The ongoing surveillance of Donald Trump continues to generate a need for the U.S. Intelligence Community (USIC) to attribute foreign adversaries to the origin. However, substantively we all know the surveillance itself is coming from inside the house.
In the latest development, the New York Times is reporting from their sources “familiar with the matter,” that communication systems within President Trump’s family have been corrupted by “China-linked hackers.” Before outlining the who’s, what’s and transparently predictable “why’s” of the story, let us first outline what the USIC is leaking to the New York Times.
Remember as you read this, each surveillance system -the origin of the spyware- tells us a lot about what methods are being deployed as a justification for surveillance that we know has been ongoing for a long time. Notice this “hacking” system is attributed to “Phones used by Jared Kushner and Eric Trump.” When you see ‘phones‘, think ‘Pegasus.’
New York Times – Members of former President Donald J. Trump’s family, as well as Biden administration and State Department officials, were among those targeted by the China-linked hackers who were able to break into telecommunications company systems, according to people familiar with the matter.
The sophisticated hacking operation has alarmed national security officials and appears to have targeted a substantial but focused list of people whose communications would be of interest to the Chinese government. The list of known targets is currently fewer than 100 individuals, these people said, speaking on condition of anonymity to describe a sensitive ongoing investigation.
So far, the list of targeted phones includes devices used by high-profile people, including Mr. Trump, his son Eric Trump and his son-in-law Jared Kushner. (read more)
Time is of the essence, so let’s cut to the chase.
The Biden attribution to the same ‘hacking’, is a disposable narrative useful only insofar as the USIC needs to project an air of bipartisanship to the underlying narrative. Yes, the USIC monitors the Bidens just like they do every other entity of influence in/around government. However, Biden is irrelevant in this one.
When you see the methods being stated by the USIC to the New York Times as “phones,” we can immediately understand the tools of the spyware they are deflecting toward is the Pegasus system developed by Israeli intelligence contractor NSO. As the Guardian noted in 2021, ” [NSO] sells surveillance technology to governments worldwide. Its flagship product is Pegasus, spying software – or spyware – that targets iPhones and Android devices. Once a phone is infected, a Pegasus operator can secretly extract chats, photos, emails and location data, or activate microphones and cameras without a user knowing.”
Due to the nature of the product they sell, NSO works with the Israeli government to vet the purchaser of the spyware they sell.
The Pegasus’ cell phone surveillance technology is a tool for governments who cannot build out the technology on their own, and they do not have access to the NSA database. Pegasus is marketed as an alternative to data collection that allows the government agency to specifically target individual cell phones and spy on what that phone is doing.
That’s the surface system that the USIC is selling as part of their operational narrative. However, how does that attribution connect to “China-Linked Hackers”? This is where we must always visit prior research.
After the Pegasus revelations were made, it was identified that the actual code that created the malware behind Pegasus was not, in actuality, code generated from within the network of the Israeli company that sells the software/spyware. There was a very strong indication the actual spyware was created by the Chinese. Israel was selling a cell phone communication surveillance system, created in part by coding from China, discovered by noticing Chinese fingerprints in the spyware code itself.
The motives and intentions for Israeli intelligence are always what they are. Israeli intelligence operates on the backbone of multiple SIGNIT (signal intel) and HUMIT (human intel) networks. Israel doesn’t care what the sourcing of the surveillance spyware is; it’s more important to them to have access to the surveillance end product. I digress.
However, we go back to the aspect of how the story originates, from the USIC to the New York Times. Now we see that it is important for the USIC to promote a very specific leak that Chinese affiliated systems are monitoring President Trump’s family phones. Why would the USIC want to make that assertion public? Because the assertion itself is a distraction, a justification, a smokescreen per se’ that will cover their sourcing of any information that comes as an outcome of the surveillance.
The USIC is conducting the surveillance using the same metadata capabilities they always have. However, if something useful needs to be exploited, they need an attribution that is disconnected from them. The USIC need plausible deniability to exploit the surveillance. The USIC tells the New York Times that China-linked systems are doing the surveillance.
If you were to believe that the USIC stopped exploiting the NSA database to conduct surveillance of Trump, you would have to believe with the stakes even higher than 2016 they somehow, magnanimously, decided not to exploit the system they used in 2015 and 2016. Put another way, we would have to be stubbornly stupid to think the USIC stopped conducting surveillance on Donald Trump.
This motive of false attribution by the USIC toward China becomes increasingly important when you realize President Trump and his transition team have decided to stay away from the U.S. Government partnership therein. If a leak of information from within the transition is needed to stimulate a narrative, that leak must have some other plausible method of origin, or it becomes obvious the USIC is monitoring Trump despite his team staying private and outside govt.
When you accept the NSA database of electronic metadata is being exploited by the USIC, the same process they used in 2016, then you accept some method of plausible deniability is needed, especially if President Trump stays disconnected from official USG involvement until much closer to his inauguration. Hence, the USIC telling the New York Times the Chinese did it.
Just because Eric and Lara Trump are getting their automobile gas tanks filled from alternate or random gas stations, doesn’t mean the GPS tracking in their car’s satellite radio stops working.
The bottom line for the Trump network is to understand the U.S. Intelligence Apparatus, writ large, is currently conducting electronic surveillance of their operations, including the operations of the transition team. This is NOT going to stop, even after Donald Trump becomes President-elect.
Thus, the importance of the “Emissary.”
The Washington DC Intelligence Community (IC) actively work to isolate the office of the president. This is an almost impossible dynamic to avoid, caused by an entrenched and ideological adversary who has dug themselves deep into the apparatus of government.
The “emissary” is the person who carries the word of President Trump to any person identified by President Trump. The emissary is very much like a tape recording of President Trump in human form. The emissary travels to a location, meets a particular person or group, and then recites the opinion of the President. The words spoken by the emissary, are the words of President Trump.
The IC cannot inject themselves into this dynamic; that is why this position is so valuable.
The emissary then hears the response from the intended person or group, repeats it back to them to ensure he/she will return with clarity of intent as expressed, and then returns to the office of the presidency and repeats the reply for the President. The emissary recites back exactly what he was /is told.
This process is critical when you understand how thoroughly compromised the full Executive Branch is. More importantly, this process becomes even more critical when you accept the Intelligence Community will lie to the office of the President to retain their position.
Read this next sentence slowly…. If the Senate confirms a director of an IC silo, then that director is demonstrably going to lie to the office of the President.
The Senate only confirms Intelligence Community leadership who are willing to LIE to THE PRESIDENT. This is just a factual reality.
If the Senate Select Committee on Intelligence (SSCI) confirms them, they will lie. That is the main role of the SSCI.
The people who constructed the Silos then metastasized the control rot within them, use the term “continuity of government,” to describe the true role and responsibility of the system. This is not factually wrong.
Where people go wrong is misunderstanding what the “continuity” is that is being maintained. Truly, the continuity of government is the priority. However, it’s the continuity of currently corrupt and immoral government we are now maintaining.
The CIA Director will lie to President Trump (they did, remember). The FBI Leadership will lie to President Trump (they did, remember). The AG will lie, the DNI will lie, the NSA will lie, and all the deputies therein will lie.
Washington DC puts it this way, you probably heard Bill Barr talking about ad-infinitum. The IC leadership is responsible for maintaining the “continuity of government” at all costs. The government is more important than The President.
If the continuity of government is maintained by lying to the office of the President, then so be it. Or, as James Comey said when justifying his lies to the President and his manipulation on March 20th, 2017: “because of the sensitivity of the matter.”
You can get as angry as you want about this, it’s just the DC system that exists. We must deal with what exists, not what we would pretend there is.
If a candidate for an IC position is not willing to lie to the President, the Senate will not confirm him/her. This is why President Trump needs an emissary.
The role of the emissary is critical, the qualifications for that role are extremely important.
Remember, this person is speaking on behalf of President Trump. And representing the responding voice with a similar level of clarity.
The emissary must be of incredible moral character. They must be honest. The person should be entirely altruistic. They must have exceptional judgement, possess no ego, be impervious to scrutiny or review. They must maintain themselves at the highest moral standards at all times and exhibit incredible judgement and wisdom.
Due to the nature of the position the emissary is extremely powerful; therefore, a disposition of humility is also critical. The President must be able to trust this person without reservation or issue. At the same time, the entire weight of the U.S. Intelligence Community apparatus will seek to compromise the emissary as they try to put walls around the President who holds silo-busting power.
Honesty, integrity, humility, trustworthiness, unimpeachable character and exceptional judgement, establish the baseline of traits the emissary must possess.
This is a choice that will be deeply important to President Trump. Fortunately, it is not a position that requires any confirmation or external approval. Judgement, discernment, wisdom and silence are the strength characteristics.


If the IC can and will lie to the POTUS and be hostile, then to “protect the continuity of government” they must believe the government they are protecting has no need for a POTUS! Isn’t that kind of government exactly what we had under Biden and likely to have had under Harris? One controlled by a hidden and reclusive “Royalty”, protected by a Propoganda Dept and a black-mailed Kongress!
What I find infuriating about all this and yes I understanding it is all part of the system of lies.
However the one characteristic all high functioning persons specifically those charge with great responsibilities find thoroughly inexcusable is those that willfully withhold information.
So with that said, “Was the President informed of the potential that his and those around him that their phones may have been compromised?”
Outside of any other motives and rationale not to tell the President. It is a very weak argument to hide behind National Security on this simple observation.
Since the premise is built into the fears inherent to the compromise.
And mission number one was to put a stop to the compromise on first knowledge.
No matter who’s phone were suspected of this type of compromise
Not doing so at best means a calculous/incompetent disregard and at worst malicious intentions.
What is the worst of the worst implications is, “What if there was no compromise just the say so of the leak.”
Go figure.
I am sure that is entirely the point of the Six Ways to Sunday crowd.
And once again, in the Civilian World. Issues like this, withholding information is H.R. defined as Just Cause For Dismissal.
Just try making an CYA argument of not informing a surgeon a patient’s current blood pressure is a risk factor. See how far that gets you arguing, “You were afraid if the risk factor was known to the doctor the procedure could not proceed.”
In other Deep State tech news….
Remember when the Internet Archive aka Way Back Machine was “down” a couple weeks ago?
They Are Scrubbing the Internet Right Now
https://brownstone.org/articles/they-are-scrubbing-the-internet-right-now/
“They Are Scrubbing the Internet Right Now”
Some believe that one of the goals of the [plandemic+shots] program was to observe how the masses responded, to adjust the Plan for the next stages of tightening the screws of tyranny.
The Wayback Machine illuminated* the CDC capriciously changing the official definition of “vaccine” to accommodate the non-vaccine shots, right before the unlawful biden shot mandates in September 2021. No doubt this public information archiving was noted by the tyrants along with other mechanisms opposing tyranny, targeted for “adjustment”.
It seems the “adjustments” are underway. Brave New World + 1984, with a twist. Some suggest that everything being done by the US Bloc governments centered on the Five Eyes core is combining to sink the Bloc into totalitarian vassal state under the coming “multi-polar global governance”.
*The CDC quietly changed their vaccine definition on Sept 2, 2021, with no public explanation.
Sept 1 long-standing definition:
https://web.archive.org/web/20210901163633/https://www.cdc.gov/vaccines/vac-gen/imz-basics.htm
Sept 2 revised definition:
https://web.archive.org/web/20210902194040/https://www.cdc.gov/vaccines/vac-gen/imz-basics.htm
One week later, Sept 9, biden announced the unlawful shot mandates.
Sundance you are an amazing Patriot. I am going to nick name you Paul as in Reveer. Some day the History books will acknowledge the scope of intel you brought to the masses that we could understand the IC. God has given you an amazing talent and Heart to help your bretheren. God Bless. Please all readers Pray for Sundance and his family.
We need just one senator, ONE, to put the Senate in recess.
I doubt that the code was written by anyone in chyyyy-na. I read an article a while back about how most college students that cheat are chyyyynese. They have to cheat because they have no imagination, they can’t invent anything, they have no original thought. I could probably find the article again.
The article used an example of, Boeing I think, having wings manufactured in chyyyyna. The chyyynese would copy the technology and start building wings to sell to other companies and countries.
That someone found evidence of chyyynese code is not surprising because any code can be inserted into any software during development.
Especially when you want someone else’s fingerprints on your work.
I’m happy you are writing articles of this caliber and exposing the IC, how and why they operate.
Also, I noticed you left the possible or preferred Emissary’s name outta this expose’.
I am very happy about that.
After all, why show your cards to your opposition?
I trust President Trump and those very few confidantes to know the score and the mission.
THE FOCUS IS STILL GETTING ELECTED – ITS NOT IN THE BAG!!
THERE IS CHICANERY EVERYWHERE. STAY FOCUSED. Nevertheless…
Does President Trump still have a SCIF – Sensitive Compartmented Information Facility – at Mar-a-lago?
Musk needs one or two, as well.
Don’t forget, RFK Jr. Is a life-long Democrat. So are Ivanka and Jared. And there is another clanish subset within DC that cuts across both sides replete with powerful players. Don’t forget the spouses – Nellie Ohr, Peter Strok’s wife, etc.
DON’T FORGET – when Trump first became President he talked about finding “gold in the walls” – and some speculated that Obama’s team bugged the WH during their exit. The Trump WH was hammered with unending leaks until a down-to-the-studs remodeling occurred.
I’D SERIOUSLY ADVISE holding key meetings offsite – at Trump’s New Jersey country club? Add a SCIF.
ANOTHER GUESS – President’s now have confirmed powerful rights.
My guess is DC is paranoid about possible significant PT 2.0 moves. Would he eliminate a whole department? Axe 10,000 IRS agents? How about the 3,000 – 6,000 Obama appointees to be replaced?
GO ON OFFENSE. Obama and his ilk made PT and his supporters life hell. Can an outside group(s) go to war to preoccupy some of the evil Left?
So much to consider.
Soooo…..
Does “THE ONE” still have any significant power of control ?
We are about to find out………
Sundance / Treepers – which Intell Communities leak to the NY Slimes?
Thanks in advance.
“Please always remember. CNN = State Dept. WaPo = CIA. NYT = DOJ/FBI/DNI. This constant will never change.” Sundance
Sundance, I like the emissary idea and I’d like to add to it. The President can make recess appointments, although if the Senate denies confirmation, the Treasury may not have to pay them, but there may be some unsettled Presidential appointment power to get around the permanent appointment rules.
https://crsreports.congress.gov/product/pdf/RS/RS21308
In other words, I agree that anyone the Senate confirms is compromised but the President can still appoint someone to fill a vacancy created when Trump fires everyone immediately upon taking office. No more Sally Yates types. Just fire them all immediately and appoint people immediately. Make the Senate go through their process, of course, but keep appointing trusted people that understand the reform plans. And if they can’t get through confirmation for one job, appoint them to another meaningful job and tell the Senate to confirm the President’s choices. The President has a right to the people he wants unless there is some moral turpitude issue.
Have a dozen or so people that can afford to fill an important vacancy without pay so that reform work can begin immediately. It will drive the bureaucracy nuts but think about how many people can be introduced to the private sector in the meantime. And begin the work to document the who, what, when, and where details necessary to hold the former bureaucrats accountable, if not in law, then in publishing their deeds publicly for all to see. And if the bureaucracy refuses to follow orders, shut down the whole department so civil service rules will not apply.
Also fire every US Attorney like Clinton did. Day one
Elon & other “tech bros” are emissaries.
Do you think the “creators” aren’t better suited than our IC?
Team Trump is tightly wrapped – believe that!!!
Also: depending on how much a person is tapped into many “team Trump” approved accounts – watch closely & you’ll notice big time US military support to SS.
Also Also: regarding the Senate – listen to President Trump when he calls out who is with him at a particular rally.
For the hardcore: which recent rally did the Wyoming senator attend? Isn’t he one of the John’s in the running for Senate leader?
Dan Scavino.
Trump needs to call Musk, and ask him to immediately set up secure Starlink coms for his campaign and family. He can’t trust anyone else domestically, particularly anyone associated with the US government.
Musk can fix this with encrypted coms immediately.
The Emissary: “The IC cannot inject themselves into this dynamic; that is why this position is so valuable.”
Why not???
Why not more than one emissary?
We will miss our Emissary Sundance.
I cannot think of another human being who ticks all the above boxes better than our honourable host.