the systems of government.  Steps:

  • First, identify the targets (IRS Database).
  • Second, research the targets (NSA Database).
  • Third assemble files on the targets (DOJ Authorization).
  • Fourth use the files to leverage/destroy your opposition.

We now have evidence of the first three steps; and my hunch is if we apply hindsight a lot of unusual activity will now make sense.  We have been living inside the fourth step for a few years.  We noticed the consequences… but we only had suspicions, until now.

Fusion GPS was not hired to research Trump, the intelligence community was already doing surveillance and spy operations. The intelligence community needed Fusion GPS to give them a plausible justification for already existing surveillance and spy operations.

Fusion-GPS gave the Obama administration the justification they needed for a FISA warrant with the Steele Dossier. Ultimately that’s why the Steele Dossier is so important; without it, the DOJ and FBI are naked with their surveillance and database abuse.

At 12:15pm on January 20th, 2017, Obama’s outgoing National Security Advisor Susan Rice wrote a memo-to-self.  Many people have called this her “CYA” memo, from the position that Susan Rice was protecting herself from consequences if the scheme against President Trump was discovered.  Here’s the email:

On January 5, following a briefing by IC leadership on Russian hacking during the 2016 Presidential election, President Obama had a brief follow-on conversation with FBI Director Jim Comey and Deputy Attorney General Sally Yates in the Oval Office. Vice President Biden and I were also present.

President Obama began the conversation by stressing his continued commitment to ensuring that every aspect of this issue is handled by the Intelligence and law enforcement communities “by the book“.

The President stressed that he is not asking about, initiating or instructing anything from a law enforcement perspective. He reiterated that our law enforcement team needs to proceed as it normally would by the book.

From a national security perspective, however, President Obama said he wants to be sure that, as we engage with the incoming team, we are mindful to ascertain if there is any reason that we cannot share information fully as it relates to Russia.

[Redacted Classified Section of Unknown length]

The President asked Comey to inform him if anything changes in the next few weeks that should affect how we share classified information with the incoming team. Comey said he would.

Susan Rice ~ (pdf link)

Evidence of Obama Administration Political Surveillance Beginning Mid-2012….


Repost by Request – Considering the upcoming declassification window…between Trump’s state visit in Japan (5/25 – 5/28) and the state visit with the U.K (6/3 – 6/5).

Bucket Five – Intelligence documents that were presented to the Gang of Eight in 2016 that pertain to the FISA application used against U.S. person Carter Page; including all exculpatory intelligence documents that may not have been presented to the FISA Court.  Presumably this would include the recently revealed State Dept Kavalac email; and the FBI transcripts from wiretaps of George Papadopoulos (also listed in Carter Page FISA).

Now that we have significant research files on the 2015 and 2016 political surveillance program; which includes the trail evident within the Weissmann/Mueller report; in combination with the Obama-era DOJ “secret research project” (their words, not mine); we are able to overlay the entire objective and gain a full understanding of how political surveillance was conducted over a period of approximately four to six years.

This is why there’s panic.

Working with a timeline, but also referencing origination material in 2015/2016 – CTH hopes to show how the program operated. This explains an evolution from The IRS Files in 2010 to the FISA Files in 2016.

More importantly, research indicates the modern political exploitation of the NSA database, for weaponized intelligence surveillance of politicians, began mid 2012.

The FISA-702 database extraction process, and utilization of the protections within the smaller intelligence community, was the primary process. We start by reviewing the established record from the 99-page FISC opinion rendered by Presiding Judge Rosemary Collyer on April 26th, 2017; and explain the details within the FISC opinion.

I would strongly urge everyone to read the FISC report (full pdf below) because Judge Collyer outlines how the DOJ, which includes the FBI, had an “institutional lack of candor” in responses to the FISA court. In essence, the Obama administration was continually lying to the court about their activity, and the rate of fourth amendment violations for illegal searches and seizures of U.S. persons’ private information for multiple years.

Unfortunately, due to intelligence terminology Judge Collyer’s brief and ruling is not an easy read for anyone unfamiliar with the FISA processes outlined. The complexity also helps the media avoid discussing, and as a result most Americans have no idea the scale and scope of the issues. So we’ll try to break down the language.

.For the sake of brevity and common understanding CTH will highlight the most pertinent segments showing just how systemic and troublesome the unlawful electronic surveillance was.

Early in 2016 NSA Director Admiral Mike Rogers was alerted of a significant uptick in FISA-702(17) “About” queries using the FBI/NSA database that holds all metadata records on every form of electronic communication.

The NSA compliance officer alerted Admiral Mike Rogers who then initiated a full compliance audit on/around March 9th, 2016, for the period of November 1st, 2015, through May 1st, 2016.

While the audit was ongoing, due to the severity of the results that were identified, Admiral Mike Rogers stopped anyone from using the 702(17) “about query” option, and went to the extraordinary step of blocking all FBI contractor access to the database on April 18, 2016(keep these dates in mind).

Here are some significant segments:

The key takeaway from these first paragraphs is how the search query results were exported from the NSA database to users who were not authorized to see the material. The FBI contractors were conducting searches and then removing, or ‘exporting’, the results. Later on, the FBI said all of the exported material was deleted.

Searching the highly classified NSA database is essentially a function of filling out search boxes to identify the user-initiated search parameter and get a return on the search result.

FISA-702(16) is a search of the system returning a U.S. person (“702”); and the “16” is a check box to initiate a search based on “To and From“. Example, if you put in a date and a phone number and check “16” as the search parameter the user will get the returns on everything “To and From” that identified phone number for the specific date. Calls, texts, contacts etc. Including results for the inbound and outbound contacts.

FISA-702(17) is a search of the system returning a U.S. person (702); and the “17” is a check box to initiate a search based on everything “About” the search qualifier. Example, if you put a date and a phone number and check “17” as the search parameter the user will get the returns of everything about that phone. Calls, texts, contacts, geolocation (or gps results), account information, user, service provider etc. As a result, 702(17) can actually be used to locate where the phone (and user) was located on a specific date or sequentially over a specific period of time which is simply a matter of changing the date parameters.

And that’s just from a phone number.

Search an ip address “about” and read all data into that server; put in an email address and gain everything about that account. Or use the electronic address of a GPS enabled vehicle (about) and you can withdraw more electronic data and monitor in real time. Search a credit card number and get everything about the account including what was purchased, where, when, etc. Search a bank account number, get everything about transactions and electronic records etc. Just about anything and everything can be electronically searched; everything has an electronic ‘identifier’.

The search parameter is only limited by the originating field filled out. Names, places, numbers, addresses, etc. By using the “About” parameter there may be thousands or millions of returns. Imagine if you put “@realdonaldtrump” into the search parameter? You could extract all following accounts who interacted on Twitter, or Facebook etc. You are only limited by your imagination and the scale of the electronic connectivity.

As you can see below, on March 9th, 2016, internal auditors noted the FBI was sharing “raw FISA information, including but not limited to Section 702-acquired information”.

In plain English the raw search returns were being shared with unknown entities without any attempt to “minimize” or redact the results. The person(s) attached to the results were named and obvious. There was no effort to hide their identity or protect their 4th amendment rights of privacy:

But what’s the scale here? This is where the story really lies.

Read this next excerpt carefully.

The operators were searching “U.S Persons”. The review of November 1, 2015, to May 1, 2016, showed “eighty-five percent of those queries” were unlawful or “non compliant”.

85% !! “representing [redacted number]”.

We can tell from the space of the redaction the number of searches were between 1,000 and 9,999 [five digits]. If we take the middle number of 5,000 – that means 4,250 unlawful searches out of 5,000.

The [five digit] amount (more than 1,000, less than 10,000), and 85% error rate, was captured in a six month period.

Also notice this very important quote: “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” So they were searching the same phone number, email address, electronic “identifier”, or people, repeatedly over different dates. Specific people were being tracked/monitored.

Additionally, notice the last quote: “while the government reports it is unable to provide a reliable estimate of” these non lawful searches “since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 coincided with an unusually high error rate”.

That means the 85% unlawful FISA-702(16)(17) database abuse has likely been happening since 2012. (Again, remember that date, 2012) Who was FBI Director? Who was his chief-of-staff? Who was CIA Director? ODNI? etc. Remember, the NSA is inside the Pentagon (Defense Dept) command structure. Who was Defense Secretary? And finally, who wrote and signed-off-on the January 2017 Intelligence Community Assessment?

Tens of thousands of searches over four years (since 2012), and 85% of them are illegal. The results were extracted for?…. (I believe this is all political opposition use; and I’ll explain why momentarily.)

OK, that’s the stunning scale; but who was involved?

Private contractors with access to “raw FISA information that went well beyond what was necessary to respond to FBI’s requests“:

And as noted, the contractor access was finally halted on April 18th, 2016.

[Coincidentally (or not), the wife of Fusion-GPS founder Glenn Simpson, Mary Jacoby, goes to the White House the next day on April 19th, 2016.]

None of this is conspiracy theory.

All of this is laid out inside this 99-page opinion from FISC Presiding Judge Rosemary Collyer who also noted that none of this FISA abuse was accidental in a footnote on page 87: “deliberate decisionmaking“:

This specific footnote, if declassified, would be key.  Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”, this sentence has the potential to expose an internal decision; withheld from congress and the FISA court by the Obama administration; that outlines a process for access and distribution of surveillance data.

Note: “no notice of this practice was given to the FISC until 2016“, that is important.

Summary of this aspect: The FISA court identified and quantified tens-of-thousands of search queries of the NSA/FBI database using the FISA-702(16)(17) system. The database was repeatedly used by persons with contractor access who unlawfully searched and extracted the raw results without redacting the information and shared it with an unknown number of entities.

The outlined process certainly points toward a political spying and surveillance operation; and we are not the only one to think that’s what this system is being used for.

Back in 2017 when House Intelligence Committee Chairman Devin Nunes was working to reauthorize the FISA legislation, Nunes wrote a letter to ODNI Dan Coats about this specific issue:

SIDEBAR: To solve the issue, well, actually attempt to ensure it never happened again, NSA Director Admiral Mike Rogers eventually took away the “About” query option permanently in 2017. NSA Director Rogers said the abuse was so inherent there was no way to stop it except to remove the process completely. [SEE HERE] Additionally, the NSA database operates as a function of the Pentagon, so the Trump administration went one step further. On his last day as NSA Director Admiral Mike Rogers -together with ODNI Dan Coats- put U.S. cyber-command, the database steward, fully into the U.S. military as a full combatant command. [SEE HERE]

There is little doubt the FISA-702(16)(17) database system was used by Obama-era officials, from 2012 through April 2016, as a way to spy on their political opposition. Quite simply there is no other intellectually honest explanation for the scale and volume of database abuse that was taking place.

When we reconcile what was taking place and who was involved, then the actions of the exact same principle participants take on a jaw-dropping amount of clarity.

All of the action taken by CIA Director Brennan, FBI Director Comey, ODNI Clapper and Defense Secretary Ashton Carter make sense. Including their effort to get NSA Director Mike Rogers fired.

Everything after March 9th, 2016, was done to cover up the weaponization of the FISA database. [Explained Here] Spygate, Russia-Gate, the Steele Dossier, and even the 2017 Intelligence Community Assessment (drawn from the dossier and signed by the above) were needed to create a cover-story and protect themselves from discovery of this four year weaponization, political surveillance and unlawful spying. Even the appointment of Robert Mueller as special counsel makes sense; he was FBI Director when this began.

The beginning decision to use FISA(702) as a domestic surveillance and political spy mechanism appears to have started in/around 2012. Perhaps sometime shortly before the 2012 presidential election and before John Brennan left the White House and moved to CIA. However, there was an earlier version of data assembly that preceded this effort.

Political spying 1.0 was actually the weaponization of the IRS. This is where the term “Secret Research Project” originated as a description from the Obama team. It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller. It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

Why disks? Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS. All of the evidence within this sketchy operation came directly to the surface in early spring 2012.

The IRS scandal was never really about the IRS, it was always about the DOJ asking the IRS for the database of information. That is why it was transparently a conflict when the same DOJ was tasked with investigating the DOJ/IRS scandal. Additionally, Obama sent his chief-of-staff Jack Lew to become Treasury Secretary; effectively placing an ally to oversee/cover-up any issues. As Treasury Secretary Lew did just that.

Lesson Learned – It would appear the Obama administration learned a lesson from attempting to gather a large opposition research database operation inside a functioning organization large enough to have some good people that might blow the whistle.

The timeline reflects a few months after realizing the “Secret Research Project” was now worthless (June 2012), they focused more deliberately on a smaller network within the intelligence apparatus and began weaponizing the FBI/NSA database.  If our hunch is correct, that is what will be visible in footnote #69:

How this all comes together in 2019

Fusion GPS was not hired in April 2016 to research Donald Trump. As shown in the evidence provided by the FISC, the intelligence community was already doing surveillance and spy operations. The Obama administration already knew everything about the Trump campaign, and were monitoring everything by exploiting the FISA database.

However, after the NSA alerts in/around March 9th, 2016, and particularly after the April 18th shutdown of contractor access, the Obama intelligence community needed Fusion GPS to create a legal albeit ex post facto justification for the pre-existing surveillance and spy operations. Fusion GPS gave them that justification in the Steele Dossier.

That’s why the FBI small group, which later transitioned into the Mueller team, are so strongly committed to and defending the formation of the Steele Dossier and its dubious content. The Steele Dossier contains the cover-story and justification for the pre-existing surveillance operation.

During a rather innocuous podcast discussion panel April 12th, 2019, one of President Trump’s personal lawyers Jay Sekulow mentioned the FBI had three FISA applications denied by the FISA court in 2016. [Podcast Here – Note comment at 25:05] The denials were always suspected; however, until now no-one in/around the administration has ever confirmed.

If Sekulow is accurate, this adds additional context to the actions of the FBI in the aftermath of Admiral Mike Rogers and an increased urgency in gaining legal justification for surveillance and spy operation unlawfully taking place. A valid FISA warrant would help the FBI cover-up the surveillance. The likely targets were Manafort, Flynn and Papadopoulos…. but it appears the DOJ/FBI were rebuked.

These FISC denials would then initiate institutional panic dependent on the election outcome. An insurance policy would be needed. The Steele Dossier becomes the investigative virus the FBI wanted inside the system. To get the virus into official status, they used the FISA application as the delivery method and injected it into Carter Page. The FBI already knew Carter Page; essentially Carter Page was irrelevant, what they needed was the FISA warrant and the Dossier in the system {Go Deep}.

Fusion GPS was not hired to research Trump, the intelligence community was already doing surveillance and spy operations. The intelligence community needed Fusion GPS to give them a plausible justification for already existing surveillance and spy operations.

Fusion-GPS gave them the justification they needed for a FISA warrant with the Steele Dossier. Ultimately that’s why the Steele Dossier is so important; without it, the DOJ and FBI are naked with their FISA-702 abuse as outlined by John Ratcliffe.

No-one really knows the extent of the current documents and/or information that may be subject to the AG Bill Barr declassification. However, this is the original list as outlined in September 2018, and the agencies who would be involved in the declassification process:

  1. All versions of the Carter Page FISA applications (DOJ) (DoS) (FBI) (ODNI).
  2. All of the Bruce Ohr 302’s filled out by the FBI. (FBI) (ODNI)
  3. All of Bruce Ohr’s emails (FBI) (DOJ) (CIA) (ODNI), and supportive documents and material provided by Bruce Ohr to the FBI. (FBI)
  4. All relevant documents pertaining to the supportive material within the FISA application. (FBI) (DOJ-NSD ) (DoS) (CIA) (DNI) (NSA) (ODNI);
  5. All intelligence documents that were presented to the Gang of Eight in 2016 that pertain to the FISA application used against U.S. person Carter Page; including all exculpatory intelligence documents that may not have been presented to the FISA Court. (CIA) (FBI) (DOJ) (ODNI) (DoS) (NSA)
  6. All unredacted text messages and email content between Lisa Page and Peter Strzok on all devices. (FBI) (DOJ) (DOJ-NSD) (ODNI)
  7. The originating CIA “EC” or two-page electronic communication from former CIA Director John Brennan to FBI Director James Comey that started Operation Crossfire Hurricane in July 2016. (CIA) (FBI) (ODNI)

♦ President Trump can prove the July 31st, 2016, Crossfire Hurricane counterintelligence operation originated from a scheme within the intelligence apparatus by exposing the preceding CIA operation that created the originating “Electronic Communication” memo. Declassify that two-page “EC” document that Brennan gave to Comey.  [The trail is found within the Weissmann report and the use of Alexander Downer – SEE HERE]

♦ Release and declassify all of the Comey memos that document the investigative steps taken by the FBI as an outcome of the operation coordinated by CIA Director John Brennan in early 2016.  [The trail was memorialized by James Comey – SEE HERE]

♦ Reveal the November 2015 through April 2016 FISA-702 search query abuse by declassifying the April 2017 court opinion written by FISC Presiding Judge Rosemary Collyer. Show the FBI contractors behind the 85% fraudulent search queries. [Crowdstrike? Fusion-GPS? Nellie Ohr? Daniel Richman?]  This was a weaponized surveillance and domestic political spying operation. [The trail was laid down in specific detail by Judge Collyer – SEE HERE]

♦ Subpoena former DOJ-NSD (National Security Division) head John Carlin, or haul him in front of a grand jury, and get his testimony about why he hid the abuse from the FISA court in October 2016; why the DOJ-NSD rushed the Carter Page application to beat NSA Director Admiral Mike Rogers to the FISA court; and why Carlin quit immediately thereafter.

♦ Prove the Carter Page FISA application (October 2016) was fraudulent and based on deceptions to the FISA Court. Declassify the entire document, and release the transcripts of those who signed the application(s); and/or depose those who have not yet testified. The creation of the Steele Dossier was the cover-up operation. [SEE HERE]

♦ Release all of the Lisa Page and Peter Strzok text messages without redactions. Let sunlight pour in on the actual conversation(s) that were taking place when Crossfire Hurricane (July ’16) and the FISA Application (Oct ’16) were taking place.  The current redactions were made by the people who weaponized the intelligence system for political surveillance and spy operation.  This is why Page and Strzok texts are redacted!

♦ Release all of Bruce Ohr 302’s, FBI notes from interviews and debriefing sessions, and other relevant documents associated with the interviews of Bruce Ohr and his internal communications. Including exculpatory evidence that Bruce Ohr may have shared with FBI Agent Joseph Pientka. [And get a deposition from this Pientka fella] Bruce Ohr is the courier, carrying information from those outside to those on the inside.

♦ Release the August 2nd, 2017, two-page scope memo provided by DAG Rod Rosenstein to special counsel Robert Mueller to advance the fraudulent Trump investigation, and initiate the more purposeful obstruction of justice investigation. Also Release the October 20th, 2017, second scope memo recently discovered.  The Scope Memos are keys to unlocking the underlying spy/surveillance cover-up. [SEE HERE and SEE HERE]

Does Biden Dominance Show that Moderate Democrats Still Own DNC?


Published on May 21, 2019

SUBSCRIBED 128K
The presidential polling dominance of former Vice President Joe Biden contradicts the narrative that Democrats want the DNC to tack hard Left. Despite Socialist-wannabe insurgencies — from Elizabeth Warren, Bernie Sanders, Beto O’Rourke, Pete Buttigieg, Kamala Harris, and others — the rise and rule of Biden seems to show that moderate Democrats still own the DNC. If identity politics really matter, why are Democrats so enamored of an old, white, heterosexual, male? Meanwhile, in an exclusive enclave secured from the clamor of mindless social media, a band of liberty lovers hones the skills needed to save America — reasoned thought, civil dialogue and a principled approach to the pursuit of happiness. These happy warriors engage in mutual encouragement as they analyze the news, politics, culture, education and more. Perhaps you should join them. Find your people. Become a Member now at https://BillWhittle.com/register/