Posted originally on the conservative tree house on November 23, 2022 | Sundance
In an op-ed from the New York Post today, former Attorney General Bill Barr joins the not coincidentally timed call from Republican Club officer Paul Ryan to dump Donald Trump. New York Post and Fox News owner Rupert Murdoch smiles gleefully, but the organized effort is transparent.
According to the diatribe from Bill Barr, things were much better for the leaders of the ‘acceptable Republican Party‘ when the unwashed masses of the unrepresented middle-class were compliant in their role as victims to the GOP. Battered conservatives are so much easier to manage if they just listen to the high-minded pontifications of the professional political class, pull lever and get pellet.
The tone of Barr’s screed is condescending in the extreme, as if he is delivering his prose to the RNC corporate boardroom at cocktail hour. With a backdrop buffet of crustless triangle cucumber sandwiches and a masked waitstaff hurrying to provide the gentle ladies with white wine spritzer refills, you can visualize the words “hear, hear” coming from atop the crystal glasses.
As customary amid these conversations, titles are left unattributed for the unapproved. “Trump brought his wrecking-ball style to the task of governing the nation. He did not temper his disruptiveness and penchant for chaos,” says Barr, pausing intentionally to afford his eloquence time to settle amid the less intellectually capable.
“It took his senior staff and cabinet secretaries an ungodly amount of maneuvering to keep him on track,” Barr continued. Murmured noises and well-toned grunts from the assembly communicated their seriousness in understanding and agreement. Barr’s tenure was obviously a time of unimaginable horror.
Sympathy, shock and sadness afforded for Barr’s recounting of his survival. Moments later, furrowed brows from the audience.
Yes, this vulgarian uprising has finally become too much for the shouldered cashmere sweater crowd to continue accepting.
All of this noise about good paying jobs, sound money, respect for a class of workers that will never sit in Corinthian leather, it’s all just too much.
Mitch leans forward, speaking in the familiar tones without lips moving, we must act now, or we may lose control.
The weight of the moment stills the room.
A younger voice from the Murdoch clan seeks to support the former attorney general by pointing out, “They don’t even drive cars – they use trucks.” Almost immediately a reply, “Yes, and use gasoline,” from the affirming Perino, as widening eyes start to imagine it.
No longer content with patting heads and playing corporate pretenses to the base voters, now it is finally time for the well-educated to bring in the hired muscle and take control, even if forced evictions are needed. It’s all just too much, too much.
Collectively they turn back toward Barr as he continues: “The threat is simple,” he says.
The time for toleration is over says Bill Barr, Paul Ryan and the billionaires who really matter. The elite-minded self-appointed sovereigns have had enough.
“Unless the rest of the party goes along with him, he will burn the whole house down by leading “his people” out of the GOP,” shouts Barr. The open hand slammed upon the lectern, while seriousness of the statement catches even the waitstaff off guard as the entire room turns to hear.
“Trump’s willingness to destroy the party if he does not get his way is not based on principle, but on his own supreme narcissism,” Barr continues. “His egoism makes him unable to think of a political party as anything but an extension of himself — a cult of personality.”
Caught up in the lust of the moment a loud shout comes quickly from the back of the room, “REMOVE HIM!” is decried.
And just like that, the entire audience stares toward a stunned Ronna McDaniel, who was caught returning quietly to the buffet for another sandwich. Embarrassed and unable to turn around with full cheeks, she gives the room a thumbs up over her shoulder….
Posted originally on the conservative tree house in November 22, 2022 | Sundance
This is a significant dose of sunlight that aligns with everything known about how the RNC Corporation operates. Additionally, given what we have witnessed coming from the history of the RNC operation, the claim tracks.
History does show that Ronna McDaniel cares more about her Wall Street donor appointed position in the corporation, than she does about election outcomes that would be against the interest of those same Wall Street donors. So, this claim makes sense in multiple ways.
Posted originally on the conservative tree house on November 22, 2022 | Sundance
In this brief interview segment {Direct Rumble Link} Steve Bannon and Natalia Mittlestadt discuss a GOP legal team compilation report {pdf Here} from Maricopa County, Arizona as identified by findings on election day.
…”The 11 attorneys visited 115 out of the 223 vote centers in Maricopa County on Election Day and found that 72 of them (or 62.61%) “had material problems with the tabulators not being able to tabulate ballots,” Sonnenklar reported, “causing voters to either deposit their ballots into box 3, spoil their ballots and re-vote, or get frustrated and leave the vote center without voting.” WATCH:
Posted originally on the conservative tree house on November 22, 2022 | Sundance
When the republican Speaker of the Florida House of Representatives publicly supports a legislative change that would permit the republican Governor to run for the GOP nomination, it doesn’t happen without prior discussion.
FLORIDA – Top Republicans in the Florida legislature said Tuesday that they’d be willing to change state election law so that Gov. Ron DeSantis could run for president without resigning from his current job.
“I think that’s a great idea,” Florida House Speaker Paul Renner said in a press conference with reporters at the state capitol, when asked about potential changes to the state’s so-called “resign to run” election law in the forthcoming legislative session. “I think we’ll look at that.”
Senate President Kathleen Passidomo echoed Renner’s comments, saying it would be an “honor” to have someone from Florida running for president. She agreed with Renner it would be a “good idea” to change the law. “I think he should be allowed to do it,” she said.
Under current Florida law, if DeSantis were to run for president then he would have to resign his post as governor — even if he eventually lost the presidency. Candidates have 10 days to resign after they qualify for federal office, but how exactly that is defined when it comes to the presidency isn’t clear and has been open to different interpretations, according to The Miami Herald.
[…] DeSantis hasn’t tried to tamp down speculation that he might seek a White House bid, and hasn’t committed to serving out all four years as governor. (read more)
Posted originally on the concervative tree house on November 22, 2022 | Sundance
I keep saying the 2024 GOP nomination is going to be fun because this is an epic Wall Street -vs- Main Street battle that needs to be done. The conniving republican political class are openly wearing their anti-working-class uniforms now. Despite their efforts to remain hidden, and thanks entirely to their hubris, they are glowing.
The primary contest in 2024 is going to be epic, because this time the MAGA scruffnecks will, for the first time in years, clearly see who the enemy within the republican ranks really are. This makes them so much easier to defeat, and also explains why the professional managers behind Ron DeSantis are desperate to keep his alignment hidden.
Emerson College Polling has a granular poll out today [DATA HERE] & [Cross Tabs Here] that highlights some really interesting stuff. First, amid GOP voters Liz Cheney at 4% is beating Ted Cruz (3%), Nikki Haley (3%) and Larry Hogan (1%) for the 2024 GOP nomination. How funny is that?
I mean it’s funny as hell when you look at it from the position of Nikki Haley and the detached billionaires that are going to have to fund her. We’re just not into you Nikki. LOL.
Also, I mean, c’mon, ya gotta laugh. Imagine being one of the former 2016 members of Team Ted Cruz and seeing the insufferable Liz Cheney beating him in current 2022 polling… Seriously, ROFLMAO. Yer’ killing me. I mean could the Cruz Crew pick a winner or what? Too funny.
Even better are the ways Emerson uses the demographics of the poll to explain the political alignment and who the typical supporters are for President Donald Trump (55%) -vs- Florida Governor Ron DeSantis (25%). The Emerson polling data nails the demographics perfectly.
(Emerson) – […] Spencer Kimball, Executive Director of Emerson College Polling noted, “There is a stark education divide among Republican primary voters. A 71% majority of voters with a high school degree or less support Trump in 2024 whereas 14% support DeSantis.
A 53% majority of those with a college degree, some college, or associate’s degree support Trump while 28% support DeSantis. By contrast, Republican voters with a postgraduate degree are most split: 32% support Trump, 29% support DeSantis, and 18% support Mike Pence for the Republican nomination.”
Kimball added: “There is also an age divide in the Republican primary: younger voters under 50 break for Trump over DeSantis 67% to 14%, voters between 50 and 64 break for Trump 54% to 32%, while Republicans over 65 are more split: 39% support Trump and 32% DeSantis.” (read more)
So, President Trump wins every demographic, but to see what groups leans more favorably toward Ron DeSantis it looks like this:
DeSantis Voters – Older, over educated, wealthy, Wall-Street, non-working, investment class, predominately white, left-leaning republicans with delicate sensibilities. The more of each of these attributes the person carries, the more likely they are to support DeSantis.
Trump Voters – Younger and middle-aged, multi-racial, working-class, hardcore, Main Street, paycheck earners. ie. the middle-class. The more of each of these attributes the person carries, the more likely they are to support President Trump.
It doesn’t get much more easily defined.
Trump is defined by Main Street. DeSantis is defined by Wall Street.
That demographic data shows the pattern analysis of exactly what is going on.
It doesn’t matter how many candidates line up in the non-MAGA political lane; they are all coming from the same cocktail class circuit.
Here comes the kicker…. As more people find out about the management operation of Ron DeSantis, that has been happening in the background, the more DeSantis will bleed support back toward MAGA.
Think of this in realistic terms. Team MAGA is running on authenticity and honesty. Team DeSantis has to run on duplicity and continual defense to keep people from finding out about the inauthentic and dishonest nature of the operation.
Ask yourself, which team would you rather be on?
Within that answer you discover why this campaign is going to be so much fun.
We have nothing to hide. They have everything to hide.
We can admit every downside because the ultimate goal is pure. They must deny every downside because the ultimate goal is duplicity.
We have nothing to lose that we haven’t already lost. They have everything to lose in their effort to retain power.
Truth is a powerful weapon, and no one uses that weapon better than Donald J Trump.
Yes, I’m smiling at how easy it is going to be for President Donald Trump to trigger them.
If you read the article about the “Pegasus Project”, spyware created to infect cell phones that was marketed by Israeli intelligence through a company called NSO {Go Deep Here}, then you essentially know the background. Pegasus is “no click” targeting spyware that can be deployed against cellular phones, simply by inputting the phone number and transmitting to it.
The Guardian previously reported, “Claudio Guarnieri, who runs Amnesty International’s Security Lab, said once a phone was infected with Pegasus, a client of NSO could in effect take control of a phone, enabling them to extract a person’s messages, calls, photos and emails, secretly activate cameras or microphones, and read the contents of encrypted messaging apps such as WhatsApp, Telegram and Signal.”
Pegasus was deployed to target tens-of-thousands of cell phones by the people who Israel sold the spyware to. The Guardian, and a group of allied leftists in media, were previously granted access to a leaked batch of 50,000 phone numbers that the Pegasus software was operating in.
In a recent update from the New York Times they stated, “[it] has been used by police and intelligence services to hack the phones of drug kingpins and terrorists, but gained notoriety when it was revealed that governments, like Saudi Arabia, Mexico, Hungary and India, had deployed it against political dissidents, journalists and human rights workers.
It was also recently revealed the U.S. FBI under Director Chris Wray purchased the Pegasus program for “FBI experiments” and “exploration” into how the spyware program could be used domestically.
The FBI was initially reluctant to reveal their ownership of the Pegasus program, however, within FOIA documents related to the potential for domestic surveillance and concerns about fourth amendment constitutional protections, the FBI admitted they retain the capability – but promised it has not been deployed.
(New York Times) – […] The Times revealed in January that the F.B.I. had purchased Pegasus in 2018 and, over the next two years, tested the spyware at a secret facility in New Jersey. Since the bureau first purchased the tool, it has paid approximately $5 million to NSO.
Since that story was published, F.B.I. officials, including Mr. Wray, have gone further than they did during the closed meeting with senators last December. They acknowledged that the bureau did consider deploying Pegasus, though they still emphasized that the F.B.I.’s main goal was to test and evaluate it to assess how adversaries might use it. (read more)
Now, stay with me…
The FBI is not saying they will not use Pegasus, they simply said they would not use the spyware outside of the legal framework for deployment without legal and valid investigative baselines. Put another way, if there was a court ordered search warrant, Pegasus would be a tool for use in criminal investigations.
The latest discussions of Pegasus came around four days after the U.S. election, in a New York Times article November 12th. We know the general use of the New York Times as it pertains to the DOJ/FBI and their domestic public relations efforts. [Broadly, Main Justice (DOJ/FBI) use NYT/Politico, CIA use WaPo and State Dept use CNN]
Consider the timing of November 12th against the backdrop of Main Justic announcing the appointment of Special Counsel Jack SmithNovember 18. Media narratives often follow a data frequency, a rhyme or signal that you can sense amid the background operations.
So, here we have: (1) Pegasus, a stealth tool for surveillance and extraction of investigative evidence that can be deployed, covertly, without the target having any idea they are exposed. (2) We have concrete evidence the FBI has the Pegasus tool, and an understanding it would not be deployed without legally authorized authorities. And (3) we have a special counsel created to investigate congress under the auspices of the J6 ‘insurrection’…. Can you see where this is going?
The Special Counsel is authorized to conduct the ongoing investigation into whether any person or entity violated the law in connection with efforts to interfere with the lawful transfer of power following the 2020 presidential election or the certification of the Electoral College vote held on or about January 6, 2021, as well as any matters that arose or might arise directly from this investigation or that are within the scope of [Special Counsel Regulations 28 C.F.R. § 600.4(a)]. (pdf)
The special counsel appointment essentially means that congressional representatives are under investigation; and search warrants on their phones, text messages, emails, etc could be authorized. Then we overlay using DOJ-NSD defined terms of “national security threat” (that’s why they emphasized insurrection) and we find the pathway to gain legal search warrants on an incoming congressional caucus. Then the possibilities for Pegasus.
They didn’t just think this up overnight. They are using J6 as a weapon against their losing the House to republicans. The Democrats are now structurally targeting Republicans with the appointment of Jack Smith. The executive is now investigating the legislative branch; the legal structure of this eliminates the separation of powers issue.
The DOJ is not investigating republicans, they are investigating defined criminals; insurrectionists that are national security threats, that happen to be republicans. See how that works?
Contrast these recent events, tools and discoveries against the backstory of how the modern surveillance state was created {Go Deep}. Then overlay their recent Pegasus capabilities against the backdrop of a weaponized DOJ and FBI now targeting political opposition in congress.
In the decades before 9/11/01 the intelligence apparatus intersected with government, influenced government, and undoubtedly controlled many institutions with it. The legislative oversight function was weak and growing weaker, but it still existed and could have been used to keep the IC in check. However, after the events of 9/11/01, the short-sighted legislative reactions opened the door to allow the surveillance state to weaponize against domestic enemies.
After the Patriot Act was triggered, not coincidentally only six weeks after 9/11, a slow and dangerous fuse was lit that ends with the intelligence apparatus being granted a massive amount of power. Simultaneously the mission of the intelligence community now encompassed monitoring domestic threats as defined by the people who operate the surveillance system.
The problem with assembled power is always what happens when a Machiavellian network takes control over that power and begins the process to weaponize the tools for their own malicious benefit. That is exactly what the network of President Barack Obama did.
The Obama network took pre-assembled intelligence weapons (we should never have allowed to be created) and turned those weapons into political tools for his radical and fundamental change. The target was the essential fabric of our nation.
Ultimately, this corrupt political process gave power to create the Fourth Branch of Government, the Intelligence Branch. From that perspective the fundamental change was successful. (more)
This is the scale of corrupt political compromise on both sides of the DC dynamic that we are up against. Preserving this system is also what removing Donald Trump and all of the rebellious unaligned freedom believers is all about.
The question now becomes, will anyone in congress do anything about it now that they are within the target zone?
Posted originally on the conservative tree house on November 22, 2022 | Sundance
“The Committee’s purpose in requesting President Trump’s tax returns has nothing to do with funding or staffing issues at the IRS and everything to do with releasing the President’s tax information to the public,” Trump’s non-pretending attorneys wrote to the court in October. However, today the Supreme Court maintains the pretense of a valid legislative purpose.
(Washington DC) – The U.S. Supreme Court on Tuesday refused to block a request by the House Ways and Means Committee for former President Trump’s tax returns. There were no noted dissents.
The decision likely means that the returns will be released to the Committee immediately, ending a multi-year legal battle.
Trump filed an emergency application at the Supreme Court on Oct. 31 to block the release of his tax information at least until the court considered whether it wanted to hear full argument on the issue. Trump similarly lost his case in the lower courts, most recently with a panel of the D.C. Court of Appeals ruling unanimously that the Committee’s request for tax returns was constitutional.
The House Ways and Means Committee argued that it needs the information contained in Trump’s tax returns to meaningfully evaluate the IRS’s presidential audit program. The Committee says it is considering implementing greater legislative oversight of financial activities conducted by presidents. In particular, it is investigating whether the current IRS audit program is able to adequately enforce the nation’s tax laws against a president, like Trump, who has complex business holdings. (read more)
The 10th U.S. Circuit Court of Appeals dismissed the lawsuit calling into question the 2020 election. The media immediately jumps on it saying that the lawsuit relied on “baseless conspiracy theories” spread by Trump and his supporters that the election was stolen in favor of Joe Biden. This is in itself FAKE NEWS and a deliberate attempt by the media to continue this narrative undermining the corruption in the election system of the United States. The media refuses to explain the truth for, in fact, their own conspiracy theory was not the basis for dismissing the lawsuit.
Among others, the lawsuit named Facebook and Denver-based Dominion Voting Systems, whose election machines remain the focus of voter fraud allegations. The court ruling had NOTHING to do with the validity of the allegations. The court found that eight plaintiffs from across the U.S. had no standing to assert that the outcome of the election “violated the constitutional rights of every registered voter in the United States.” “NO STANDING” means they had no right to bring the action and it has nothing to do with the validity of the claims.
U.S. Magistrate Judge N. Reid Neureiter dismissed the lawsuit in April 2021, finding the plaintiffs failed to show they had suffered specific injuries due to the election result and thus had no standing to bring the lawsuit.
Clearly, the courts just do not want to get involved and they will continue to use every possible loophole they can argue NOT to rule on the claims. The Judiciary has simply REFUSED to defend the Constitution or to allow such a case to go to trial and let the people decide on the evidence. Their refusal to address this issue leaves the 2022 election ripe for civil unrest for whoever loses, will argue it was rigged. That is probably part of the Panic Cycle our computer has targeted for the 2022 mid-term election.
Posted originally on the conservative tree house on June 1, 2022 | Sundance
Last night Representative Matt Gaetz (R-FL) made an explosive announcement as an outcome of a whistleblower providing information to him and Jim Jordan about the FBI having a collaborative relationship with the Clinton/DNC law firm Perkins Coie. {Go Deep} Specifically, the explosive element surrounds the FBI having a workspace within the DNC law firm that would have given Democrats an open portal into FBI databases for use in opposition research.
Secondarily, Clinton campaign lawyer Michael Sussmann being in charge of this working arrangement within Perkins Coie for the past year, since the departure of Marc Elias, becomes a far greater issue. The potential ramifications of this joint collaborative activity are vast.
The FBI can exploit the NSA database to conduct searches of all cell phone, computer, email, text message, social media, electronic communication and all private data/communication belonging to Americans; this would include geolocation. If the FBI was operating within Perkins Coie since 2012, then the democrats have held access to fully intrusive electronic surveillance of their political opposition, or anyone else – anywhere, for a decade.
Mainstream conservative defenders of the DOJ and FBI institutions, as a result of their prior tenure inside those same agencies, have long denied the Dept of Justice and FBI are corrupt political entities. The revelation of the FBI and Perkins Coie working collaboratively to exploit this data portal is something that people like Margot Cleveland, Andrew McCarthy, Johnathan Turley and many others need to deny in order to retain the premise of institutional credibility.
However, the FBI and DNC law firm working collaboratively on issues of joint importance goes far beyond the ‘image of impropriety or conflicted interest‘ and extends to the actual corruption within the foundational institutions of government. Transparently, if these reports are accurate all of the inexplicable dynamics within the “two tiers of justice” suddenly reconcile. The FBI and Perkins Coie having the ability to conduct electronic surveillance of any target is a thermonuclear level of sunlight, that reconciles years of visible issues.
There is a common misconception about why the FBI and intelligence apparatus began investigating the political campaign of Donald Trump.
In this refresher outline I hope to provide some deep source material that will provide context to the revelation of the FBI-Perkins Coie relationship against numerous historic reference points that reconcile with the new revelation.
During the timeframe of December 2015 through April 2016 the NSA database was being exploited by contractors within the intelligence community, specifically within the FBI, doing unauthorized searches.
On March 9, 2016, oversight personnel doing a review of FBI system access were alerted to thousands of unauthorized FBI search queries of specific U.S. persons within the NSA database.
NSA Director Mike Rogers was made aware.
Subsequently NSA Director Rogers initiated a full compliance review of the system to identify who was doing the searches; & what searches were being conducted.
On April 18, 2016, following the preliminary audit results, Director Rogers shut down all FBI contractor access to the database after he learned FISA-702 “about”(17) and “to/from”(16) search queries were being done without authorization.
Thus begins the first discovery of a much bigger background story.
When you compile the timeline with the people involved; and the specific wording of the resulting review, which was then delivered to the FISA court; and overlay the activity that was taking place in the 2016 political primary; what we discover is a process where the metadata collected by the NSA was being searched for political opposition research and surveillance.
Tens-of-thousands of unauthorized and unlawful searches were identified by the FISA court as likely extending much further than the compliance review period: “while the government reports it is unable to provide a reliable estimate of the non compliant queries since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 period coincided with an unusually high error rate”.
In short, during the Obama administration access to the NSA database was continually used to conduct surveillance. This is the critical point that leads to understanding the origin of “Spygate”, as it unfolded in the Spring and Summer of 2016.
It was the discovery of the database exploitation and the removal of access as a surveillance tool that seemed to create the initial problem for the FBI political unit in Washington, DC. Here’s how we can tell.
In December 2015 there were 17 GOP candidates, all needing opposition research.
However, when Donald Trump won New Hampshire, Nevada and South Carolina the field was significantly whittled. Trump, Cruz, Rubio, Kasich and Carson remained.
On Super Tuesday, March 2, 2016, Donald Trump won seven states (VT, AR, VA, GA, AL, TN, MA) it was then clear that Trump was the GOP frontrunner with momentum to become the presumptive nominee.
On March 5th, 2016, DonaldTrump won Kentucky and Louisiana; and on March 8th Trump won Michigan, Mississippi and Hawaii.
The next day, March 9, 2016, is when NSA security alerts warned internal oversight personnel that something sketchy was going on. This timing is not coincidental.
As FISA Judge Rosemary Collyer later wrote in her report, “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” Put another way: attributes belonging to a specific individual(s) were being targeted and queried, unlawfully. Given what was later discovered, it seems obvious the primary search targets, over multiple date ranges, were political candidates, specifically Donald Trump.
There were tens-of-thousands of unauthorized search queries; and as Judge Collyer stated in her report, there is no reason to believe the 85% non compliant rate was any different from the abuse of the NSA database going back to 2012, the same year the FBI collocated a workspace within Perkins Coie.
As you will see below the NSA database was how political surveillance was being conducted during Obama’s second term in office. However, when the system was flagged, and when NSA Director Mike Rogers shut down “FBI contractor” access to the system, the system users needed to develop another way to get access.
Mike Rogers shuts down access on April 18, 2016. On April 19, 2016, Fusion-GPS founder Glenn Simpson’s wife, Mary Jacoby visits the White House. Immediately thereafter, the DNC and Clinton campaign contract Fusion GPS… who then hire Christopher Steele.
Knowing it was federal “contractors”, outside government with FBI access to the system doing the unauthorized searches, the question becomes: who were the contractors?
The possibilities are quite vast. Essentially anyone the FBI or intelligence apparatus was using could have participated. Crowdstrike was a known FBI contractor; they were also contracted by the DNC. Shawn Henry was the former head of the FBI office in DC and later become part of Crowdstrike’s leadership team, a rather dubious contractor for the government and a politically connected data security and forensic company.
FBI Director James Comey’s special friend Daniel Richman was an unpaid FBI “special employee” with security access to the database. Nellie Ohr began working for Fusion-GPS on the Trump project in November 2015 and she was a previous open-source CIA contractor; and now that we know the FBI and Perkins Coie were in a collaborative relationship, we can also presume they were FBI contractors with similar clearances and access.
Remember the Sharyl Attkisson computer intrusions? It’s all part of this same network; Attkisson even names Shawn Henry as a defendant in her ongoing lawsuit.
All of the aforementioned names, and so many more, held a political agenda in 2016.
It seems likely if the NSA flags were never triggered then the contracted FBI system users would have continued exploiting the NSA database for political opposition research; which would then be funneled to the Clinton team. However, once the unauthorized flags were triggered, the system users (including those inside the FBI and sister agency the CIA) would need to find another back-door to continue… Again, the timing becomes transparent.
Immediately after NSA flags were raised March 9, 2016, the same FBI and CIA intelligence agencies began using confidential human sources (CHS’s) to run into the Trump campaign. By activating intelligence assets like Joseph Mifsud and Stefan Halper the IC (CIA, FBI) and system users had now created an authorized way to continue the same political surveillance operations.
When Donald Trump hired Paul Manafort on March 28, 2016, it was a perfect scenario for those doing the surveillance. Manafort was a known entity to the FBI and was previously under investigation. Paul Manafort’s entry into the Trump orbit was perfect for Glenn Simpson to sell his prior research on Manafort as a Trump-Russia collusion script two weeks later.
The shift from “unauthorized exploitation of the NSA database” to legally authorized exploitation of the NSA database was now in place. This was how they continued the political surveillance. This is the confluence of events that originated “spygate”, or what officially blossomed into the FBI investigation known as “Crossfire Hurricane” on July 31.
If the NSA flags were never raised; and if Director Rogers had never initiated the compliance audit; and if the FBI political contractors were never blocked from access to the database; they would never have needed to create a legal back-door, a justification to retain the surveillance. The political operatives/contractors would have just continued the targeted metadata exploitation.
Once they created the FBI surveillance door, Fusion-GPS was then needed to get the FBI known commodity of Chris Steele activated as a pipeline. Into that pipeline all system users pushed opposition research. However, one mistake from the database extraction, likely during an “about” query, shows up as a New Yorker named Michael Cohen in Prague.
That misinterpreted data from a FISA-702 “about query” is then piped to Steele and turns up inside the dossier; it was the wrong Michael Cohen. It wasn’t Trump’s lawyer, it was an art dealer from New York City with the same name; the same “identifier”.
A DEEP DIVE – How Did It Work?
Start by reviewing the established record from the 99-page FISC opinion rendered by Presiding Judge Rosemary Collyer on April 26, 2017. Review the details within the FISC opinion.
I would strongly urge everyone to read the FISC report (full pdf below) because Judge Collyer outlines how the DOJ, which includes the FBI, had an “institutional lack of candor” in responses to the FISA court. In essence, the Obama administration was continually lying to the FISA court about their activity, and the rate of fourth amendment violations for illegal searches and seizures of U.S. persons’ private information for multiple years.
Unfortunately, due to intelligence terminology Judge Collyer’s brief and ruling is not an easy read for anyone unfamiliar with the FISA processes. That complexity also helps the media avoid discussing it; and as a result most Americans have no idea the scale and scope of the Obama-era surveillance issues. So we’ll try to break down the language.
For the sake of brevity and common understanding CTH will highlight the most pertinent segments showing just how systemic and troublesome the unlawful electronic surveillance was.
Early in 2016 NSA Director Admiral Mike Rogers was alerted of a significant uptick in FISA-702(17) “About” queries using the FBI/NSA database that holds all metadata records on every form of electronic communication.
The NSA compliance officer alerted Admiral Mike Rogers who then initiated a full compliance audit on/around March 9th, 2016, for the period of November 1st, 2015, through May 1st, 2016.
While the audit was ongoing, due to the severity of the results that were identified, Admiral Mike Rogers stopped anyone from using the 702(17) “about query” option, and went to the extraordinary step of blocking all FBI contractor access to the database on April 18, 2016 (keep these dates in mind).
Here are some significant segments:
The key takeaway from these first paragraphs is how the search query results were exported from the NSA database to users who were not authorized to see the material. The FBI contractors were conducting searches and then removing, or ‘exporting’, the results. Later on, the FBI said all of the exported material was deleted.
Searching the highly classified NSA database is essentially a function of filling out search boxes to identify the user-initiated search parameter and get a return on the search result.
♦ FISA-702(16) is a search of the system returning a U.S. person (“702”); and the “16” is a check box to initiate a search based on “To and From“. Example, if you put in a date and a phone number and check “option 16” as the search parameter the user will get the returns on everything “To and From” that identified phone number for the specific date. Calls, texts, contacts etc. Including results for the inbound and outbound contacts.
♦ FISA-702(17) is a search of the system returning a U.S. person (702); and the “17” is a check box to initiate a search based on everything “About” the search qualifier. Example, if you put a date and a phone number and check “option 17” as the search parameter the user will get the returns of everything about that phone. Calls, texts, contacts, geolocation (or gps results), account information, user, service provider etc. As a result, 702(17) can actually be used to locate where the phone (and user) was located on a specific date or sequentially over a specific period of time which is simply a matter of changing the date parameters.
And that’s just from a phone number.
Search an ip address “about” and read all data into that server; put in an email address and gain everything about that account. Or use the electronic address of a GPS enabled vehicle (about) and you can withdraw more electronic data and monitor in real time. Search a credit card number and get everything about the account including what was purchased, where, when, etc. Search a bank account number, get everything about transactions and electronic records etc. Just about anything and everything can be electronically searched; everything has an electronic ‘identifier’.
The search parameter is only limited by the originating field filled out. Names, places, numbers, addresses, etc. By using the “About” parameter there may be thousands or millions of returns. Imagine if you put “@realdonaldtrump” into the search parameter? You could extract all following accounts who interacted on Twitter, or Facebook etc. The search result is only limited by the operators’ imagination and the scale of the electronic connectivity.
As you can see below, on March 9th, 2016, internal auditors noted the FBI was sharing “raw FISA information, including but not limited to Section 702-acquired information”. Who were they sharing it with? Perkins Coie?
In plain English the raw search returns were being shared with unknown entities without any attempt to “minimize” or redact the results. The person(s) attached to the search results were named and obvious. There was no effort to hide their identity or protect their 4th amendment rights of privacy; and database access was from the FBI network:
But what’s the scale here? This is where the story really lies.
Read this next excerpt carefully.
The operators were searching “U.S Persons”. The review of November 1, 2015, to May 1, 2016, showed “eighty-five percent of those queries” were unlawful or “non compliant”.
85% !! “representing [redacted number]”.
We can tell from the space of the redaction the number of searches were between 10,000 and 99,999 [six digits]. If we take the middle number of 50,000 – a non compliant rate of 85 percent means 42,500 unlawful searches out of 50,000.
The [six digit] amount (more than 10,000, less than 99,999), and 85% error rate, was captured in a six month period, November 2015 to April 2016. The timeframe of highest interest in the republican presidential primary.
Also notice this very important quote: “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” This tells us the system users were searching the same phone number, email address, electronic identifier, repeatedly over different dates. Put another way, specific person(s) were being tracked/monitored.
Additionally, notice the last quote: “while the government reports it is unable to provide a reliable estimate of” these non lawful searches “since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 coincided with an unusually high error rate”.
That means the 85% unlawful FISA-702(16)(17) database abuse has likely been happening since 2012.
2012 is an important date in this database abuse because a network of specific interests is assembled that also shows up in 2016/2017:
Who was 2012 FBI Director? Robert Mueller, who was selected by the FBI group to become special prosecutor in 2017.
Who was Mueller’ chief-of-staff? Aaron Zebley, who became one of the lead lawyers on the Mueller special counsel.
Who was 2012 CIA Director? John Brennan (remember the ouster of Gen Petraeus)
Who was ODNI? James Clapper.
Remember, the NSA is inside the Pentagon (Defense Dept) command structure. Who was Defense Secretary? Ash Carter
Who wanted NSA Director Mike Rogers fired in 2016? Brennan, Clapper and Carter.
And finally, who wrote and signed-off-on the January 2017 Intelligence Community Assessment and then lied about the use of the Steele Dossier? The same John Brennan, and James Clapper along with James Comey.
Tens of thousands of searches over four years (since 2012), and 85% of them are illegal. The results were extracted for?…. (I believe this is all political opposition use; and I’ll explain why momentarily.)
OK, that’s the stunning scale; but who was involved?
Private contractors with access to “raw FISA information that went well beyond what was necessary to respond to FBI’s requests“.
So, someone using the justification of FBI “requests”, was exploiting their access to the FBI portal; and they were searching for material “well beyond” the justification of “FBI requests” the used. Doesn’t this exactly sound like someone in Perkins Coie using their FBI portal access?
And as noted, the contractor access was finally halted on April 18th, 2016.
[Coincidentally (or likely not), the wife of Fusion-GPS founder Glenn Simpson, Mary Jacoby, goes to the White House the very next day on April 19th, 2016.]
None of this is conspiracy theory.
All of this is laid out inside this 99-page opinion from FISC Presiding Judge Rosemary Collyer who also noted that none of this FISA abuse was accidental in a footnote on page 87: “deliberate decisionmaking“:
This specific footnote, if declassified, could be a key. Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”, this sentence has the potential to expose an internal decision; withheld from congress and the FISA court by the Obama administration; that outlines a process for access and distribution of surveillance data.
Note: “no notice of this practice was given to the FISC until 2016“, that is important.
Summary: The FISA court identified and quantified tens-of-thousands of search queries of the NSA/FBI database using the FISA-702(16)(17) system. The database was repeatedly used by persons with FBI contractor access who unlawfully searched and extracted the raw results without redacting the information and shared it with an unknown number of entities.
The outlined process certainly points toward a political spying and surveillance operation; and we are not the only one to think that’s what this system is being used for.
Back in 2017 when House Intelligence Committee Chairman Devin Nunes was working to reauthorize the FISA legislation, Nunes wrote a letter to ODNI Dan Coats about this specific issue:
SIDEBAR: To solve the issue, well, actually attempt to ensure it never happened again, NSA Director Admiral Mike Rogers eventually took away the “About” query option permanently in 2017. NSA Director Rogers said the abuse was so inherent there was no way to stop it except to remove the process completely. [SEE HERE] Additionally, the NSA database operates as a function of the Pentagon, so the Trump administration went one step further. On his last day as NSA Director Admiral Mike Rogers -together with ODNI Dan Coats- put U.S. cyber-command, the database steward, fully into the U.S. military as a full combatant command. [SEE HERE] Unfortunately it didn’t work as shown by the 2018 FISC opinion rendered by FISC Judge James Boasberg [SEE HERE]
There is little doubt the NSA database system was used by Obama-era FBI officials and political allies, from 2012 through April 2016, as a way to spy on their political opposition.
Quite simply, there is no other intellectually honest explanation for the scale and volume of database abuse that was taking place; and keep in mind these searches were all ruled to be unlawful. Searches for repeated persons over a period time that were not authorized.
When we reconcile what was taking place and who was involved, then the actions of the exact same principle participants take on a jaw-dropping amount of clarity.
All of the action taken by CIA Director Brennan, FBI Director Comey, ODNI Clapper and Defense Secretary Ashton Carter make sense. Including their effort to get NSA Director Mike Rogers fired.
Everything that comes after March 9, 2016, had a dual purpose: (1) done to cover up the weaponization of the FISA database. [Explained Here] Spygate, Russia-Gate, the Steele Dossier, and even the 2017 Intelligence Community Assessment (drawn from the dossier and signed by the above) were needed to create a cover-story and protect themselves from discovery of this four year weaponization, political surveillance and unlawful spying. Even the appointment of Robert Mueller as special counsel makes sense; he was FBI Director when this began. And (2) they needed to keep the surveillance going.
The beginning decision to use FISA(702) as a domestic surveillance and political spy mechanism appears to have started in/around 2012. Perhaps sometime shortly before the 2012 presidential election and before John Brennan left the White House and moved to CIA. However, there was an earlier version of data assembly that preceded this effort.
Political spying 1.0 was actually the weaponization of the IRS. This is where the term “Secret Research Project” originated as a description from the Obama team. It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller. It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:
The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)
Why disks? Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS. All of the evidence within this sketchy operation came directly to the surface in early spring 2012.
The IRS scandal was never really about the IRS, it was always about the DOJ asking the IRS for the database of information. That is why it was transparently a conflict when the same DOJ was tasked with investigating the DOJ/IRS scandal. Additionally, Obama sent his chief-of-staff Jack Lew to become Treasury Secretary; effectively placing an ally to oversee/cover-up any issues. As Treasury Secretary Lew did just that.
Lesson Learned – It would appear the Obama administration learned a lesson from attempting to gather a large opposition research database operation inside a functioning organization large enough to have some good people that might blow the whistle.
The timeline reflects a few months after realizing the “Secret Research Project” was now worthless (June 2012), they focused more deliberately on a smaller network within the intelligence apparatus and began weaponizing the FBI/NSA database. If our hunch is correct, that is what will be visible in footnote #69:
How this all comes together.
Fusion GPS was not hired in April 2016 to research Donald Trump. As shown in the evidence provided by the FISC, the FBI contractors were already doing surveillance and spy operations. The Clinton campaign already knew everything about the Trump campaign, as they were monitoring everything by exploiting their FBI relationship and the Perkins Coie location for portal access to the database.
However, after the NSA alerts in/around March 9th, 2016, and particularly after the April 18th shutdown of contractor access, the Clinton Team and FBI needed Fusion GPS to create a legal albeit ex post facto justification for the pre-existing surveillance and spy operations. Fusion GPS gave them that justification in the Steele Dossier.
That’s why the FBI small group, which later transitioned into the Mueller team, were so strongly committed to and defending the formation of the Steele Dossier and its dubious content. The Steele Dossier was used in lieu of the ‘Woods File’, underpinning the justification for the Carter Page Title-1 surveillance warrant.
The Steele Dossier, an outcome of the Fusion contract, contains two purposes: (1) the cover-story and justification for the pre-existing FBI surveillance operation (protect Obama and Clinton); and (2) facilitate the FBI counterintelligence operation against the Trump campaign (assist Clinton and Perkins Coie).
An insurance policy would be needed.
The Steele Dossier becomes the investigative virus the FBI wanted inside the system. To get the virus into official status, they used the FISA application as the delivery method and injected it into a Title-1 search warrant against Carter Page. The FBI already knew Carter Page (he worked for the CIA); essentially Carter Page was irrelevant, what they needed was the FISA warrant and the Dossier in the system {Go Deep}.
The Obama FBI needed Fusion GPS to give them a plausible justification for already existing political surveillance and spy operations. Fusion-GPS gave them that justification and evidence for a FISA warrant with the Steele Dossier.
Ultimately that’s why the Steele Dossier was so important; without it, the FBI would not have the tool that Mueller needed to continue the investigation of President Trump. In essence by renewing the FISA application in 2017, despite them knowing the underlying dossier was junk, the FBI was keeping the surveillance gateway open for Team Mueller to exploit later on.
Additionally, without the Steele Dossier the DOJ and FBI are naked with their surveillance (FISA-702) abuse as outlined by John Ratcliffe.
I have created this site to help people have fun in the kitchen. I write about enjoying life both in and out of my kitchen. Life is short! Make the most of it and enjoy!
This is a library of News Events not reported by the Main Stream Media documenting & connecting the dots on How the Obama Marxist Liberal agenda is destroying America