Michael Flynn defense attorney Sidney Powell appears for an interview with Liz MacDonald to discuss the developments in the Flynn case (note: Sullivan’s court appointed amicus response brief is due tomorrow), and the background information recently highlighted. As you review this interview, retain the 30,000/ft perspective.
Ms. Powell also discusses the Weissmann/Mueller special counsel erasing evidence by wiping phones and hiding evidence of their corrupt activity. Additionally, Liz Mac circles back to the 2017 FISA report by Rosemary Collyer to support the most recent 2019 opinion filed by the FISA court showing the NSA database search abuse is ongoing.
.
(1) We know to a demonstrable certainty the special counsel took apart the FBI investigative file of Washington Field Office Supervisory Special Agent Brian Dugan in order to protect their corrupt investigation and the collaborative effort of the Senate Intelligence Committee. And Durham/Aldenberg knows that we know.
(2) We also know with a high degree of certainty the special counsel created a missing Woods File for the Carter Page application when the IG started sniffing around and announced his intent to review the four FISA applications. And Durham/Aldenberg knows that we have strong, very strong, evidence pointing in that direction.
(3) And now today we discover the same special counsel team destroyed their iPhones in an effort to cover their tracks. These three events all happened within an almost identical time-frame. C‘mon man… this is not coincidental.
I’m reposting a prior research outline below because something odd is happening in the background of this story. I’m not sure what it is, but there are small -seemingly disconnected- issues surfacing, that might tie back to this much bigger and purposefully avoided story. I have learned to trust my instincts on this.
♦One – The FISA reauthorization legislation was dropped by Nancy Pelosi and all media conversation immediately vaporized.
♦Two – Crowdstrike is very concerned about this story every time it surfaces.
♦Three – If you understand the scale and scope of surveillance… does that explain the behavior of some people today [legislative (politicians), judiciary (judges), Pentagon (military)].
Were ‘black files‘ created by the Obama Administration?
With the release of recent transcripts and the declassification of material from within the IG report on the Carter Page FISA, there is a common misconception about how the intelligence apparatus began investigating the Trump campaign. In this outline we hope to provide some deep source material that will explain the origin, and specifically why those inside the Intelligence Community began using Confidential Human Sources.
During the time-frame of December 2015 through April 2016 the NSA database was being exploited by contractors within the intelligence community doing unauthorized searches.
On March 9, 2016, oversight personnel doing a review of FBI system access were alerted to thousands of unauthorized search queries of specific U.S. persons within the NSA database.
NSA Director Mike Rogers was made aware.
Subsequently NSA Director Rogers initiated a full compliance review of the system to identify who was doing the searches; & what searches were being conducted.
On April 18, 2016, following the preliminary audit results, Director Rogers shut down all FBI contractor access to the database after he learned FISA-702 “about”(17) and “to/from”(16) search queries were being done without authorization. Thus begins the first discovery of a much bigger background story.
When you compile the timeline with the people involved; and the specific wording of the resulting review, which was then delivered to the FISA court; and overlay the activity that was taking place in the GOP primary; what we discover is a process where the metadata collected by the NSA was being searched for political opposition research and surveillance.
Additionally, tens-of-thousands of searches were identified by the FISA court as likely extending much further than the compliance review period: “while the government reports it is unable to provide a reliable estimate of the non compliant queries since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 period coincided with an unusually high error rate”.
In short, during the Obama administration the NSA database was continually used to conduct surveillance. This is the critical point that leads to understanding the origin of “Spygate”, as it unfolded in the Spring and Summer of 2016.
It was the discovery of the database exploitation and the removal of access as a surveillance tool that created their initial problem. Here’s how we can tell.
Initially in December 2015 there were 17 GOP candidates and all needed to be researched.
However, when Donald Trump won New Hampshire, Nevada and South Carolina the field was significantly whittled. Trump, Cruz, Rubio, Kasich and Carson remained.
On Super Tuesday, March 2, 2016, Donald Trump won seven states (VT, AR, VA, GA, AL, TN, MA) it was then clear that Trump was the GOP frontrunner with momentum to become the presumptive nominee. On March 5th, Trump won Kentucky and Louisiana; and on March 8th Trump won Michigan, Mississippi and Hawaii.
The next day, March 9th, NSA security alerts warned internal oversight personnel that something sketchy was going on.
This timing is not coincidental. As FISA Judge Rosemary Collyer later wrote in her report, “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” Put another way: attributes belonging to a specific individual(s) were being targeted and queried, unlawfully. Given what was later discovered, it seems obvious the primary search target, over multiple date ranges, was Donald Trump.
There were tens-of-thousands of unauthorized search queries; and as Judge Collyer stated in her report, there is no reason to believe the 85% non compliant rate was any different from the abuse of the NSA database going back to 2012.
As you will see below the NSA database was how political surveillance was being conducted during Obama’s second term in office. However, when the system was flagged, and when NSA Director Mike Rogers shut down “contractor” access to the system, the system users needed to develop another way to get access.
Mike Rogers shuts down access on April 18, 2016. On April 19, 2016, Fusion-GPS founder Glenn Simpson’s wife, Mary Jacoby visits the White House. Immediately thereafter, the DNC and Clinton campaign contract Fusion GPS… who then hire Christopher Steele.
Knowing it was federal “contractors”, outside government with access to the system, doing the unauthorized searches, the question becomes: who were the contractors?
The possibilities are quite vast. Essentially anyone the FBI or intelligence apparatus was using could have participated. Crowdstrike was a known FBI contractor; they were also contracted by the DNC. Shawn Henry was the former head of the FBI office in DC and is now the head of Crowdstrike; a rather dubious contractor for the government and a politically connected data security and forensic company.
James Comey’s special friend Daniel Richman was an unpaid FBI “special employee” with security access to the database. Nellie Ohr began working for Fusion-GPS on the Trump project in November 2015 and she was a CIA contractor; and it’s entirely likely Glenn Simpson or people within his Fusion-GPS network were also contractors for the intelligence community.
Remember the Sharyl Attkisson computer intrusions? It’s all part of this same network; Attkisson even names Shawn Henry as a defendant in her ongoing lawsuit.
All of the aforementioned names, and so many more, held a political agenda in 2016.
It seems likely if the NSA flags were never triggered then the contracted system users would have continued exploiting the NSA database for political opposition research; which would then be funneled to the Clinton team. However, once the unauthorized flags were triggered, the system users (including those inside the official intelligence apparatus) needed to find another back-door to continue… Again, the timing becomes transparent.
Immediately after NSA flags were raised March 9th; the same intelligence agencies began using confidential human sources (CHS’s) to run into the Trump campaign. By activating intelligence assets like Joseph Mifsud and Stefan Halper the IC (CIA, FBI) and system users had now created an authorized way to continue the same political surveillance operations.
When Donald Trump hired Paul Manafort on March 28, 2016, it was a perfect scenario for those doing the surveillance. Manafort was a known entity to the FBI and was previously under investigation. Paul Manafort’s entry into the Trump orbit was perfect for Glenn Simpson to sell his prior research on Manafort as a Trump-Russia collusion script two weeks later.
The shift from “unauthorized exploitation of the NSA database” to legally authorized exploitation of the NSA database was now in place. This was how they continued the political surveillance. This is the confluence of events that originated “spygate”, or what officially blossomed into the FBI investigation known as “Crossfire Hurricane” on July 31.
If the NSA flags were never raised; and if Director Rogers had never initiated the compliance audit; and if the political contractors were never blocked from access to the database; they would never have needed to create a legal back-door, a justification to retain the surveillance. The political operatives/contractors would have just continued the targeted metadata exploitation.
Once they created the surveillance door, Fusion-GPS was then needed to get the FBI known commodity of Chris Steele activated as a pipeline. Into that pipeline all system users pushed opposition research. However, one mistake from the NSA database extraction during an “about” query shows up as a New Yorker named Michael Cohen in Prague.
That misinterpreted data from a FISA-702 “about query” is then piped to Steele and turns up inside the dossier; it was the wrong Michael Cohen. It wasn’t Trump’s lawyer, it was an art dealer from New York City with the same name; the same “identifier”.
A DEEP DIVE – How Did It Work?
Start by reviewing the established record from the 99-page FISC opinion rendered by Presiding Judge Rosemary Collyer on April 26, 2017. Review the details within the FISC opinion.
I would strongly urge everyone to read the FISC report (full pdf below) because Judge Collyer outlines how the DOJ, which includes the FBI, had an “institutional lack of candor” in responses to the FISA court. In essence, the Obama administration was continually lying to the FISA court about their activity, and the rate of fourth amendment violations for illegal searches and seizures of U.S. persons’ private information for multiple years.
Unfortunately, due to intelligence terminology Judge Collyer’s brief and ruling is not an easy read for anyone unfamiliar with the FISA processes. That complexity also helps the media avoid discussing it; and as a result most Americans have no idea the scale and scope of the Obama-era surveillance issues. So we’ll try to break down the language.
.
For the sake of brevity and common understanding CTH will highlight the most pertinent segments showing just how systemic and troublesome the unlawful electronic surveillance was.
Early in 2016 NSA Director Admiral Mike Rogers was alerted of a significant uptick in FISA-702(17) “About” queries using the FBI/NSA database that holds all metadata records on every form of electronic communication.
The NSA compliance officer alerted Admiral Mike Rogers who then initiated a full compliance audit on/around March 9th, 2016, for the period of November 1st, 2015, through May 1st, 2016.
While the audit was ongoing, due to the severity of the results that were identified, Admiral Mike Rogers stopped anyone from using the 702(17) “about query” option, and went to the extraordinary step of blocking all FBI contractor access to the database on April 18, 2016 (keep these dates in mind).
Here are some significant segments:
The key takeaway from these first paragraphs is how the search query results were exported from the NSA database to users who were not authorized to see the material. The FBI contractors were conducting searches and then removing, or ‘exporting’, the results. Later on, the FBI said all of the exported material was deleted.
Searching the highly classified NSA database is essentially a function of filling out search boxes to identify the user-initiated search parameter and get a return on the search result.
♦ FISA-702(16) is a search of the system returning a U.S. person (“702”); and the “16” is a check box to initiate a search based on “To and From“. Example, if you put in a date and a phone number and check “16” as the search parameter the user will get the returns on everything “To and From” that identified phone number for the specific date. Calls, texts, contacts etc. Including results for the inbound and outbound contacts.
♦ FISA-702(17) is a search of the system returning a U.S. person (702); and the “17” is a check box to initiate a search based on everything “About” the search qualifier. Example, if you put a date and a phone number and check “17” as the search parameter the user will get the returns of everything about that phone. Calls, texts, contacts, geolocation (or gps results), account information, user, service provider etc. As a result, 702(17) can actually be used to locate where the phone (and user) was located on a specific date or sequentially over a specific period of time which is simply a matter of changing the date parameters.
And that’s just from a phone number.
Search an ip address “about” and read all data into that server; put in an email address and gain everything about that account. Or use the electronic address of a GPS enabled vehicle (about) and you can withdraw more electronic data and monitor in real time. Search a credit card number and get everything about the account including what was purchased, where, when, etc. Search a bank account number, get everything about transactions and electronic records etc. Just about anything and everything can be electronically searched; everything has an electronic ‘identifier’.
The search parameter is only limited by the originating field filled out. Names, places, numbers, addresses, etc. By using the “About” parameter there may be thousands or millions of returns. Imagine if you put “@realdonaldtrump” into the search parameter? You could extract all following accounts who interacted on Twitter, or Facebook etc. You are only limited by your imagination and the scale of the electronic connectivity.
As you can see below, on March 9th, 2016, internal auditors noted the FBI was sharing “raw FISA information, including but not limited to Section 702-acquired information”.
In plain English the raw search returns were being shared with unknown entities without any attempt to “minimize” or redact the results. The person(s) attached to the results were named and obvious. There was no effort to hide their identity or protect their 4th amendment rights of privacy; and database access was from the FBI network:
But what’s the scale here? This is where the story really lies.
Read this next excerpt carefully.
The operators were searching “U.S Persons”. The review of November 1, 2015, to May 1, 2016, showed “eighty-five percent of those queries” were unlawful or “non compliant”.
85% !! “representing [redacted number]”.
We can tell from the space of the redaction the number of searches were between 10,000 and 99,999 [six digits]. If we take the middle number of 50,000 – a non compliant rate of 85 percent means 42,500 unlawful searches out of 50,000.
The [six digit] amount (more than 10,000, less than 99,999), and 85% error rate, was captured in a six month period, November 2015 to April 2016.
Also notice this very important quote: “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” This tells us the system users were searching the same phone number, email address, electronic identifier, repeatedly over different dates. The same people were being repeatedly queried.
Specific person(s) were being tracked/monitored.
Additionally, notice the last quote: “while the government reports it is unable to provide a reliable estimate of” these non lawful searches “since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 coincided with an unusually high error rate”.
That means the 85% unlawful FISA-702(16)(17) database abuse has likely been happening since 2012.
2012 is an important date in this database abuse because a network of specific interests is assembled that also shows up in 2016/2017:
- Who was 2012 FBI Director? Robert Mueller, who was selected by the FBI group to become special prosecutor in 2017.
- Who was Mueller’ chief-of-staff? Aaron Zebley, who became one of the lead lawyers on the Mueller special counsel.
- Who was 2012 CIA Director? John Brennan (remember the ouster of Gen Petraeus)
- Who was ODNI? James Clapper.
- Remember, the NSA is inside the Pentagon (Defense Dept) command structure. Who was Defense Secretary? Ash Carter
Who wanted NSA Director Mike Rogers fired in 2016? Brennan, Clapper and Carter.
And finally, who wrote and signed-off-on the January 2017 Intelligence Community Assessment and then lied about the use of the Steele Dossier? The same John Brennan, and James Clapper along with James Comey.
Tens of thousands of searches over four years (since 2012), and 85% of them are illegal. The results were extracted for?…. (I believe this is all political opposition use; and I’ll explain why momentarily.)
OK, that’s the stunning scale; but who was involved?
Private contractors with access to “raw FISA information that went well beyond what was necessary to respond to FBI’s requests“:
And as noted, the contractor access was finally halted on April 18th, 2016.
[Coincidentally (or likely not), the wife of Fusion-GPS founder Glenn Simpson, Mary Jacoby, goes to the White House the very next day on April 19th, 2016.]
None of this is conspiracy theory.
All of this is laid out inside this 99-page opinion from FISC Presiding Judge Rosemary Collyer who also noted that none of this FISA abuse was accidental in a footnote on page 87: “deliberate decisionmaking“:
This specific footnote, if declassified, could be a key. Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”, this sentence has the potential to expose an internal decision; withheld from congress and the FISA court by the Obama administration; that outlines a process for access and distribution of surveillance data.
Note: “no notice of this practice was given to the FISC until 2016“, that is important.
Summary: The FISA court identified and quantified tens-of-thousands of search queries of the NSA/FBI database using the FISA-702(16)(17) system. The database was repeatedly used by persons with contractor access who unlawfully searched and extracted the raw results without redacting the information and shared it with an unknown number of entities.
The outlined process certainly points toward a political spying and surveillance operation; and we are not the only one to think that’s what this system is being used for.
Back in 2017 when House Intelligence Committee Chairman Devin Nunes was working to reauthorize the FISA legislation, Nunes wrote a letter to ODNI Dan Coats about this specific issue:
SIDEBAR: To solve the issue, well, actually attempt to ensure it never happened again, NSA Director Admiral Mike Rogers eventually took away the “About” query option permanently in 2017. NSA Director Rogers said the abuse was so inherent there was no way to stop it except to remove the process completely. [SEE HERE] Additionally, the NSA database operates as a function of the Pentagon, so the Trump administration went one step further. On his last day as NSA Director Admiral Mike Rogers -together with ODNI Dan Coats- put U.S. cyber-command, the database steward, fully into the U.S. military as a full combatant command. [SEE HERE] Unfortunately it didn’t work as shown by the 2018 FISC opinion rendered by FISC Judge James Boasberg [SEE HERE]
There is little doubt the FISA-702(16)(17) database system was used by Obama-era officials, from 2012 through April 2016, as a way to spy on their political opposition.
Quite simply there is no other intellectually honest explanation for the scale and volume of database abuse that was taking place; and keep in mind these searches were all ruled to be unlawful. Searches for repeated persons over a period time that were not authorized.
When we reconcile what was taking place and who was involved, then the actions of the exact same principle participants take on a jaw-dropping amount of clarity.
All of the actions taken by CIA Director Brennan, FBI Director Comey, ODNI Clapper and Defense Secretary Ashton Carter make sense. Including their effort to get NSA Director Mike Rogers fired.
Everything after March 9th, 2016, had a dual purpose: (1) done to cover up the weaponization of the FISA database. [Explained Here] Spygate, Russia-Gate, the Steele Dossier, and even the 2017 Intelligence Community Assessment (drawn from the dossier and signed by the above) were needed to create a cover-story and protect themselves from discovery of this four year weaponization, political surveillance and unlawful spying. Even the appointment of Robert Mueller as special counsel makes sense; he was FBI Director when this began. And (2) they needed to keep the surveillance going.
The beginning decision to use FISA(702) as a domestic surveillance and political spy mechanism appears to have started in/around 2012. Perhaps sometime shortly before the 2012 presidential election and before John Brennan left the White House and moved to CIA. However, there was an earlier version of data assembly that preceded this effort.
Political spying 1.0 was actually the weaponization of the IRS. This is where the term “Secret Research Project” originated as a description from the Obama team. It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller. It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:
The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)
Why disks? Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS. All of the evidence within this sketchy operation came directly to the surface in early spring 2012.
The IRS scandal was never really about the IRS, it was always about the DOJ asking the IRS for the database of information. That is why it was transparently a conflict when the same DOJ was tasked with investigating the DOJ/IRS scandal. Additionally, Obama sent his chief-of-staff Jack Lew to become Treasury Secretary; effectively placing an ally to oversee/cover-up any issues. As Treasury Secretary Lew did just that.
Lesson Learned – It would appear the Obama administration learned a lesson from attempting to gather a large opposition research database operation inside a functioning organization large enough to have some good people that might blow the whistle.
The timeline reflects a few months after realizing the “Secret Research Project” was now worthless (June 2012), they focused more deliberately on a smaller network within the intelligence apparatus and began weaponizing the FBI/NSA database. If our hunch is correct, that is what will be visible in footnote #69:
How this all comes together in 2019/2020
Fusion GPS was not hired in April 2016 to research Donald Trump. As shown in the evidence provided by the FISC, the intelligence community was already doing surveillance and spy operations. The Obama administration already knew everything about the Trump campaign, and were monitoring everything by exploiting the FISA database.
However, after the NSA alerts in/around March 9th, 2016, and particularly after the April 18th shutdown of contractor access, the Obama intelligence community needed Fusion GPS to create a legal albeit ex post facto justification for the pre-existing surveillance and spy operations. Fusion GPS gave them that justification in the Steele Dossier.
That’s why the FBI small group, which later transitioned into the Mueller team, were so strongly committed to and defending the formation of the Steele Dossier and its dubious content.
The Steele Dossier, an outcome of the Fusion contract, contains two purposes: (1) the cover-story and justification for the pre-existing surveillance operation (protect Obama); and (2) facilitate the FBI counterintelligence operation against the Trump campaign (assist Clinton).
An insurance policy would be needed. The Steele Dossier becomes the investigative virus the FBI wanted inside the system. To get the virus into official status, they used the FISA application as the delivery method and injected it into Carter Page.
The FBI already knew Carter Page; essentially Carter Page was irrelevant, what they needed was the FISA warrant and the Dossier in the system {Go Deep}. This also explains all of the issues with the FISA application “Woods File” being created ex post facto.
The Obama intelligence community needed Fusion GPS to give them a plausible justification for already existing surveillance and spy operations. Fusion-GPS gave them that justification and evidence for a FISA warrant with the Steele Dossier. The Dossier was used to create the FISA application. The Dossier was used as a replacement for a valid Woods File.
Ultimately that’s why the Steele Dossier was so important; without it, the FBI would not have a tool that Mueller needed to continue the investigation of President Trump. In essence by renewing the FISA application, despite them knowing the underlying dossier was junk, the FBI was keeping the surveillance gateway open for Team Mueller to exploit later on.
Was the Peter Strzok created “EC” that initiated Crossfire Hurricane really just a massive effort to cover-up the Obama-era surveillance network? {Go Deep} Is that underlying surveillance network the real threat explaining why Michael Flynn had to be removed?
.









She has the guts to take on the evil swamp!
Not like others who have the needed facts but sit on that or wait to write books for $
If they aren’t held responsible and accountable it’s as good as it didn’t happen. Forget letting the American people know. (We know, we’ve known, it’s known.) It’s taking away the bs narratives by upholding law and order. This is not hard to understand. If it doesn’t end our whole system will be proven to be one big hoax and we are without excuse.
i think it should be a question in the first debate. ‘ what are the implications of the mueller team erasing 31 phones,after horowitz requested them?’
Not sure Joe knows what a phone is these days.
Joe uses a record player. LOL
you got that right …

I couldn’t agree more, especially, “(We know, we’ve known, it’s known.)”.
And the media, “the media” needs to be brought to its knees. Tucker covered a little exposure the other night, again, it is something we have all known for years, but never gets dealt with. When will that ever happen?
After 3 years of Russia Hoax, and everything that they have done. No indictments, charges prison time. I have given up on justice. The Swamp is much deeper then we could have imagined. Very RICH and Powerful people are involved. President Trump only has a small group of people that support his American Agenda and I trust. After the election it is time to Clean house top to bottom and bring in TRUE AMERICAN PATRIOTS
BARR is part of the problem
Yes, it needs to be cleaned up but my guess is that it never will nor can it be done. As you said, the Swamp is much deeper than people could have imagined. For years, since before President Trump ran for office, I’ve been aware that it’s deeper than people can imagine and even when people started to see it in the last four years, no one wanted to believe it’s as deep as it is. That said, while I hope it can be cleaned up, I highly doubt it can. The biggest concern I have now is one that no one wants to hear (at least among Trump supporters). That is that the Deep State is so deep that they quite likely can pull off stealing this election and POTUS does not get a 2nd term. If that happens, we enter into the thousand years of darkness Reagan warned about. America will become a Marxist nation.
No one on our side wants to consider it, but the threat is real and the problem is how we prevent them from using fraud and mail-in voting to do it. What happened in the Orange County, CA 2018 Congressional elections is likely a rough and small blueprint of what they plan to do this time. Every patriot of faith needs to be praying daily for God’s hand on this election and with that prayer they need to pray for a spiritual and moral revival in America. Those who don’t believe or don’t understand it will scoff at the idea, but God has made it clear that without it His hand of blessing will not continue (II Chronicles 7:14). And our founders said that our government could only succeed if we are a moral and spiritual people. America is neither of those things, even among conservatives. We better focus on what’s important for if we don’t we won’t have God’s support and without His support we will fail.
Hillary email deletion and secret server possession: oops, didn’t mean to.
Clinesmith fabrication: oops, didn’t mean to.
Weissmann’s clown posse’s evidence wiping: oops, didn’t mean to.
Memorize this line. It is the ultimate Get-out-of-jail-free card.
The Oopsie Absolution.
Oopsie on Epstein, oopsie on Fast N’ Furious guns. Oopsie on Awans and Weiners’ laptop.etc
Seems like we need mass hangings for treasons and coups.
I would love to see 40 soul less traitors on ropes at one time, and when the hangman pulled the lever, say “Oopsie”!
At :40 seconds in mad dog Grassley issues his strongest worded letter to date. crickets. They controlled Congress for 2 years. Imagine that.
Blame the horrible Paul Ryan, too.
Collyer Report shows Comey have unsupervised access to a private entity to LOOK WAY beyond needs to help the FBI
Nellie Wrote it;
Bruce carried the Flash Drive;
Steele was called to Author it;
Fiona Roped in her drinking buddy Igor Danchenko to be the Fall guy;
SSA Dugan interviewed Igor and was told he informed Peter STROKE it was BS in Jan 2017;
Weissmann FREAKED and recreated a WOODS FILE to point to Steeled and not IGOR;
DOJ Letter to FISC 2018 Lied and said Igor was truthful (but not that he said its all BS)
—————-
Sundances work attempted to coordinated on the website. all respect- all can be used by anyone.
(Inform all why this matters; cliff not amature attempt to get people caught up on CTH work)
—————–
https://4thamendmentrestored.com/
sorry, I’m learning!
Have we seen enough ? Are we angry enough to march ? I didn’t think so.
If anyone has read Sundance’s Twitter posts within the last few minutes — well — they are depressing.
They sound like defeat.
sounds like righteousness to me. also confidence in his/her standing in the end of things.
The current reality is depressing but it gets much worse come November.
For them.
I’ll freely admit I would have never thought this lawlessness could happen in America. Where all this goes to from here is anyone’s guess. We see political murder on the streets and the other side says that’s fiction, there’s no murder there’s no riots. Then why the record sales of guns and ammunition?
We all have our interpretation of current events. Should it come to it I will protect me and mine against those that would do us harm.
Drogers – you miss one KEY FACT.
President Trump has never had his DOJ – so he has never had a LAW ENFORCEMENT BRANCH to address this rogue nation.
———————————
PLEASE – i beg you to understand this. I will make a timeline later. Sundance this is the key point people angry with POTUS are not getting, but once explained they see.
(rough draft) – add more if you like
————————————————————————
March, 02, 2017 — Attorney General (AG) Jeff Sessions Recuses from all things Russia (all DOJ activity)
May 17, 2017 — Special Counsel appoint of Rober Mueller
February 4, 2019 — William P. Barr sworn in as the AG of the United States
May 29, 2019 —Special Counsel Robert Mueller Announces Closure of Special Counsel Office
July 24, 2019 — Special Counsel Muller does Final Testimonry before Congress
August 12, 2019 – Whistleblower files complaint to Senate and House Intelligence Committee
July 25, 2019 — President Trump phone call with Ukrainian President Volodymyr Zelensky
September 24, 2019 — Nancy Pelosi Announces Formal Impeachment Inquiry of President Trump
January 21, 2020 — First case of COVID-19 in United States
January 30, 2020 — WHO declares Global Health Emergency
February 2, 2020 — President Trump restricts Travel With China (COVID-19)
February 29, 2020 — President Trump restricts Travel With Iran (COVID-19)
February 5, 2020 — Diamond Cruise Ship Quarantined
February 5, 2020 — President Trump Acquitted on Both Counts of Impeachment
February 26, 2020 — First Person to Person Transmission (local transmission) of COVID-19 reported in US
February 29, 2020 — First COVID -19 Death reported in the US
March 13, 2020 — President Trump Declares National Emergency
September 9, 2020 — House Intel Committee Chair Announces New Whistleblower Russian Interference Suppression by President Trump
WhiteBoard,
Thanks for the timeline, forgot Miller’s final Congress testimony, next day the Ukraine perfect telephone call, 18 days later we start the next hoax.
It is GOOD to look at a timeline of all of the junk that PDJT, HIS family, friends and associates have endured from the UniParty.
Thank you GOD for watching over PDJT etal.
There’s no storm coming. Nothing is coming. The only way things change is revolution. Make the guillotine great again.
the fact that none of my predictions has come true is merely proof of my farsightedness.
Join the team. the excuses are running out.. the time is running dead.
out of a courtesy we have supported making america great, and once good, we revisit this other issue we already “caught them all’ at.
no revolution. our founders presented a system where we elect and we change. we are.
You are only frustrated because you are being shown the swamp. imagine the people who have seen it years before us and we didnt listen?
face it, resolve it – Contact the Prosecuter and tell him you know.
“The only way things change is revolution.”
The problem is that the left sees things the same way:
https://thefederalist.Com/2020/09/09/how-democrats-attacks-on-the-2020-elections-legitimacy-set-the-stage-for-revolution/
Not to worry. We have more guns and something worth fighting for.
Our side also has precisely f*** all in terms of organization and coordination. An organized mob tends to defeat uncoordinated small groups. Our side needs to build those organizations and keep infiltrators out so as to be able to stand and succeed in the chaos to come. They’re a de facto army, we need to be the same.
Not affiliated with them so I have no sphere of reference, but perhaps they’re worth looking into.
https://oathkeepers.org
Black Files Matter. Put aside your Democrat privilege and say the words.
Black Files Matter. First, incorporate. Get the website. Next, get the memes going. Don’t forget the riots, er protest. Then the money starts rolling in. After all, how many innocent black files have been destroyed due to reckless law enforcement?
Black Flies Matter up north if you’re outdoors a lot in the spring.
Done! I sent Aldenberg an email just a few minutes ago.
Had to rewrite a few lines, as I don’t want anyone to feel threatened. Told him to let the sun shine on the swamp, prosecute all the crimes to the fullest and tell us why he didn’t prosecute all the other things I think are criminal. Also, needs to close any loophole those turds are hiding in.
Appealed to his pride and told him that I think Justice Dept is a clown show being trolled by Comey, Sztrok, Brennan, etc. The US has a crisis caused by lack of faith in justice and seemingly two tiered system and he can play a part by restoring out faith.
We the People demand action and we deserve truth and justice.
Get busy Treepers and write! God bless you and God bless America!
I wrote him an earful and from the heart. I hope he gets lots of emails today.
“i FIND YOUR LACK OF FAITH DISTURBING”.
The final moves in this have yet to be made.
DEPLORABLE JEDI. Remember, anything the WEISSMULLER MISCREANTS sent electronically…..CAN NEVER “DISAPPEAR”.
Sundance Add – Page 85 and 86 of collyer report.
private entity. unauthorized- beyond scope. Comey tried to claim they were federal becuase they went to federal building (Footnote 68 page 86)
BITE SO HARD INTO THEM! do not let go Sundance, Sydney, and all
AAH?
Maybe this will help

“This specific footnote, if declassified, could be a key. Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”, this sentence has the potential to expose an internal decision; withheld from congress and the FISA court by the Obama administration; that outlines a process for access and distribution of surveillance data.”
It looks like all can be read but the portion directly after [apparently in place], if right?
Access granted to [Prism] contractors
[Inspector General] compliance report in 2009 declared
CTH believes that redacted date is 2012
[CIA] access to FBI systems was the subject of an inter-agency memorandum of understanding enter into in [2012.
__________
NIP
https://www.dni.gov/files/documents/CIO/Improving_Cybersecurity-IC_IE_ImpPlan-August_2019_reduced_web.pdf
Not illegal – someone put it on the net =]
Fck off traitors…
Page 11 , just in case these people try and overwhelm you.
“A Nation made more secure by a fully
integrated, agile, resilient, and innovative
Intelligence Community that exemplifies
America’s values.”
Oh, That Part?
LIARS.
Replace the word “Nation” with “Washington Swamp” and “America’s values” with “corruption beyond comprehension”.
In 2007 2008 we had banks issuing fake financial documents…no one went to jail.. as in too big to fail..
In 2020 we have president Trump an outsider.. the swamp runs the country and they are too big to fail..
taking into consideration today’s President Trump rally and love and devotion exhibited by the attendees my hope remains that after the election..the old corrupt Rino Republican Party dies and is reborn into the MAGA Republican Party. Get rid of the Schumer’s Pelosi Graham Feinstein thru gentle pressure… resign or face 50 years in jail.. the same with the DOJ dirty prosecutors..
I now think jail time prosecutions would take too long…….given Clinesmith falsifying evidence is and is allowed to plead to a minor infraction sets the tone.. the DOJ and the judges are not going to play ball for any real jail time. Look at Sullivan and Gen Flynn… too many exposed crimes and no indictments ….. yes we have a two tiered justice system.. and I don’t believe AG Barr could fix this if he wanted to.
So IMHO the second best deal is to clean house as best as can be and start over..
Isn’t it why the IRS go after people who owe $1000, give assistance to those who owe $10,000, and never touch those who have a $1000,000.
I am sick to death of the untouchables!
Let me proffer this, I think Judge Sullivan is protecting Obama’s legacy.
Black Lies Matter!
Let me proffer this: I think the illegal searches of the NSA datastore turned up something in Judge Sullivan’s background that the Obama people have used to make him do their bidding.
The illegal surveillance carried out by the Obama, Brennan, Clapper minions is the “key to the coup.” See the website http://www.blxware.org to get a full picture of the surveillance.
The spy results may (or may not) have been deleted from the contractors’ systems, but NOT FROM THOSE THEY SOLD, REPORTED or Transferred the illegal surveillance to. The FISC and Barr strangely do not seem concerned whatsoever with who got it or what they did with it.
Did it go to Perkins Coie, obama officials in the whitehouse, hillary, the DNC ?
Moreover, the crooked FISC has held no disciplinary hearings for lying to the FISC for years.
Server in Ukraine ———- Crowdstrike.
“CROWDSTRIKE” was the word that sent the SWAMPIRE ablaze. And may be the reason they simply HAD to move forward with their IMPEACHCOUP.
The actual servers are not in Ukraine. THE DATA FROM THE SERVERS MAY BE.
THUMB/FLASH DRIVES most likely. Copies of the DNC H.Q. on-site “HACK”. No one really knows how many copies were made, nor where they ALL may be located.
Nice leverage to have over “THE HAG QUEEN” who was SUPPOSED TO WIN.
But she lost in a HISTORICALLY CRUSHING DEFEAT. To our everlasting JOY.
Would keeping that DATA and HOW IT WAS OBTAINED secret be worth sending the U.S. MILITARY TO UKRAINE to assist them in a war with RUSSIA, RUSSIA, RUSSIA?
We all know the answer.
As for THE MULE TEAM and their “WIPING”? NSA “HIVES”. They made a grave mistake. YOU WOULD THINK THEY WOULD KNOW THAT.
DEPLORABLE JEDI.
“Obama, HE GOT A DATABASE ON EVERYBODY! It’s like nuttin you ever seen before!”
-Mad Maxine
The service providers have all the texts and call logs that were on the cell phones. Wiping a cell phone does nothing to erase texts and call logs except on the device.
All this “knowing” this and “knowing” that has left me with; “What they did would put me in GITMO if I did what they did”. Not much more to it all that I see worth fretting about. One thing for sure, I sure has hell don’t need to know one more thing if knowing it has the practicality as tits on a boar.
Maxine Waters: “Obama put in place a very powerful database that has everything on everyone”
I remember her saying that and wondering if the “secret police” like Lois Lerner were a part of that “database”.
Can Obama’s database be audited? To find out where the data came from…
Crowdstrike President Shawn Henry Found Dead of Apparent Self Inflicted Gunshot Wounds
link
“The NSA compliance officer alerted Admiral Mike Rogers who then initiated a full compliance audit on/around March 9th, 2016, for the period of November 1st, 2015, through May 1st, 2016.”
I am starting to believe the above was a CYA move, and not a sudden audit with following honorable intentions. I believe he always knew the database was being raped.
Just like Dugan, why isn’t he talking?
the compliance officer was not in on the deal.
Dugan wasnt in on the deal,
thats why his work got bent over and FLUSHED
by law his response gets written – thats how sundance scoooped it.
I am wondering why he did not know the amount of queries against this database on a monthly basis? Who was specifically tasked with monitoring and overseeing that??
PRISM – link to foot note 69 above
https://theconservativetreehouse.com/2020/09/10/big-picture-sidney-powell-discusses-weissmann-mueller-special-counsel-destroying-evidence-of-their-conduct/comment-page-2/#comment-8755958
Facebook, Google and seven other major Internet companies are allowing the National Security Agency direct access to a wealth of users’ data, according to a repoPRISMrt.
Called PRISM, the program involves the NSA accessing the emails, documents, photographs and other sensitive data of users from all nine involved companies, according to a PowerPoint presentation obtained by The Washington Post and The Guardian. The PowerPoint was provided by a whistleblower in the intelligence services.
Snowden warned us all, and we called him a traitor. I don’t know a single person who uses a device with camera, and doesn’t cover it with a sticker, or removes the battery from their phones etc
What people often overlook about Snowden is that he was not a government employee but a CONTRACTOR himself. So, how did a contractor get all of that information? That is the BIGGER Scandal / realization. IMHO
To put it into context: The government is owned by the contractors.
Prove me wrong.
Right to reply,
The new phones don’t allow you to remove the battery easily.
Just Saying
IIRC, it was CIA funding that got google and the others started, and facilitated their dominance over other startups.
And, more
it is amazing how the CIA sold “the cloud” as a good thing.
especially after they could not ‘sell’ the clipper chip
Link to Prism contractors above
https://theconservativetreehouse.com/2020/09/10/big-picture-sidney-powell-discusses-weissmann-mueller-special-counsel-destroying-evidence-of-their-conduct/comment-page-2/#comment-8756084
If right, then two of the seven contractors are Facebook and Google.
Access granted to [Prism] contractors
Facebook, Google and seven other major Internet companies are allowing the National Security Agency direct access to a wealth of users’ data, according to a repoPRISMrt.
https://mashable.com/2013/06/06/prism-tech-companies-data-mining/#vP5Mr4hNRZqR
The Cloud is the internet. So who owns the internet?
Is this the answer? It’s all of them.
?width=620&quality=85&auto=format&fit=max&s=7a21191e4e212d1cbb0d223a40d7ca4b
It depends on who you’re paying. Microsoft’s cloud service is Azure. Amazon’s cloud service is AWS. They are big air conditioned rooms filled with servers scattered around the world that you back up your information to.
BE CAREFUL HERE…The Azure system is based upon a: DATABASE (SQL SERVER) which INTERFACES with all the rest of them…Everyone of those companies saying they have a Cloud Service…they do…more servers than you can imagine. BUT THEY ARE ALL USING SQL SERVER LINKED TOGETHER TO FORM THE CLOUD..that is where the smoke and mirrors come in.
Can you point me to more info about that? Why would it be MS based and not Unix/Linux based?
MICROSOFT won a $10 BILLION contract to build a system that works with Azure (web farm)…MS has come up with a way to interconnect the servers. It is MIND BLOWING. I am running Win Server 2019 and SQL SERVER 2019 AND there HOOKS in the OS that hook into SQL Server. When I shut down the system, AZURE also shuts down…
They are just laughing at us. Now we learn that the Mueller team deleted all of their I-Phones just before IG Horowitz got them. That is like 27 phones deleted. They must have been taught by Hillary Clinton. If Durham / Barr fails to act, we are done. Our Country has become Venezuela. Sad.
think about it. it is impossible to ignore.
Oopsie! I just spent more than three hours scrambling passwords on my phone until everything was deleted. Funny thing is, everyboday else did the exact same thing at the same time!
Well, whoopsie!
In theory the NSA should have a complete history of those phones.
That Sydney would risk her well-earned credibility by tossing grenades of private contractors selling limitless Classified Information to the highest bidder reminds of POTUS first announcing he learns his phones are tapped. After a long rebuking, it turns out he was dead nutz correct. Coming from Sydney and based upon all we now know, the burden of innocence just shifted to those contractors now needIng to prove they haven’t committed treason…
Sydney laid out the case: trace the $ and bring the charges.
https://twitter.com/EmeraldRobinson/status/1304181536271499265
So, there’s a difference between “punting” an waiting until after the election…. just sayin.
I don’t think Barr is going to expose the criminality of the first blackish President, The CIA, The FBI, etc. He certainly is not going to expose the depth of the FISA abuse while at the same time opining against reforms to FISA. If he was serious and interested in protecting the US Constitution, he would be demanding significant reform instead of fighting it. Likely he sees himself as saving America because, in his opinion, Americans can’t handle the truth and the whole system would collapse on itself.
The FISA corruption should have been fairly straightforward seeing as how Judge Collyer and Admiral Rogers have had access to the unredacted which likely identify the culprits, or at least provide a pathway to them. Barr knows also seeing as how he has full declassification authority from POTUS. Way too many documents and other evidence have been disappeared with no consequences. Sundance nailed it when he said something to the effect that Barr’s problem is not what he doesn’t know but what we the people know. Barr is likely spending a lot of time thinking about how far he can expose the criminality to satisfy we the people without exposing the rot underlying the entire system. I hope I’m wrong and he is saving it all for the biggest October surprise in history.
All of you are a bunch of sad sacks. It is a good thing that the President isn’t as easily discouraged as all of you are.
Thank you Dorothea.
I would not have been able to opine such sentiment so eloquently.
Agreed, he seems extremely upbeat lately. Either barr does it or he’s going to expose it all before election.
I hope you’re reprinting this fine work again because something is going to happen.
One addition I’d suggest to the narrative is to add in Patrick Byrne’s tale of being approached by his FBI handlers, including Strzok, I think, in the same timeframe, I think, or maybe even earlier, asking him to introduce his pretty Russian fire-arm living girlfriend to Republican campaign people, knowing that she was already being surveilled, which would expose anyone communicating with her via the two hop rule to their own surveillance. He claimed he was offered a billion dollar bribe, which he declined, then was subject to an SEC investigation. His online retail company had acquired a bunch of crypto currency technology.
The only billion dollar bribe I can think of that could conceivably come through Strzok from the globalists opposing Trump would’ve been the opportunity for his crypto-currency technology to get incorporated into global banking plans to launch a crypto-currency solution to enable international transaction settlements. See Steven Guinness’s excellent if wonky analysis of THAT Globalist initiative. https://stevenguinness2.wordpress.com/
Rumors or inside knowledge of that possibility would have sent Overstock.com stock soaring, which it did. When those rumors failed to materialize, the stock crashed, Strzok’s wife, the SEC Enforcement Division Deputy Chief, opened an investigation, apparently leading Byrne to talk to his “Rabbi” Warren Buffet, who told him to go public with this story, but to resign as CEO first.
A bizarre side story but possibly providing a direct link from the bad cops in the Deep State to the deep pockets of global financial empire managers.
it sure did dissapear fast to right?
What if the “sources” feeding info to tick tocks out there were actually another traitor like Jim Mattis, or many of the people we thought were good but turned out to be swamp?
What if, it was meant to keep us hanging so they can run the clock.
Horowitz didn’t mention the wiped phones. He could have.
Horowitz didn’t have SUBPOENA POWER for their phones.
He was NEVER going to get them.
BARR’S TEAMS CAN GET THE “PEN REGISTERS” AND “BLOWOUT” the whole SWAMP SECTOR if he chooses to do so.
HIS PLAY.
DEPLORABLE JEDI.
Why would Horowitz need subpoena power for the phones? They were and still are the property of the DoJ. As a matter of fact, the whole Special Counsel Investigation as well as Crossfire, and other operations/investigations and acquired evidence are all DoJ property/provenance.
Technically you are correct.
Realistically they could tell him to go pound sand. “ONGOING INVESTIGATIONS”.
And how many times have we heard that excuse over the past few years?
THAT’S WHY HE DIDN’T “GET” THEM.
“OHR WOULDN’T HAVE GOTTEN THEM ANYWAY. He didn’t want them.
BUT WE ALL WANT THE DATA ON THEM NOW. And we will get it.
DEPLORABLE JEDI.
I am keenly interested in bringing lawsuits on behalf of the U.S. Citizens who had their civil rights violated. I’ll reach out to SP tomorrow. I practice in Ohio. If you reside in Ohio and you think your 4th Amendment rights were violated please reach out.
I wish you success, really.
But I am pass the point of counting on the legal system created by these crooks. It’s their system. It was created to protect them. I don’t believe it will ever work for us.
It wasn’t meant to, they are walking around smiling and not a care in the world. They know they are untouchable.
Legal system is not the way to go after them since they own it.
We would have to think outside the box and I have no idea what besides taking the country back by force… which I don’t care to do it. Our side won’t fight.
That’s why they keep doing this to us. It’s a win win. They know we won’t fight back (physically) and if we go after then using their rotten system they will laugh at us.
So, if we don’t go yellow vest on them, forget it!
Peter Strozk has” a care in the world”. He is man for whom optics matters. Yet in his tv interview a few days ago he wore an unironed shirt possibly pulled from the laundry basket.
They will give him a high level job in one of the agencies in the future and the media will make him a hero.
Floyd 2.0. It doesn’t matter who is he is, the media will create a hero out of him.
If a “Woods File” was created “after the fact”, then the server timestamps and access identity IDs will show it. Especially if it was a Unix/Linux server. Unix/Linux files record the User ID, access timestamp, closure timestamp, for any file from any user, including the Administrator. I’m not so sure about Windows Servers. But the server data shows exactly who accessed any file, when, time, date, and when/date/time they closed the file, and how many bytes were written. Securing those server log files will prove who accessed what, when, and for how long, and how much was written. That’s what server log files are for. That’s what security is for. That’s how servers work.
yeah, and I’ll add – that to my knowledge – those server logs are backed up and there are backups of the backups. Ten years ago it was still to tapes, and backup tapes were sent to an offsite repository in case your computer room burned.
that’s why I was tearing my hair out and yelling back when the Hillary / State Department missing emails were in the news – anything that was on State computers was backed up, but I heard little about sysadmins assisting with tape-recovery efforts (doesn’t adress the home bathroom server, of course, but does apply to those offsite firms she had port the data to their servers)
same for the Lois Lerner escapade where I think a central issue was “can no longer find it on her computer”
Yeah, in Unix/Linux a “tar” file is a “tape archive” file. Her bathroom server still has ISP backups somewhere. If her server “touched” an external server, then there’s more backups. If you follow the server backbones and branches far enough, there’s a copy of anything that’s ever been keyed in or sent or received. True Dat. Servers don’t lie.
You are overthinking this. Those procedures exist so they can tell us on TV that they are doing everything by the book and we should trust them. That’s it!
Inside the swamp those rules don’t really exist, they make up their own rules so they do what they need to do. And they get away with it by hiding under National Security/ Top Secret crap.
So for us, they exist (wink wink) but in reality they are not followed and they don’t have to.
You left off the /sarc tag.
Server logs are intrinsic, exact, and unimpeachable. That’s how an administrator controls a data system or examines it. Part of the system architecture.
What I mean is, you can prove they committed 1000s of crimes with your analyses but it doesn’t matter. They know what they did, but they all do it all the time and it’s just how things work in the agencies. They don’t have to obey anything.
It’s just how it has been for decades.
Outside of the agencies you could nail people with those facts. But inside it doesn’t matter.
Yeah they broke the law. But there was no intent so… no charges, move on.
Crimes are permitted and they all do it all the time, have been for decades.
IF someone CaARES enough to look for it…
“Ok, but – US targets – then you’d have to … get … the court order”
“You mean FISA? Yeah … they’re just a big-ass rubber stamp, dude”
General Flynn only had this job for 3 weeks and has spent 4 years going through hell. I wish one day he would go to the WH Press Room and just start spilling the beans on live Tv.
Stroyk has to be one of the top five creepiest people ever seen. He really should have been an on going storyline on Criminal Minds. Has he always been like that? I shudder just watching him in those clips.
When you overlay this information, with what we have SEEN, with our own lieing eyes, right out there in the public domain, of Congressional Republicon Leadership, it becomes obvious that, although Sundance talks about “Obama Era” political exploitation of the NSA database, Congressional Republicon leadership HAD to be aware of, and complicit in this exploitation.
The earlier “Special Project” was getting info on TEA PARTY 503C applications and membership lists, and the IRS delayed such applications, as well.
The Tea parties very public tactic was to attempt to primary Republicon Congressional Leadership.
From a D vs R view, Obama should have ordered those applications to be EXPEDITED, not delayed. Cause disruption to Republican leadership would be to Dems advantage.
Instead, we see Obama admin breaking the law, to help,…..?
Republicon Congressional Leadership.
WHY?
Well, is it just a coincidence that the Obama admin scandals that couldn’t be swept under the rug, ignored by the media, etc. Fast/Furious, IRS/Tea party and Benghazi, were ‘investigated’ by Gowdy,…MUCH of the scandal was exposed (lance the boil) but no one was found to be accountable.
And, Republicon complicity was concealed. In IRS/Tea Party, the Republicon involvement is obvious; THEY were the beneficiaries, after all.
Any unfamiliar,with Sundances excellent work on Benghazi, should read it in the archives; he makes an excellent case that “Operation Zero Footprint” in Lybia, and the earlier unnamed operation in Syria, put 100’s of tons of sophisticated U.S. weopons into the hands of ISIS, some of which made it to Afghanistan, where it was used to shoot down U.S. personelle, including seal team 6.
And, compelling argument that,Congressional Republicon Leadership, thru g of 8/SSCI and House intel, were complicit in the scheme.
THATS why there are photos of McStain and Lindsey meeting with ISIS leaders.
They were ‘selling’ U.S
military aid, just as others in Congress were ‘selling’ U.S. non-military aid (highest bidder).
Yes, the contractor access to NSA database WAS exploited for political weoponisation from 2012 onward, and it was used by Congressional leadership of both faces of the Uniparty, as a ‘defensive weopon’ against primary challengers.
Thats why McConnell has avoided any hearings on, or changes to FISA. Only authorised “FISA hearings” (another investigate to exhonerate” because FISA reauthorisation unexpectedly failed.
The goal of Lindseys hearings isn’t to truly investigate and expose the abuse of FISA. It was to be able to SAY they have investigated, and reccomend some meaningless changes, SO THAT they can then vote to reauthorise.
Because Republicon Congressional Leadership was ALSO exploiting the database, and so was complicit, they were “on board” with the “insurance policy” to disrupt PDJT’s campaign, and torpedo his Presidency, if elected.
Thats the only reasonable explanation of Ryan and McConnells behavior, as we have observed it,..with our own lieing eyes.
Dutchman,
You explained the UniParty more succinctly than I would have been able to do.
Becomes more important to be able to explain it to the new lurkers that are coming to this site. Getting an education from Professor Sundance on a wide range of topics.
Glad that I stumbled upon this site, realizing that economic, political, social worldwide conditions are all interrelated. Have to take the 50,000 or higher view of what is happening and not get stuck in the weeds.
Agree 100 percent, so they need to go down too! If we keep voting for these repeat and ongoing offenders than we truly get and have the government we deserve. Both sides, for the most part are up to their necks in this sham!
Yup. If we were voting with our heads, instead of hearts, we really SHOULD vote ALL incumbents out.
“But wait, that means somebody “Good” like Nunes would be voted out.
Yes, but we would get new people in, instead of “career politicians”,…of coarse, even if we DID vote them out, each time,..they may have cosequences.
With voter imposed term limits, MAYBE they would just go for all the graft they could collect in ONE term?
But RepubliCAN party has been cursed with Rinos, ever since I can remember (Rockefeller Republicans).
And for ALL that time, they have given VOICE to our concerns, and policy prescriptions.
They have even voted for legislation in keeping with same (when they KNEW the legislation had NO CHANCE of actually being enacted. Witness 50 votes to R & R Obamacare.)
But, they have actually worked WITH Dems, to allow us to creep towards Global Conmunism agenda, step by step.
HOW is it, that FCC isn’t pulling broadcast licences of CNN and MSNBC, for blatant violations of fairness doctrine?
How is it that our Public Education system has become Conmunist indoctrination?
A REAL “Conservative Alternative” party would have blocked this inexhorable slide.
“Many say we need a “third party” in this country. However, the reality is we have had a one party system in this country, for many years; the UNIPARTY.
The emergence of DJT has brought about a true second party, the America First MAGA party, and the Uniparty, being Conmunists, DO NOT like competition.
Conmunist CAN NOT compete, hence they MUST cheat. We see this with every example of Conmunism; CCP, or Uniparty.
Trade or ideas, they can’t compete, so MUST cheat.
“
FBI, true to it’s roots. Any one surprised?
Look familiar?
“J Edgar Hoover instituted strenuous agent-recruiting and advanced intelligence-gathering techniques. During his tenure he confronted gangsters, Nazis and Communists. Later, Hoover ordered illegal surveillance against suspected enemies of the state and political opponents.”
“Hoover also used COINTELPRO’s operations to conduct his own personal vendettas against political adversaries in the name of national security.”
“ . . . Using illegal wiretaps and warrantless searches, . .”
“In 1971, COINTELPRO’s tactics were revealed to the public, showing that the agency’s methods included infiltration, burglaries, illegal wiretaps, planted evidence and false rumors leaked on suspected groups and individuals.”
https://www.biography.com/law-figure/j-edgar-hoover
I don’t know how our country recovers from all the damage done.
I don’t know about you, but not only I have no faith in our legal system but I look at it with complete disgust. It’s dirty, corrupt, tyrannical. A little less bad/unfair than China’s.
Our agencies are rotten. Zero credibility.
They lied to us about WMD and destroyed Iraq and slaughtered thousands of people based on fake intel. Never apologized.
If I make a list of all the corruption and crimes… it’s endless. I wish I could say the opposite but, be a realist and look at the last 20 years. It’s FUBAR.
Snowden was right, I didn’t see it at first but after the spygate… He is a hero, I see what he was trying to show us. He left the country, VERY smart, he would have had zero chance in injustice system, they would have killed him.
Knowing what I know now our agencies are basically a country within our country. They have a separate set of laws, their own secret judges, secret everything, and don’t follow the constitution. Hillary is a perfect example.
https://twitter.com/JesseKellyDC/status/1304175789835980800
I have never seen justice our of the agencies before, go back as far as you want to, Iraq war, Benghazi, IRS… It’s the same theater, they act like there’s a serious investigation, they sound so tough on TV, get us some intense sound bites, we get some leaks, they feed us hope and then… oopsie. Nothing really, let’s move on shall we?
It’s just how all swamp investigations end.
Ask Hillary and Weinner…
Barr is navigating through what we already know so he can keep pretending to be investigating.
He may give us more crumbs. More declassified documents that should have never been classified in first place. But will do.
I will gladly vote for Trump, and I will plug my nose and vote straight ticked Republican.
But after Trump leaves I have no interest and keeping voting for RINOs so they can turn around and act like Democrats. Y’all can do what you want. I’m out! After Trump leaves I will leave.
Corruption is bad votes really don’t matter when you choosing between insiders.
Rubio or Bush… I choose my azz at home, no vote.
By the way, certain government agencies who give out government iPhones currently force users to have a biometric – – thumb print or face scan – – passcode rather than a manual one. Isn’t that interesting given the excuse of multiple failed passcodes.
At about 4:10 into this interview, Sidney Powell suggests that the Inspector General WAS ALERTED to the cellphone-erasing upcoming issue in 2019, prior to the end of the Mueller probe.
She doesn’t say that the IG neglected to respond to HER request, although that’s a possibility.
But she reports that the IG (Horowitz?), failed to seize the phones, before their contents were eventually deleted.
She blames the IG for their lack of action.
Is that true? Can someone ASK the Inspector General? Sounds like a fire-able lack of judgment to me.
If not now, then hopefully after the election.
What’s HIS explanation for what looks (at best) like incompetence?
Is it possible these iPhones (or other mobile device) evaded collection by NSA and that’s why they needed to be locally erased? Were these iPhones somehow encrypted to evade NSA collection? Same question of Hillary’s Blackberry. Learn why Blackberries Matter
Remember when some FBI phones were erased a couple years ago and it turned out they could be recovered because they are backed by IT? Wouldn’t you think sensitive DoJ phones would backed up constantly with multi images stored off site in a secure location along with call and text history? Heck they might even have cloned phones for quick replacement if lost or broken. Especially with the amount of money they spent.
Re those erased phones
“The top echelon of the FBI has been completely captured by organized crime. Change my mind. ”
https://www.smalldeadanimals.com/index.php/2020/09/11/when-the-fbi-does-it-that-means-that-its-not-illegal-171/
Sydney Powell your outstanding, along with Fitton, Solomon, Carter, Sundance, Bongino, and a few House members.
But your all missing one important point(except Fitton). Mueller and his wife are best friends with the current AG and his wife. It was a set up from the beginning to allow Wray to conceal, reclassify, and now destroy evidence while Barr-zini put restrictions on Durham to enable him to run out the clock. Senator Graham was promoted to head the Judiciary Committee which gave him control to call witnesses thus securing Barr-zini’s and Deep State Flank.
“Wray is a pimp. He could never have outfought Trump. But what I did not know until this day it was Barr-zini all along. “
Does the term “end of summer” include “indian summer”?
Does the term “Barr include “indian giver”?
Does the term “end of summer” include “indian summer”?
Does the term “Barr include “indian giver”?
When I finished reading this article, I was redisgusted with the corruption of the previous administration. I thought/hoped the truth must prevail. I thought a new day must come, then remembered thiS song:
https://youtu.be/-zRAUH8yBcQ
And Bill Barr does NOTHING !!!
Sorry, didn’t check to see if song could be shared. The song is “City of God.” Lyrics:
A new day is dawning for all those who weep.
The people in darkness have seen a great light.
The Lord of our longing has conquered the night.
Let us build the city of God.
May our tears be turned into dancing!
For the Lord, our light and our love,
Has turned the night into day!
The One who has loved us has brightened our way.
The Lord of all kindness has called us to be
A light for his people to set their hearts free.
I don’t understand how destroying hardware is an issue. Certainly, the government doesn’t rely on phones to store government emails. Even with my phone, if it gets lost, I can destroy all data, buy a new phone, and restore the old information to it. The hardware is unimportant. If government phones don’t work this way, Houston, we have a problem.
Willing to bet we have this problem!
Need Motivation To “Sack-Up” And Stay In This Fight? Put That Picture Of Norm Eisen Grinning Like A Moldy “Jack-O-Lantern” On Your Refrigerator Door. That’s Enough For Me To Send William Aldenberg An Email… I’m Not Throwing In The Towel And Neither Should Any Of You!
That misinterpreted data from a FISA-702 “about query” is then piped to Steele and turns up inside the dossier; it was the wrong Michael Cohen. It wasn’t Trump’s lawyer, it was an art dealer from New York City with the same name; the same “identifier”.
This has to be a different source than the original “outside contractors”.
Unless Mike Rogers shutting down the contractor access on APRIL 18, 2016 didn’t actually shut it down.
The Steele Dossier claims:
“clandestine meeting/s between Republican presidential candidate, DONALD TRUMP’s lawyer Micheal COHEN and Kremlin representatives in August 2016,,,,in Prague”
(Report 136, Oct 20, 2016)
Report 166, December 13, 2016 gives slightly different data range;
“Trump’s representative COHEN accompanied to Prague in August/September 2016 by 3 colleagues for secret discussions with Kremlin representatives and associated operators/hackers”
August/September 2016 are obviously after April 18, 2016.