Sidney Powell Highlights The Intersection of The Flynn Case With NSA Metadata (Surveillance) Abuse…

Michael Flynn’s defense attorney Sidney Powell hits it out of the park as she connects the dots within the surveillance state and the use of FBI contractors to mine the NSA database.

Must Watch:


A DEEP DIVE – How Did It Work?

Start by reviewing the established record from the 99-page FISC opinion rendered by Presiding Judge Rosemary Collyer on April 26, 2017. Review the details within the FISC opinion.

I would strongly urge everyone to read the FISC report (full pdf below) because Judge Collyer outlines how the DOJ, which includes the FBI, had an “institutional lack of candor” in responses to the FISA court. In essence, the Obama administration was continually lying to the FISA court about their activity, and the rate of fourth amendment violations for illegal searches and seizures of U.S. persons’ private information for multiple years.

Unfortunately, due to intelligence terminology Judge Collyer’s brief and ruling is not an easy read for anyone unfamiliar with the FISA processes. That complexity also helps the media avoid discussing it; and as a result most Americans have no idea the scale and scope of the Obama-era surveillance issues. So we’ll try to break down the language.


For the sake of brevity and common understanding CTH will highlight the most pertinent segments showing just how systemic and troublesome the unlawful electronic surveillance was.

Early in 2016 NSA Director Admiral Mike Rogers was alerted of a significant uptick in FISA-702(17) “About” queries using the FBI/NSA database that holds all metadata records on every form of electronic communication.

The NSA compliance officer alerted Admiral Mike Rogers who then initiated a full compliance audit on/around March 9th, 2016, for the period of November 1st, 2015, through May 1st, 2016.

While the audit was ongoing, due to the severity of the results that were identified, Admiral Mike Rogers stopped anyone from using the 702(17) “about query” option, and went to the extraordinary step of blocking all FBI contractor access to the database on April 18, 2016 (keep these dates in mind).

Here are some significant segments:

The key takeaway from these first paragraphs is how the search query results were exported from the NSA database to users who were not authorized to see the material. The FBI contractors were conducting searches and then removing, or ‘exporting’, the results. Later on, the FBI said all of the exported material was deleted.

Searching the highly classified NSA database is essentially a function of filling out search boxes to identify the user-initiated search parameter and get a return on the search result.

♦ FISA-702(16) is a search of the system returning a U.S. person (“702”); and the “16” is a check box to initiate a search based on “To and From“. Example, if you put in a date and a phone number and check “16” as the search parameter the user will get the returns on everything “To and From” that identified phone number for the specific date. Calls, texts, contacts etc. Including results for the inbound and outbound contacts.

♦ FISA-702(17) is a search of the system returning a U.S. person (702); and the “17” is a check box to initiate a search based on everything “About” the search qualifier. Example, if you put a date and a phone number and check “17” as the search parameter the user will get the returns of everything about that phone. Calls, texts, contacts, geolocation (or gps results), account information, user, service provider etc. As a result, 702(17) can actually be used to locate where the phone (and user) was located on a specific date or sequentially over a specific period of time which is simply a matter of changing the date parameters.

And that’s just from a phone number.

Search an ip address “about” and read all data into that server; put in an email address and gain everything about that account. Or use the electronic address of a GPS enabled vehicle (about) and you can withdraw more electronic data and monitor in real time. Search a credit card number and get everything about the account including what was purchased, where, when, etc. Search a bank account number, get everything about transactions and electronic records etc. Just about anything and everything can be electronically searched; everything has an electronic ‘identifier’.

The search parameter is only limited by the originating field filled out. Names, places, numbers, addresses, etc. By using the “About” parameter there may be thousands or millions of returns. Imagine if you put “@realdonaldtrump” into the search parameter? You could extract all following accounts who interacted on Twitter, or Facebook etc. You are only limited by your imagination and the scale of the electronic connectivity.

As you can see below, on March 9th, 2016, internal auditors noted the FBI was sharing “raw FISA information, including but not limited to Section 702-acquired information”.

In plain English the raw search returns were being shared with unknown entities without any attempt to “minimize” or redact the results. The person(s) attached to the results were named and obvious. There was no effort to hide their identity or protect their 4th amendment rights of privacy; and database access was from the FBI network:

But what’s the scale here? This is where the story really lies.

Read this next excerpt carefully.

The operators were searching “U.S Persons”. The review of November 1, 2015, to May 1, 2016, showed “eighty-five percent of those queries” were unlawful or “non compliant”.

85% !! “representing [redacted number]”.

We can tell from the space of the redaction the number of searches were between 10,000 and 99,999 [six digits]. If we take the middle number of 50,000 – a non compliant rate of 85 percent means 42,500 unlawful searches out of 50,000.

The [six digit] amount (more than 10,000, less than 99,999), and 85% error rate, was captured in a six month period, November 2015 to April 2016.

Also notice this very important quote: “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” This tells us the system users were searching the same phone number, email address, electronic identifier, repeatedly over different dates.

Specific person(s) were being tracked/monitored.

Additionally, notice the last quote: “while the government reports it is unable to provide a reliable estimate of” these non lawful searches “since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 coincided with an unusually high error rate”.

That means the 85% unlawful FISA-702(16)(17) database abuse has likely been happening since 2012.

2012 is an important date in this database abuse because a network of specific interests is assembled that also shows up in 2016/2017:

  • Who was 2012 FBI Director? Robert Mueller, who was selected by the FBI group to become special prosecutor in 2017.
  • Who was Mueller’ chief-of-staff? Aaron Zebley, who became one of the lead lawyers on the Mueller special counsel.
  • Who was 2012 CIA Director? John Brennan (remember the ouster of Gen Petraeus)
  • Who was ODNI? James Clapper.
  • Remember, the NSA is inside the Pentagon (Defense Dept) command structure. Who was Defense Secretary? Ash Carter

Who wanted NSA Director Mike Rogers fired in 2016? Brennan, Clapper and Carter.

And finally, who wrote and signed-off-on the January 2017 Intelligence Community Assessment and then lied about the use of the Steele Dossier? The same John Brennan, and James Clapper along with James Comey.

Tens of thousands of searches over four years (since 2012), and 85% of them are illegal. The results were extracted for?…. (I believe this is all political opposition use; and I’ll explain why momentarily.)

OK, that’s the stunning scale; but who was involved?

Private contractors with access to “raw FISA information that went well beyond what was necessary to respond to FBI’s requests“:

And as noted, the contractor access was finally halted on April 18th, 2016.

[Coincidentally (or likely not), the wife of Fusion-GPS founder Glenn Simpson, Mary Jacoby, goes to the White House the very next day on April 19th, 2016.]

None of this is conspiracy theory.

All of this is laid out inside this 99-page opinion from FISC Presiding Judge Rosemary Collyer who also noted that none of this FISA abuse was accidental in a footnote on page 87: “deliberate decisionmaking“:

This specific footnote, if declassified, could be a key. Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”, this sentence has the potential to expose an internal decision; withheld from congress and the FISA court by the Obama administration; that outlines a process for access and distribution of surveillance data.

Note: “no notice of this practice was given to the FISC until 2016“, that is important.

Summary: The FISA court identified and quantified tens-of-thousands of search queries of the NSA/FBI database using the FISA-702(16)(17) system. The database was repeatedly used by persons with contractor access who unlawfully searched and extracted the raw results without redacting the information and shared it with an unknown number of entities.

The outlined process certainly points toward a political spying and surveillance operation; and we are not the only one to think that’s what this system is being used for.

Back in 2017 when House Intelligence Committee Chairman Devin Nunes was working to reauthorize the FISA legislation, Nunes wrote a letter to ODNI Dan Coats about this specific issue:

SIDEBAR: To solve the issue, well, actually attempt to ensure it never happened again, NSA Director Admiral Mike Rogers eventually took away the “About” query option permanently in 2017. NSA Director Rogers said the abuse was so inherent there was no way to stop it except to remove the process completely. [SEE HERE] Additionally, the NSA database operates as a function of the Pentagon, so the Trump administration went one step further. On his last day as NSA Director Admiral Mike Rogers -together with ODNI Dan Coats- put U.S. cyber-command, the database steward, fully into the U.S. military as a full combatant command. [SEE HERE] Unfortunately it didn’t work as shown by the 2018 FISC opinion rendered by FISC Judge James Boasberg [SEE HERE]

There is little doubt the FISA-702(16)(17) database system was used by Obama-era officials, from 2012 through April 2016, as a way to spy on their political opposition.

Quite simply there is no other intellectually honest explanation for the scale and volume of database abuse that was taking place; and keep in mind these searches were all ruled to be unlawful. Searches for repeated persons over a period time that were not authorized.

When we reconcile what was taking place and who was involved, then the actions of the exact same principle participants take on a jaw-dropping amount of clarity.

All of the action taken by CIA Director Brennan, FBI Director Comey, ODNI Clapper and Defense Secretary Ashton Carter make sense. Including their effort to get NSA Director Mike Rogers fired.

Everything after March 9th, 2016, had a dual purpose: (1) done to cover up the weaponization of the FISA database. [Explained Here] Spygate, Russia-Gate, the Steele Dossier, and even the 2017 Intelligence Community Assessment (drawn from the dossier and signed by the above) were needed to create a cover-story and protect themselves from discovery of this four year weaponization, political surveillance and unlawful spying. Even the appointment of Robert Mueller as special counsel makes sense; he was FBI Director when this began. And (2) they needed to keep the surveillance going.

The beginning decision to use FISA(702) as a domestic surveillance and political spy mechanism appears to have started in/around 2012. Perhaps sometime shortly before the 2012 presidential election and before John Brennan left the White House and moved to CIA. However, there was an earlier version of data assembly that preceded this effort.

Political spying 1.0 was actually the weaponization of the IRS. This is where the term “Secret Research Project” originated as a description from the Obama team. It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller. It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

Why disks? Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS. All of the evidence within this sketchy operation came directly to the surface in early spring 2012.

The IRS scandal was never really about the IRS, it was always about the DOJ asking the IRS for the database of information. That is why it was transparently a conflict when the same DOJ was tasked with investigating the DOJ/IRS scandal. Additionally, Obama sent his chief-of-staff Jack Lew to become Treasury Secretary; effectively placing an ally to oversee/cover-up any issues. As Treasury Secretary Lew did just that.

Lesson Learned – It would appear the Obama administration learned a lesson from attempting to gather a large opposition research database operation inside a functioning organization large enough to have some good people that might blow the whistle.

The timeline reflects a few months after realizing the “Secret Research Project” was now worthless (June 2012), they focused more deliberately on a smaller network within the intelligence apparatus and began weaponizing the FBI/NSA database. If our hunch is correct, that is what will be visible in footnote #69:

How this all comes together in 2019/2020

Fusion GPS was not hired in April 2016 just to research Donald Trump. As shown in the evidence provided by the FISC, the intelligence community was already doing surveillance and spy operations. The Obama administration already knew everything about the Trump campaign, and were monitoring everything by exploiting the FISA database.

However, after the NSA alerts in/around March 9th, 2016, and particularly after the April 18th shutdown of contractor access, the Obama intelligence community needed Fusion GPS to create a legal albeit ex post facto justification for the pre-existing surveillance and spy operations. Fusion GPS gave them that justification in the Steele Dossier.

That’s why the FBI small group, which later transitioned into the Mueller team, were so strongly committed to and defending the formation of the Steele Dossier and its dubious content.

The Steele Dossier, an outcome of the Fusion contract, contains three insurance policy purposes: (1) the cover-story and justification for the pre-existing surveillance operation (protect Obama); and (2) facilitate the FBI counterintelligence operation against the Trump campaign (assist Clinton); and (3) continue the operation with a special counsel (protect both).

An insurance policy would be needed. The Steele Dossier becomes the investigative virus the FBI wanted inside the system. To get the virus into official status, they used the FISA application as the delivery method and injected it into Carter Page. The FBI already knew Carter Page; essentially Carter Page was irrelevant, what they needed was the FISA warrant and the Dossier in the system {Go Deep}.

The Obama intelligence community needed Fusion GPS to give them a plausible justification for already existing surveillance and spy operations. Fusion-GPS gave them that justification and evidence for a FISA warrant with the Steele Dossier.

Ultimately that’s why the Steele Dossier was so important; without it, the FBI would not have a tool that Mueller needed to continue the investigation of President Trump. In essence by renewing the FISA application, despite them knowing the underlying dossier was junk, the FBI was keeping the surveillance gateway open for Team Mueller to exploit later on.

Additionally, without the Steele Dossier the DOJ and FBI are naked with their FISA-702 abuse as outlined by John Ratcliffe.


This entry was posted in 1st Amendment, 4th Amendment, 6th Amendment, AG Bill Barr, Big Government, Big Stupid Government, Cold Anger, Conspiracy ?, Decepticons, Deep State, Dem Hypocrisy, Dept Of Justice, Donald Trump, Donald Trump Transition, Election 2016, Election 2020, FBI, Legislation, media bias, NSA, Phase 1, Phase 2, President Trump, Spygate, Spying, THE BIG UGLY, Tripwires, Uncategorized. Bookmark the permalink.

208 Responses to Sidney Powell Highlights The Intersection of The Flynn Case With NSA Metadata (Surveillance) Abuse…

  1. TwoLaine says:

    I heard her tonight and knew you would be pleased.

    I will guarantee you that every judge who was on candidate TRUMP’s list to be a potential Supreme was spied on. I have said this for YEARS. That is why they wanted the list.

    That is why they also wanted the list of his foreign policy team, and cabinet. They badgered him relentlessly. It was so they could spy and set all this in motion. They wanted to muddy them up as quickly as possible.

    Liked by 24 people

    • GOYA says:

      Agreed 100%!!!

      Liked by 6 people

    • Another takeaway from this is what I’ve been “shouting from the rooftops” forever, and that is that they are literally spying on ALL of us.

      LernerGate didn’t just affect those 501c3s, it affected lots of us “little people” in the now “lower middle class”.

      I’m thankful we have a ESG President Trump and Sundance’s Treehouse with the entire gang of awesome Patriots. Thank you all for what you do, and take a DAY OFF!!

      Commenters will survive! L 😀 L

      Liked by 14 people

      • TwoLaine says:

        Right back at ya’! 🙂


      • p1um1oco says:

        Well of course they are spying on everyone, and all the time. Just listen to this guy, he bought diesel filters online and the Dept of Homeland Security shows up with the local police. Thinking he was buying them to make a silencer from the adapters.

        Liked by 4 people

      • p1um1oco says:

        Well of course they are spying on all of us, this bloke was just buying adapters and diesel filters online and the Dept of Homeland Security shows up with the Sheriff. Apparently just buying parts that may be used for a silencer (Legal in some parts) will get you on the watch list and a visit from your law enforcement officials.


      • margarite1 says:

        I’m a nobody from the Pacific Northwest. If they entered my name or phone number would they get a record of everything I’ve ever typed or said on the phone? Mad Maxine must have been speaking the truth:

        “The President has put in place an organization with the kind of database that no one has ever seen before in life,” Representative Maxine Waters told Roland Martin on Monday.

        “That’s going to be very, very powerful,” Waters said. “That database will have information about everything on every individual on ways that it’s never been done before and whoever runs for President on the Democratic ticket has to deal with that. They’re going to go down with that database and the concerns of those people because they can’t get around it. And he’s [President Obama] been very smart. It’s very powerful what he’s leaving in place.”

        Liked by 2 people

      • ann says:

        Yes, it’s heartening to hear media actually talking about Obama admin surveillance of Congress, private individuals.

        This should have been the primary focus once Collyer’s review was released April 29, 2017. Happy also the DoJ, Bureau command who authorised and signed these FISC apps and renewals are not let off the hook.

        Before Congress Rosenstein vigorously defended authorising these compilations of ldeception by blaming underlings. signature was” I took the staff at their word”, is inconsistent with the number of surveillance requests and free for all with private contractors.
        Yates had direct knowledge , in fact , was in the direct chain of command of the DoJ staff working on the backlog of “bad”cases FISC judges identified.

        The signers,, highest command , authorised and enabled systemic abuse .

        Also, how can the DoJ claim they’ve delayed all the ill gotten data?
        Please, don’t try to convince us out of control Bureau, JD NSI and Private contractors complied with the brokered agreement with FIS court .

        Liked by 2 people

    • bertdilbert says:

      Sidney: While in this particular situation it was Comey’s FBI that allowed the Contractors, I think it is important to start with Muller’s FBI that signed the MOU to allow CIA contactors.

      That makes the SC Mueller coverup operation that much more stinky and is likely to stick with the publics.. Think what a stir it would be if Trump tweeted that Mueller initiated access to spy on me! Then ran the SC. A lot more punch there.

      Liked by 4 people

  2. GOYA says:

    Keep it up Sundance. You keep helping us put pieces together in understandable format.

    Liked by 8 people

  3. Zorro says:

    Here’s what we are up against Sundance.

    Meet the Cleanup Man.

    Liked by 4 people

  4. WhiteBoard says:

    I have nothing to resay or draw attention to in an effort to comment.

    This is you best summary yet.

    Liked by 6 people

    • anthonydog says:

      It was the C_A and THE HAMMER


    • ann says:

      The Collyer report is seminal. Thank you Admiral Rogers.

      Delighted this is finally beginning to get coverage .

      Systematic acquisition and dispersal of surveillance intell infers the DoJ & sisters could dominate Congress Judiciary, private citizens, candidates, presidents and Cabinet, fear, intimidation and blunt coercion, such as Comey & Yates tried to pull on President Trump , his attorney and team.
      Disgusting .

      The antithesis of governance by free consent and respect of individual freedom and civil rights. rights free uover fear, intimidation and coercion are ,


  5. thedoc00 says:

    Great recap. There is a parallel thought to all this. If the Clinton Campaign was using or had this “raw, classified” information, it was; on the infamous Clinton server, on the Wiener Lap top and anywhere else Hillary’s missing emails may reside.

    The depth of the whitewash over the Clinton and DNC servers takes on a whole new aspect if linked to this topic. Of course all meat for another day, after the coup is exposed and disrupted.

    Liked by 5 people

    • WhiteBoard says:

      Yes – and Hillary was okay selling it like the rest of Congress. Where she messed up was having a muslimsisterhood spy that synchronized her server to Huma’s laptop.

      this is the FREAK OUT about some “exported” data in the public

      Liked by 1 person

    • dd_sc says:

      If that’s true, there is also a good chance there are accounting ledgers and spreadsheets on the Weiner laptop.


    • jediphantom says:

      There is an excellent possibility that some of the blackmail materials from EPSTEIN’S ILLEGAL EROTIC FILM COLLECTION would have found there way onto a CERTAIN LAPTOP. Having the convenience of a short clip showing a potential PEDOCRAT DONOR doing the horizontal floss dance with an 11 year old kid, can increase the size of the donation to ones campaign, as one could imagine…quite substantially. Doubtful that any of what amounts to CHILD PORNOGRAPHY FOR PROFIT materials were on the DNC H.Q. SERVERS simply because of the fact that the SANDERS CAMPAIGN did have limited access to it. TOO RISKY.

      But on a trusted aides systems? Why not? That way you can pull up what is needed when going to your next PEDOCRAT DONOR FUNDRAISING EVENT. Pretty good reason to SMASH UP YOUR PHONES after catching wind of any investigation. The DNC H.Q. servers are another matter that is linked to all of this. Those links have been made, and at some point will be revealed. In some cases it already has been.

      PEDOGATE hung around the necks of the PEDOCRAT PARTY will secure victory in November. And beyond. The Church scandals, fresh in the mind of millions who were repulsed by it all, will have no trouble understanding the vile crimes committed by these monsters. We must insure that these horrors, reach the SUBURBAN KARENITE MASKAMANIA MOMS in every possible way, EVERYDAY….RELENTLESSLY.

      We shall win the House back.
      Retain the Senate.
      And re-elect our favorite President in a LANDSLIDE.


      AND WIN.


      Liked by 6 people

      • WhiteBoard says:

        Yes- for a lenient plea deal – Epsteins files were collected by the FBI Export Team to utilize for ‘national security’. It would keep the country safe if your congress could be controlled and not make bad moves for the country (these people are sick).

        Liked by 2 people

        • jediphantom says:

          Ah yes…”NATIONAL SECURITY”! And if these materials happened to be on….oh let us just say….A CERTAIN SOMEONES illegal bath-house server…in say…CANKLESQUAW N.Y. that was hacked by HOSTILE FOREIGN POWERS….WELL….WHO ELSE HAS IT?

          No wonder ED BUCKS dear, dear friend Adam SHIFTY Schifft thought the “RUSSIANS” had pictures of “NAKED TRUMP”.

          I would venture to say that makes OUR FAVORITE PRESIDENT laugh at loud every time Hannity plays that clip. I DO.


          Liked by 1 person

          • WhiteBoard says:

            and YATES said the IG could not have oversight – SO ALL WAS HIDDEN in that group. The FOX group. the beagles look for the scent to find the criminal, the fox wasnt looking for the criminal.

            the test before the 8.15 nightmare of 3.17.17 is Yate’s testimony tommorow. If they dont decide a Yes to equal law and order then they better fight to take POTUS out .. them or him – no compromise.


            • jediphantom says:

              What is most remarkable to me, though given our MAIN-REEK SWAMP MEDIA MINIONS…well…. is the lack of coverage regarding 53 VARMINTS under oath testifying THEY SAW NO EVIDENCE OF TRUMP/RUSSIA COLLUSION.

              “Q” THE MORON SWAMPERNACLE CRICKETS would you?

              DEPLORABLE JEDI.


          • margarite1 says:

            Wouldn’t POTUS know by now what was on Weiner’s laptop that made the cops who saw it vomit?


            • jediphantom says:

              Perhaps. Most likely from some old friends. But he really couldn’t talk about it. And even if he did know, the POTUS is not a PROSECUTOR. And at this point, he should stay out of it.

              But D.J. (Don Junior) has been trolling about PEDOGATE. So…there’s that.

              DEPLORABLE JEDI.

              Liked by 1 person

      • Dwayne Diesel says:

        Oh, IMO, they have the server. It’s why they (Dems and some Republicans) were so incensed over Trump’s call with the Ukraine.

        If my memory serves me correctly Ukraine’s President confirmed when mentioned by Trump they do in fact have the “Crowdstrike” server.

        That server is the DNC server and they thought it was long buried away. Some may ask why they didn’t destroy it- well you don’t destroy juicy illegally obtained info if you still have use for it….their arrogance is over the top. It’s also why, IMO, Murphy, Feinstein, Schumer, Warner, and others were still trying to take trips to the Ukraine. They needed to understand how much is compromised and how to spin.

        But, I’m just a plebe being bent over by career politicians via COVID rules while they do what they please.


        • jediphantom says:

          I agree with you on the value of the DATA. However, it is my belief that the actual SERVERS and HARD DRIVES became victims of “THE HAG QUEENS HAPPY HIDING HAMMERS”.

          I think that information is held within the confines of “THUMB DRIVES”. And no one really knows HOW MANY COPIES WERE MADE. What do all I.T. PEOPLE tell you about DATA? Save, COPY, backup.

          If the physical servers still exist it would be an unforced error. Not getting ALL OF THE COPIES of that information….WOULD BE A GRAVE ONE. (TDM). THUMB DRIVES MATTER!

          As for the tyranny spawned by the CHINESE KUNG-FLU? You are not a PLEBE….you are an AMERICAN. We shall be freed of it. WE SHALL REMAIN FREE. We just have to ride it out for a little while longer.



          Liked by 1 person

    • Dwayne Diesel says:

      The coup, the database abuse, Clinton’s emails, the DNC server, and Flynn are all connected. There is no separation- that is apparent now.

      Liked by 1 person

  6. Skidroe says:

    Scumbama needs to be TOTALLY exposed on ALL the blackmailing he and his team have been envolved with since at least 2012. Romney had to be blackmailed. He laid down tremendously after he blew Scumbama away in the 1st debate. Justice Roberts was blackmailed on Obamacare vote. I think his shadow gov. is still blackmailing people today.

    Liked by 7 people

  7. Stringy theory says:

    I hope and trust, and feel sure this wonderful attorney came into possession of Sundance’s briefing book that perfectly connects all the dots. And she will make good use of it.

    Liked by 2 people

  8. gpatriae says:

    Sidney Powell is a patriot!

    Liked by 12 people

  9. Dave Sanderson says:

    Thanks ONLY to Sundance’s relentless pursuit of the facts behind these monstrous Obama-instigated FISA violations have CTH Treepers known much of this for many months. Based on statements today (by Trump himself and also by Lou Dobbs on Fox Business Network) we may at long last be mere days away from an epic volume of fit hitting the shan, enough illegal – indeed treasonous – crap to bury Democrats in the biggest GOP electoral landslide in history.

    God bless you, Sundance! You are are an unsung hero for your dogged pursuit of truth and justice. Thank you, thank you, THANK YOU!!!

    Liked by 6 people

    • MelH says:

      I just came here from Twitter where they are ALL celebrating that the investigation of the IG’s 29 flawed Fisa applications found that all had “just cause” and there were only two minor errors, thus Spygate was a lie all along and Trump will now try to steal the election or refuse to apologize and leave the White House. And Barr is now totally embarrassed because he lied. But not a word of that here? How did Democrats get the news but we didn’t?


  10. screwauger says:

    It apropos to repeat at this time that elRushbo told his listeners repeatedly in 2007 and 08 that if elected, Obama would bring with him for the first time ever in the White House, Chicago Thug Politics. He asked that his words be marked, that an Obama administration (remember all the I Hope He Fails drama) would represent the Most Corrupt Admin. in the history of the USA. Paraphrasing Rush’s words of course. I believe and have for some time, that he was 100% correctomundo!!!

    Liked by 9 people

  11. Linus in W.PA. says:

    Let Hell rain down on these treasonous bastagees…

    If the swift death penalty is not achievable, then forfeiture of all assets, loss of citizenship for the individual and all direct family members, loss of citizenship for all those same people, and banishment from the U.S.A.

    This is all, of course, after long prison terms.

    Liked by 3 people

  12. Chip Doctor says:

    The key to draining the swamp is stopping the blackmail. I believe that Obama has a duplicate database where access cannot be tracked. As mad Maxine said “it is the most powerful database ever” (paraphrased). This is the stranglehold on DC. It MUST be exposed and broken.

    A list of names that were accessed would blow Washington DC to bits. It’s time. WE KNOW.

    Liked by 12 people

    • WhiteBoard says:

      Remember when POTUS said – Ukraine has the server.

      Liked by 4 people

    • Linda K. says:

      I don’t think Obama was that clever. Duplicate database? I bet he was sure he would never be caught.


    • usualwidgits says:

      The notion that contractors were not authorized to make queries needs to be put into context. Actually, I believe all analysis of information gathering activities needs a new context. Just like the U.S. government does not control money creation activities but relies on The Federal Reserve (an entity owned by the financial industry), the entire information gathering industry, whether contractors who control NSA, for example, or any of the social media giants, the U.S. government does not control its own intelligence apparatus.

      At one time IBM was the one stop shop for any information processing needs especially in government and large corporations. Contracting with IBM was the “safe” way to go. Once the contract was signed, IBM had their hooks in for years. Decades. Then, along came Microsoft. Hey, we’ll give you the software. The point is companies and agencies invest huge amounts in hardware and software. Then the upgrades, not to mention the tweeks and the fine tuning … oh, and the integration. End of the day, the contractor controls the customer.

      This is what has happened to the intel agencies. They have become so technology dependent that the technology controls the customer.

      Maybe Obama has a dupicate data base. More likely, the contractors have multiple mirrors (cloud servers) and more leverage than any of us can possibly conceive.

      Liked by 1 person

      • WhiteBoard says:

        “deliberate decision making” and “FISC was not informed of this until the audit”

        that is not a technolgy dependent related issue. A good point is that we need our companies American focused – hence saving boeing. but this was the PICUTRE! the FOX IN THE HOUSE. the export group was in our HOUSE.

        footnote 69 Collyler Report FISA – The improper access granted to the ___ contractors was apparently in place _____ ___ and seems to have been the result of deliberate decision making. ________ Compliance Report at 92-93 ____ access to FBI systems was the subject of an interagency memorandum of understantding entered into _____ ……”no notice of this practice was given to the FISC until 2016.


      • geoffg12 says:

        Well, first along came Amdahl. This company, formed in 1970 by Dr, Eugene Amdahl, co-inventor of the IBM 370, was the 1st CLONE. It ran all of the customers’ software written to run on the IBM mainframes, without change on the Amdahl mainframe. The business model was later copied by hundreds of microcomputer manufacturers to run the OS chosen by IBM – DOS by Microsoft. Stupidly, IBM did not ask for exclusivity, which led to a torrent of desktop “cloners.:


      • geoffg12 says:

        Ad rem – my reply must have been sent to ether.


  13. GTOGUY says:

    No wonder it is taking Durham so long to indict these crooks. It’s going to be tough to tie all of this up and use it as a conspiracy to defraud the United States.

    Liked by 3 people

  14. bessie2003 says:

    Elizabeth MacDonald of The Evening Edit is another one of those bright spots on Fox Business;

    along with Maria Bartoromo, and a few others like Varney & Co., and of course the indomitable, though sometimes grumpy, Mr. Lou Dobbs, it’s starting to make sense now, put together with Sundance’s post titled ‘Point” – it makes sense as to why it will be reporters on the financial side of the news that will not stop digging until they find that buried bone as to exactly what was going on with the coup, with Gen. Flynn, with the fake Russia hoax, why the need for impeachment, and only know to keep on digging until they find the hidden treasure –

    Good financial reporters sniff out fraud; great ones hang in there regardless of the consequences and never let go until they get to the bottom of it!

    Liked by 4 people

  15. Incredible information.
    What happens next?

    Liked by 1 person

  16. Issy says:

    The dots are connected. We Know what they did and why, but will the media report it? I don’t think many have followed the drip, drip of information enough to understand it.

    Liked by 3 people

  17. Right to reply says:

    God bless that lady, and keep her safe!
    There has to be a way to track the money on these people, there just has to be!

    Liked by 1 person

  18. Fred Witt says:

    Regarding the Flynn case, there is no “case or controversy.” There is nothing justiciable.
    There is no case upon which the court can rule — because no “case or controversy” exists.
    Good Luck, Sydney!

    Liked by 1 person

  19. trnathens says:

    Edward Snowden

    Liked by 2 people

  20. trnathens says:

    Ed Ward Snow Den


  21. Beau Geste says:

    The illegal spying on General Flynn and others went beyond the NSA database. I hope Sidney Powell brings up this obama “out to get Flynn” illegality at the IRS, in the the DC Circuit oral argument. ” The other names include: Members of Congress, the most senior staffers on the 2016 Trump campaign and members of Trump’s family,”

    “President Barack Obama’s Treasury Department regularly surveilled retired Army Lt. Gen. Michael T. Flynn’s financial records and transactions BEGINNING IN DECEMBER 2015 and well into 2017, before, during and after when he served at the White House as President Donald Trump’s National Security Director, a former senior Treasury Department official, and veteran of the intelligence community, told the Star Newspapers.

    “I started seeing things that were not correct, so I did my own little investigation, because I wanted to make sure what I was seeing was correct” she said. “You never want to draw attention to something if there is not anything there.”

    By March 2016, the whistleblower said she and a colleague, who was detailed to Treasury from the intelligence community, became convinced that the surveillance of Flynn was not tied to legitimate criminal or national security concerns, but was straight-up political surveillance among other illegal activity occurring at Treasury.

    “When I showed it to her, what she said, ‘Oh, sh%t!’ and I knew right then and there that I was right – this was some shady stuff,” the whistleblower said.

    “It wasn’t just him,” the whistleblower said. “They were targeting other U.S. citizens, as well.”

    Only two names are listed in the whistleblower’s official paperwork, so the others must remain sealed, she said. The second name is Paul J. Manafort Jr., the one-time chairman of Trump’s 2016 presidential campaign.

    The other names include: Members of Congress, the most senior staffers on the 2016 Trump campaign and members of Trump’s family, she said.


  22. lambgraham says:

    The heroes are, Powell, Admiral Rogers, few House members, Grenell, Ratcliffe, Fitton, Solomon, Sundance, Bongino, and Sarah Carter.
    The traitors, too many to name.

    Liked by 2 people

  23. Donna in Oregon says:

    There are a few issues with FISA that have not been explored.

    It is that DO uses the META and inquiry to use as evidence in criminal trials.

    That is one of the major reasons why the DOJ does not want to open this Pandora box.

    Please keep in mind that this case made it to the USSC. Also, this happens all the time. Police Depts. all across the USA.

    Carpenter v. United States Privacy Case Pushes Supreme Court to Decide Fourth Amendment Protections of Cell Phone Metadata

    I believe that we have had wireless since the 1980’s and the old excuse that the courts are far behind the technology is stupid. It’s been almost 40 years. Smells like BS, looks like BS, must be BS.

    The question has always been IS there an expectation of privacy on a wireless phone? We used to listen on the Scanner to cordless phone conversations. We had some laughs. But at the time I thought that this would be misused.

    It is misused. There is no expectation of privacy in the public square. But if you are paying for a service that is not a public utility (i.e. email, cell phone, smart phone) that is the question.

    It is private. They just don’t want to admit it. Because if they did admit that they have been violating the 4th Amendment for decades…. the lawsuits would be legion.


    • WhiteBoard says:

      Not under national security.

      They got a bypass on the constitution for the 9/11 event Northwoods with JFK stoppping the planes from crashing into Cuba. I mean the next one in New york.

      So the new issue is – They even abused the intial bypass of the constitution and didnt even use it for terrorist. In fact alll terrorist were trauma programed through working them up and providing the weapon. The news reports of the shooter talking with or visiting the FBI 2-4 times prior is only in the news initially, as its identifed, and the author scrubbed.

      Pretty simple if our beleif in the world comes from data. Which makes my final point! Rubios said they can upload on to a computer (Vault 7 is in Mark Warners Texts). Uploading shows how you can REMOVE ANYONE .. upload child porn on Michael Cohen’s computer and squeeze him for everything he has by the FBI.

      Exports are for profit. Uploads are for control. Think of the Subway guy. the company was repurchased.


      • Donna in Oregon says:

        Yep, that is my point. META data is for FISA, it is not for domestic crimes within the USA. It is Foreign Intelligence Surveillance.

        Yes expanded, but still about FOREIGN. This improper use, and then the courts not getting up off their azzes and defending the 4th Amendment:

        Amendment IV
        The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

        My point is FISA/NSA Meta Data/DOJ is not being used legally by anyone anymore.

        So this USSC case showcases just one way META data is being misused. And BONUS, the United States Supreme Court is not going to defend the 4th Amendment because if they do all those people in prison in the USA would sue the crap out of them and get out.

        Do I think crime should be allowed? No. But I do see that it is very advantageous for the Swamp to use this as cover to keep violating the 4th Amendment thereby allowing these Government criminals to spy on us.

        Many people believe that Chief Justice John Roberts was spied upon and being blackmailed with that information.

        I believe that. Who is John Roberts going to tell? William Barr? EYEROLL

        And this is how they do it and the fruits of their labor allow them carte blanche…… and this is why the 4th Amendment is not protected. The blackmail….fear of reprisal is very pervasive in Washington DC.

        Just look at what they do to people that get in their way. They are destroyed.

        The people of the United States of America no longer have 4th Amendment protections.


        • WhiteBoard says:

          Refresh – the NSA database is CLOSED. the access points are no longer available to the exporters. Paul Ryan quit when he saw the globe in saudi arabia.

          So if they no longer have access – it implies the game is over and they are being prosecuted.


          • Donna In Oregon says:

            Americans really believe them? That they will stop misusing? Really…..that’s funny. Because that does not explain the decades of abuse—nor does it explain the failures of all the agencies including the courts to protect the 4th Amendment.


            I’m just not sure why Americans believe them.

            I do not believe the US government. They lie.

            POTUS cannot even get ONE indictment. Not even for unmasking General Flynn which IS a straight-up crime. It is going on 4 years now. Still, nothing was done. Oh right, it’s under ‘investigation’…..I do not believe that it is. I believe it is being swept under the rug and the almost 4-year investigation for a CRIME that was documented 4-years ago and ANY investigator with an IQ over room temperature knows WHO, WHAT, WHEN, WHY AND WHERE.

            No indictments. None. .

            Refresh? Sounds good, but didn’t happen. The reality is that FISA is ripe for abuse anytime/anyplace. Even 5 eyes will assist the Deep State and the Swamp if they need it. They were extremely helpful to the Swamp and the Deep State during Spygate. I will settle for reality, not the cover story.

            I don’t believe that there has been ANY change. And the truth is no one can PROVE me wrong. because META data collection and spying is clandestine and hidden.from the public and the system of protections in the US government IS corrupt and benefits financially from its misuse.


    • Asciimom says:

      Thank you. Keep comments like these coming.


  24. mtg50 says:

    There is nothing new in this post. While it spells out plenty of criminality to indict many Obama officials, it does not make the conspiracy case for the overall coup attempt.There was an attempt to overthrow a President of the the former president and by his intelligence and justice department officials.Say that out loud a few times and realize those people have to be indicted for that crime.


  25. Beigun says:

    British “Red Coats” conducted illegal search and seizure during the lead up to the American Revolution.

    “Give Me Liberty or Give Me Death” has several meanings, but for Colonial America it meant stopping the illegal search and seizure of homes by “Red Coats.” Just like the spying by “unmasking” ordinary Americans, the Deep State has become the “Red Coats” of our era!

    Liked by 1 person

  26. Dan says:

    There is no legitimate reason to redact the names of the contractors who illegally accessed the NSA database. There is no legitimate reason for almost any of the redactions in any of the documents related to the Mueller probe, the FISA abuse, the IRS abuse, etc.

    Liked by 3 people

  27. somebodysgramma says:

    The thought that came to mind… this spying crap was going on long before Obama. I always had a hunch that the Patriot Act was only created in order to legitimize the spying that was already taking place. So, imagine this isn’t just about the Marxist Obama and the Communist Jarrett… if you haven’t noticed, the Bush’s are quite friendly with the Obama’s and were with the Clintons. I think what’s been going on has been going on a very long time. And The Swamp is YUUUUGE. Most likely our most senior Senators and Congress Critters are involved. They probably justify it all by thinking “this is just the way business is done”. You scratch my hide, I scratch yours. Their PROBLEM is that We the People weren’t in on the deals. Yes, they would throw us a bone every once in awhile to make us think they were working for us while they enriched themselves. They are like the Mafia.

    I realize I’m creating a huge vat full of evil monsters. Not ALL politicians are evil. There are a handful that really care about the Republic, but they are a very small minority. A problem that must be solved by We the People – not corrupt government. As Sundance has said, WE ARE WORTH IT – WE CAN PUSH BACK – there’s still time. I’m in 100% agreement that Sundance must go ahead with the expose, with or without the so-called Department of Justice.

    Liked by 1 person

  28. conservalicious says:

    Holy Cow, it looks like Durham has completed the investigation!

    Liked by 6 people

  29. Jay Wiz says:

    Take this, and look at it in light of Sharyl Atkisson’s new lawsuit that names the intruders on her home network. She got the names because a whistleblower came forward. The name of the FI that hacked her home netwrok and spied on her computer is:

    Shawn Henry, former FBI agent and current President of Crowdstrike.

    It’s all come full circle.


    Liked by 4 people

  30. kleen says:

    Not related to Powell but related to draining the swamp, and will give you hope.

    Liked by 10 people

  31. Chump Change says:

    I don’t ask for much in life…but I do want to be the person who pulls the lever on the gallows that hangs every single one of the treasonous bastards in the Obama and Clinton circle.

    I want to close my eyes and listen as they rattle, spit, shake and finally empty their waste into their shoes.

    Then we can start working on the money sources who fund all of the Democrat’s treason.


  32. Admiral Rogers and Chief Judge Collyer know whether the FBI subcontractors were using the NSA database to conduct electronic surveillance on then Candidate Trump, as well as members of his family, campaign and businesses. They also know whether those subcontractors were doing the exact same thing for other Republican presidential candidates, none of whom are mentioned in the Steele Dossier or the Carter Page FISA application and renewals. Both Rogers and Collyer had the authority to disclose to the American people this political surveillance that made Watergate actually look like a two bit burglary, not only before the 2016 election but well into the Trump Administration.

    Four years later? Crickets.

    As Director of the NSA, Rogers was in a position to not only monitor but object to FBI access to the NSA database via the Carter Page FISA application and all three renewals. Collyer could have made her colleagues aware of the Obama Administration abuse of the NSA database for electronic political surveillance and possibly even ordered that any application or renewal seeking surveillance authority over anyone associated with the Trump campaign or administration should be scrutinized with a fine tooth comb. Neither one did.

    We have always assumed that Admiral Rogers is a white hat because he met with President-Elect Trump post-election without authorization. But we still do not know what he actually disclosed to Trump and there is absolutely nothing in the public record to indicate he ever did anything to counter the clear sedition of his counterparts at the DOJ, FBI and CIA other than the continued assurances of former USADC Joe DiGenova.

    I must say that, rereading this missive, I find myself less than optimistic when I truly am hopeful that Sundance is making real progress. It’s just that this is information that is clearly known or easily knowable and, along with Carter Page’s participation in the Buryakov prosecution, would conclusively prove the political surveillance we all know occurred. Sorry.


  33. kleen says:

    I want o see Powell and Flynn running an agency.

    Liked by 1 person

  34. amwick says:

    So the NSA created a vast database,,, for national security,, then they used it to blackmail some people and spy on others. Having a database sucks, having a corrupt FBI sucks, it seems that the FISA courts were fooled, that sucks.. What does not suck is that it is all out in the open, for anyone to see, if they dare.
    I am optimistic, absolutely.. especially after listening to Sidney explain all of this on national TV.. She even used that phrase “about query”… and I just about cheered. Black ops, meet sunlight. BTW Sidney means ray of hope in Urdu..(I made that up)…

    Liked by 4 people

  35. Snowmaze says:

    Did the Anwan brothers scrub all the data specifically related to search requests, or did the the contractors delete their finger print of access?

    Liked by 1 person

  36. jediphantom says:

    As self-governing citizens and taxpayers of this great REPUBLIC, we are the rightful owners of THE DEEP STATE SWAMP, and all things that reside in it’s DARK, MURKY, DIRTY WATERS. Therefore it is my right, my duty, and my obligation as an American to state, eloquently, emphatically, and justifiably that….


    Yes. I know.


    Liked by 6 people

    • usualwidgits says:

      I do appreciate a good play on words.

      Liked by 1 person

      • jediphantom says:

        I find that in most cases the words play with me. Something about the ’80’s. I am told I had a great time, but….IT WAS THE ’80’s.






      • jediphantom says:

        I should note a bit of caution whilst we are “RECLAIMING OUR SLIME”!
        I’m not sure there is a CHINESE KUNG-FLU MASK that is capable of STRAINING THE SWAMP WATER enough to make it safe to “RECLAIM”.




  37. We Know

    She has known for a while

    Obama knows we know and he is scared poopless.

    Liked by 1 person

  38. Publius2016 says:

    Everything Sidney said is 100% TRUE!

    Contact tracing is no one’s business!!

    The government is so out of control with their secret powers and hypocrisy, 4 MORE YEARS TO DRAIN THE SWAMP!!!

    Liked by 2 people

  39. Jimmy R says:

    As for Warner, his challenger this year is Daniel Gade (R). Iraq War vet (surgeons had to remove his entire leg), poli sci prof, family man. Ostensibly conservative (knock wood.)

    I would like to see Gade beat Warner and Warner indicted, not necessarily in that order.

    Liked by 4 people

    • leavemygunsalone says:

      Yes, knock wood. I have met him and he was straight up w/me. I am working a tad on his campaign, it would be awesome to see him take down Warner. They need contributions and volunteers, so if anyone is inclined to help out, please do.

      Liked by 3 people

  40. MVW says:

    So, this is about the power to make $trillions and to hold on to the power.

    But they got too greedy and too power hungry.

    Liked by 1 person

  41. Fromseatoshinningsea says:

    If Biden gets in China gets our 5G. Goodby America

    Liked by 1 person

  42. Me says:

    So was the extracted data going to Obama’s 501C “Organizing for America”? Consider what Maxine Waters is saying back in 2013. Sounds like Obama planned to dabble in presidential politics long after he was out of office.

    Liked by 1 person


      Yep….thats why Mr BoJangles bought tha big ole mansion in the elite Kalorama district of DC, Built A Wall, & his handler, ValJar moved in too.


  43. Fools Gold says:

    More Sundancing! God I love this smart human! Thank You for the great summary. I’m slow but everything is starting to connect like chain loops!

    Liked by 2 people

  44. anthonydog says:

    Sundance why no mention of the BOMBSHELL info that Sidney exposed



    it is not the NSA …It is the C_A…

    Liked by 1 person

  45. anthonydog says:

    Sidney mentioned “Brennan’s Fusion Center” and “THE HAMMER”



  46. j'accuse says:

    The executive branch has become a closed system in which people at the top levels play musical chairs between agencies and drift out of government to lucrative private positions but are poised to return later on. It is this permafrost of powerful people in Washington that makes this level of corruption and control possible. Any politicians and lower rung bureaucrats who think these people are ‘on their side’ are foolish in my opinion.
    It is possible to break up the crowd who is using their offices and access to intelligence information to chill or scare away threats to their power. I think Trump has made substantial progress in this regard but it’s disappointing to me that a lot of retired Foggy Bottom people and ex-military who inhabit the think tanks took such strong positions against Trump at the very beginning.
    I look at some of the DOJ lawyers, as an example, who seem to like the power game and it’s possible that some of them may feel like they didn’t get their fair share for being a team player, whatever that share may be, given the risks they took. Just a hunch but a group to keep an eye on. Keeping the foot soldiers happy is important to running any racket and they are always are looking for opportunities to move upward and form the next generation of elite bureaucrats.


  47. nerveman says:

    In my own way I have studied and listened to Sidney Powell very closely over some time now. I find her truly formidable. She’s nervous in this video and her voice quivers a lot. In Sydney’s mind. and I feel quite sure, she’s is touching a third rail and is reluctantly being forced to go there. It’s far beyond her client and his representation.


  48. Beau Geste says:

    so, where is the exported IRS and NSA obama database?
    in obama’s DC headquarters under jarretts control? ? on marthas vinyard?
    some pacific island obama went to right after the election?
    when will the FBI raid it?


    • Linda K. says:

      I would love to see a raid on Obama’s Washington mansion. You know, wtrh a helicopter, swat team, and CNN cameras recording it all. That is what happens when you lie to Congress about an immaterial matter according to the Roger Stone case. And what Obama has done is so much worse than we knew.

      Liked by 1 person

  49. Eric says:

    The FISA courts were not fooled. They are complicit in it. The affidavits do not contain probable cause. Triple hearsay from an unknown source is not allowed in a probable cause affidavit. It’s not allowable in any court setting. Judges should be going to prison. A lot of them.


    • TwoLaine says:

      I am guessing we will find out that these judges are all compromised. They were most likely threatened verbally, if not physically, by The Kenyan’s Kabal. I am sure they were spied upon as well, or perhaps participated in the spying.

      We know what The Kenyan and Kabal did to reporters/newz outlets they did not like and we know that that is just the tip of the iceberg.


    • Dimbulbz says:

      You would think that someone saying “We need to spy on the Republican Candidate for president” would raise at least a slight eyebrow with at least one of the judges. Unless they were in on it. That would be no surprise to me. I have naught but contempt for people who choose a corrupt life in DC over a life well lived.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s