Michael Flynn defense attorney Sidney Powell appears for an interview with Liz MacDonald to discuss the developments in the Flynn case (note: Sullivan’s court appointed amicus response brief is due tomorrow), and the background information recently highlighted. As you review this interview, retain the 30,000/ft perspective.
Ms. Powell also discusses the Weissmann/Mueller special counsel erasing evidence by wiping phones and hiding evidence of their corrupt activity. Additionally, Liz Mac circles back to the 2017 FISA report by Rosemary Collyer to support the most recent 2019 opinion filed by the FISA court showing the NSA database search abuse is ongoing.
.
(1) We know to a demonstrable certainty the special counsel took apart the FBI investigative file of Washington Field Office Supervisory Special Agent Brian Dugan in order to protect their corrupt investigation and the collaborative effort of the Senate Intelligence Committee. And Durham/Aldenberg knows that we know.
(2) We also know with a high degree of certainty the special counsel created a missing Woods File for the Carter Page application when the IG started sniffing around and announced his intent to review the four FISA applications. And Durham/Aldenberg knows that we have strong, very strong, evidence pointing in that direction.
(3) And now today we discover the same special counsel team destroyed their iPhones in an effort to cover their tracks. These three events all happened within an almost identical time-frame. C‘mon man… this is not coincidental.
I’m reposting a prior research outline below because something odd is happening in the background of this story. I’m not sure what it is, but there are small -seemingly disconnected- issues surfacing, that might tie back to this much bigger and purposefully avoided story. I have learned to trust my instincts on this.
♦One – The FISA reauthorization legislation was dropped by Nancy Pelosi and all media conversation immediately vaporized.
♦Two – Crowdstrike is very concerned about this story every time it surfaces.
♦Three – If you understand the scale and scope of surveillance… does that explain the behavior of some people today [legislative (politicians), judiciary (judges), Pentagon (military)].
Were ‘black files‘ created by the Obama Administration?
With the release of recent transcripts and the declassification of material from within the IG report on the Carter Page FISA, there is a common misconception about how the intelligence apparatus began investigating the Trump campaign. In this outline we hope to provide some deep source material that will explain the origin, and specifically why those inside the Intelligence Community began using Confidential Human Sources.
During the time-frame of December 2015 through April 2016 the NSA database was being exploited by contractors within the intelligence community doing unauthorized searches.
On March 9, 2016, oversight personnel doing a review of FBI system access were alerted to thousands of unauthorized search queries of specific U.S. persons within the NSA database.
NSA Director Mike Rogers was made aware.
Subsequently NSA Director Rogers initiated a full compliance review of the system to identify who was doing the searches; & what searches were being conducted.
On April 18, 2016, following the preliminary audit results, Director Rogers shut down all FBI contractor access to the database after he learned FISA-702 “about”(17) and “to/from”(16) search queries were being done without authorization. Thus begins the first discovery of a much bigger background story.
When you compile the timeline with the people involved; and the specific wording of the resulting review, which was then delivered to the FISA court; and overlay the activity that was taking place in the GOP primary; what we discover is a process where the metadata collected by the NSA was being searched for political opposition research and surveillance.
Additionally, tens-of-thousands of searches were identified by the FISA court as likely extending much further than the compliance review period: “while the government reports it is unable to provide a reliable estimate of the non compliant queries since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 period coincided with an unusually high error rate”.
In short, during the Obama administration the NSA database was continually used to conduct surveillance. This is the critical point that leads to understanding the origin of “Spygate”, as it unfolded in the Spring and Summer of 2016.
It was the discovery of the database exploitation and the removal of access as a surveillance tool that created their initial problem. Here’s how we can tell.
Initially in December 2015 there were 17 GOP candidates and all needed to be researched.
However, when Donald Trump won New Hampshire, Nevada and South Carolina the field was significantly whittled. Trump, Cruz, Rubio, Kasich and Carson remained.
On Super Tuesday, March 2, 2016, Donald Trump won seven states (VT, AR, VA, GA, AL, TN, MA) it was then clear that Trump was the GOP frontrunner with momentum to become the presumptive nominee. On March 5th, Trump won Kentucky and Louisiana; and on March 8th Trump won Michigan, Mississippi and Hawaii.
The next day, March 9th, NSA security alerts warned internal oversight personnel that something sketchy was going on.
This timing is not coincidental. As FISA Judge Rosemary Collyer later wrote in her report, “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” Put another way: attributes belonging to a specific individual(s) were being targeted and queried, unlawfully. Given what was later discovered, it seems obvious the primary search target, over multiple date ranges, was Donald Trump.
There were tens-of-thousands of unauthorized search queries; and as Judge Collyer stated in her report, there is no reason to believe the 85% non compliant rate was any different from the abuse of the NSA database going back to 2012.
As you will see below the NSA database was how political surveillance was being conducted during Obama’s second term in office. However, when the system was flagged, and when NSA Director Mike Rogers shut down “contractor” access to the system, the system users needed to develop another way to get access.
Mike Rogers shuts down access on April 18, 2016. On April 19, 2016, Fusion-GPS founder Glenn Simpson’s wife, Mary Jacoby visits the White House. Immediately thereafter, the DNC and Clinton campaign contract Fusion GPS… who then hire Christopher Steele.
Knowing it was federal “contractors”, outside government with access to the system, doing the unauthorized searches, the question becomes: who were the contractors?
The possibilities are quite vast. Essentially anyone the FBI or intelligence apparatus was using could have participated. Crowdstrike was a known FBI contractor; they were also contracted by the DNC. Shawn Henry was the former head of the FBI office in DC and is now the head of Crowdstrike; a rather dubious contractor for the government and a politically connected data security and forensic company.
James Comey’s special friend Daniel Richman was an unpaid FBI “special employee” with security access to the database. Nellie Ohr began working for Fusion-GPS on the Trump project in November 2015 and she was a CIA contractor; and it’s entirely likely Glenn Simpson or people within his Fusion-GPS network were also contractors for the intelligence community.
Remember the Sharyl Attkisson computer intrusions? It’s all part of this same network; Attkisson even names Shawn Henry as a defendant in her ongoing lawsuit.
All of the aforementioned names, and so many more, held a political agenda in 2016.
It seems likely if the NSA flags were never triggered then the contracted system users would have continued exploiting the NSA database for political opposition research; which would then be funneled to the Clinton team. However, once the unauthorized flags were triggered, the system users (including those inside the official intelligence apparatus) needed to find another back-door to continue… Again, the timing becomes transparent.
Immediately after NSA flags were raised March 9th; the same intelligence agencies began using confidential human sources (CHS’s) to run into the Trump campaign. By activating intelligence assets like Joseph Mifsud and Stefan Halper the IC (CIA, FBI) and system users had now created an authorized way to continue the same political surveillance operations.
When Donald Trump hired Paul Manafort on March 28, 2016, it was a perfect scenario for those doing the surveillance. Manafort was a known entity to the FBI and was previously under investigation. Paul Manafort’s entry into the Trump orbit was perfect for Glenn Simpson to sell his prior research on Manafort as a Trump-Russia collusion script two weeks later.
The shift from “unauthorized exploitation of the NSA database” to legally authorized exploitation of the NSA database was now in place. This was how they continued the political surveillance. This is the confluence of events that originated “spygate”, or what officially blossomed into the FBI investigation known as “Crossfire Hurricane” on July 31.
If the NSA flags were never raised; and if Director Rogers had never initiated the compliance audit; and if the political contractors were never blocked from access to the database; they would never have needed to create a legal back-door, a justification to retain the surveillance. The political operatives/contractors would have just continued the targeted metadata exploitation.
Once they created the surveillance door, Fusion-GPS was then needed to get the FBI known commodity of Chris Steele activated as a pipeline. Into that pipeline all system users pushed opposition research. However, one mistake from the NSA database extraction during an “about” query shows up as a New Yorker named Michael Cohen in Prague.
That misinterpreted data from a FISA-702 “about query” is then piped to Steele and turns up inside the dossier; it was the wrong Michael Cohen. It wasn’t Trump’s lawyer, it was an art dealer from New York City with the same name; the same “identifier”.
A DEEP DIVE – How Did It Work?
Start by reviewing the established record from the 99-page FISC opinion rendered by Presiding Judge Rosemary Collyer on April 26, 2017. Review the details within the FISC opinion.
I would strongly urge everyone to read the FISC report (full pdf below) because Judge Collyer outlines how the DOJ, which includes the FBI, had an “institutional lack of candor” in responses to the FISA court. In essence, the Obama administration was continually lying to the FISA court about their activity, and the rate of fourth amendment violations for illegal searches and seizures of U.S. persons’ private information for multiple years.
Unfortunately, due to intelligence terminology Judge Collyer’s brief and ruling is not an easy read for anyone unfamiliar with the FISA processes. That complexity also helps the media avoid discussing it; and as a result most Americans have no idea the scale and scope of the Obama-era surveillance issues. So we’ll try to break down the language.
.
For the sake of brevity and common understanding CTH will highlight the most pertinent segments showing just how systemic and troublesome the unlawful electronic surveillance was.
Early in 2016 NSA Director Admiral Mike Rogers was alerted of a significant uptick in FISA-702(17) “About” queries using the FBI/NSA database that holds all metadata records on every form of electronic communication.
The NSA compliance officer alerted Admiral Mike Rogers who then initiated a full compliance audit on/around March 9th, 2016, for the period of November 1st, 2015, through May 1st, 2016.
While the audit was ongoing, due to the severity of the results that were identified, Admiral Mike Rogers stopped anyone from using the 702(17) “about query” option, and went to the extraordinary step of blocking all FBI contractor access to the database on April 18, 2016 (keep these dates in mind).
Here are some significant segments:
The key takeaway from these first paragraphs is how the search query results were exported from the NSA database to users who were not authorized to see the material. The FBI contractors were conducting searches and then removing, or ‘exporting’, the results. Later on, the FBI said all of the exported material was deleted.
Searching the highly classified NSA database is essentially a function of filling out search boxes to identify the user-initiated search parameter and get a return on the search result.
♦ FISA-702(16) is a search of the system returning a U.S. person (“702”); and the “16” is a check box to initiate a search based on “To and From“. Example, if you put in a date and a phone number and check “16” as the search parameter the user will get the returns on everything “To and From” that identified phone number for the specific date. Calls, texts, contacts etc. Including results for the inbound and outbound contacts.
♦ FISA-702(17) is a search of the system returning a U.S. person (702); and the “17” is a check box to initiate a search based on everything “About” the search qualifier. Example, if you put a date and a phone number and check “17” as the search parameter the user will get the returns of everything about that phone. Calls, texts, contacts, geolocation (or gps results), account information, user, service provider etc. As a result, 702(17) can actually be used to locate where the phone (and user) was located on a specific date or sequentially over a specific period of time which is simply a matter of changing the date parameters.
And that’s just from a phone number.
Search an ip address “about” and read all data into that server; put in an email address and gain everything about that account. Or use the electronic address of a GPS enabled vehicle (about) and you can withdraw more electronic data and monitor in real time. Search a credit card number and get everything about the account including what was purchased, where, when, etc. Search a bank account number, get everything about transactions and electronic records etc. Just about anything and everything can be electronically searched; everything has an electronic ‘identifier’.
The search parameter is only limited by the originating field filled out. Names, places, numbers, addresses, etc. By using the “About” parameter there may be thousands or millions of returns. Imagine if you put “@realdonaldtrump” into the search parameter? You could extract all following accounts who interacted on Twitter, or Facebook etc. You are only limited by your imagination and the scale of the electronic connectivity.
As you can see below, on March 9th, 2016, internal auditors noted the FBI was sharing “raw FISA information, including but not limited to Section 702-acquired information”.
In plain English the raw search returns were being shared with unknown entities without any attempt to “minimize” or redact the results. The person(s) attached to the results were named and obvious. There was no effort to hide their identity or protect their 4th amendment rights of privacy; and database access was from the FBI network:
But what’s the scale here? This is where the story really lies.
Read this next excerpt carefully.
The operators were searching “U.S Persons”. The review of November 1, 2015, to May 1, 2016, showed “eighty-five percent of those queries” were unlawful or “non compliant”.
85% !! “representing [redacted number]”.
We can tell from the space of the redaction the number of searches were between 10,000 and 99,999 [six digits]. If we take the middle number of 50,000 – a non compliant rate of 85 percent means 42,500 unlawful searches out of 50,000.
The [six digit] amount (more than 10,000, less than 99,999), and 85% error rate, was captured in a six month period, November 2015 to April 2016.
Also notice this very important quote: “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” This tells us the system users were searching the same phone number, email address, electronic identifier, repeatedly over different dates. The same people were being repeatedly queried.
Specific person(s) were being tracked/monitored.
Additionally, notice the last quote: “while the government reports it is unable to provide a reliable estimate of” these non lawful searches “since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 coincided with an unusually high error rate”.
That means the 85% unlawful FISA-702(16)(17) database abuse has likely been happening since 2012.
2012 is an important date in this database abuse because a network of specific interests is assembled that also shows up in 2016/2017:
- Who was 2012 FBI Director? Robert Mueller, who was selected by the FBI group to become special prosecutor in 2017.
- Who was Mueller’ chief-of-staff? Aaron Zebley, who became one of the lead lawyers on the Mueller special counsel.
- Who was 2012 CIA Director? John Brennan (remember the ouster of Gen Petraeus)
- Who was ODNI? James Clapper.
- Remember, the NSA is inside the Pentagon (Defense Dept) command structure. Who was Defense Secretary? Ash Carter
Who wanted NSA Director Mike Rogers fired in 2016? Brennan, Clapper and Carter.
And finally, who wrote and signed-off-on the January 2017 Intelligence Community Assessment and then lied about the use of the Steele Dossier? The same John Brennan, and James Clapper along with James Comey.
Tens of thousands of searches over four years (since 2012), and 85% of them are illegal. The results were extracted for?…. (I believe this is all political opposition use; and I’ll explain why momentarily.)
OK, that’s the stunning scale; but who was involved?
Private contractors with access to “raw FISA information that went well beyond what was necessary to respond to FBI’s requests“:
And as noted, the contractor access was finally halted on April 18th, 2016.
[Coincidentally (or likely not), the wife of Fusion-GPS founder Glenn Simpson, Mary Jacoby, goes to the White House the very next day on April 19th, 2016.]
None of this is conspiracy theory.
All of this is laid out inside this 99-page opinion from FISC Presiding Judge Rosemary Collyer who also noted that none of this FISA abuse was accidental in a footnote on page 87: “deliberate decisionmaking“:
This specific footnote, if declassified, could be a key. Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”, this sentence has the potential to expose an internal decision; withheld from congress and the FISA court by the Obama administration; that outlines a process for access and distribution of surveillance data.
Note: “no notice of this practice was given to the FISC until 2016“, that is important.
Summary: The FISA court identified and quantified tens-of-thousands of search queries of the NSA/FBI database using the FISA-702(16)(17) system. The database was repeatedly used by persons with contractor access who unlawfully searched and extracted the raw results without redacting the information and shared it with an unknown number of entities.
The outlined process certainly points toward a political spying and surveillance operation; and we are not the only one to think that’s what this system is being used for.
Back in 2017 when House Intelligence Committee Chairman Devin Nunes was working to reauthorize the FISA legislation, Nunes wrote a letter to ODNI Dan Coats about this specific issue:
SIDEBAR: To solve the issue, well, actually attempt to ensure it never happened again, NSA Director Admiral Mike Rogers eventually took away the “About” query option permanently in 2017. NSA Director Rogers said the abuse was so inherent there was no way to stop it except to remove the process completely. [SEE HERE] Additionally, the NSA database operates as a function of the Pentagon, so the Trump administration went one step further. On his last day as NSA Director Admiral Mike Rogers -together with ODNI Dan Coats- put U.S. cyber-command, the database steward, fully into the U.S. military as a full combatant command. [SEE HERE] Unfortunately it didn’t work as shown by the 2018 FISC opinion rendered by FISC Judge James Boasberg [SEE HERE]
There is little doubt the FISA-702(16)(17) database system was used by Obama-era officials, from 2012 through April 2016, as a way to spy on their political opposition.
Quite simply there is no other intellectually honest explanation for the scale and volume of database abuse that was taking place; and keep in mind these searches were all ruled to be unlawful. Searches for repeated persons over a period time that were not authorized.
When we reconcile what was taking place and who was involved, then the actions of the exact same principle participants take on a jaw-dropping amount of clarity.
All of the actions taken by CIA Director Brennan, FBI Director Comey, ODNI Clapper and Defense Secretary Ashton Carter make sense. Including their effort to get NSA Director Mike Rogers fired.
Everything after March 9th, 2016, had a dual purpose: (1) done to cover up the weaponization of the FISA database. [Explained Here] Spygate, Russia-Gate, the Steele Dossier, and even the 2017 Intelligence Community Assessment (drawn from the dossier and signed by the above) were needed to create a cover-story and protect themselves from discovery of this four year weaponization, political surveillance and unlawful spying. Even the appointment of Robert Mueller as special counsel makes sense; he was FBI Director when this began. And (2) they needed to keep the surveillance going.
The beginning decision to use FISA(702) as a domestic surveillance and political spy mechanism appears to have started in/around 2012. Perhaps sometime shortly before the 2012 presidential election and before John Brennan left the White House and moved to CIA. However, there was an earlier version of data assembly that preceded this effort.
Political spying 1.0 was actually the weaponization of the IRS. This is where the term “Secret Research Project” originated as a description from the Obama team. It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller. It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:
The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)
Why disks? Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS. All of the evidence within this sketchy operation came directly to the surface in early spring 2012.
The IRS scandal was never really about the IRS, it was always about the DOJ asking the IRS for the database of information. That is why it was transparently a conflict when the same DOJ was tasked with investigating the DOJ/IRS scandal. Additionally, Obama sent his chief-of-staff Jack Lew to become Treasury Secretary; effectively placing an ally to oversee/cover-up any issues. As Treasury Secretary Lew did just that.
Lesson Learned – It would appear the Obama administration learned a lesson from attempting to gather a large opposition research database operation inside a functioning organization large enough to have some good people that might blow the whistle.
The timeline reflects a few months after realizing the “Secret Research Project” was now worthless (June 2012), they focused more deliberately on a smaller network within the intelligence apparatus and began weaponizing the FBI/NSA database. If our hunch is correct, that is what will be visible in footnote #69:
How this all comes together in 2019/2020
Fusion GPS was not hired in April 2016 to research Donald Trump. As shown in the evidence provided by the FISC, the intelligence community was already doing surveillance and spy operations. The Obama administration already knew everything about the Trump campaign, and were monitoring everything by exploiting the FISA database.
However, after the NSA alerts in/around March 9th, 2016, and particularly after the April 18th shutdown of contractor access, the Obama intelligence community needed Fusion GPS to create a legal albeit ex post facto justification for the pre-existing surveillance and spy operations. Fusion GPS gave them that justification in the Steele Dossier.
That’s why the FBI small group, which later transitioned into the Mueller team, were so strongly committed to and defending the formation of the Steele Dossier and its dubious content.
The Steele Dossier, an outcome of the Fusion contract, contains two purposes: (1) the cover-story and justification for the pre-existing surveillance operation (protect Obama); and (2) facilitate the FBI counterintelligence operation against the Trump campaign (assist Clinton).
An insurance policy would be needed. The Steele Dossier becomes the investigative virus the FBI wanted inside the system. To get the virus into official status, they used the FISA application as the delivery method and injected it into Carter Page.
The FBI already knew Carter Page; essentially Carter Page was irrelevant, what they needed was the FISA warrant and the Dossier in the system {Go Deep}. This also explains all of the issues with the FISA application “Woods File” being created ex post facto.
The Obama intelligence community needed Fusion GPS to give them a plausible justification for already existing surveillance and spy operations. Fusion-GPS gave them that justification and evidence for a FISA warrant with the Steele Dossier. The Dossier was used to create the FISA application. The Dossier was used as a replacement for a valid Woods File.
Ultimately that’s why the Steele Dossier was so important; without it, the FBI would not have a tool that Mueller needed to continue the investigation of President Trump. In essence by renewing the FISA application, despite them knowing the underlying dossier was junk, the FBI was keeping the surveillance gateway open for Team Mueller to exploit later on.
Was the Peter Strzok created “EC” that initiated Crossfire Hurricane really just a massive effort to cover-up the Obama-era surveillance network? {Go Deep} Is that underlying surveillance network the real threat explaining why Michael Flynn had to be removed?
.









The True Pundit is reporting that their intel indicates James Comey will not be indicted. It better not be true, my God.
https://truepundit.com/untouchable-james-comey-walks-away-free-clear-from-durham-barr-probe-of-fbi-spying-on-trump/
I think it’s already been established that comey will continue to skate.
Mueller and his team will be skating in Rockefeller Center by Christmas also because Barr is buddies with Mueller.
Yup
…he Commie ..will be indict…
comey was smart,dissipating his actions. he is no good. but that doesn’t mean the rest are getting off. and when they get nailed, they could implicate the limp wristed comey.
I’m not too enamored with True Pundit. I’ll take a pass on this story for now.
Why does a no-leak Durham team leak now?
Disinformation?
Why does a no-leak Durham team leak now?
What leaks are you contributing to Durham?
True Pundit is reporting what Thomas Paine said on his latest podcast. You have to sit through mindless yak yak and commercials to get Paines piecemeal story in total.
I hate that True Pundit has started using podcasts to support his headlines. They are all over an hour and he rambles on and on (slowly, too) about himself.
Too bad…I used to follow his stories.
Lee Smith has reported extensively on the spying and consequent blackmailing of pro Israel congressmen and AIPAC officials in Obama’s full court press to pass a Iran nukes deal.
Assumedly they pulled the same crap whenever they could.
Considering that Obama himself is probably a CIA asset, this would be right up his alley.
I appreciate why Sundance describes this as “political opposition research,” but we have to be naive fools to expect that it wasn’t also used for leverage/blackmail, too. Does anyone thing Obama was doing this just for himself? Every person involved in that is dirty, so what would stop them from doing a few searches for themselves? Pandora’s box, my friends … and it’s been open for a long time.
The number of these queries is staggering. I’m not even sure how to estimate how many “contractors” might have been involved.
Sidney Powell cites 16,000 and more Americans were spied upon. Where did she get this specific number?
Bert WAY TO draw the eye!!!

https://4thamendmentrestored.com/
See sundances Article!
https://theconservativetreehouse.com/2020/09/05/2019-fisc-report-and-opinion-released-full-pdf-and-links/
I believe the 16,000 came from the search results on Flynn, plus 2 hops. Perhaps it includes others but just Trump alone would be into the 100 thousands, probably millions especially if all his family is included. That 2 hop rule over all the years since 2012 would be billions.
Can you imagine what windfalls could be had by a person who might be able to tap in for the purpose of corporate espionage?
“political opposition research“ is a broad term that covers everything you can imagine such information would be used for, legally or not, ethically or not.
Blackmailing is how Jeffrey Epstein became so wealthy and Osama and others did the same thing for money and to continue the transformation with the help of those being blackmailed and at the end of the strings.
Ah, yes PEDOGATE. Another shoe dangling precariously above the SWAMP WATER that is going drop and make a HUGE SPLASH.
DEPLORABLE JEDI.
This could be the best summary you have completed to date, sundance.
Superb work.
Easily followed, easily noted in a very complicated story.
Yes, thank you
Yes, I believe that is the most complete work to date on the subject. It focuses on the initial crime in which all following coverup operations are based. It laid out the motives for all the people who showed up in the coverup operations.
Crimes have motives. The best motive exposed here is Mueller, who was at the beginning of it all and winds up heading the SC. This is where the people should be really pissed and something Trump should be able to drive home as to the full extent of the corruption against his administration.
Barr’s best move to date has been to look cool while swigging on a water bottle. At this point he is just a Lindsey Graham clone. All talk and outrage while doing nothing of substance. Prove me wrong.
Has Sen Grassley been briefed? He states that he expects indictments. If the Dem-rats manage to completely blow up the election to the extent that there is no definitive outcome prior to noon on 3 January, he could become president on the 20th. I suggest that Barr/Durham be warned that if they don’t move before 1 October, you will serialize the material and get it out on both the airwaves and the internet – so many outlets that it can’t be shut down. Grassley is right: this has to come out before the election.
Who “could become president on the 20th”?
Sen Grassley: as President pro tempore of the Senate, and not up for reelection in 2020, he is fourth in line. The succession is President, Vice President, Speaker of the House, President pro tempore of the Senate, and Secretary of State. The terms of Senators and Representatives ends at noon on 3 January (Twentieth Amendment), so, if the election of the President and Vice President is still in doubt by that date, so is the election or Senators and Representatives since they are on the same ballots. Nancy would be out of a job; if the election was still in doubt on 20 January, Grassley would become President.
Exactly. Everyone says Pelosi would become president and I keep saying if the election results aren’t in, we won’t have a House of Representatives to seat, either.
No doubt the result of sundance’s preparation work for venturing ‘outside the wire’.
100% This post is not by accident!
It was bad enough before Obama took command, but now our federal government is totally FUBAR. It will take a long time to fix it, if that is even possible at this point.
Thanks to Sundance, everyone will soon know, what these conspirators/criminals have done.
How would you like to go through life, waiting for the next knock at your door. Their anonymity keep them safe, until now.
You and I would fear for our families.
Is the corruption in DC so massive that it is considered too big to fail (to be brought to justice)?
…not for the justice…there is only one tier…..
Sidney is always clear and concise.
We love you, Sidney!
Godspeed to you and General Flynn.
This would make a great movie, I would rather see people held to account
Just think of ALL the blackmailing that has occurred between 2008 and now. Some are still being blackmailed through Scumbama’s shadow gov. If Bill Barr would just do his job and nail one of the big ones the whole thing would come tumbling down. Ratcliffe needs to declassify that footnote NOW!
How many judges started out as conservative and then “evolved” into a liberal. It is an old Washington tradition it seems. Same with journalists like David Brock, Matt Drudge, George Will etc.
Jeff Sessions appointed an Obama appointee Huber to investigate
Carter Page surveillance
U1
Clinton Foundation
Was Huber ever debriefed?
Any hearings?
How much criminality took place that we do not know about? I pray that Flynn tells all and soon.
I do remember in the early day of this scandal when the FBI or DOJ subpoenaed Fusion GPS’s bank files and there was panic that only the those paid by Hillary and the DNC be sent. If their entire bank records exist, many could be prison bound.
I am still waiting for thise, Bob. Top of my wishlist because it would expose all ties.
So, if 16,000 Americans were illegally spied on, shouldn’t there be at least one charge for each individual abuse?
“One death is a tragedy; a million is a statistic”.
Despite the exhausting, even heroic work by Sundance, this is foretold through the millennia. There is no justice in this world. Hitler took the easy way out. Stalin and Mao died in their own beds. I could go on.
I would love to see the traitors condemned to life in prison, but it’s unlikely that any of the prime movers will be indicted.
Our hope is that we will see a decisive victory for Trump in November.
Let’s work toward that goal.
Roadagent…are you so sure Dolfi Hitler..took easy way out?…read book -GREY WOLF-by Simon Dustan and Gerrad Williams….btw Stalin been poisened by own doctor….
poisoned…
I read it all. The Russians are big on poison. But he still died in his own bed. A hero of the Soviet Union.
When I was a youngster in high school, we read Dante’s Inferno. There were two condemned souls buried to their necks one behind of the other. One ate the other’s brain out each day, and it grew back so that the punishment could be continued through eternity.
The only question is: which one is Hitler and which one is Stalin?
A pleasant night to all.
Thank you Sundance.
The Missing Woods File that had to be recreated… happens to use Dugan’s copy of the FISA application that was given to the Special Council. My guess is that more than a couple of dates were switched around, the Mueller team wasn’t sure what changed, but it HAD to match what was leaked to the NYT else be exposed. The Mueller team used Dugan’s copy to rebuild the Woods File section. Comparing renewal #3 and #4 will probably expose differences.
Second, recent notes on CH start date … The date given in the Misfud 302 apparently do not line up with Downer and Strozk’s dates. Strozk now admits that dates of start of investigation are wrong. The meeting with Papadopoulos actually occurs after the date given as “rumor of Russian’s having the DNC emails”.
https://www.washingtonexaminer.com/news/i-got-that-wrong-peter-strzok-admits-he-botched-timeline-on-opening-of-trump-russia-investigation
THAT IS A MUST READ! Just for this quote:
Strzok: “So, I got that wrong. So, I was writing my book without the benefit of the notes“…
So, he wrote a BOOK accusing the POTUS of treason and “he got that wrong”? It seems like Strzok got a lot wrong and never had a problem working without documents (“notes”) before. And Strzok is the best and the brightest the FBI has, assigned to MIDYEAR EXAM and CROSSFIRE HURRICANE. So, if he is not corrupt, he is a bigger asset to Vladimir Putin and Xi Jinping than having moles directly embedded in our intelligence agencies.
How does a guy like Strzok get promoted so high? The guy is an idiot/clown.
Shawn Henry gets around (From Anti-Defamation League Must Go)
Leading the internet censorship movement. In 2018, Greenblatt established the ADL Center for Technology and Society (CTS) and received a $1.75M payment from Pierre Omidyar (founder of eBay). Despite CTS’s wholesome and organic title, it is little more than an information warfare platform used for massive censorship, influence operations, and political targeting. Not surprisingly, the members of the CTS advisory board include disinformation specialists like Shawn Henry, the president of Crowdstrike and the brain behind the fake DNC Russian hack and Eli Pariser, the co-founder of Avaaz.
https://apelbaum.wordpress.com/2020/09/09/the-anti-defamation-league-must-go/
the first and foremost purpose of the weismann/mueller special counsel was to destroy evidence. I have asked this before, what happened to all of the evidence collected from crossfire hurricane?
Every single time someone like Chief Justice Roberts, Judge Sullivan et al makes a very questionable decision or seems to subvert justice, I think to myself…the deep state has something on them. After taking many ‘deep dives’ here (thank you Sundance) and other places, I am convinced that the following are true:
1. Obama is running a shadow government.
2. There are black files on 2/3 of the people in Washington.
3. Many politicians and their friends and business associates are depraved individuals.
4 The Deep State has five ways from Sunday to get you. They seem to be on way number 4 with President Trump.
3. Our Very Stable Genius, President Trump, must be re-elected at all costs or we descend all the way into darkness and America as we know it is lost.
I agree on all points.
I suspect part of the uniparty club initiation involves sharing compromising information to ensure everyone will watch each others backs. Those that have not willingly participated were then compromised via the spying.
Pretty much every national level politician is a wealthy lawyer or businessman/senior executive. I have known enough to believe that they are mostly egomaniacal sociopaths as well as narcissitic pathological liars. The few exceptions that prove the rule are (some of) those that achieved wealth via entrepreneurial activity. And most of those will have some kind of skeleton that can be exploited. Or as we have seen in the case with Trump, framed for something.
If they are powerful enough to have done all this, have most of it exposed, and still skate with no indictments, then Trump does not have a prayer.
It is just too big.
Without punishment there is no deterrent for
capital crimes. Do we still have a Constitution and does it include a remedy for a tyrannical government? I think Sessions/Barr dropped the ball here BIGLY. Justice meted by DOJ is the EASY way out, no?
Excellent Keith, completely agree. Obama and his trolls are deeply embedded
This really makes me wonder – what does President Trump’s first term look like if Admiral Rodgers doesn’t conduct the audit of the NSA database and stop the 702 program? The Russia hoax as a plan B would not have been needed, CHS’s would never have been activated, and ultimately no need for a Special Counsel. But no doubt the Rats would have come up with something else to try and delegitimize the election result – that’s all they do.
If Admiral Rogers is the savior we all believe, then where is he?
Best hope? Working with Durham.
Next best hope? Realizing Durham is a coverup and speaking out himself.
Realizing Durham is a coverup and staying silent? He is not the hero we thought and we are screwed.
6. Everything they try against Trump backfires.
7. Trump always seems to be 5 steps ahead of them and loves to troll them.
“One – The FISA reauthorization legislation was dropped by Nancy Pelosi and all media conversation immediately vaporized.” President Trump made it perfectly clear that he would be vetoing any legislation to authorized that, even short-term. But you’re absolutely right, the silence since then has been deafening.
And Barr says “Can you please pass the sweet and sour shrimp”?
“With extra butter please, lots of extra butter.”
That’s what I call walking the line. 😉
No problem. I saw this in moderation and admit…I cracked up. ?
Sorry, Mods (it’s tough not to get carried away):
One really wonders how some of these treasonous bastagees can appear in public, and not be made extremely ******* UNCOMFORTABLE by honest citizens who know what these feces-heads did.
Two quick notes. Sidney makes a very specific and devastating charge, that the contractors that were allowed NSA database access were selling that information around the world to the highest bidder. If that’s not hanging level treason, I don’t know what it is. Maybe somebody should look into that
Second, why doesn’t somebody ask Fatboy Barr why these contractors had such easy access to the NSA database, yet the Department of Justice seems to not even realize it exists, and keep being thwarted by simple device destruction or file deletion. Talk about the Mamet principle in action.
its because they had access EVEN AFTER doing the FBI assignemnt
https://4thamendmentrestored.com/footnote-68-%26-69
Inform ALL why this election matters
inform ALL so they can contact the prosecutor outted – and SAY WE KNOW
Who has the bucks to buy that info ? George Soros comes to mind and he has taken an inordinate interest in our elections . I just wonder about that coincidence.
Starfcker – I wonder if her statement might be based in part on Millenial Millie’s video? (By the way, what happened to her? THAT “bombshell arrest” vanished like a drop of water in the Sahara!) Sydney has access to some pretty heavy muscle in the District of Corruption, maybe got some corraborration for the video?
That video program was one of the scariest things I’ve seen, and I’ve been around a long time!
The Scots word, ‘scunnered,’ comes to mind today!!!!!
When Trump is re-elected, he better nuke these a-holes and the organizations they served. Just go in and destroy entire agencies; merge them if needed. Fire the living snot out of a huge portion of the swamp.
No more mr. nice guy.
Sometimes you just have to DO THE RIGHT THING. Screw the costs.
Why wait?
Exactly.
To demonstrate overwhelming backing, which might serve to limit the carnage.
In the USA, an ISP server log file is typically kept for 6 months. Maybe longer. Depends on the data retention policy. If the servers use some form of RAID data security, it is possible to reconstruct the original data from 1 to 3 of the server drives depending on RAID configuration for very much longer time frames. If the NSA actually intercepts all email/text data, then they also have permanent copies. The data that Weissman et al sought to erase isn’t really “gone”. It just takes more work to get it. There are data “grave digger” programs that can recover data even if it has been erased up to 10 times. Quality varies, but data is often recoverable. If I were Ms. Powell, I’d get a court order to sequester the physical devices, ISP log files that served the devices, NSA copies or backups of any intercepts, and ISP RAID drives and seek to reconstruct the deleted data. It is tedious. It isn’t impossible. If the RAID drives are hardware controlled, then you need the same hardware to recover the data. If software controlled, you need the same software to recover. The only way to truly erase a device is to take a hammer, torch, or power drill to it. Even then, if data traversed an ISP unencrypted , a copy exists somewhere. An encrypted VPN tunnel from the device to the ISP makes it very much more difficult, but seriously doubt the Govt IT people would allow that on Govt phones/devices. The data isn’t “lost”, it is just “hidden”. Good data recovery forensics people can get it back, but it costs a lot.
Could I suggest you give your contact info to Sidney and to Sundance 🙂 Sounds like you know what you are doing.
Any good iPhone/Android IT tech can get text messages back from iCloud/iTunes or Android after a factory reset. Sniffing through the Servers and ISP logs is much trickier. But it can be done. If Ms Powell wants to get the data back, she just needs the devices, first, and if that doesn’t work, a forensic IT recovery geek to work the ISP and servers. I know this sounds weird to most people, but it isn’t. Even if you “factory reset your phone”, all the data is still there. Just takes a little work.
If they are DOJ phones, then Weissman doesn’t actually own the device, DOJ does. So, if served with a warrant, Verizon, Apple, etc, has to unlock the phone because the owner, DOJ, said to do it. All Weissman did was dig a hole for himself, unless he shredded the phone, erased any synced iCloud backups, or over wrote the sms files. I’m not sure a lawyer is that savvy. Let’s hope so.
Those phones are in the exact same place as Anthony Wiener’s laptop………
Let’s hope at least one of them still exists. Probably does if they were DOJ issued property. C’mon. Let’s go for the entertainment value of watching weissman squirm and realizing he isn’t as tech savvy as he thinks he “was”. 🙂
About entertainment value, I would much prefer to see Comey, McCabe, Brennan and Clapper indicted for perjury, obstruction of justice, fraud, and sedition, many others to follow. As you observed, the existence of the hardware may not matter.
“Top. Men.”
Additionally, Liz Mac circles back to the 2017 FISA report by Rosemary Collyer to support the most recent 2019 opinion filed by the FISA court showing the NSA database search abuse is ongoing. <– listened on the radio. Finally somebody is getting the real story, and not the limited hang out concerning the FISA warrant insurance policy.
So how is it that the information on the phones was not automatically captured by the NSA as metadata?
Probably, it was. But that doesn’t matter a whole lot.
1. If DOJ owned the phones, then Weissman has no 4th Amendment rights.
2. Unless the SMS files were overwritten, they still exist on the phone or on a cloud backup.
3. Any decent IT geek can recover a phone’s SMS files especially with a court warrant.
4. If weissman synced the phones with a backup cloud account or other device(s), then copies exist.
5. If the ISP that served the phone has the device MAC ID and IP address and their log files captured the SMS / text content, then those files are discoverable with a warrant.
6. If none of 1 to 5 exist, then the ISP has server backups that can be cloned and read.
7. If ONE of the phones is synced to the other phones in the group, then Everything is recoverable from one phone.
8. Recovering the SMS texts from a RAID server backup at the ISP is “possible” but difficult, but can be done. Just bring money.
IOW, I don’t think Weissman is smart enough to know all this and he just buried himself. Ms. Powell needs a court order to obtain the devices from DOJ and sequester the devices and the ISP log files and backups and cloud backups. From those, one avenue will recover the texts unless the devices are destroyed, the server drives are destroyed, and the NSA files are destroyed. Somewhere, there’s a copy. There’s even “blacker” ways of getting them.
can you pair his gov phone with devices – that were near it constantly?
i.e, finding his real comm phone?
no – one would comm on a gov phone – period.
No, you can’t “pair” locked phones. Pairing is a bluetooth thing.
But. if you know the MAC ID of the devices in a group of phones, then you can cross reference their SMS texts, and if they are synced phones, then any one of the phones in the group has all of the texts from all of the phones. That makes things interesting.
I can’t believe these phones were issued in the clear, and not government managed devices. There was likely some IT support somewhere, and it would be easy to determine if these were managed devices. If they were, there are very likely logs on the management system that would assist in recovery.
If they were managed devices, it would also show the “accidentally entered the wrong code” claim to be a blatant lie. If they were managed, the user would have to change the codes likely every 60-90 days, or the IT support might do that for them. The user would certainly know what would happen if they entered the wrong codes, and would have contacted support if there were problems.
I also can’t see Weissmann and other swamp rats updating their own devices over months of use. There would have been multiple OS and application updates during the period of use. There also would have been some kind of minimal additional security on devices used by such a group.
If they were managed devices, did some IT department use the same ID on all of the devices to make it easier to manage them?
If they were DOJ devices, then they were assigned to users. Updates and stuff don’t matter. Doesn’t change ownership or data, just the OS. Personal devices are not legal in a Govt administered system. Weissman “might” have used a personal device and synced it to a group, but even if he did, all the other Govt owned devices would have copies and the server would know it. He can’t hide from the tech. If the device was attached and existed, there’s a copy of whatever he did.
Need more people just like you working on the good side 🙂
EVERYONE of those 31 individuals has a target on their back. As you say, either the ISP is a SECURE GOVERNMENT ISP that has the records or NSA does…It wouldn’t hurt to get both.
Also, getting the records means doing a SURPRISE, SURGICAL STRIKE without any advance notice. No one knows how deep the pile is at either of these entities…
No 31…17…apologies!!!
Sundance, 2 observations after your extensive investigation here:
1-You are NOT getting paid enough for what you do for us & the American people!
2-I hope Obiden (see what I did here) reads this & realizes that “the jig is up” & we are coming for him & his corrupt Administration!
The search parameter is only limited by the originating field filled out. Names, places, numbers, addresses, etc. By using the “About” parameter there may be thousands or millions of returns. Imagine if you put “@realdonaldtrump” into the search parameter? You could extract all following accounts who interacted on Twitter, or Facebook etc. You are only limited by your imagination and the scale of the electronic connectivity.
Well my imagination is running wild!
Looks like that wonderful honorable straight as an arrow Robert Mueller decided to take a page right out of the old Clinton playbook…did you wipe it clean?
“What you mean like with a cloth or something?”
Just imagine what we don’t know. Mind blowing corruption and massive cover up.
“Clean up on Aisle 3 – – we have a serious Depends leak situation.”
I would have done my job if it weren’t for those darn presidential tweets.
3 examples IMO why this investigation is a farce……
1) We have DOCUMENTED evidence via the Adm Rodgers & Judge Collyer Report that just during a 6 month period, 85% of the NSA Contractor Search queries were illegal and NO ONE orders a comprehensive damage assessment audit done on the NSA database to learn how how far back and how extensive these illegal searches been going on for.
2) We have DOCUMENTED proof that exculpatory evidence was withheld to the defense of Gen Flynn and his Attorney but yet NO indictments of the people who withheld this evidence or even a referral to the bar association. NOTHING but yet they know the evidence was withheld.
3) We have documented evidence that 15 phones and thus much of their communications are accidentally wiped but EVERYONE knows that these communications are easily retrieved via the NSA or via the phone service providers. So if the investigators truly wanted these communications they absolutely could.
When basic and common sense investigative follow up work is seemingly ignored, you know this investigation smells!
Here’s a question : We know Rogers uncovered the details about 6 months worth of illegal searches. But Sundance said this had been going on since 2012. Does anyone (Sundance?) know – for those previous 3 years, did the NSA keep information on what was searched on who and when? Or was all of that data lost? And if was lost, was it lost because, either 1) it was a badly designed system that didn’t keep records of searches -or- 2) was that information deleted by someone. I find it incomprehensible that the NSA didn’t keep records of all those searches. It is possible that government IT departments set up such a bad system that it didn’t keep records, but I doubt that very much. So, Sundance, do you know if those preceding 3 years worth of searches are known about it detail ?
The best way is to confirm who was caught with exported data.
document the investigator that caught it, their interview, and the depth of data exported.
or simply say it jeopardized national security – and show results.
the bottom line is — Faking a DNA hack to offload exported NSA data to provide new access to it, after Admiral Rogers shut it down, IS NOT THE WAY TO GO. its amature and immoral.
edit. DNI hack, not DNA. Immature, not amature.
My wife is a librarian. Please forgive me.
It’s become a habit for my own survival. 🙂
lol no problem! i loves you other explanations on this site!
keep informing us – its helpful, and we read it , even if we dont comment =]
and i meant DNC hack – =]
thats how the exported NSA data was offloaded to open source – for Nellie to claim its open source in her testimony.
got it. I’m a bit ocd.
amateur
When conducting technical audits – each fact/finding must have direct data referenced as explicit proof… The working papers should hold explicit evidence that is directly cross referenced to the statements of fact in their report….
A simple 3 or 4 page summary reports can easily have many, many 3 ring binders full of cross referenced evidence…
Most of this work has been computerized now and digital and image files are used as the reference data…. What used to be actual hard copy now ends up being scanned in page copies and downloaded files living in a computerized audit management systems with strict access controls and rigorous backup and archiving protocols.,,,
In the financial audit world there is a need for chain of custody and access controls as much of this information has legal reporting mandates and are allowable in the court of law… So evidentiary controls are clearly necessary…. .
“If you understand the scale and scope of surveillance… does that explain the behavior of some people today [legislative (politicians), judiciary (judges), Pentagon (military)]?”
Heck yeah! I’ve been noticing for months that the things some people are saying and doing are so untruthful or out-of-character that they must be blackmail victims. With Obama’s constant spying, he and his minions surely are threatening people with exposure if they don’t play along.
If Al Capone and Frank Nitti had sons, they would be like Weissmann and Mueller.
Bunch of criminals. Stole 44 million of our money at same time
the money made selling the NSA data will dwarf that.
99.9% of SD’s post is – imho – info that he has previously disseminated in one form or another to TCTH. A big revelation, again imho, is that he has tied the missing Woods document into his prefvious findings which in-turn adds fuel to the recent fire ignited about the scrubbing of the Weissmann’s crews cell phones.
It appears it is one of the last few pieces of the puzzle. I wonder if AG Barr, Durham and Aldenberg can put them all together?
H&HC, 2nd-16th,
I am sure that AG Barr, Durham, and Aldenberg can put them all together. The 64,000 dollar question will they?
Water, water everywhere, and Barr refuses to take more than a sip.
It’s beginning to look like we need some right wingers “Weissmanns”.
Azzholes who go after the opposition with no mercy. Perhaps then we will see arrests. And…since what he does is not illegal, then we should get our own crooks and do the same…It’s legal after all.
All we do is stay in the game playing by the rules while the other side just make up the rules. It will never work out for us.
Lin Wood
Robert Barnes
and one other name representing that young man recently.
Its game on time.
if you have an issue raise it…. send it to them. fund it , support it, and stay on depriving NO ONE of their rights.
I’m not sure any of us understand what “illegal” means currently. It seems to mean you are not supposed to do or be something, but there are no penalties if you do or are if you are a supporter of the criminal leftists and globalists. If there is even an image of illegal with a conservative the book is thrown at them with SWAT teams taking them down. It has been so disgusting. If B2 and cronies are playing it this way to preserve institutions, I pity his bagplaying soul when he meets his maker.
I’m moving on until after the election if nothing drops of consequence before. I don’t know who or what this country has become, or even if it ever has been what it purported itself to be. Thank goodness I know the Lord and the Lord knows me. I will vote in accordance with Godly principles and continue to do my part to further his kingdom on earth.
https://twitter.com/seanmdav/status/1304131579397189634
The Spygate perps sought to destroy [lose] incriminating evidence by ‘wiping’ their phones, but nothing [digital] is ever really ‘lost’.
Nothing can stop what’s coming. Nothing.
We reelect Trump, and pray Donald Jr stands in 2024! I don’t trust any of them anymore.
I have great respect for Nunes, but when given the opportunities, he refuses to call out Graham!
the wonderful thing about trump is his example. don jr is great. i expect a hundred american patriots ,emboldened by trumps stand up act,to step forward,and blaze a path across american history. trump is awesome. and grateful. being right is contagious.
I’m not that impressed with Don Jr. I’d sure like to see Rick Grennell run for pres in 2024
Only Tiffany of PDJT’s children is a constitutional nbc qualified person for POTUS, The rest had a NON-citizen mother at the time of their birth. Besides not wanting political dynasties in this country I sure wish people would be more informed and not make serendipitous choices with such a weighty result.
Thank you. Countering wrong-doing with more wrong-doing is never productive . . .
What about Osama all records sealed, that works for Americans? Sad, evil, God sees all. God Bless PDJT and his Family.
Barr is doing a fantastic job!
He is navigating through what we already know like a champ. He goes away, and we get disappointed start to losing hope and complaining… then he appears on TV and throw us some more crumbs.
Or we get some declassified documents that should have never been classified in first place.
But that’s reality.
Great navigator.
Amid all the gloom . . . there is a bright lining . . . a very bright lining.
Barr just completed his first week on the Marie Osmond diet . . . and he lost 14 ounces! He was so grateful that he gave Marie one of his bagpipes.
Now isn’t that a heartwarming human-interest story? I’m glad I could brighten everyone’s day.
Every touch leaves a trace.
They need to release the names of everybody who was illegally third-party searched in the NSA/FBI databases and how often they were searched.
I suspect all Republican Senators/Congressmen, high court judges, industry leaders, right-of-centre media would have been repeatedly targeted over many years.
This is so much bigger than President Trump. It’s the complete weaponisation of the biggest data collection on the planet for political and financial gain by a select cabal.
Expose them and let the public decide their fate.
‘Murder, rape, slavery, human trafficking is against the rules and it needs to stop….’
/s
No. This is not about breaking rules. This is about felonies that must be prosecuted to the fullest extent of the law, that strongly worded wishes that it never should happen again is a waste of wind.
Hard time with Bubba is what must happen.
Powell said something of great importance. She said” if yoo look at the contractors who had access to the files I would bet that they were selling the information obtained to the highest bidder.” That is treason. If this is true and Barr/Durham does not prosecute as treason our country is lost.
One of the big problems Barr has is trying to save FISA like he desperately wants to do, while navigating through the facts of how badly it was abused.
If the public really got wind of how FISA was abused in this coup, no sane politician would vote for reauthorizing it.
For whatever reason, Nunes is one of the few who publicly states how it was abused, but none of them put it in such a way such that John Q. can understand it. Many of the rest either want the spying to continue, or know of their own material captured in the spying.
Wray and Barr both have publicly stated how their changes and memos have strengthened the safeguards of FISA. Why do that instead of going to Congress to get those changes put into law? Why would they both want to save such a farce with just a couple of memos saying a politician shouldn’t be spied on without proper blessings?
How much of this entire corrupt operation of just the last 5-6 years all points back to a FISA system that was used against political enemies? A system Barr wants to keep with window dressing put on it?
In my opinion, Barr screwed up badly when he announced his little changes prior to doing anything to hold accountable those who cannot be trusted with it. Now the swamp knows he wants it, and knows he may not be so quick to prosecute abusers because that would put it in jeopardy.
Powell said something of great importance. She said” if yoo look at the contractors who had access to the files I would bet that they were selling the information obtained to the highest bidder.” That is treason. If this is true and Barr/Durham does not prosecute as treason our country is lost.
High level points in the beginning – you missed one!
(4) MSM Liberal blackout A google search just conducted reveals NOT A SINGLE MAINSTREAM television or newspaper outlet has covered this blockbuster revelation! Lockstep, unified Liberal MSM.
Will they completely whitewash this dramatic turn? Or are they waiting for Valerie Jarrett & Bed Rhodes to craft a narrative dpin?
Who covered this story – essentially of Obstruction and Collusion by DOJ staff attorneys?
Fox News
National Review
Epoch Times
The Blase
Just the News
The Federalist
RT News
Gateway Pundit
WND
ZeroHedge
Hillary wiped her phones as well. Nothing happened to her and these same crooks helped her get away with it.
That’s why they CAN’T go down for this. They all do it, they all help, they are all guilty. Taking one down it means taking DC down.
If done outside the swamp in the real world.
Destruction of government property.
Conspiracy and attempted coverup…
The swamp has its own rules.
These people have immunity in the swamp and what they did INSIDE the swamp will stay in the swamp as it always has.
They all know they have immunity and can count on secrecy.
From 30,000 feet, this doesn’t necessarily look like a head fake. Maybe a very shiny object to keep people looking while something else more devastating moves in unseen. We may need clearance to climb to 50,000 feet to get a bigger and better view of the ground.