IG Report: Peter Strzok Statements About Weiner/Abedin Laptop Conflict With FBI Claims About Weiner/Abedin Laptop…

General David Petraeus was arrested for leaving his classified schedule on mistress Paula Broadwell’s nightstand.  Kristian Saucier was arrested for taking a classified photograph on a submarine.  Anthony Weiner and Huma Abedin had dozens of classified Clinton emails on a laptop and…

There is a great deal of inconsistent application of law surrounding classified information. There is also a great deal of fatigue surrounding discussion of those inconsistent applications.  Contradictions, inconsistency and obtuse justifications are as rampant in our midst as the political narratives shaping them.  Perhaps that’s by design.

We begin reading Chapter 11 of the IG Report with a growing acceptance that not only is there a need for a special counsel, but there is a brutally obvious need for multiple special counsels; each given a specific carve-out investigation that comes directly from the content of the Inspector General report.   This issue of the handling of the Weiner/Abedin laptop screams for a special counsel investigation on that facet alone.  Why?

Well, consider this from page #388 (emphasis mine):

Midyear agents obtained a copy of the Weiner laptop from NYO immediately after the search warrant was signed on October 30.

The laptop was taken directly to Quantico where the FBI’s Operational Technology Division (OTD) began processing the laptop. The Lead Analyst told us that given the volume of emails on the laptop and the difficulty with de-duplicating the emails that “at least for the first few days, the scale of what we’re doing seem[ed] really, really big.”

Strzok told us that OTD was able “to do some amazing things” to “rapidly de-duplicate” the emails on the laptop, which significantly lowered the number of emails that the Midyear team would have to individually review. Strzok stated that only after that technological breakthrough did he begin to think it was “possible we might wrap up before the election.”  (pg 388)

The key takeaway here is two-fold.  First, the laptop is in the custody of the FBI; that’s important moving forward (I’ll explain later).  Also, specifically important, FBI Agent Peter Strzok, the lead investigative authority in the Hillary Clinton MYE (Mid-Year-Exam), is explaining to the IG how they were able to process an exhaustive volume of emails (350,000) and Blackberry communications (344,000) in a few days; [Oct 30 to Nov 5]

Note: “OTD was able “to do some amazing things to rapidly de-duplicate” the emails on the laptop.

OK, you got that?

Now lets look at the very next page, #389 (again, emphasis mine):

[…] The FBI determined that Abedin forwarded two of the confirmed classified emails to Weiner. The FBI reviewed 6,827 emails that were either to or from Clinton and assessed 3,077 of those emails to be “potentially work-related.”

The FBI analysis of the review noted that “[b]ecause metadata was largely absent, the emails could not be completely, automatically de-duplicated or evaluated against prior emails recovered during the investigation” and therefore the FBI could not determine how many of the potentially work-related emails were duplicative of emails previously obtained in the Midyear investigation. (pg 389)

See the problem?  See the contradiction?

Strzok is saying due to some amazing wizardry the FBI forensics team was able to de-duplicate the emails.  However, FBI forensics is saying they were NOT able to de-duplicate the emails.

Both of these statements cannot be true.  And therein lies the underlying evidence to support a belief the laptop content was never actually reviewed.  But it gets worse, much worse….

To show how it’s FBI Agent Peter Strzok that is lying; go back to chapter #9 and re-read what the New York case agent was saying about the content of the laptop.

The New York FBI analysis supports the FBI forensic statement in that no de-duplication was possible because the metadata was not consistent.   The New York FBI Weiner case agent ran into this metadata issue when using extraction software on the laptop.

CHAPTER 9:    The case agent assigned to the Weiner investigation was certified as a Digital Extraction Technician and, as such, had the training and skills to extract digital evidence from electronic devices.

The case agent told the OIG that he began processing Weiner’s devices upon receipt on September 26. The case agent stated that he noticed “within hours” that there were “over 300,000 emails on the laptop.”

The case agent told us that on either the evening of September 26 or the morning of September 27, he noticed the software program on his workstation was having trouble processing the data on the laptop.  (pg 274)

The New York Case Agent then describes how inconsistent metadata within the computer files for the emails and Blackberry communications, made it impossible for successful extraction.  The FBI NY case agent and the Quantico FBI forensics agent agree on the metadata issue and the inability to use their software programs for extraction and layered comparison for the purposes of de-duplication.

Both NY and Quantico contradict the statement to the IG by FBI Agent Peter Strzok.  However, that contradiction, while presented in a factual assertion by the IG, is entirely overlooked and never reconciled within the inspector general report.  That irreconcilable statement also sheds more sunlight on the motives of Strzok.

Next up, there were only three FBI people undertaking the October Clinton email review.  To learn who they are we jump back to Chapter #11, page #389.

The Midyear team flagged all potentially work-related emails encountered during the review process and compared those to emails that they had previously reviewed in other datasets. Any work-related emails that were unique, meaning that they did not appear in any other dataset, were individually reviewed by the Lead Analyst, [Peter] Strzok, and FBI Attorney 1 [Tashina Gauhar] for evidentiary value.  (pg 389)

Pete Strzok, Tash Gauhar and the unknown lead analyst.  That’s it.  Three people.

This is the crew that created the “wizardry” that FBI Director James Comey says allowed him to tell congress with confidence that 1,355,980 electronic files (pg 389), containing 350,000 emails and 344,000 Blackberry communications were reviewed between October 30th and the morning of November 6th, 2016.

Three people.

Pete, Tash and one lead analyst.  Uh huh.

Sure.

The Inspector General just presents the facts; that’s obviously what he did.  Then it’s up to FBI and DOJ leadership to accept the facts, interpret them, and apply their meaning.

No bias?

But FBI is committed to bias training?

FUBAR.

There is an actual hero in all of this though.  It’s that unnamed FBI Case Agent in New York who wouldn’t drop the laptop issue and forced the FBI in DC to take action on the laptop.  Even the IG points this out (chapter #9, page 331):

We found that what changed between September 29 and October 27 that finally prompted the FBI to take action was not new information about what was on the Weiner laptop but rather the inquiries from the SDNY prosecutors and then from the Department. The only thing of significance that had changed was the calendar and the fact that people outside of the FBI were inquiring about the status of the Weiner laptop. (pg 331)

Those SDNY prosecutors only called Main Justice in DC because the New York case agent went in to see them and said he wasn’t going to be the scape goat for a buried investigation (chapter #9, pg 303) “The case agent told us that he scheduled a meeting on October 19 with the two SDNY AUSAs assigned to the Weiner investigation because he felt like he had nowhere else to turn.” … “The AUSAs both told us that the case agent appeared to be very stressed and worried that somehow he would be blamed in the end if no action was taken.”

On October 20, 2016, the AUSAs met with their supervisors at SDNY and informed them of their conversation with the Weiner case agent. The AUSAs stated that they told their supervisors the substantive information reported by the case agent, the case agent’s concerns that no one at the FBI had expressed interest in this information, and their concern that the case agent was stressed out and might act out in some way. (pg 304)

Why would the New York Case Agent be worried?

Consider Page 274, footnote #165:

fn 165:  No electronic record exists of the case agent’s initial review of the Weiner laptop. The case agent told us that at some point in mid-October 2016 the NYO ASAC instructed the case agent to wipe his work station. The case agent explained that the ASAC was concerned about the presence of potentially classified information on the case agent’s work station, which was not authorized to process classified information.

The case agent told us that he followed the ASAC’s instructions, but that this request concerned him because the audit trail of his initial processing of the laptop would no longer be available. The case agent clarified that none of the evidence on the Weiner laptop was impacted by this, explaining that the FBI retained the Weiner laptop and only the image that had been copied onto his work station was deleted. The ASAC recalled that the case agent “worked through the security department to address the concern” of classified information on an unclassified system. He told us that he did not recall how the issue was resolved.

Now watch embed tweet video:

.

Summary:

  • There were only three people in the Mid-Year-Event team granted authority to physically do the Clinton email review.
  • They were: FBI Agent Peter Strzok, FBI Attorney-1 Tashina “Tash” Gauhar, and an unnamed lead analyst.
  • FBI Agent Peter Strzok says they were able to cull the number of emails through the use of “some amazing things to rapidly de-duplicate” the emails.
  • The New York FBI case agent assigned to the Weiner investigation, a certified Digital Extraction Technician, as well as the FBI forensics team in Quantico say it was impossible to use the conflicted metadata to “de-duplicate” the emails.
  • Someone is lying.
  • FBI Director James Comey said his investigative unit used some form of “wizardry” to review the content of the Huma Abedin and Anthony Weiner laptop.
  • The Inspector General makes no determination as to who is telling the truth; and never asked the question of whether an actual review of the laptop emails took place.
  • The FBI still has possession of the Abedin/Weiner laptop.

.

.

⇑ These Cannot Both Be True ⇓

.

 

 

 

Advertisements
This entry was posted in AG Jeff Sessions, Big Government, Big Stupid Government, Clinton(s), Conspiracy ?, Decepticons, Deep State, Dept Of Justice, Desperately Seeking Hillary, Election 2016, FBI, IG Report Clinton Investigation, Jeff Sessions, media bias, Notorious Liars, President Trump, THE BIG UGLY, Uncategorized, White House Coverup. Bookmark the permalink.

1,053 Responses to IG Report: Peter Strzok Statements About Weiner/Abedin Laptop Conflict With FBI Claims About Weiner/Abedin Laptop…

  1. I guess we also shouldn’t forget the very close relationship of Strzok and Brennan!

    Liked by 9 people

  2. Ventura Highway says:

    Strzoker is done. Toast.

    Liked by 3 people

    • cagefree says:

      According to Congressman Jim Jordan (R-Ohio) on Fox w/Neil cavuto, Mr Strzok is still employed at the FBI

      Like

      • farmhand1927 says:

        Yes, we see the problems, the contradictions.

        We’ve read and reread months on end till our eyes are crossed. It doesn’t matter a hill of beans what the average reader of all these documents thinks. All the subtle underlying messages that probably mean something other than what is said don’t seem to have meaning to people that can do something about it.

        This entire endeavor–Clinton emails, Awan Bros, Iran Deal, Uranium One, Fake Dossier, Russian Non-collusion–clearly are all connected. It would not be a stretch to throw in Benghazi and Fast and Furious while we’re at it. They are connected because an incredible arrogance overtook the govt during the Obama Regime. They knew they could do as they pleased to enrich themselves and sell us off like cattle and get away with it because of the media.

        Each and every crime and scandal are tentacles attached to the same hideous 2-headed monster–take your pick which head joins Hillary’s on the shoulders of this nightmarish horror movie we’re forced to watch replayed over and over. Each and every crime and scandal faced exposure and prosecution at the very thought of a President Trump. It was inconceivable to allow him to get close, let alone win. Now, they don’t just fight to keep people out of prison, they fight to keep their billions coming in from One World Order promoters. They fight for survival and they are top notch professionals in the arts of deceit, corruption, distortion and force feeding propaganda.

        The study and debate, the super sleuthing and opinionating has become a cottage industry. It’s becoming more obvious that while a select few underlings that did the bidding and dutifully attended the Secret Society meetings may get anything from raps on the wrists to some time in low security prisons, the Big Fish still swim. And they always will.

        We’ve watched new heroes emerge in the House as they have tried, pretty much in vain, to get this show on the road, rip off scabs and let the bleeding begin. The DOJ is absolutely accountable to Congress but you’d never that by looking. Pundits and ‘experts’ comment and opine ad nauseam on TV while the needle doesn’t move.

        The public is weary. In hindsight, maybe the entire story shook have been buried until all the answers known, all the ducks lined up for the parade, then drop the entire mess like a MOAB, giving the media nowhere to hide because there would be too much to ignore, too many perp’s being marched out of govt offices.

        Liked by 11 people

        • Bo3484 says:

          Farmhand, this is the best offering of a post regarding this matter.

          The Swamp remains.

          The cottage industry you refer which is driven by click-bait such as this site and some others is having their day in the sun. It’s factual noise signifying nothing.

          Like

          • GB Bari says:

            There is nothing about this site that gets even close to “clickbait “.
            This site is run by an individual who performs well-documented and supported analyses on every aspect of this massive corruption scandal, as well as equally comprehensive analyses of economic, trade, immigration and other geopolitical issues that directly affect our nation; in particular those that President Trump is actively addressing.
            Go see what Breitbart has descended into for a good example of a clickbait driven site. Racy headlines with scant articles lacking thoroughness and substance.
            Not here.

            Liked by 2 people

        • Syd (@Syd) says:

          I feel the same way. Nothing is ever going to happen.

          Liked by 1 person

        • Questioning says:

          I disagree. As Sundance suggests this mess needs many Special Investigators with a time frme of under a year to produce actionable results.

          Liked by 2 people

        • Major Rage says:

          Farmhand – put away your pitchfork and plow, take a seat in your rocking chair on the porch, have a nice, long, cool lemonade, and chill-out. You are way too pessimistic, man!

          I’m not saying that the IG’s report is reason to celebrate – but if Sundance can elicit these clear inconsistencies and outright fallacies in the matter of just two days – imagine what the various Congressional committees will do with this report in the coming weeks. Strzok has already been subpoenaed to testify on Capitol Hill. The unnamed Lead Analyst – will be discovered – and, most likely extensively interviewed. The public will get some closure on the factual things that matter.

          On the political front – the things that matter are the continued cleansing of DoJ of any Obama/Clinton holdovers AND the investigation of the Clinton Foundation. It’s all a big, Russian-Mafia style, RICO case that will take a while to unravel. John Gotti – the “Teflon Don” – believed his own press and so, he died in jail. Expect no less for the Clintons.

          Liked by 2 people

          • SteveT says:

            Major, your last para is the key.
            It is absolutely imperative that the FBI & DOJ are cleansed before risking any important indictments. Experience has shown that without this, the corrupt agency incumbents will find a way to let them off.
            The cleansing operation has started but will likely take some time and requires every bit of support to improve the situation during the mid-terms. Make sure your votes count.
            Have patience, the OIG’s report will make it difficult for Rod the rat to avoid being removed (recusal,resignation,impeachment or firing) as his involvement becomes ever clearer.
            Once he is removed, the succession will favour Trump (and the truth) and indictments can commence with hopes of proper justice. Don’t forget, the Demonrats will not allow confirmation of true Republican candidates to replace removals, so they need to be knocked back.
            November will be key, I’m not able to vote (British) but please, if YOU can, do not throw away the opportunity.
            Have patience, but continue the campaign pressure.

            SteveT

            Liked by 1 person

          • mightyconservative says:

            MR,
            “I’m not saying that the IG’s report is reason to celebrate – but if Sundance can elicit these clear inconsistencies and outright fallacies in the matter of just two days – imagine what the various Congressional committees will do with this report in the coming weeks.”

            They will bury it and say they are giving the benefit of the doubt to the perps.

            Like

        • ron Milam says:

          Either Sessions is a complete moron or he wants to get the credit for taking these clowns down thus he refuses to appoint a Special Counsel because Huber is doing what Prosecutors do. We will see.

          Like

      • Steve in Lewes says:

        I read on Sundance’s twitter feed the other day that perhaps the reason why Strzok is still employed is that he may have been granted immunity !

        Like

        • Bud Klatsch says:

          I don’t get the impression that Strzok is cooperating at all? Moreover, thank you SD for incredible detail analysis once again.

          Liked by 1 person

          • ron Milam says:

            We don’t know what is going on with Huber, that is the KEY, if hes isn’t doing what Muller is doing via squeezing these clowns then Sessions is a fool.

            Like

  3. marc says:

    There needs to be a correction. The Blackberry communications were not reviewed. Please read footnote 178 on page 325. The paragraph is on 324, continues on 325. It should be stated the Blackberry communications were not part of the FBI search warrant. A major piece of evidence was ignored.

    Best Regards,
    A Yankee in Connecticut.

    Liked by 18 people

    • Shadrach says:

      Adding on to this, they didn’t issue a search warrant for any of the senior aide’s personal emails (e.g. Abedin, Mills) pg 90 even though they wrote one (pg 120). They didn’t look at private devices (phones) used by Abedin, Mills, or Sullivan (pg 92).

      They didn’t get a search warrant the (Wilkinson, Mills) laptops used to “cull” the initial emails….remember the FBI never got the whole Clinton package, just the culled set (pg 110, 118-119). Then they traded immunity for the ability to look at a ridiculously limited data set (124-125). They didn’t look at Abedin’s emails on the Weiner laptop (380)

      The entire thing is a farce.

      Liked by 5 people

      • Shadrach says:

        I wanted to add, please compare this to what they did to Cohen. Break into his office, take potentially privileged information, and frigging tape together shredded pieces of paper. Ridiculous (even though I suspect Cohen is a POS, it doesn’t matter).

        Liked by 1 person

      • Robert Hayward says:

        Stroxak redid the warrant to include only mail with a security marking, knowing that abadaba removed all security markings before she mailed. Additionally, only first two pages of each were reviewed. Stroker is headed to leavenworth if we ever get an AG

        Liked by 1 person

    • “By no later than September 29, the FBI had learned virtually every fact that was cited by the FBI in late October as justification for obtaining the search warrant for the Weiner laptop, including that the laptop contained: ”

      “An unknown number of BlackBerry communications on the laptop, including one or more messages between Abedin and Clinton, indicating the possibility that the laptop contained communications from the early months of Clinton’s tenure; 178”

      “178 Although Comey identified this fact as critical to his assessment of the potential significance of the emails on the Weiner laptop, the information was not included in the October 30 search warrant application for the Weiner laptop. ”

      The key words are “justification” and later “the information.” The information should have been provided as justification for the search warrant, and did not pertain to whether the blackberry texts were included in the search warrant application.

      Having said that, you’re still sort of right in the sense that nothing on the laptop even became the basis for an investigation, and SD thinks the MYE team just pretended to look at it and then shut the whole thing down.

      Like

      • marc says:

        I’m not disagreeing with the Author, the search of the laptop was a farce. The statement the blackberry communications were reviewed is incorrect. Reading chapter 11 the IG admonished the FBI for not including the information in the warrant, therefore the information was not reviewed. Is that obstruction, perhaps. That was the point of my comment. The potential evidence was set aside on purpose. Maybe voices in the report stated the blackberry communications could be significant to the investigation. Why were they set aside?

        Liked by 1 person

        • Sorry, the “information” was justification for the warrant application, not the subject matter to be searched. The IG simply said the importance of the BB messages should have been emphasized in the justification for the warrant application. My reading of the IG report is clear – they had legal access to the BB messages via the search warrant, Strzok’s team simply didn’t do much with them. The IG was criticizing the lack of attention throughout the process to the BB messages but there’s nothing in there that suggests the warrant application was twisted around the BB messages (e.g. Application subject matter: “the Weiner laptop, sans the BB messages”, which is silly).

          Like

          • MCG says:

            I strongly disagree. The BlackBerry Communications were not part of the warrant application. The material was not on of the four categories of material. Please refer to page 379. The text reads as follows:

            “I. The October 30, 2016 Search Warrant
            The FBI obtained a search warrant for the Midyear-related material on the
            Weiner laptop on October 30, 2016. The search warrant authorized the FBI to
            search for four categories of information on the laptop:
            1. Data and information associated with the operation, use,
            maintenance, backup, auditing, and security functions of the Subject
            Laptop…;
            2. Data and information electronically stored on the Subject Laptop
            related to communications with email accounts used by former
            Secretary of State Hillary Clinton during her tenure as Secretary of
            State;
            3. Data and information on the Subject Laptop that might identify the
            person or persons who accessed classified information present on the
            Subject Laptop…; and
            4. Data and information on the Subject Laptop that might identify
            activity related to a computer intrusion….
            We discuss the Midyear team’s decision to seek a search warrant rather than
            using consent to review the laptop below. We also discuss the narrow factual basis
            for the search warrant that the Midyear team included in the application and
            compare the Weiner laptop with the treatment of other devices during the main
            part of the Midyear investigation. ”

            There is no mention of BlackBerry communications. The wording above is specific for a reason.

            Regards.

            Like

          • MCG says:

            I’m going to add the passage from page 389. The Author skimmed over this section. This clearly states only the Clinton related emails were reviewed. The agent was not happy….from below… Analyst 1 stated, “I had very strict
            instructions that all I was allowed to do within the case was look for Hillary Clinton
            emails, because that was the scope of our work.” .

            “Analysts on the Midyear team subsequently drafted a document summarizing
            the review of the Weiner laptop entitled, “Anthony Weiner Laptop Review for
            Communications Pertinent to Midyear Exam.” This document, dated November 15,
            2016, showed that the full image of the laptop contained approximately 1,355,980
            items, or files. According to the document, FBI OTD initially extracted
            approximately 350,000 emails from the laptop and then approximately 344,000
            BlackBerry backup files.
            190
            The FBI determined that 4 of the 13 BlackBerry backups
            “were assessed to belong to Abedin.” The remaining 9 BlackBerry backups were
            associated with Weiner. The FBI only reviewed emails to or from Clinton during the
            period in which she was Secretary of State, and not emails from Abedin to other
            parties or emails outside that period. Analyst 1 stated, “I had very strict
            instructions that all I was allowed to do within the case was look for Hillary Clinton
            emails, because that was the scope of our work.” Utilizing various searches
            targeting Clinton’s emails, the FBI reviewed in full “approximately 48,982” items on
            the Weiner laptop. “

            Like

            • You can use BB to send emails. Just because the backups were associated with Weiner or Abedin does not mean there was not correspondence on those backups to or with HRC. So yes they probably did go through the BB backups. Sorry.

              Like

              • MCG says:

                Page 382 has the following paragraph:

                “We asked Prosecutor 1 if there was any discussion of putting in information relating
                to the BlackBerry emails from early in Clinton’s tenure. Prosecutor 1 stated:
                I don’t think so. If it would have helped the probable cause, I would
                have put it in. I don’t think we had…strong enough basis to do that,
                or I would have put it in I’m sure. Because it, I mean we would have,
                anything that we could have put in there that was true and would have
                bolstered the probable cause, we would have put in.”

                Taking all the tidbits as a whole I see the FBI dancing around the subject. BlackBerry related information. The IG went back to the subject again and again. My opinion still stands. They were not reviewed, the BlackBerry related information.

                Like

                • That was a particular subset of emails, and it related to establishing an appropriate probable cause argument in the warrant application. But they did view the BB emails:
                  pp 382-3. ‘In addition, in drafting the search warrant application for the Weiner laptop, a discussion occurred regarding the scope of the requested search warrant and whether it should be limited to emails between Clinton and Abedin, or whether it should include all of Abedin’s emails. Emails from the night of October 29 show that Baker expressed concerns that the draft search warrant request was too narrow. Specifically, in an email at 9:13 p.m. to FBI Attorney 1, Strzok, and Anderson, Baker stated, “The main question I [sic] have right now is why we are only seeking access to emails between Huma and Clinton. Based on the facts set forth about Huma mishandling classified information on all of her accounts, it seems to me there is [probable cause] to look at all of her emails no matter who is the other party. Am I misreading the scope of the warrant or the strength of the [probable cause]?”’

                  There was no distinction made between BB or laptop emails. They saw them all, but only chose to “review” the ones that were to/from HRC. The review itself was also a farce.

                  I am going to leave this topic as it really makes no difference either way. You can believe whatever you choose to.

                  Like

  4. Brian Baker says:

    I actually like the idea of multiple Special Counsels, all DC outsiders, each with a very narrow scope. Just to name a few matters that need review:
    – Anthony Weiner laptop
    – Obstruction of Justice by DOJ & FBI during the Hillary email investigation
    – FISA abuses during, and predating, the 2016 presidential election.
    – Mishandling of classified information by DOJ & FBI officials during, and after, the 2016 presidential election.

    Liked by 6 people

    • JX says:

      Yeah and they can all staff up with Republican lawyers and Trump donors. Then they can kick in doors at four in the morning and later get retro-active authorization to do so.

      Hahahaha! Right.

      Not to worry though, we’re going to sit around the camp fire and re-commit to our ideals. Meanwhile the country will burn down.

      Liked by 6 people

    • jrapdx says:

      A problem with special counsels is preventing “mission creep”. It seems the scope of an SC investigation inevitably expands no matter how it starts off. The “boundaries” of SC investigations are intrinsically “soft” and permeable. Having several SCs working on contiguous cases risks running up costs, duplication of effort, turf battles, and even contradictory findings. You know, human nature, it’s hard to get around.

      Liked by 2 people

      • Questioning says:

        It’s all in the framing of the initial instructions to the SC. Give specific instructions with a time frame and budget for producing actionable results.

        Like

    • LetsPlay says:

      And just when do we get a Special Investigator to start into the misdeeds of Benghazi Hillary as SecState and B. Hussein’s administration over eight years??? Eh?? I don’t care what color his skin might be, crimes were committed by the highest office holders in the land and need to be held accountable. Communists and Moose Limbs in the WH!!! Unbelievable. And for eight years, re-elected even. Disgusting.

      Liked by 4 people

    • Special Prosecutors, okay, but what about now? The Justice Department’s poor performance damages our international crebility. Our national security rests in a collapsed institution armed with unquantified, and, so far, unchecked, powers. .

      The Justice Department/Bureau, under Mueller/Holder , failed to protect our intelligence, period. Comey, and Wray defend the institution, and screw their nation.

      This “matter”, in plain speech, is a major breach which operated unchecked for five years plus. For OUR Justice Dept to PROSECUTE should not require The Second Coming.

      Clintons SS entourage knew, the Chinese, Russians, Iranians cracked it, even some random Romanian hacker found it laughable. The only ones not laughing are American citizens.

      My concern is that Special Prosecutors will distract and provide an excuse to delay confronting and finding solutions for the meta-problem: a Justice adepartment that operates in defiance of it’s duty and legitimate authority.

      Liked by 2 people

    • Special Prosecutors, okay, but what about now? The Justice Department’s poor performance damages our international crebility. Our national security rests in a collapsed institution armed with unquantified, and, so far, unchecked, powers. .

      The Justice Department/Bureau, under Mueller/Holder , failed to protect our intelligence, period. Comey, and Wray defend the institution, and screw their nation.

      This “matter”, in plain speech, is a major breach which operated unchecked for five years plus. For OUR Justice Dept to PROSECUTE should not require The Second Coming.

      Clintons SS entourage knew, the Chinese, Russians, Iranians cracked it, even some random Romanian hacker found it laughable. The only ones not laughing are American citizens.

      My concern is that Special Prosecutors will distract and provide an excuse to delay confronting and finding solutions for the meta-problem: a Justice adepartment that operates in defiance of it’s duty and legitimate authority.

      Like

    • TomJ says:

      Add to that a special counsel to investigate Treason. All who aided and abetted this scheme need to be in prison for life.

      Liked by 1 person

  5. Bubby says:

    Based on Sundance’s analysis of the IG Report it appears that the emails on Weiner’s laptop were probably not reviewed by the FBI. Yet we’re told by Comey that they had been? This is one area Sundance is asking Rep Jim Jordan to look into. I would like to add to Sundance’s requests item # 21. Please verify that the laptop and its contents still exist and determine who specifically has possession of it? My guess is when the FBI is asked to produce the Weiner laptop it will have mysteriously gone missing with no record of what happened to it. Just a wild guess.

    Liked by 15 people

    • Questioning says:

      Something else troubling; the repeated comments on how the FBI super-wizebang “de-duplicating” couldn’t properly work because the meta-data was removed – seriously? The supposed technical abilities of the FBI use 20 year old technology to glean data from emails? That is akin to saying you can’t “de-duplicate” a pile of letters because their envelopes have been removed and discarded. I know, for a fact, that the Government (specifically the DoD and NSA) have software that can rapidly compare actual large scale data sets; they can do this in almost real time.

      Liked by 2 people

      • Bubby says:

        I’m no techie just an old man. I don’t understand what “de-duplicating” is. So what you are saying in layman terms is that the Feds (not necessarily the FBI) have more current technology that could have been used to review Weiner’s laptop in short order but didn’t. Hope I got that right. Then the question becomes why didn’t they? Of course the answer is they didn’t want to, no need to since Hillary was going to be President and their new boss. Just another example of the deep state in action or inaction as in this case.

        Liked by 1 person

  6. David R. Graham says:

    In light of received doctrine that one should expect one’s enemy to do what they should do to annihilate one, and in light of Robert Mueller’s record of prosecuting innocent persons to the point of [apparent] suicide and [definite] worldly ruin (the reason Rod Rosenstein appointed Mueller SC), I posit the following:

    Robert Mueller and his Terrorist Team seek a warrant(s) for their FBI cohort to arrest President Trump and his entire family.  They see an acute need to accomplish that objective, to include, among other reasons, preventing President Trump from campaigning in the mid-term elections. They will move to execution probably sooner than later.  They will find a judge to issue the warrant(s) and will raid the White House and residences of immediate family members when they believe they have the element of surprise and the opportunity to inflict degradation.  They will incarcerate the entire Trump family for the rest of their lives and execute as many of them as they deem seemly (Jack Ruby, Ruby Ridge, Waco).  . . . as a warning to anyone at all against questioning their supreme authority . . . ever again.

    Then begins the war against Robert Mueller and his Terrorist Team and their supporters.  A hot (shooting) war, with elements of the USG shooting at one another, and citizens shooting at one another and elements of USG, state, and local governments.

    Liked by 1 person

  7. Strateshooter says:

    There is only one question I would ask on Monday….
    Mr.OIG , the FBI and yourself have now issued two reports that detail pervasive and serious criminality in the handling of the Clinton email matter and have concluded all is well with the FBI.
    Are you either incompetent or corrupt and in either case can you give me a reason why American taxpayers should continue to pay your salaries ?

    Liked by 12 people

  8. anthohmy says:

    How about this one, the Midyear and the Russia investigations were one-and-the-same, if one is to rely on Stroczk’s statements that they became concerned that the Russians were offering the Trump campaign THE CLINTON EMAILS, the ones the FBI forensic evaluators said they saw no evidence of them ever leaving the henhouse.

    IF the Russians had the emails, then this should have triggered a REOPENING OF MIDYEAR in July 2016, not a brand new “Russian” investigation.

    The whole Russian spectacle is repeated offers to Trump campaign people to get them the emails the FBI had just declared were not hacked/extracted.

    1. Either the FBI knew the premise was malarkey because their forensic experts determined, as a facet of the Midyear Examination, that they classified emails only passed to people in government and that the Chappaqua Homemade Secretary of State email system was secure

    or

    2. The Russians offering up the emails (in a way the FBI knew about it) brought the matter into a new investigatory territory and now there was an evidence trail to follow that the Russians tapped into the Secretary of State’s email and she should have secured it.

    No, somehow they immediately turn this into a Trump campaign might be guilty of something campaign, simply by coming up with a new name for the investigation. The Russia investigation,
    rather than The Russians Have HRC’s Emails changes the Midyear exam.

    Duh.

    Obfuscation station.

    Liked by 12 people

    • Electra says:

      Good Point.

      Like

    • Pelayo says:

      Fact that Peter “No We’ll Stop Him” Strzok is lead person on Clinton email sham investigation, FBI counter intelligence investigation,
      Flynn interview and Special Counsel investigation is complete BS. The FBI has thousands of investigators and they keep tapping this guy to be involved.

      Liked by 10 people

      • Esperanza says:

        Yes! It feels like they have only 2 or 3 people. Let’s have some non DC people in.

        Liked by 2 people

      • iconoclast says:

        Strzok seems to have been assigned to every case that potentially involved the presidential election or the new president: email, counter-intelligence, Flynn, special counsel. This cannot be a mere coincidence.

        Let’s get to the bottom of who was designating him. Brennan? Lynch? Obama?

        Liked by 1 person

        • littleanniesfannie says:

          All of the above with a side of Holder (who ObamA -hole is personally grooming for a 2020 run) since he was the mastermind of several 44-era SCANDALS!

          Like

      • L4grasshopper says:

        Keep in mind that Strzok is upper mgt! He’s either assigning himself, or his upper mgt bosses are assigning him in order to keep things “close hold”.

        Like

    • Pelayo says:

      Fact that Peter “No We’ll Stop Him” Strzok is lead person on Clinton email sham investigation, FBI counter intelligence investigation,
      Flynn interview and Special Counsel investigation is complete BS. The FBI has thousands of investigators and they keep tapping this guy to be involved.

      Liked by 1 person

    • Hmmm... says:

      This is a very important point. It was always an oddity that the FBI was running around with its head on fire looking for Clinton emails when they supposedly had no proof that the server (or servers) were ever hacked. Catherine Herridge at Fox had a report that they suspected the server was hacked. Undercover Huber and Lee Smith have a detailed dissection of the evidence that shows it was likely hacked by Russia. It seems likely that the FBI was extremely interested in those missing emails because it would be extremely harmful to the FBI’s reputation if they ended up being released. It also plays into this post from Sundance since they absolutely could not admit that they found the missing 30,000 emails.

      Things make a lot more sense if you consider that the FBI was fully aware that Russia had those emails, those emails contained damaging information, and that any release of those emails would thoroughly destroy both Hillary and the credibility of the investigation. It really explains the fixation upon Trump’s throwaway line about Russia releasing the missing emails. Ironically, if Russia was actually the wikileaks source for the DNC emails then the fact that they didn’t release the Clinton emails is extremely contradictory.

      The real story is that Russia hacked Hillary’s servers. Russia hacked the DNC servers. Russia hacks anything they can. They are seriously overpowered in comparison to the enormous capability of the NSA so targeted hacks are a real equalizer. Any weakness is exploited and they all made themselves easy targets. The Russian MO is to hack but not leak (just like they didn’t leak the Clinton emails). The DNC leak was not the Russians but because they hacked all of these systems it was possible for the IC to blame it on them. The Russian meddling is seriously overblown. They didn’t meddle. All they did was collect intelligence. Exactly what the NSA and CIA do.

      Liked by 2 people

      • anthony earl says:

        many IT people have said that speed at which the data was transferred from the DNC server, that it could not been a over the wire “hack” but it was most likely a download to a flashdrive. something that like seth rich could have done. so are you implying that SR was working with the Russia?

        Like

        • Hmmm... says:

          No, I think SR leaked the emails with no connection to Russia at all. There is evidence that Russia hacked the DNC server. Nunes has been saying this and the HSCI report included a blurb about it. There is little to no evidence that they were responsible for the leak. Russia could have hacked the server and someone else could have been responsible for the leak. I really think this confusing point is exactly what they seized upon to construct the entire Russia narrative.

          Liked by 1 person

          • DeWalt says:

            Who determined the Russians hacked the DNC? Last I knew, the FBI has yet to examine that server. Are you taking CrowdStrikes word as evidence?

            Like

  9. David Reznor says:

    SUNDANCE: “Contradictions, inconsistency and obtuse justifications are as rampant in our midst as the political narratives shaping them. Perhaps that’s by design.”

    Of course it’s by design. It is malicious design, a cretin’s craft honed over decades by the so-called “intelligence” community to manipulate populaces, and its primary purpose is to generate confusion, not clarity. It is a black art with the name “psyops,” and anyone who believes it doesn’t exist is fodder for it. Ashton Gray has analyzed and exposed some of the most important methods used in CIA psyops, published as an appendix to his book “Watergate: The Hoax.” That analysis has also been published freely as a public service at Chalet Reports:

    “The CIA Psyops of Watergate and Beyond”
    http://www.chaletbooks.com/chaletreports/?p=810

    It summates—and predicted—every last “contradiction, inconsistency, and obtuse justification” that I have seen trotted out in Spygate and the Russia hoax. If you see any that aren’t cataloged there, please send notice to info@chaletbooks.com.

    Liked by 8 people

    • Firefly says:

      Here’s another interesting article by Ashton Gray. Points out that Strzok and Page weren’t hired by Mueller at the same time.

      Meet the Strzok-Page “Insurance Policy”
      …And now you know exactly why Mueller, as Special Counsel, hired Lisa Page, then returned her to the FBI and hired Peter Strzok—probably on the very same day that he sent Lisa Page back to the FBI: 13 July 2017. Now you know why Lisa Page and Peter Strzok were hired by Mueller sequentially, not at the same time—which is what some of their bought-and-paid-for liars in the media would have you believe. Now you know why Mueller muzzled his mouthpiece, Peter Carr, who refused to answer our questions about when Lisa Page went back to the FBI from the Mueller team.
      The naiveté it must take to believe that Mueller just happened to pick both Strzok and Page, and simply had no idea about all they had been up to, and every single detail about the “insurance policy”— Well, you simply have to be dumber than dirt to believe for an instant that Mueller did not know the whole show, at all relevant times.
      Because he did.
      And before very much longer, the whole world is going to know just how deep in and dirty Mr. Insurance Policy really is.
      http://www.chaletbooks.com/chaletreports/?p=1184&

      Liked by 1 person

    • Firefly says:

      Another article referencing Ashton Gray’s book on Watergate Hoax

      EXCLUSIVE: Mueller Mouthpiece Muzzled—Refuses to Answer When Lisa Page Returned to FBI from Mueller Team

      …It should have been simple. Very simple: Just contact Peter Carr—formerly Acting Director of Public Affairs for the Justice Department during the Obama/Trump transition, currently the spokesperson for Special Counsel Robert Mueller—and ask a clear, direct question: “On what specific date—month, day of the month, and year—did Lisa Page leave Mueller’s Special Counsel team and return to the FBI?”
      We did our part—asking the simple question—and that’s where the simplicity came to a smoking, metal-on-metal screeching halt…

      WHY THE DATE IS CRUCIAL
      In simplest terms, the exact date when Lisa Page left the Mueller team and returned to the FBI is crucial in relation to a number of other events that happened during the same general time frame. Stay tuned …
      One hard-won lesson that was learned through decades of research for Ashton Gray’s seminal 600-page exposé of the CIA and the Deep State, Watergate: The Hoax, is that whenever government actors are vague or coy about a date, somebody has got something to hide. That maxim proved itself so many times that we’ve never seen it fail. [Further reading: Ashton Gray’s “The CIA Psyops of Watergate and Beyond,” particularly the section called “The Manipulation of Time.” Article available here. —Ed.]

      The whole article is worth reading

      Liked by 1 person

  10. Chieftain says:

    Could the “de-duplicate” be a reference to duplicates internal to that computer? For example, If the laptop was used to create “backup” copies at different points in time, it MIGHT have multiple copies, no? Also, If the same e-mail was sent to Huma, Cheryl, and Hillary and then forwarded to Huma who forwarded to Weiner’s laptop then multiple copies might once again be on that laptop. The question for me is whether or notthe “de-duplicate” refers to an internal comparison or to the e-mails already searched outside of the Weiner laptop.

    Like

    • acenypd says:

      Since the original 55,000 PAGES of emails clinton provided had no metadata, there is no way to conclusively match the emails from the laptop to them except using the title, date, from, to, total # of characters, etc., which is NOT conclusive. Since the emails from clinton were in paper form, you would have to visually inspect each POSSIBLE match to make sure they were one and the same.
      I said it in 2016, and I will restate it today, the FBI did NOT verify that the emails were matched to already known emails, they just put on a show. They KNEW she was going to win anyway.

      Liked by 8 people

  11. TC Comics says:

    Sorry to be dense, but does the IG Report address what happened to the physical evidence? i.e. Clinton’s server, her mobile devices, etc? It seems incredible for it to have disappeared between upstate NY and Washington unless (1) they were proactively destroyed by Clinton or (2) deliberately lost by the FBI.

    Like

    • LetsPlay says:

      Oh come on now TC, you know better than that. To utter the name Clinton is that answer in and of itself. Of course, THIS investigation had nothing even remotely to do with her actions. It was all about absolving the FBI from perceptions of their actions.

      Those much smarter and wiser than ourselves have long ago determined that it is better that we just let sleeping dogs lie. (several double entendre’s there for you!)

      Like

  12. Phil Garber says:

    You know what has gone AWOL throughout the Clinton investigation and in the IG process as well? (At least at the summary level.)

    There is a complete absence of reasonable skepticism.

    This, in an organization of professional investigators.

    Liked by 7 people

    • Foxy says:

      Agree. This report is really just a superficial summary of findings with Candide like analyses and conclusions. Really laughable. If this was a private sector effort the work product would have been rejected out of hand.

      Liked by 2 people

  13. anthohmy says:

    I have two programs on my computer that can rip through files and quickly identify duplicates. No decoder ring necessary.

    Now how to “de-duplicate” the Russia investigation from the Midyear examination, not seeing that one.

    Liked by 2 people

    • jrapdx says:

      Appears the “Russia investigation” is more a spawn of the MYE than a duplicate. The MYE begot the Russian thing, the MYE “team” were the womb and the midwives. It’s the same theme, new variation, and the song plays on without end.

      Liked by 1 person

    • acenypd says:

      Can your 2 programs identify duplicates between 55000 pages of emails and 30000 email files? You can compare certain aspects, but you would need to visually inspect all possible matches to be 100% sure.

      Liked by 1 person

      • Wind Hawk says:

        This is starting to irritate me. With 10 year old “Big Data” technology, I could OCR any printed documents (even if they were hand written translated to other language), and still do statistical matchups based on the content.

        Granted, the FBI’s tech capabilities are dark ages, but there are “groups” out there that could have digested all of the intelligence (emails, etc) and turned a respectable knowledge extraction in just a few days. Especially with 2015 technology. (And they did/do provide these services to Quantico.)

        The story line is absolute undeniable BS. The “wizardry” was rm -rf /* . Gee, no files left. Guess we still have time to go to that cocktail part with FISA judges and strippers

        Liked by 2 people

      • Foxy says:

        Without an understanding of the code the programs are using to do the comparisons/parsing you can only assume that it is accurate and correct – in your scenario maybe it works well enough for your purposes. This is not sufficient for a project of this importance or complexity

        Like

      • anthohmy says:

        Your question raises an excellent point. I forgot that they handed over the original email in paper form, so it had to be OCR’d which would introduce mayhem and chaos.

        Like

    • Cuppa Covfefe says:

      De-duplicating emails and references (e.g. threads, docs, and links) within them is beyond the capability of the various “diff” programs out there today. Moreover the “files” in question are not files, per se, but data blocks within email archives (e.g. osts and psts). If the metadata is borked, it’s that much harder.

      Having the exchange server side of things would simplify things, but it’s still a huge task.
      The FBI is just blowing smoke.

      Liked by 1 person

      • Foxy says:

        For those of us who have actually done data processing like this (e.g. C code comparing/parsing two or more dissimilar or non-identical files) know it is far from simple, straightforward or 100% accurate. The size of the files is really pretty much irrelevant and relates only to processing time.

        Like

      • anthohmy says:

        Yeah upon reflection and contemplation email files are different than the kinds of files that Beyond Compare handles easily.

        Like

  14. Charlotte says:

    The FBI’s Document Blackouts ~ The bureau is redacting documents without credible justification.

    https://www.wsj.com/articles/the-fbis-document-blackouts-1528931262

    Liked by 2 people

    • Charlotte says:

      Notably, Justice and the FBI have been redacting names or initials of employees involved in handling those cases. This frustrates Congress’s ability to seek more information or interviews with those individuals.
      Potomac Watch Podcast

      One initial batch of documents contained an Oct. 11, 2016 text message from FBI official Peter Strzok to his FBI paramour Lisa Page. It read: “Currently fighting with”—while the rest was redacted. The unredacted version reads: “Currently fighting with Stu for this FISA,” which may be a reference to the warrant the FBI obtained to surveil Trump campaign adviser Carter Page. Who is Stu and what was that fight? Congress has a right to know.

      The initials “BO” are also redacted from several messages. An unredacted version shows a Strzok text on Oct. 7, 2016: “Jesus. More BO leaks in the NYT.” Another from Oct. 25, 2016 reads: “Just cranky at them for bad choices about BO.” Investigators aren’t certain who BO is, but one possibility is Bruce Ohr, the DOJ employee who was demoted after it emerged that he’d held undisclosed meetings with anti-Trump dossier author Christopher Steele, and whose wife worked for Fusion GPS, the firm that hired Mr. Steele.

      Another less-redacted text shows someone blacked out a Strzok explanation for why the FBI didn’t pursue some Clinton leads. “Clinton, Mills, and Abedin all said they felt the server was permitted and did not receive information that it was not. To the extent there was objection down the line in IRM, we did not pursue that as State OIG did, because it was not a key question behind our investigation.”

      Why not? An important issue regarding Mrs. Clinton’s private email server was whether she and aides Cheryl Mills and Huma Abedin intentionally violated State Department rules in setting it up, and if this increased her mishandling of classified information.

      Redactions are supposed to be limited to guarding national security, attorney-client privilege, individual privacy or criminal investigations. These blackouts appear motivated to withhold pertinent information from Congress or spare the FBI political embarrassment.

      Meanwhile, the FBI is refusing to answer a May 11 letter from Sen. Johnson seeking the names of employees who are doing the redacting. Mr. Johnson is concerned that some of the employees involved in this investigation might also be overseeing the redacting.

      As retired FBI special agent Thomas Baker wrote on these pages last month (“The FBI’s Shocking Disrespect for Congress,” May 11), the FBI has damaged its credibility by flouting subpoenas and slow-rolling or hiding information. This behavior is why Congress must continue to pry out the truth.

      Liked by 5 people

  15. Ferret2 says:

    We have found the laptop.

    Liked by 21 people

  16. dayallaxeded says:

    One really basic issue is surprisingly murky and makes no sense in the world of computer forensics: why all the talk about the original laptop and multiple, potentially different copies? That’s not how computer forensics are done. Searches and analysis isn’t done on an original machine. That would cause changes in the data that would taint its use as evidence.

    Every computer forensic investigation I’ve seen (admittedly not a whole lot, but a few involving experts who do contract work for FIB) starts with cloning, not copying, the original system harddrive and/or other storage. It doesn’t matter what’s on the original (eg, consistent metadata or not, varying file types, even different OS), b/c the cloning process simply duplicates, byte by byte the data on the original. Then the original is tagged and secured for future confirmation and use as evidence. No analysis is ever done on the original machine, because every file access changes file attributes, like last accessed, modified, and created. In court you have to prove, eg, when Weiner accessed or created a file, not when some jack-leg FIBber did.

    In short, none of the discussion so far about handling of the Weiner laptop or any computer forensics makes any sense at all, unless we assume that the FIBers are not just lying, incompetent, and/or obfuscating but more like committing sabotage and evidence tampering. If they really expect us to believe the bs they’ve thrown out so far, I’m deeply offended, b/c that means they think they can play me easier than a roll piano. Um, NO!

    Liked by 8 people

    • jrapdx says:

      Excellent points. Your comments about cloning a disk image before examination make perfect sense, sound exactly right. No doubt several clones would be made, never hurts to have multiple backups of crucial data. While I have no trouble believing there are FBI agents who are incompetent or worse, I’m also pretty sure the FBI has a highly capable IT staff to manage the disk handling chores.

      Liked by 1 person

    • DWIM says:

      True. Validated, verified exact duplicate. The original is placed in secured storage, and the duplicate is analyzed.

      Like

  17. Meanwhile, all of this wearing people down, and out… A necessary side effect of what must happen if we the Constitutional oriented people seeking a complete REBOOT of our system without the massive beast aspect of it to be put in place.

    K. I. S. S. Keep It Simple Stupid.

    It is deliberately massive, and we are witnessing why. So nothing ever gets done about those abusing the system while us “normies” are easily prosecuted for things we haven’t even done and they continue to violate ALL of our rights collecting data on us, etc…

    If you’re already screaming for heads to roll and Sessions removal (yawn), might want to take a break as this is NOT going to end quickly. There are literally a couple hundred million people in this nation that have to even get a clue to “accept” what MUST HAPPEN.

    The Reckoning. The Restoration. Whatever you want to call it… must happen. Order without chaos.

    Liked by 2 people

    • TomJ says:

      The thing that will prevent that is our AG Sessions. At this point, only the most naive can think he is a White Hat. He is either in on the scheme to remove Trump or is being threatened or blackmailed.

      For him to allow all this to unfold means to me that the fix is in on the SC. We will have a constitutional crisis soon, one of which the U.S. has never seen before.

      There is no doubt that the SC is the insurance policy. And they did not spend 20 million and hire 13 anti trumpers to in the end let Trump off the hook.

      They will find something and regardless of the secrecy, it will be leaked. At that point, all hell will break loose.

      Sessions will go down in history as one of the biggest betrayals of all time. Both a betrayal to Trump and to the U.S.

      Like

      • Did typing out your histrionic concern rant make you feel better?

        Only the very most naive continually spew their emotionally driven textual crap about Sessions, etc. as if it is some factual truth only they know.

        BTW, it reads like enemedia propaganda too.

        That said though, I have no problem with affording the proper lengths of rope to those who are habitually trying to hang themselves.

        Like

  18. Another Scott says:

    “Strzok is saying due to some amazing wizardry the FBI forensics team was able to de-duplicate the emails.” That’s easy, just put together something that retrieves all the emails on the laptop they previously had from her server and they can say we “we didn’t find anything new”….because they didn’t look for anything new….

    Liked by 1 person

    • Dr.Jay says:

      They DO NOT HAVE the 30K original emails from the Clinton server because Clinton et.al did NOT supply ANY of the original emails (electronic mails) in electronic form, instead they merely handed over PRINTOUTS (to PDF) of the Clinton emails…

      Liked by 1 person

  19. anthohmy says:

    inconsistent application of law…

    This issue is so deep and profound and it should continue to expand as one of the CENTRAL issues of our time.

    Imagine being in high school and a certain group of your classmates go on to work for the DOJ or AG or DA.

    A portion of those people were the stand-up people, the very people you want there. Another portion is the bullies and now they are the Arm of the Law.

    Liked by 1 person

  20. andyocoregon says:

    Hillary should be locked away in prison by now for the multiple felonies she committed.

    Liked by 7 people

  21. More.Confused.Than.Before says:

    Is it possible ,the N.Y. Agent who reviewed Weiner laptop gave Wikileaks the e-mails that ended up getting leaked during the election?

    Like

    • jeans2nd says:

      No. “On March 16, 2016 WikiLeaks launched a searchable archive for over 30 thousand emails & email attachments sent to and from Hillary Clinton’s private email server while she was Secretary of State.” https://wikileaks.org/clinton-emails/

      NYPD did not receive the Weiner laptop until late Sep 2016, 29 Sep 2016 iirc.
      Nice idea, though.

      Like

  22. CountryClassVulgarian says:

    “Strzok told us that OTD was able “to do some amazing things” to “rapidly de-duplicate” the emails on the laptop”
    Hey!! What if OTD is really Penelope the whizz gal from Criminal Intent? She does “amazing things” in under twenty minutes all the time. A few taps on her keyboard and voila!!!

    Oh wait…

    Liked by 1 person

  23. More.Confused.Than.Before says:

    I believe the reason the DNC forbid the FBI to inspect their servers. Is because there could have been some sort of massive spy bot network running on those servers. That they stored against Senators and Congressmen/women.

    Liked by 5 people

  24. pvcdroid says:

    “The FBI still has possession of the Abedin/Weiner laptop.”
    Yea, just like the Clinton server still exists, DNC server is still available and the Strock/Page missing texts have been found. Guaranteed that they have gotten to that laptop to at least delete the really bad stuff just in case some special counsel or nosy Republican decides to take another look.

    Where are the White Hats that are needed to expose all this? I thought they would be coming out of the woodwork.

    Liked by 2 people

  25. The Great Kazoo says:

    The swamprats can’t be trusted to investigate themselves.
    Not even the OIG or anyone else that Sessions assigned.
    The swamprats have gone renegade.
    Nothing short of an armed uprising/public tribunals can reign them in.

    Common law grand juries.
    Here’s how they work:

    https://www.1215.org/lawnotes/lawnotes/grandjuryrules.htm

    Like

  26. Eastender says:

    Thank you Sundance, for your extraordinary results and pinpointing the disgraceful lies and deception of people willing to throw their Country under the bus.
    The amount of time you devote to explaining your findings is mind boggling, and this Treeper is humbly thankful for your efforts. You allow meek sleep at night and digest your findings during the day.

    My only question is when do you sleep?

    Liked by 5 people

    • anthony earl says:

      i wonder if he has a photographic memory. to be able to read and combine details from so many pages of a report is amazing. maybe SD can be the lead on the next SC for POTUS.

      Like

  27. Countrywatch says:

    Wonderful analysis, Sundance. Thank you so much for your unremitting hard work. Hugely appreciated.

    Liked by 4 people

  28. mazziflol says:

    I love reading about how much they are getting away with. Guess it really is the perfect crime.

    Liked by 1 person

  29. Countrywatch says:

    An interesting article on threadreaderapp which urges a degree of patience and reassures that P Trump is absolutely in control.
    https://threadreaderapp.com/thread/1007792551213125637.html
    Thread by @dashman76: “1. Winning thread. Irrefutable logic that @realDonaldTrump is working towards prosecuting the subversive enemies of America. I use analysis based on professional poker”

    Liked by 3 people

    • lotbusyexec says:

      “I hope” – lately that’s all I keep saying! But without hope I’d be crazed and unable to function. The abuse of power is so obvious to all of us without blinders on. Good will overcome the evil we have been living under. I can’t think any other way – I just can’t!

      Like

  30. DanO64 says:

    Wow SD, amazing work.

    Liked by 2 people

  31. “The case agent clarified that none of the evidence on the Weiner laptop was impacted by this, explaining that the FBI retained the Weiner laptop and only the image that had been copied onto his work station was deleted. The ASAC recalled that the case agent “worked through the security department to address the concern” of classified information on an unclassified system. He told us that he did not recall how the issue was resolved.” ~ A mirror image disk should still be in Wiener’s case file. All I can say is, whatever was in them must have been bad and yet again we have a scandal involving the Clintons where the evidence has somehow apparently gone missing. WHERE is the laptop. Where are the “Hashed” mirror image disks. Or have THEY all been destroyed?

    Like

  32. waicool says:

    Wait, strzok IS FBI, to this day! Truth is, Trump’s DOJ has been his major weakness as POTUS, i would go so far as to say Trump is incapable of fixing things. Until this basis truth changes, we the people will continue to be denied the justice we deserve and DEMANDED on election day.

    Like

  33. Howzie says:

    There is no political bias. This is far beyond mere political bias. It is a genuine coup against The Constitution. Enemy action by domestic enemies. Actual sabotage and subversion. The enemy is now prancing around on the criminal media right in your face. Legalized treason and crime. Our justice system is dithering and dallying around it all willy nilly.

    Liked by 3 people

  34. Chris Four says:

    There is no mystery to the de duplicate mumbo jumbo. When you have a set of original files on your computer’s hard drive and you try to save files from another source – thumb drive the computer will ask you if you want to save the new file or delete the old file when there are duplicates. Apparently Strzok never used a computer

    Liked by 1 person

  35. Ospreyzone says:

    Wow, ..is all can say. I recall that those of us who insisted many months ago that a second special counsel was needed were called trolls and worse. It has taken far too long, but I’m relieved to see that common sense is finally gaining traction at CTH with regard to this investigation.

    A government bureaucracy can NOT reliably investigate or audit itself for criminal malfeasance. Never, ever. That is what a prosecutor and grand jury are designed to do, and independence is the key. After all of this time, there is not ONE criminal investigation ongoing. Oh, except for Mr. Mueller’s, which is steadily advancing on PDJT like an Anaconda stalking its prey.

    “…a growing acceptance that there is a brutally obvious need for multiple special counsels.”
    Yes Sundance, you’re exactly right.

    Liked by 1 person

  36. Joshua says:

    Hi

    I hate tech. Yet, this is bordering on insane and it would be if not for the plants (yes I see u).

    The Dedup I wrote doesn’t alter any data it tells u what is identical.

    If u ask what files are identical it tells u (mine also comments on dates whooohoo). Email inboxes are files. Many emails compresssed into one file

    If u uncompressed the inbox and strip out the header u will PRECLUDE the ability to search based on DOMAIN.

    Where have I heard domain before ….?

    U can always compare any strings of bits and u might be surprised to know that comparing an extremely large email or file, say, > 8k still takes less than a blink; no time. If u were using a traditional hard disk the whole time would be consumed by the seek time to find the spot on the disk from which to read.

    I’m stopping here cause this obvious to everyone and I’m not a smart person. I’m sure I can answer more silly questions if needed.

    – does scrubbing meta data hamper search time? yes scrubbing meta data is the easiest way to “hamper” a search by idiots. It’s totally possible to compare different strings from the emails once decompressed…. like say … THE BODY. Which is always VERY small. It is so small the CPU laughs.

    – why are strozks children not in protective custody? I have no idea I didn’t know he has children.

    – doesn’t the NSA have everything? Ostensibly yes. Do u have someone who wants to enter their login ID? The other side does . They have many they are legion.

    – What happened to Breitbart ? Good question. The last tears I shed were that day. 2 weeks after he had dinner at Bill Ayer’s. Bill Ayers had said he is not interested in the political day to day battles; he wants to win he culture war

    I have never lost a patriot like breitbart before. His value in the struggle to retain our nation (as opposed to transforming it – read: sedition) was irreplaceable . Full stop . Period

    Happy to answer any texh questions I can for y’all. The least I can do.

    Liked by 2 people

    • Joshua says:

      To continue:

      When one has a “hard drive” they wish to procure data from that is “valuable”,one takes extreme precautions.

      – precaution #1: access the hard drive mechanisms as little as possible. There are ways to disassemble a drive and attempt to read from the disks but this is only done as a very very last resort. If it is a flash drive the same principle follows as they are not immune from the laws of physics (though basically u can smoke or have a drink while this process occurs – physical drives not so much)

      – corollary 1:!one makes a ‘mirror’ copy of the data. I use scare quotes because this operation is not uniquely defined.there are multiple ways to attempt to mirror a drive. If u are lucky and it is a run of the mill file system all operations will yield the same result (assuming ur target drive has capacity). But that is not always the case. Drives have bad blocks. They have regions they have identified as being “bad” (un read writable ). So those bits are useless. Nonetheless if u copy them it’s unlikely they will be be mistaken for a real file.

      Real files have formats. And a forensic software package worth its salt will scour the countless bits in search of anything that looks like a file format. Stuff that it finds that does not look like a file will often be reported as deleted (sometimes recoverable if the links to the whole exist – files, in the past, were split into parts u see).

      – root kits : root kits exist before the beginning of the file system data that the operating system uses. They are bad.

      – searching 60k emails for duplicates: that is a non issue. Anyone who tells u so is playing on ur ignorance. Headers or not; if I have the inbox I can search every body of every email for any any string of bits (say: “cohen” for example … or “cohen flight” or “cohen Prague” or “cohen Ukraine”) in a matter of seconds. Less than a minute. This is with computers from a decade ago.

      Yeah, if they DELETED the subject field I cannot search it. Duh. The report should state this or the state of the email data for that matter, in general. (Not inspector general)

      This is all academic. In the words of u know who “Faster please…”

      Like

      • Wind Hawk says:

        Yeah. TrueCrypt… Such the whole drive down to an SSD at digit level.

        Liked by 1 person

        • Wind Hawk says:

          Dibit, not digit.

          Like

        • Joshua says:

          Well let’s just finish it off why don’t we…

          – why doesn’t he fire them (who – any of them) and appoint others ? He cannot. As per my understanding the senate leader had told him No Maas.

          Obviously as per midterm results (not midyear exam).

          So spout your fire at the legislative branch.

          Spout
          Ur
          Fire
          At
          The
          Legislature.

          We have 3 branches of government. We have them for a reason. Time to retake numero dos. How do we accomplish this?

          Like

      • Dr.Jay says:

        >> searching 60k emails for duplicates: that is a non issue. Anyone who tells u so is playing on ur ignorance.

        Sifting & de-duping the 300k+ emails from the Weiner laptop in electronic form, yes that is fairly easy, but only for full electronic copies.
        The exact same email in two different backups should be easily de-duplicated, with some aid of special software or custom script.
        If an email has been forwarded and then replied to we have two emails which are from the same email-chain, yet they are different. That is less easy to de-duplicate, but usually doable if both are in electronic format (and in same type of format).
        In case Ms Clinton forwarded an email (O) then we will find a forwarded version (F) of it (which is not the same email) in Huma’s set. The correspondence between the two is the original text of O, plus date/subject/to/from. When Huma then replies (R) or forwards we create yet another copy in the same email-chain, yet the email is different. With a bit of more effort we can detect these partial copies, the follow-ups. Again this assumes that the data sets are all in electronic form.

        Main problem would be comparing the Huma set with the Clinton submitted set.
        Main issue is that the set that Clinton submitted was NOT in electronic email format (i.e. orginal format), instead these were merely printouts (to PDF AFAIK) of the original emails. Good luck with comparing that to the Huma set!
        The To/Form fields are now plain text and will usually only show the names and not email-addresses of sender & recipients.
        Also the dates may be different due to the fact that while printing the date/time is represented as a string using the current timezone and not stored as a timezone independent date/time (as in original emails in electronic form).
        And we have forwarded versions on the Weiner laptop (Huma set) in electronic format. In order to know that email #3214 from the Clinton set is one of the emails in the Huma set requires quite a bit of programming effort or lots of manual work (search for large blocks of text from the original emails).

        Like

        • Joshua says:

          Wow. Are u saying that we paid FBI agents to go through 60 thousand emails and compare print outs to digital versions…? In what 1 week ? 2 weeks ? That’s amazing. And also insane. How much did that cost and can I hire them ?

          I of course appreciate ur point. Yes we can by hand insert a remove newline and carrots (or whatever character) then compare… and we all know the built in Microsoft comp will match sequences already, so u can match and then give it the command line option to start after the match thus easlily doing line by line without compiling anything ( Apologees to the reader. this is necessary to show deference to the knowledge of the respondent).

          But, That’s crazy if they were actually doing the work of comparing versus printouts. I guess the suspicion Sundance has hinted to is …. maybe they were not but said they did ?

          Deduping 60 thousand email printouts…
          By eye….
          In 2016 u say….
          This is truly progress from landing in the moon without integrated circuits.

          Like

        • Joshua says:

          Also, if someone forwarded or replied to an email … even if they didn’t add text, I would want it flagged to me. It would get the “similar” flag …. but I would want to know about it – if that was my job, I mean.

          Like

  37. KBR says:

    The Law states that anyone suspecting child abuse who is an official, including LEO’s and prosecutors must turn that information over to those whom the Attorney General has designated especially to handle child abuse cases. There are legal penalties for failure to do so.

    I have not seen any evidence that the FBI investigator group working on the MYE, nor even one member of it, was part of a specific special assigned Child Abuse Investigative Unit.

    There is clearly evidence of child abuse on Weiner’s laptop, even if one only considers the 15 year old girl that Weiner was arrested about. How much clearer does it get than an arrest based on Weiner’s phone text that his laptop would be a piece of evidence that must be reviewed by the special child abuse investigators? Child abuse special investigators were not those assigned for HRC emails MYE, but rather the investigative division for child abuse.

    Weiner’s 15 year old victim to whom he texted pornographic images of his own nude private parts (apparently also photos of himself in bed with his own young son?) is NOT the only victim on that laptop. NYC LEO’s don’t get shaky and vomit because of a text message.

    I suppose that “the leadership” felt/feels it does not have to follow that law either?

    To DOJ/FBI (then and now!) covering Hillary’s ass for her willful and extreme carelessness with classified information took precedence over saving children from abuse so terrible that it made NY LEO’s sick.

    Sessions needs to say that while he is recused from the investigation involving Clinton, he is NOT recused from prosecuting investigators and others who broke the written laws regarding TO WHOM/WHICH AGENTS evidence in CHILD ABUSE cases MUST be delivered.

    He has been going after pedo child abusers and their OFFICIAL FBI LEADERSHIP enablers everywhere EXCEPT under his own nose.

    (I would say “under his authority” but he himself refuses to take Secretarial-level Cabinet authority, even for the legal and proper administration duties of a of his own Federal department.)

    Clinton’s sorry ass and the FBI DOJ “Leadership’s” sorry asses are NOT MORE IMPORTANT than the destruction of children in the USA.

    Time to saddle up.

    Liked by 3 people

  38. We can find crimes committed till we’re blue in the face. No intent = no crime. Comey already clearly told us what the bar is for Democrats to be convicted – INTENT.

    It’s beyond obvious that there absolutely is a caste system in our justice. It all depends on who you are, what party you belong to, what your religion is…

    Liked by 1 person

  39. Paul Apostle says:

    It is you Sundance, that convinced me ‘no Special Counsel would be needed to investigate the investigators’, that Sessions appointment of Huber is more effective.
    Please clarify :
    “We begin reading Chapter 11 of the IG Report with a growing acceptance that not only is there a need for a special counsel, but there is a brutally obvious need for multiple special counsels; each given a specific carve-out investigation that comes directly from the content of the Inspector General report.”

    Like

    • GB Bari says:

      Sundance has shown how poorly the OIG report analyzed glaring inconsistencies within the report itself. This occurred frequently enough and on significant events and issues as to be proof beyond a reasonable doubt that the DOJ is corrupt to the core and cannot be trusted to police itself.

      Huber is part of the DOJ, and is not independent. He reports to Sessions, who so far appears to be fine with the summary and recommendations within the OIG report(despite glaring inconsistencies in the report body). Thus we cannot rely on Huber’s product or any work product from within the DOJ to fix the serious problems that are painfully evident in the OIG report.

      Like

      • Perot Conservative says:

        Others have suggested they may be withholding more damaging information, IF they are building criminal cases.

        DOES HUBER HAVE A GRAND JURY SEATED??

        WHERE are the 1.5 Million pages / documents?

        How big are the specific assigned teams for Horowitz and Huber?

        Complex criminal investigation, or Swamp coverup?

        Like

        • GB Bari says:

          Sundance and others have speculated or deduced fromstatements made and other seemingly corroborated evidence that Huber does have a grand jury and has had one since last year. I have personally seen nothing (I could have easily missed it) from any official that states that as a direct fact, though..

          Like

  40. NYPatriot says:

    I work in the electronic discovery field and deduplicate email archives on a regular basis. If they couldnt dedupe Wieners laptop against the pre-existing set of emails, theres only a few reasons because Huma probably forwarded most of them to herself which would change the md5hash and make it impossible to dedupe using processing software. I’ve encountered this and the only way to determine duplicates is a manual review. So, 3 people would not be able to review 1.3 million electronic files suffienciently to have any kind of conclusion they described. They probably never looked at it at all.

    Liked by 2 people

  41. Ted says:

    page 294:
    And as we further describe in Chapter Nine, at the same time that FBI leadership was taking the steps we describe in this chapter to defend its handling of the Midyear investigation as thorough and complete, it was taking no action in response to the notification by NYO regarding the Weiner laptop.

    Like

  42. Publius2016 says:

    What about the actual files on the computer? Who reviewed those?

    Like

  43. digleigh says:

    We will see how many Senators or House Representatives are in on the cover-up(IMHO) of the volumes of Huma/Weiner emails that need major assessment, when we see if only soft ball questions are asked of Horowitz next week!! We will know for sure who is part of the swamp and who is not, so that we may work to vote them out!! This is why the 28 FBI agents willing to testify were not sure about sticking their necks out, because there is STILL too many CORRUPT officials in charge! After Wray’s little “NO BIAS STUNT” and having a different group of people do the summary (which was NOT accurate), I find him to be at minimum a CYA for the agency guy! He frankly, reminds me of a frat boy giving HIS CYA ANALYSIS, after a terrible hazing incident!!

    Like

  44. SmileyFtW says:

    What I don’t understand is that the analyst’s supervisor was so concerned about classified information being on the analyst’s workstation that the workstation was ordered to be wiped. That would mean that the Weiner laptop must also contain classified information…so how and from where did that classified information end up on the laptop? Why is that not being investigated or even talked about in the IG report?

    Like

  45. Amanda Coleman says:

    I thought Strzok had “flipped”?

    Like

    • GB Bari says:

      His wig maybe. But apparently he has only provided some information (not everything he knows) after being granted some kind of immunity. At least that’s what I infer from the OIG Report..

      Like

  46. SW Richmond says:

    Seems to me that telling the tech to wipe his workstation is destroying evidence. Some other measure could have been taken to secure the workstation like removing the hard drive and storing it securely.

    This is the problem with having a law enforcement agency that you cannot trust. They know where later investigators are likely to look, they understand the legal process and things like chain of custody, and they know where to break those things effectively to destroy a case.

    Like

    • Dr.Jay says:

      Nah he is merely removing a copy of the image. There still should be a) the original laptop and certainly b) a master full forensic image copy on a write-protected & sealed hard-disk. Plus one or more full forensic image copies stored on FBI or NYPD secure servers.

      Like

      • H.R. says:

        Dr.Jay: “There still should be […]” (emphasis, mine)

        Yeah, and we should have the DNC server, Hillary’s server, numerous Blackberrys and laptops, but they are little bits and pieces of plastic now.

        I can only hope it’s true, that the evidence you assume still exists is safely tucked away, but it wouldn’t surprise me if Weiner’s laptop and all copies of the hard drive have been destroyed.

        At this point, I’d be royally pissed off, but not incredulous, to find that everything was destroyed.

        Like

  47. H&HC, 2nd-16th says:

    I think I’m in over my head. Will anyone be charged with a crime? And when might that happen?

    Like

    • H.R. says:

      Just my opinion, H&HC, but I think the indictments don’t get unsealed until after the FISA abuse investigation, which includes the Steele dossier and planting spies in the Trump campaign. That also rounds up Brennan and Clapper along with the “small group” and should nail down charges of sedition (coup plot) and possibly treason.

      And it might take another investigation beyond the FISA abuse, such as the conclusion of the Clinton Foundation investigation, before cell doors start to clank shut.

      Anyhow, if we can get to the point that sedition and/or treason comes is etablished, then military tribunals and Gitmo come into play, and we can skip the corrupt courts and “Lying to Investigators” BS.

      That’s why I have been patient.
      My 2¢.

      Liked by 1 person

      • ^^^THIS^^^

        Very few understand the aspect of allowing these cretins to continue committing crimes while documenting ALL OF IT without them being able to smash, bleach bit, destroy etc… anything.

        And all while a larger percentage of the public is paying at least a little more attention to it all… and each week more comes out.

        Being overcome with too many emotions and too little patience is to be expected. We have all seen these bassturds, soetoro, krooked killery et al & etc do as they please for far too long. It doesn’t appear that “we” do much thinking about how many bureaucrat scumbags are actually still attempting to “fix things” either.

        So will those whining and concerning settle for the “small group” being prosecuted NOW and the rest of this swept under the rug? It appears that way…

        Now, at what point do people remember WHY they elected VSG PDJT? You either trust him now or you don’t and all the concern trolling posts indicate one “concerning” doesn’t.

        Duly noted. I’m in it for the yuge picture.

        Because global evil of the most heinous kind being destroyed is actually very key to restoring our own nation. The only person that is now actually in charge I’ve ever heard mention this is VSG PDJT. Hmmm…

        Like

  48. Madi says:

    Now we know that Clinton loss the Presidency in 2008 to Obama . The Democrats are excellent to hide, concealed, lied, deceived…..just think what they gave to HRC in 2008: don’t investigate/tell the truth about the …Barry Soetoro and will make you PResident in 2016;

    Like

  49. Publius2016 says:

    Think they were setting someone up to be “Clintonized”

    Like

  50. Moe Grimm says:

    Haven’t gotten to these sections yet. I’m going to have a have a hard copy printed out so I can tab notes to it as this document would take me humble HP OfficeJet to its knees not to mention what the damn cartridges cost. As ominous as all of this treason and crime/s is I take real solace others are too up early reading. Gives me hope. Took a break from reading also about what’s happening in Austria and Germany with Frau Mer-kill which is if course receiving near zero coverage by the Cult Marx Ministry of Prop. And Sundance, you auto qualify for a Grade 1 Gold NYC Detectives shield. Keep it man.

    Liked by 1 person

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s