Obama Era Political Surveillance, and The Dual Purpose of Fusion GPS…

With research files on the ’15, ’16 and ’17 political surveillance program; including information from the Mueller report and information from the IG Horowitz report; in combination with the Obama-era DOJ “secret research project” (their words, not mine); we are able to overlay the Obama-era domestic IC  operations and gain a full understanding of how political surveillance was conducted over a period of approximately four to six years.

Working with a timeline, but also referencing origination material in 2015/2016 – CTH hopes to show how the program(s) interacted and operated.  A full review explains an evolution from The IRS Files in 2010 to the FISA Files in 2016.

More importantly, the assembly of government reports and public records now indicates a political exploitation of the NSA database, for weaponized intelligence surveillance of politicians, began mid 2012.

The FISA-702 database extraction process, and utilization of the protections within the smaller intelligence community, became the primary process. We start by reviewing the established record from the 99-page FISC opinion rendered by Presiding Judge Rosemary Collyer on April 26th, 2017; and explain the details within the FISC opinion.

I would strongly urge everyone to read the FISC report (full pdf below) because Judge Collyer outlines how the DOJ, which includes the FBI, had an “institutional lack of candor” in responses to the FISA court. In essence, the Obama administration was continually lying to the court about their activity, and the rate of fourth amendment violations for illegal searches and seizures of U.S. persons’ private information for multiple years.

Unfortunately, due to intelligence terminology Judge Collyer’s brief and ruling is not an easy read for anyone unfamiliar with the FISA processes outlined. The complexity also helps the media avoid discussing, and as a result most Americans have no idea the scale and scope of the issues. So we’ll try to break down the language.

.

For the sake of brevity and common understanding CTH will highlight the most pertinent segments showing just how systemic and troublesome the unlawful electronic surveillance was.

Early in 2016 NSA Director Admiral Mike Rogers was alerted of a significant uptick in FISA-702(17) “About” queries using the FBI/NSA database that holds all metadata records on every form of electronic communication.

The NSA compliance officer alerted Admiral Mike Rogers who then initiated a full compliance audit on/around March 9th, 2016, for the period of November 1st, 2015, through May 1st, 2016.

While the audit was ongoing, due to the severity of the results that were identified, Admiral Mike Rogers stopped anyone from using the 702(17) “about query” option, and went to the extraordinary step of blocking all FBI contractor access to the database on April 18, 2016 (keep these dates in mind).

Here are some significant segments:

The key takeaway from these first paragraphs is how the search query results were exported from the NSA database to users who were not authorized to see the material. The FBI contractors were conducting searches and then removing, or ‘exporting’, the results. Later on, the FBI said all of the exported material was deleted.

Searching the highly classified NSA database is essentially a function of filling out search boxes to identify the user-initiated search parameter and get a return on the search result.

FISA-702(16) is a search of the system returning a U.S. person (“702”); and the “16” is a check box to initiate a search based on “To and From“. Example, if you put in a date and a phone number and check “16” as the search parameter the user will get the returns on everything “To and From” that identified phone number for the specific date. Calls, texts, contacts etc. Including results for the inbound and outbound contacts.

FISA-702(17) is a search of the system returning a U.S. person (702); and the “17” is a check box to initiate a search based on everything “About” the search qualifier. Example, if you put a date and a phone number and check “17” as the search parameter the user will get the returns of everything about that phone. Calls, texts, contacts, geolocation (or gps results), account information, user, service provider etc. As a result, 702(17) can actually be used to locate where the phone (and user) was located on a specific date or sequentially over a specific period of time which is simply a matter of changing the date parameters.

And that’s just from a phone number.

Search an ip address “about” and read all data into that server; put in an email address and gain everything about that account. Or use the electronic address of a GPS enabled vehicle (about) and you can withdraw more electronic data and monitor in real time. Search a credit card number and get everything about the account including what was purchased, where, when, etc. Search a bank account number, get everything about transactions and electronic records etc. Just about anything and everything can be electronically searched; everything has an electronic ‘identifier’.

The search parameter is only limited by the originating field filled out. Names, places, numbers, addresses, etc. By using the “About” parameter there may be thousands or millions of returns. Imagine if you put “@realdonaldtrump” into the search parameter? You could extract all following accounts who interacted on Twitter, or Facebook etc. You are only limited by your imagination and the scale of the electronic connectivity.

As you can see below, on March 9th, 2016, internal auditors noted the FBI was sharing “raw FISA information, including but not limited to Section 702-acquired information”.

In plain English the raw search returns were being shared with unknown entities without any attempt to “minimize” or redact the results. The person(s) attached to the results were named and obvious. There was no effort to hide their identity or protect their 4th amendment rights of privacy:

But what’s the scale here? This is where the story really lies.

Read this next excerpt carefully.

The operators were searching “U.S Persons”. The review of November 1, 2015, to May 1, 2016, showed “eighty-five percent of those queries” were unlawful or “non compliant”.

85% !! “representing [redacted number]”.

We can tell from the space of the redaction the number of searches were between 1,000 and 9,999 [five digits]. If we take the middle number of 5,000 – that means 4,250 unlawful searches out of 5,000.

The [five digit] amount (more than 1,000, less than 10,000), and 85% error rate, was captured in a six month period, November 2015 to April 2016.

Also notice this very important quote: “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” This tells us the system users  were searching the same phone number, email address, electronic “identifier”, or people, repeatedly over different dates.

Specific people were being tracked/monitored.

Additionally, notice the last quote: “while the government reports it is unable to provide a reliable estimate of” these non lawful searches “since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 coincided with an unusually high error rate”.

That means the 85% unlawful FISA-702(16)(17) database abuse has likely been happening since 2012.

2012 is an important date in this database abuse because a network of specific interests is assembled that also shows up in 2016/2017:

  • Who was 2012 FBI Director? Robert Mueller, who was selected by the FBI group to become special prosecutor in 2017.
  • Who was Mueller’ chief-of-staff? Aaron Zebley, who became one of the lead lawyers on the Mueller special counsel.
  • Who was 2012 CIA Director?  John Brennan (remember the ouster of Gen Petraeus)
  • Who was ODNI? James Clapper.
  • Remember, the NSA is inside the Pentagon (Defense Dept) command structure. Who was Defense Secretary?  Ash Carter
  • Who wanted NSA Director Mike Rogers fired?  Brennan, Clapper and Carter.
  • And finally, who wrote and signed-off-on the January 2017 Intelligence Community Assessment and then lied about the use of the Steele Dossier?  John Brennan, James Clapper

Tens of thousands of searches over four years (since 2012), and 85% of them are illegal. The results were extracted for?…. (I believe this is all political opposition use; and I’ll explain why momentarily.)

OK, that’s the stunning scale; but who was involved?

Private contractors with access to “raw FISA information that went well beyond what was necessary to respond to FBI’s requests“:

And as noted, the contractor access was finally halted on April 18th, 2016.

[Coincidentally (or not), the wife of Fusion-GPS founder Glenn Simpson, Mary Jacoby, goes to the White House the next day on April 19th, 2016.]

None of this is conspiracy theory.

All of this is laid out inside this 99-page opinion from FISC Presiding Judge Rosemary Collyer who also noted that none of this FISA abuse was accidental in a footnote on page 87: “deliberate decisionmaking“:

This specific footnote, if declassified, would be key. Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”, this sentence has the potential to expose an internal decision; withheld from congress and the FISA court by the Obama administration; that outlines a process for access and distribution of surveillance data.

Note: “no notice of this practice was given to the FISC until 2016“, that is important.

Summary of this aspect: The FISA court identified and quantified tens-of-thousands of search queries of the NSA/FBI database using the FISA-702(16)(17) system. The database was repeatedly used by persons with contractor access who unlawfully searched and extracted the raw results without redacting the information and shared it with an unknown number of entities.

The outlined process certainly points toward a political spying and surveillance operation; and we are not the only one to think that’s what this system is being used for.

Back in 2017 when House Intelligence Committee Chairman Devin Nunes was working to reauthorize the FISA legislation, Nunes wrote a letter to ODNI Dan Coats about this specific issue:

SIDEBAR: To solve the issue, well, actually attempt to ensure it never happened again, NSA Director Admiral Mike Rogers eventually took away the “About” query option permanently in 2017. NSA Director Rogers said the abuse was so inherent there was no way to stop it except to remove the process completely. [SEE HERE] Additionally, the NSA database operates as a function of the Pentagon, so the Trump administration went one step further. On his last day as NSA Director Admiral Mike Rogers -together with ODNI Dan Coats- put U.S. cyber-command, the database steward, fully into the U.S. military as a full combatant command. [SEE HERE]  Unfortunately it didn’t work as shown by the 2018 FISC opinion rendered by FISC Judge James Boasberg [SEE HERE]

There is little doubt the FISA-702(16)(17) database system was used by Obama-era officials, from 2012 through April 2016, as a way to spy on their political opposition.

Quite simply there is no other intellectually honest explanation for the scale and volume of database abuse that was taking place; and keep in mind these searches were all ruled to be unlawful.  Searches for repeated persons over a period time that were not authorized.

When we reconcile what was taking place and who was involved, then the actions of the exact same principle participants take on a jaw-dropping amount of clarity.

All of the action taken by CIA Director Brennan, FBI Director Comey, ODNI Clapper and Defense Secretary Ashton Carter make sense. Including their effort to get NSA Director Mike Rogers fired.

Everything after March 9th, 2016, had a dual purpose:  (1) done to cover up the weaponization of the FISA database. [Explained Here] Spygate, Russia-Gate, the Steele Dossier, and even the 2017 Intelligence Community Assessment (drawn from the dossier and signed by the above) were needed to create a cover-story and protect themselves from discovery of this four year weaponization, political surveillance and unlawful spying. Even the appointment of Robert Mueller as special counsel makes sense; he was FBI Director when this began. (2) They needed to keep surveillance ongoing.

The beginning decision to use FISA(702) as a domestic surveillance and political spy mechanism appears to have started in/around 2012. Perhaps sometime shortly before the 2012 presidential election and before John Brennan left the White House and moved to CIA. However, there was an earlier version of data assembly that preceded this effort.

Political spying 1.0 was actually the weaponization of the IRS. This is where the term “Secret Research Project” originated as a description from the Obama team. It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller. It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

Why disks? Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS. All of the evidence within this sketchy operation came directly to the surface in early spring 2012.

The IRS scandal was never really about the IRS, it was always about the DOJ asking the IRS for the database of information. That is why it was transparently a conflict when the same DOJ was tasked with investigating the DOJ/IRS scandal. Additionally, Obama sent his chief-of-staff Jack Lew to become Treasury Secretary; effectively placing an ally to oversee/cover-up any issues. As Treasury Secretary Lew did just that.

Lesson Learned – It would appear the Obama administration learned a lesson from attempting to gather a large opposition research database operation inside a functioning organization large enough to have some good people that might blow the whistle.

The timeline reflects a few months after realizing the “Secret Research Project” was now worthless (June 2012), they focused more deliberately on a smaller network within the intelligence apparatus and began weaponizing the FBI/NSA database. If our hunch is correct, that is what will be visible in footnote #69:

How this all comes together in 2019

Fusion GPS was not hired in April 2016 to research Donald Trump. As shown in the evidence provided by the FISC, the intelligence community was already doing surveillance and spy operations. The Obama administration already knew everything about the Trump campaign, and were monitoring everything by exploiting the FISA database.

However, after the NSA alerts in/around March 9th, 2016, and particularly after the April 18th shutdown of contractor access, the Obama intelligence community needed Fusion GPS to create a legal albeit ex post facto justification for the pre-existing surveillance and spy operations. Fusion GPS gave them that justification in the Steele Dossier.

That’s why the FBI small group, which later transitioned into the Mueller team, were so strongly committed to and defending the formation of the Steele Dossier and its dubious content.

The Steele Dossier, an outcome of the Fusion contract, contains two purposes: (1) the cover-story and justification for the pre-existing surveillance operation (protect Obama); and (2) facilitate the FBI counterintelligence operation against the Trump campaign (assist Clinton).

An insurance policy would be needed. The Steele Dossier becomes the investigative virus the FBI wanted inside the system. To get the virus into official status, they used the FISA application as the delivery method and injected it into Carter Page. The FBI already knew Carter Page; essentially Carter Page was irrelevant, what they needed was the FISA warrant and the Dossier in the system {Go Deep}.

Fusion GPS was not only hired to research Trump, the intelligence community was already doing surveillance and spy operations. The intelligence community needed Fusion GPS to give them a plausible justification for already existing surveillance and spy operations.

Fusion-GPS gave them the justification they needed for a FISA warrant with the Steele Dossier. Ultimately that’s why the Steele Dossier is so important; without it, the DOJ and FBI would be naked with their FISA-702 abuse as outlined by John Ratcliffe.

.

This entry was posted in 4th Amendment, 6th Amendment, AG Bill Barr, Big Government, CIA, Clinton(s), Conspiracy ?, Decepticons, Deep State, Dept Of Justice, Donald Trump, Donald Trump Transition, Election 2016, FBI, IG Report FISA Abuse, Impeachment, Legislation, media bias, Notorious Liars, NSA, President Trump, Russia, Spygate, Spying, THE BIG UGLY, TowerGate, Uncategorized. Bookmark the permalink.

320 Responses to Obama Era Political Surveillance, and The Dual Purpose of Fusion GPS…

  1. JackB says:

    The bottom line is simple. Is PDJT going to hold anyone accountable?

    It is easy to pass the buck to Barr, Wray, Rosenstein, Sessions. Where does the buck stop? Who has ultimate executive authority in our Constitution?

    Liked by 3 people

    • Truth and Liberty says:

      POTUS can’t investigate, arrest or prosecute anyone. All those tasks have to originate with the DOJ. Can you say Barr, Durham, Guiliani these are the ones who are in charge of those particular actions. Guiliani as the attorney for POTUS can investigate and hand off info and evidence but Durham has to verify, certify and provide the chain of custody necessary to use in a prosecution. Barr has done and continues to do his job namely not interfering in the Durham investigation. DJT is President and by law he has no authority to get involved other than to monitor the progress and outcomes or remove the appointed person if he feels they a failing to fullfill their responsibilities or perform on a manner hecdeems appropriate. Your statement that POTUS DJT is somehow responsible is ignorant and shows a complete lack of understanding of the role and limitations of POTUS in our system of government.

      Liked by 1 person

      • Shop says:

        Article II, Section 1 of the Constitution: “The executive power shall be vested in a President of the United States of America.”

        Maybe an analogy is better than an abstract discussion.

        The captain of a ship orders the course for the ship to sail to Norfolk. He then steps away from the bridge and retires to his captain’s cabin leaving the first officer in charge. The first officer steers to Savannah. Who has ultimate accountability? Captain or First Officer?

        Like

        • arsumbris says:

          The question wasn’t “who is the executive” but “who has executive power OVER THE CONSTITUTION” and the answer is no one does. That power is shared. Look up Marbury v. Madison, and google “Judicial review”.

          Like

          • Tparty says:

            “who has executive power OVER THE CONSTITUTION” …? The unelected deep state obviously, unless PT can wrangle it away from perverted bureaucrats with the help of the SC.

            Like

        • LIfeandLiberty says:

          Exactly! PDJT has the authority to do what JackB says however, he does not have the time and ability to do so given how out of control large our government has become. There is no DoJ in the Constitution. It was created to assist the President to carry out the executive branch duties just like all the other departments were created. So, in effect both JackB and Truth and LIberty are correct.

          Justice takes time. We know that the spying was deep and goes back 4 years prior to what we’ve been told – July of 2016. There are many lower-level individuals involved as well which is where the investigation always starts and works it’s way up the chain of command until the evidence with witnesses is overwhelming to encircle McCabe, Comey, Brennan, Clapper and just maybe Biden and Obama.

          Like

    • Rhi says:

      Remember the President said to the effect ‘if I’m elected I’m going to instruct my Attorney General to look into this (Hillary’s illegal email setup, etc.)’ and despite the MSM’s contention about the AG being an ‘independent agency’ it is clear to most the President has absolute authority to instruct Barr to look into any criminal activity. And POTUS did say “at some point I may HAVE to get involved” if Barr wiffs this.

      Thank you Sundance for your remarkable genius level of granular detail weaving together a tapestry of open source facts documenting a seditious conspiracy. You are two years ahead of all the other reporters and bloviators on Fox who state POTUS was spied upon starting mid summer ‘16 and a few who tangentially intimates that maybe it started in ‘15. Sundance schools us all. If only Sundance could team up with Durham!

      Liked by 1 person

    • ms doodlebug says:

      Don’t you think it’s more than a bit ridiculous to expect one man, the President, to be ‘accountable’ for the actions of over 2 million federal employees? In my opinion, if anyone other than individual employees are to be held accountable, it would be those in Congress who make the laws and then leave it to unelected bureaucrats to add to or subtract from those laws without oversight.

      Like

  2. Tom says:

    Outstanding research – the more you peel back the onion the more you see how corrupt the OBAMA administration really was

    Liked by 7 people

  3. mtk says:

    Unfortunately, due to intelligence terminology Judge Collyer’s brief and ruling is not an easy read for anyone unfamiliar with the FISA processes outlined.

    That said, I wish the use of word ‘extraction’ would be clarified. In the parlance of DataBase terminology it has a very specific meaning. Very specific. When a sql query on a database is sent to the database server, the records returned are referred to as a ‘VIEW’. This means that the database server returns an image of the records matching the query parameters.

    Extraction, in generalised database terminology means to ‘remove/delete’ the records returned by the sql search query after the database server returns the results.

    Big F’ing difference.
    Under that understanding of ‘extraction’, who is to say what these contractors may have been doing is removing inconveniences to the ‘deep state’ activities.

    May explain why there has been a lack NSA accountability towards the ‘small group’ and aligned political interests.

    You reading this Mr. Solomon!

    Liked by 5 people

    • Dutchman says:

      Good point. Once you have this capability, why only use it in one direction.
      Get info on your enemies, also use to cover up, for you and your pals.

      Delete the evidence of your guilt, and you are never charged.

      Liked by 4 people

    • Road Runner says:

      Extraction could also be defined as downloaded, copied and REMOVED from the premises… It could simply be that they were viewing and then taking the info to???? God only knows…

      Liked by 3 people

    • Zy says:

      You’re right that we need exacting terminology as to what happens. To expand to remove copies of database records or to delete them from a database usually requires a higher level authorization than is required to just read:view database records.

      Like

      • zekness says:

        yes this is correct Zy….for classmat/signit raw data…users have multiple levels of authority
        very specific to the scope they are permitted.

        just a general example:

        access (read/query only) would be a level 1 user account.
        access (read/query and ADD) would be a level 2 user account
        access (read/query, ADD, & Modify (meaning to update but NOT delete prior entry) would be a level 3 user account
        access (read/query, ADD, Modify, & DELETE would be a level 4 user account
        CREATE (meaning to introduce entirely new data files) would be level 5 user account

        GOD MODE – do whatever you want, whenever you want, however you want…there is no such official level user account for this authority in the sense that it can only exist in a very special circumstance.. But we know it exists. It exists at the discretion associated with the highest official authorities of the data base(S)…generally, this is with the principle director/secretary/chief (title depending on department of gov)

        separately there are additional level authorities that are explicitly identified to users referencing as the limits and constraints, rules, policies and regulations as lawfully described by congress, the law…be it title 1 or title 2 type ..and sub-authorities of the same be they 16, 17, 18, and/or 19 query functions.

        notwithstanding the massive official reports that unlawful queries did occur for a very long period of time, there is no reason to expect abuses that violated the above general descriptions of limiting authorities by users. One would assume, given the high level of abuse and lawlessness..that god mode abuse to remove data, may have occurred as well, and also traces of infractions.

        While I would resist the temptation to speculate any of that sort of thing could have been possible since the NSA is the gatekeeper of all raw data, I can imagine there are ways to get around the NSA’s firewalls to prevent such breaches.

        One also has to acknowledge that NSA is NOT the ONLY database gatekeeper …signit for cybercom/NSA is stored there…But that is NOT the only database and collection storage or even the only originator. One must accept that the CIA runs programs that are dark and covert…even inside the NSA “machine”…as well, there are other “civilian side” programs run by tech firms that are used for dual purpose of which the CIA and FBI has standing NSL’s ..

        so the point is…while there are rules ….they are defined with non-dark programs …the other stuff is wild wild west and made even more nefarious by the reckless and deliberate EO by obama to free up private contractors to get into the game.

        It’s a terrible problem now..

        what should have been a clean and dedicated and protected system of checks and audits, is now akin to trying to figure out how the precise spin quantum of a particle right at this moment. You are left with nothing more accurate than probability …it’s that problematic.

        now add to this the very real possibility that these “dark server databases” are the high jewel object of every single bad actor in planet earth, not just our three letters jobbers.!!

        all that power…all that data…all that temptation to sell out.

        If you think it’s bad, you are wrong..It’s very much worse that you can imagine…

        I’m not sure how to reel it back in at this point.

        eventually, and probably sooner than later, our country is going to face a crisis of proportions that will make these current scandals pale…

        what has been allowed to be done with the most sensitive data about our citizens, our inner workings…and the high value assets and how they operate…..is going to be a hard lesson for all of us..the foolishness in thinking that consolidating and then de-centralizing it all into the hands based on a loose trust, combined with so few checks ….it’s going to be a bad set of days for us here.

        this is what keeps me up and night.

        Like

  4. Dutchman says:

    This explanation explains a lot, for instance “First we f*ck FLYNN, then we f*ck Trump.”
    Flynn was the first one targeted, and yes he had personal animosity with Stroxz, or,was it McCabe.
    But, in his position as Natl. Security Advisor, he would have become aware, and would have blown the whistle.

    So, they HAD to get him OUT, quick and SILENCE him, which they effectively did.

    It also answers the question “Why RUSSIA?”
    It HAD to be something they could use, to JUSTIFY a Counter-Intel investigation, because FISA can only be used for Counter-intel or Terrorism. They couldn’t sell a stiry that,DJT was sopprting Terrorists, so had to be Russia.

    And, didn’t have to be BELIEVABLE, in order to be justification.

    Finally, it perhaps explains why it is so urgent that they keep repeating “Russians interfered in the 2016 election!”
    “Russians hacked the DNC servers, and gave the emails to Wikileaks!”

    If Seth Rich gave the emails to Wikileaks, there is no justification for a Counter-intel investigation, and the whole charade collapses.

    Liked by 3 people

    • anthonydog says:

      Yes…No Russian hack, ….which has been proven conclusively by Wm, Binney, the onetime Technical Director of the NSA and a whistleblower.

      According to Binney the best hackers in the world (Romanian) could not transfer the overly large data files over the World Wide Web – thus a download…

      And the data files are all “FAT” ending in even numbers proving that it was indeed a download and not a hack.

      Further, Ed Butowsky came forward with information from Ellen Ratner who told that Assange had confirmed it was information transferred to Wikileaks on a jump drive- not from a hack.

      Liked by 6 people

      • Dutchman says:

        Yup, but even Marie Baritomo says, every chance she gets, that,Russians hacked the DNC servers.
        Cause her contract says she has to stick within certain aporoved guidelines.
        Dobbs seems to be the ONLY one, even on FBN, that is free to speak his mind.

        They have done a heck of a job, of keeping Binneys info out of the mainstream.
        Like the interview of the Blackwater guy, on what was in the “insurance” file on Weiners laptop: experienced, senior NYPD personall were stepping out to throw up, is basically what he,was saying.

        Somebody has in HELL of a,”cleaning crew”.

        Liked by 2 people

    • Right to reply says:

      How much would you like to bet that Assange is dead before April?

      Like

      • Dutchman says:

        Sorry, I never gamble, although I do wager. But, wagering on somebodies death is,….unseemly?

        Liked by 3 people

        • anthonydog says:

          Let’s hope he is not…Assange can provide some answers…

          Like

          • Dutchman says:

            Yeah, hard to understand PDJT not doing something regarding Assange.

            Liked by 1 person

          • zekness says:

            wikileaks will fulfill his death wish…

            ultimately, with his death, more revelations of fact are going to be released.

            vault 7 was just the tip of iceberg.

            if anyone is hoping WL will reveal source of DNC hack is going to be dissapointed however. That will never happen..there is no rational reason to betray what the facts show…

            again, you have to admire the courage and principle here…

            it’s not about messenger..it’s about accurate facts..

            gold standard folks..

            remember this when you try to divine authenticity with information delivered and shaped by the media.

            which explains why WL is considered the existential threat to “modern” news. The press desires to influence….not to reveal basic objective facts..

            a big difference.

            Liked by 1 person

    • Rhi says:

      I think Sundance’s expose’ above reiterates what he’s been saying for awhile that the the counter intelligence investigation was opened as a fig leaf/cover for the already illegal surveillance previously going on candidate Trump and multiple others (85% of about queries of between 1,000 and 10,000 instances) were illegitimate.
      Obamanation weaponized the intelligence agencies for political leverage.

      Liked by 1 person

    • OldParatrooper says:

      Imagine if LTG Flynn had an afternoon to spend with ADM Rogers, what would they have discussed. I have a lot more confidence in the two of them to dig out the malefactors here than the DOJ and FBI.

      Like

  5. doofusdawg says:

    Bingo. And Barr knows who signed the agreement to share as well as who the contractors are.
    Great work Sundance.

    Liked by 2 people

  6. Darklich123 says:

    If the country was still full of Anglo saxons we might care but as it stands nothing will happen.

    Like

    • johnnyfandango says:

      Trump, Barr, the Freedom Caucus have one chance to get this right…the margin of error is very thin. I hope they realize this and have a plan. If we don’t see justice against this coupe, then the precedent will be set. Those like myself who love this country, accept all it’s blemishes, will be overrun. I am a Patriot, I will stock up and defend my hill.

      Liked by 1 person

      • trnathens says:

        They have a plan, and they’re following it. That’s why WE’RE frustrated, because we don’t know the plan. But we don’t need to know the plan. We just need to watch, because it’s past the point of no return. It WILL be revealed, at a place and time of PDJT’S chosing. And it will be SO big, that it will solidify his base, and get him 75% of the Democrat vote as well. The crazies will always stick with themselves.

        Liked by 1 person

  7. John Comnenus says:

    When is Roberts going to be impeached? He has had the Collier report for years and he has done nothing about it. Now Horowitz has more hard evidence that his courts are being abused and he is doing nothing about it. Roberts is a disgrace who has presided over the total collapse of confidence in US Courts. And he doesn’t seem to care.

    Liked by 8 people

  8. alliwantissometruth says:

    The rank and file democrat voters, those who still actually believe in freedom, clean government, citizen representation and the Constitution, simply don’t understand their leftist brethren will go to any length to acquire and keep power

    They’ll stoop to outrageous acts of corruption and criminality to achieve their goals, thereby making a mockery of their so called ideals

    An equitable, fair and righteous society can never be born from the tactics of criminality, corruption and deceit. Any system put in place by those capable of such tactics will only lead to tyranny and oppression, under the guise of the “greater good” of course

    I believe liberal Americans, while under the sway of far fetched utopian ideology, still love American ideals and see the Constitution as a way to ensure fairness, but they better wake up to the reality of the leftist/Marxist juggernaut rolling over everything they too hold dear

    The leftist/Marxist agenda uses the liberal agenda as a way in, but it’s ultimate goal is complete power, control and domination over all of us, with zero participation of we the people

    Voting democrat gets you exactly what Sundance has laid out here, and it’s time you figure that out

    Liked by 2 people

    • Judith says:

      Thank you, @alliwantissometruth. Many Democrat voters think *they* are the patriots. They don’t understand Marxist totalitarian infiltration and that USA will cease to exist for ANY of us.

      Republican voters have the same problem, because *our* representatives have also abdicated their responsibilities to the *same* shadow Globalist construct. Blindly following *either* side of this UNiparty construct leads back to the *same* dark, glass-strewn alleyway.

      I trust *nobody* in Washington DC, with the exception of our President, who I believe has been divinely guided to save the world from the evil Destructor.

      Liked by 1 person

  9. rmnewt says:

    For the whole story there needs to be an answer to the “so what” if they spied:
    “There is little doubt the FISA-702(16)(17) database system was used by Obama-era officials, from 2012 through April 2016, as a way to spy on their political opposition.”
    It certainly appears that the corruption was very widespread. No doubt this was part of their protective strategy ala Evelyn Farkas “keep the channel open (broadly) to all,” inferring the normalcy of corrupt action.
    What is needed is even anecdotal closure. Even one thread of an unmasking or intel product going to Hillary and/or the DNC that they acted on. There are probably smoking guns everywhere and obvious ones that were from some Fusion tap with explicit connections via emails that trace right to Hillary and her campaign. This nexus is likely the real reason Hillary’s and the DNC’s servers just disappeared.
    There is a lot of chaff out there and Sundance has mapped the violations nicely. Given the sloppiness and overconfidence of the corruptocrats, it seems tracing the emails or other comms and actions will provide the rest of the story.

    Liked by 2 people

    • BigTalkers says:

      The “so what” is that any illegal use of the NSA database is a felony punishable by 10 years in prison, per count.

      However, between the Lawfare jokers and the DC federal district courts, it’s likely they’d have to be unlucky to spend a day.

      (Or as the fictional Inspector Morse once put it, “They can spend one night in the slammer, that’s more than most criminals.”)

      Like

  10. Teutonic 360 says:

    Liked by 2 people

    • wtd says:

      Sundance wrote:

      “More importantly, the assembly of government reports and public records now indicates a political exploitation of the NSA database, for weaponized intelligence surveillance of politicians, began mid 2012.

      Teutonic’s posted video was a clip from ‘Washington Watch’ with Roland Martin Reports dated 2/4/2013.
      Interestingly, Maxine appears to warn democrat candidates and democrat elected officials about Obama’s post-presidential ‘organization’, which Roland Martin reveals was “Organizing for America” which shifted to become a 501C4 :
      Maxine:

      “…and whoever runs for president on the democratic ticket have to deal with that. They’re going to have to go down with that database and the concern for those people are because they can’t get around it. And he’s been very smart. It’s very powerful what he’s leaving in place. And I think that’s what any democratic candidate is going to have to deal with”

      Also consider this detail from 2012:

      Liked by 1 person

    • MakersMark says:

      The following are lyrics to a song I wrote in 2012 It’s a blusey, funky little, rap type thing.

      THE LANKY LUCKY BROTHER

      Here is the tale of the Lanky Lucky Brother
      Where mystery shadows his name
      He came from Chicago way down undercover
      You and I we just round out his game

      Now the Lanky Lucky Brother grew fast with his bullshit
      And soared to the roof of his dome
      Where Capitol Hill was a partisan thrill
      For the handsome one building his throne

      And he’s gliding inside of his dome

      The takers and haters and patriot fakers
      Were all bubbled up with Barrack
      They’re floating in drama with Mr. Obama
      Nobody knew how to walk

      He’ll give you the farm then build you a barn
      In exchange for political views
      Why should Obama care money grows everywhere
      Dipity dipity do

      For the IRS and the Benghazi mess
      The truth should be second to none
      But the Lanky Lucky Brother laid low undercover
      Until his election was won

      Then the truth came out not a shadow of doubt
      There’s something deceitfully wrong
      Events were distorted some never reported
      But somebody knew along

      And he’s gliding inside of his dome

      So here is the tale of the Lanky Lucky Brother
      Where mystery shadows his name
      Along came a spider who sat down beside her
      And frightened Ms. Muffet away

      As the Lanky Lucky Brother grew FAT ON HIS BULLSHIT
      He sat at the bowels of his dome
      And when he grew tired of risking his hide
      He glided inside and rode home

      And he’s gliding inside of his dome

      Like

    • S.Bishop says:

      EXACTLY! This deep dive into the security services database for political purposes was something Obama bragged about – all while pretending that he was the ‘engineer’ of some sophisticated DNC database. Maxine probably had her last orgasm describing it to the press. We need to get Valerie Jarrett under oath in the Senate’s special little private room like Schiff used. Threaten to send that communist, Muslim sympathizer to jail and watch how fast Obama backs the bus over her.

      Like

    • Pew-Anon says:

      My question is whether the “organization” and “database” divulged here by Mad Maxine is the same operation as outlined by SD above, or are they two entirely separate things?

      Like

    • anthonydog says:

      Evelyn Farrkas spilled the beans like no other…Trump is correct. These people are stupid.

      Like

  11. bessie2003 says:

    Could the House committee that sued to get President Trump’s tax records really just be using the lawsuit to gain the appearance of legality as in, couldn’t they already have all of citizen Trump’s tax information from the 702 about queries in their work to gain opposition research information, may think they have found something to use against him in the re-election campaign but can’t because they will be asked ‘how did you get this information?’ ?

    Liked by 4 people

  12. negasht7 says:

    If in “purging the data” that was collected they also purged the ability to show who was being spied upon, that would be unfortunate to say the least. Do we know with certainty the targets of the collection?

    Liked by 2 people

    • PS says:

      One of the NSA audit findings as I remember it was the metadata to track who was actually querying was missing. My guess is you had login sharing all over the place (the UN woman who unmasked all the reports, but couldn’t recall asking for any) to the point that you don’t know the person actually executing the query.

      Like

  13. Perot Conservative says:

    Notice the massive story released simultaneously with the OIG report?

    The Washington Post article that both the Bush and Obama administrations covered up the disaster in Afghanistan. They’ve lies to us for over 8 years.

    And Trump is right – get out.

    Liked by 2 people

    • trapper says:

      And who uses WP as it’s mouthpiece? The agency which must not be named. Knowing some of their dirty laundry is being strewn around from their assets planting dirt on Papadopoulos, are they taking a peremptory whack at DOD for sport? By the way that doesn’t mean it’s not all true.

      Like

  14. Beth says:

    John Brennan, the Bernie Madoff of the DC SWAMP.
    Bernie pled guilty to his swindle, got 150 yrs, and….His wife divorced him. One son died of cancer; the other committed suicide.
    and now has asked POTUS for a reduced sentence. Oh, 75 yrs?

    Will Brennan beg POTUS for mercy?
    His days are numbered….

    #KARMA JOHNtheThugBrennan

    Liked by 1 person

  15. trapper says:

    Hope I’m not jumping your conclusion, but remember this one where you actually tracked down the 2012 “memorandum of understanding” that started it all?

    https://theconservativetreehouse.com/2019/05/28/the-secret-research-project-an-irs-list-an-nsa-database-and-resulting-files-on-americans/

    And the unclassified MEMORANDUM:

    https://www.documentcloud.org/documents/490761-nctc-guidelines-2012.html

    Liked by 1 person

  16. wtd says:

    I’m only beginning to read this post when I read:

    “FISA-702(16) is a search of the system returning a U.S. person (“702”); and the “16” is a check box to initiate a search based on “To and From“. Example, if you put in a date and a phone number and check “16” as the search parameter the user will get the returns on everything “To and From” that identified phone number for the specific date. Calls, texts, contacts etc. Including results for the inbound and outbound contacts.

    FISA-702(17) is a search of the system returning a U.S. person (702); and the “17” is a check box to initiate a search based on everything “About” the search qualifier. Example, if you put a date and a phone number and check “17” as the search parameter the user will get the returns of everything about that phone. Calls, texts, contacts, geolocation (or gps results), account information, user, service provider etc. As a result, 702(17) can actually be used to locate where the phone (and user) was located on a specific date or sequentially over a specific period of time which is simply a matter of changing the date parameters.

    And that’s just from a phone number.

    Which leads one to ask….why isn’t this justifiably applied to the Awan IT scandal?

    Liked by 4 people

  17. AccountabilityPlease says:

    Judge Collyer’s 2016 letter indicates the contractors were running the same queries over and over using the same parameters. That means the queries and their parameters were logged so she could analyze them. And if she can analyze them, you would think Mr. Durham can too. All the information should be there to tell us who was doing the spying and whom they were spying upon, right? What I don’t understand is how a subsequent FISA warrant justifies or obfuscates the illegal spying that was done previously.

    Sundance, if possible, please explain. Thanks!

    Like

    • trapper says:

      FISA warrants allow looking at old info in the database, looking backward. The FISA warrant allows you to look at that old database info, so if you had already collected it illegally a year ago, those illegal searches just disappear into what you are NOW permitted to do. You now have a warrant that allows you to possess what you illegally obtained in the past.

      Like

      • Terry says:

        Makes one wonder how widespread this practice is given there are apparently 1000+ FISA applications a year (virtually none of which are rejected or apparently even read by the judges) and the database searches apparently continued with only a few parameter tweaks after the Rogers and Collyer reports. Search for whatever dirt you want on whoever you want, then get a FISA warrant to make it retroactively “legal”.

        Like

        • Deplorable_Infidel says:

          “Makes one wonder how widespread this practice is given there are apparently 1000+ FISA applications a year”

          Probably to the extent of tossing out EVERY conviction of a crime investigated by the FBI in that time frame.

          Like

      • AccountabilityPlease says:

        Thanks for the response, but it still doesn’t make sense to me. The initial queries were logged as belonging to a team of contractors. How does the Crossfire Hurricane team’s FISA and their new query records under that umbrella erase the records of the contractors queries? Also, even if that were the case, most modern IT system do “point in time” backups, which enable you to reconstruct what the database looked like on a given date/time. With a picture of the database from April 2016, investigators should be able to document the illegal searches and build a criminal case.

        Like

        • trapper says:

          They never expected anyone to go into the records to find out when they first did the review. Why would anyone do that? Warrant, then searches turning up info. Why would anyone think to go back in time through the search records to see if they did the same searches illegally two years ago?

          It’s not terribly different from law enforcement in run-of-the-mill criminal cases getting search warrants for info they already obtained illegally, and then hiding that they already had it. Hell, they even champion that trick on Law and Order.

          Like

  18. Pa Hermit says:

    Maybe someone could question Obama to define “smidgen!” Looks like a whole lotta smidgens going on, no?

    Liked by 7 people

  19. ann says:

    April 29, 2017 Collyer’s Report was released to public . Great clarification of exactly why I trust nothing the DOJ / Bureau says or does.

    Since that date, the contumely conduct of 7 of the gang of 8, the Senate Intell committe, DoJ, Bureau, and DNC has been obvious, if one has their head screwed on straight.

    Like

  20. Abe Pecota says:

    I noted the the FBI claimed to discontinue access to the raw data on the same exact date Adm. Rogers blocked access. How very patriotic of them.

    Liked by 3 people

  21. Patience says:

    I sure do wonder what Breitbart was gonna tell Hannity
    on the Monday -he died before he lived to tell.

    Liked by 1 person

  22. Ron Jaeger says:

    What was the intell. used for Criminal threats? Sexual conduct exposure? Tax evasion exposure? It all points to blackmail .

    Like

  23. Patience says:

    WHY did Obamboozler open intel computer system to 17/18 agencies
    >The night before Trump’s Inauguration?

    Liked by 1 person

  24. @ChicagoBri says:

    So why did all of this occur? Surely I do not know, but I certainly recall that PIAPS had one of her minions, Craig Livingstone, collect 400 – 900 secret FBI background files for her perusal while she was First Lady. Official investigations found the entire affair to just be some silly bureaucratic mistake.

    Liked by 2 people

  25. Herbert Kroll says:

    I would not be surprised at all if AT&T, the telecommunications company that owns CNN, has been involved in all this spying on US citizens.

    Liked by 1 person

  26. zimbalistjunior says:

    iran nuclear deal
    spying on schumer, feinstein, nadler, schiff et al

    6 ways till sunday
    schumer wasnt kidding

    Like

  27. Pingback: Hiding The Evidence And Keeping The Taps Running – Wizbang

  28. Greg says:

    So Petraeus was the victim of a 702 about query.

    Like

  29. Don McAro says:

    In 2016 they wanted us to believe Trump was a Putin Puppet…
    In 2020 we are going to find out the Obama was JUST like Stalin

    Liked by 2 people

  30. Genie says:

    There is one perp I really hope hears the command “Up against the wall, Brennan!”

    Liked by 2 people

  31. Zombie says:

    Mary Jacoby wasn’t at the White House to take a tour. Probably meeting with Minister of Propaganda Rhodes.
    Does anyone else remember the article from the “early days” of the coup where Jacoby bragged about Hubble Simpson coming up with the Russian stuff?

    Liked by 2 people

    • Right to reply says:

      I actually bothered to watch the Obama doc on his final 8 months in office. Rice, Powers, Rhodes, Kerry. watch it if you can, its on HBO. Its quite revealing in retrospect.

      Like

  32. Merkin Muffley says:

    Oh, please! This goes back to the 1500 FBI files the Clinton administration got in 1993, if not earlier!

    Liked by 1 person

  33. MNBV says:

    This just about sums it all up…..

    But PDJT’s weakness in picking people is obvious. Wray got appointed to replace Rosie?
    Why not ask Holder to do the appointments.

    Like

  34. CM-TX says:

    Hold up!

    When Ratcliffe says he & Gowdy “were the only ones to see the probable cause. To See ALL THOSE FISA ApplicationS in un-redacted form. And they centered around something called the Steele Dossier…” He also prefaced it with, “Here’s the PROBLEM…”

    I realize there were 4 on Carter Page, but the way he phrased it… makes me think he wasn’t just talking about one subject/person [CP]. Consider there were multiple people falsely disparaged in the Mueller Report.

    Just a ton of 2-Hop[ing]? Or something worse?

    Where’d they really get the [metadata] they misinterpreted, a/o twisted into BS narratives about these people. (eg., Trips by people that never happened.)

    And were these FISA’s in hindsight, attempting to cover-up (retroactively🤨) for the SPYING by US INTEL on private citizens for a Campaign? Spying that went into the Steele Dossier, then transferred into Mueller’s Report??

    If I’m right, HORowitz got some splainin’ to do.

    Like

  35. peachteachr says:

    May our children’s children tell the story of Adm. Rogers. Huge props to him for saving our nation with the power he had.

    Like

  36. MD says:

    With all the spying on Trump and anyone associated with him, it’s an absolute miracle that they never found anything to use against him. As a result they had to make up fake Russia stories.

    Liked by 1 person

  37. Boots says:

    All the offenders should be arrested and hung after a short but fair trial.

    The line of volunteers to pull the drop lever would be 25 miles long.

    Liked by 1 person

    • ms doodlebug says:

      Line them up along the wall on our southern border; sell rotten tomatoes to ‘tourists’ to throw at them until they drop from food poisoning; use the proceeds to finish building the wall…

      Like

  38. mynameisasherlev says:

    to put all this together criminally, unfortunately, requires A RAT. I’ve said that before, I’ll say it again. Because otherwise, you have all these plausible explanations and behind the scenes conversations. These are just the facts of life.

    Like

  39. owtolunch says:

    In reading Boasberg FISC Order — it seems that the fix done by Rogers was not effective as the continued searches just switched the search parameters and continued to abuse the system for 2 more years. Another issue relates to the initial Order by the FISC whereby Comey had to develop the WOODS PROCEDURE to ensure that the FISA Warrants were properly predicated. They were being abused before and inappropriate FISA Orders were being submitted and approved. So this whole mess of “spying” has been going on far earlier than 2012.

    This letter to Senator Wyden from the ODNI shows this was going on long before 2012.
    https://www.wyden.senate.gov/imo/media/doc/2012-07-20-OLA-Ltr-to-Senator-Wyden.pdf

    I suspect it has been going on since the Patriot Act was signed or before. Here you can find the INTEL Data Sets on FISA, FISC, and 702

    https://www.intel.gov/ic-on-the-record-database

    Like

  40. DeWalt says:

    I’m interested in the reports. What follows? Am I to believe you can get to a level in government that you can piss all over these judges and the court with impunity? What about the judge Strozk was personal with. What happened to that?

    Like

  41. owtolunch says:

    All you want to know about FISA

    https://fas.org/irp/agency/doj/fisa/

    Like

  42. Kent says:

    …message to comey…the chickens always come home to roost…

    Like

  43. Right to reply says:

    Does anyone remember the kid who climbed up the outside of Trump Tower? What happened to him?

    Like

  44. Mac says:

    I realize that Sundance has a pet theory that the Steele Dossier was generated mainly to gain a Title 1 FISA warrant against Carter Page. However, there is a whole lot of evidence which paints the Steele Dossier as a public relations tool to tie Trump into a Russian Collusion smear campaign, rather than to be used as a tool to obtain the warrant. The most telling evidence supporting that the intended use of the Dossier was not to obtain a warrant was the fact that the FBI applied for a warrant on Page, without the use of the Dossier, which failed. The Dossier was then amended and was introduced as seeming credible corroboration for the claim that Page was a foreign agent.

    The known actions of the “coup” all make perfect sense if one begins with the presumption that this was not a long standing, well planned operation, but a series of rushed, slapdash operations mounted in response to the shutdown of the access to the NSA database and, after the election, to attempt to build a case against Trump for impeachment.

    Liked by 2 people

  45. DeWalt says:

    My point is this.
    As a law enforcement officer I have access to a certain number of databases that allows me to view personal information on a subject. I have to have Probable Cause to do this. It has to be tied to a call or traffic stop or a number of other reasons. I and my dispatcher documents that.
    During an Audit by the State it is found I was abusing this a number of things happen.
    1. I get fired
    2. I can be criminally charged
    3.I lose my law enforcement certification
    4.I may be personally sued for violating an individuals Constitutional Rights.
    When has this happened to anyone involved in this? They know whose rights were violated. They know who did the searches. What’s next?

    Liked by 2 people

  46. Phil aka Felipe says:

    Let’s see that “interagency memorandum of understanding (presumably prepared or reviewed by FBI lawyers)” that “no notice of this practice was given to the FISC until 2016.”

    Who signed/approved it? What was the rationale/motivation/justification?

    Seems to me John Durham needs to do some deep digging here.

    This “practice” screams corrupt conspiracy to skirt policies/procedures/laws to deprive US citizens of their civil rights under the Constitution.

    Liked by 2 people

  47. Jack Schiraldi says:

    We are now witnessing the horrific damage Obama and the socialist left has done and is doing. You may not think so but this is good. The whole nation can now see what a disgusting unAmerican and unpatriotic Party the Democrats have turned into. One thing that is needed is a copy of all of Obama’s collegiate scholastic and financial records from Occidental, Columbia and Harvard. Why is he the only President in our history who insisted they be kept secret? His Obama-bots will say they don’t care but I say why does he? Why couldn’t he say Radical Islam. In the 1970’s the Islamic Wahhabi’s of the Middle East funded many scholarships for African Americans no matter if they were 50% Caucasian. Once the American people come to realize that the phony journalist’s kept this from them then and only then can we purge our Universities, schools and corporations of the cancers of Political Correctness and Diversity. Hail e Pluribus Unum

    Liked by 4 people

  48. 335blues says:

    It is important to remember that obama and clinton are funded and handled by george soros. When will the world be rid of satan’s right hand man soros?

    Liked by 1 person

  49. Jus wundrin says:

    Thank you for putting this together, SD, the tree house is a place of further understanding. I was on the board of a group that was targeted by the IRS for a 501C3 status because our group had the word Christian in its title as per our accounting firm.

    The BIG NSA data base in Utah was, I believe, started under Bush II and finished under 0Bomba, so the corruption crosses party lines….and the targets are we the people.

    Never thought I’d see this evil in my lifetime.

    Liked by 1 person

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s