The ongoing surveillance of Donald Trump continues to generate a need for the U.S. Intelligence Community (USIC) to attribute foreign adversaries to the origin. However, substantively we all know the surveillance itself is coming from inside the house.
In the latest development, the New York Times is reporting from their sources “familiar with the matter,” that communication systems within President Trump’s family have been corrupted by “China-linked hackers.” Before outlining the who’s, what’s and transparently predictable “why’s” of the story, let us first outline what the USIC is leaking to the New York Times.
Remember as you read this, each surveillance system -the origin of the spyware- tells us a lot about what methods are being deployed as a justification for surveillance that we know has been ongoing for a long time. Notice this “hacking” system is attributed to “Phones used by Jared Kushner and Eric Trump.” When you see ‘phones‘, think ‘Pegasus.’
New York Times – Members of former President Donald J. Trump’s family, as well as Biden administration and State Department officials, were among those targeted by the China-linked hackers who were able to break into telecommunications company systems, according to people familiar with the matter.
The sophisticated hacking operation has alarmed national security officials and appears to have targeted a substantial but focused list of people whose communications would be of interest to the Chinese government. The list of known targets is currently fewer than 100 individuals, these people said, speaking on condition of anonymity to describe a sensitive ongoing investigation.
So far, the list of targeted phones includes devices used by high-profile people, including Mr. Trump, his son Eric Trump and his son-in-law Jared Kushner. (read more)
Time is of the essence, so let’s cut to the chase.
The Biden attribution to the same ‘hacking’, is a disposable narrative useful only insofar as the USIC needs to project an air of bipartisanship to the underlying narrative. Yes, the USIC monitors the Bidens just like they do every other entity of influence in/around government. However, Biden is irrelevant in this one.
When you see the methods being stated by the USIC to the New York Times as “phones,” we can immediately understand the tools of the spyware they are deflecting toward is the Pegasus system developed by Israeli intelligence contractor NSO. As the Guardian noted in 2021, ” [NSO] sells surveillance technology to governments worldwide. Its flagship product is Pegasus, spying software – or spyware – that targets iPhones and Android devices. Once a phone is infected, a Pegasus operator can secretly extract chats, photos, emails and location data, or activate microphones and cameras without a user knowing.”
Due to the nature of the product they sell, NSO works with the Israeli government to vet the purchaser of the spyware they sell.
The Pegasus’ cell phone surveillance technology is a tool for governments who cannot build out the technology on their own, and they do not have access to the NSA database. Pegasus is marketed as an alternative to data collection that allows the government agency to specifically target individual cell phones and spy on what that phone is doing.
That’s the surface system that the USIC is selling as part of their operational narrative. However, how does that attribution connect to “China-Linked Hackers”? This is where we must always visit prior research.
After the Pegasus revelations were made, it was identified that the actual code that created the malware behind Pegasus was not, in actuality, code generated from within the network of the Israeli company that sells the software/spyware. There was a very strong indication the actual spyware was created by the Chinese. Israel was selling a cell phone communication surveillance system, created in part by coding from China, discovered by noticing Chinese fingerprints in the spyware code itself.
The motives and intentions for Israeli intelligence are always what they are. Israeli intelligence operates on the backbone of multiple SIGNIT (signal intel) and HUMIT (human intel) networks. Israel doesn’t care what the sourcing of the surveillance spyware is; it’s more important to them to have access to the surveillance end product. I digress.
However, we go back to the aspect of how the story originates, from the USIC to the New York Times. Now we see that it is important for the USIC to promote a very specific leak that Chinese affiliated systems are monitoring President Trump’s family phones. Why would the USIC want to make that assertion public? Because the assertion itself is a distraction, a justification, a smokescreen per se’ that will cover their sourcing of any information that comes as an outcome of the surveillance.
The USIC is conducting the surveillance using the same metadata capabilities they always have. However, if something useful needs to be exploited, they need an attribution that is disconnected from them. The USIC need plausible deniability to exploit the surveillance. The USIC tells the New York Times that China-linked systems are doing the surveillance.
If you were to believe that the USIC stopped exploiting the NSA database to conduct surveillance of Trump, you would have to believe with the stakes even higher than 2016 they somehow, magnanimously, decided not to exploit the system they used in 2015 and 2016. Put another way, we would have to be stubbornly stupid to think the USIC stopped conducting surveillance on Donald Trump.
This motive of false attribution by the USIC toward China becomes increasingly important when you realize President Trump and his transition team have decided to stay away from the U.S. Government partnership therein. If a leak of information from within the transition is needed to stimulate a narrative, that leak must have some other plausible method of origin, or it becomes obvious the USIC is monitoring Trump despite his team staying private and outside govt.
When you accept the NSA database of electronic metadata is being exploited by the USIC, the same process they used in 2016, then you accept some method of plausible deniability is needed, especially if President Trump stays disconnected from official USG involvement until much closer to his inauguration. Hence, the USIC telling the New York Times the Chinese did it.
Just because Eric and Lara Trump are getting their automobile gas tanks filled from alternate or random gas stations, doesn’t mean the GPS tracking in their car’s satellite radio stops working.
The bottom line for the Trump network is to understand the U.S. Intelligence Apparatus, writ large, is currently conducting electronic surveillance of their operations, including the operations of the transition team. This is NOT going to stop, even after Donald Trump becomes President-elect.
Thus, the importance of the “Emissary.”
The Washington DC Intelligence Community (IC) actively work to isolate the office of the president. This is an almost impossible dynamic to avoid, caused by an entrenched and ideological adversary who has dug themselves deep into the apparatus of government.
The “emissary” is the person who carries the word of President Trump to any person identified by President Trump. The emissary is very much like a tape recording of President Trump in human form. The emissary travels to a location, meets a particular person or group, and then recites the opinion of the President. The words spoken by the emissary, are the words of President Trump.
The IC cannot inject themselves into this dynamic; that is why this position is so valuable.
The emissary then hears the response from the intended person or group, repeats it back to them to ensure he/she will return with clarity of intent as expressed, and then returns to the office of the presidency and repeats the reply for the President. The emissary recites back exactly what he was /is told.
This process is critical when you understand how thoroughly compromised the full Executive Branch is. More importantly, this process becomes even more critical when you accept the Intelligence Community will lie to the office of the President to retain their position.
Read this next sentence slowly…. If the Senate confirms a director of an IC silo, then that director is demonstrably going to lie to the office of the President.
The Senate only confirms Intelligence Community leadership who are willing to LIE to THE PRESIDENT. This is just a factual reality.
If the Senate Select Committee on Intelligence (SSCI) confirms them, they will lie. That is the main role of the SSCI.
The people who constructed the Silos then metastasized the control rot within them, use the term “continuity of government,” to describe the true role and responsibility of the system. This is not factually wrong.
Where people go wrong is misunderstanding what the “continuity” is that is being maintained. Truly, the continuity of government is the priority. However, it’s the continuity of currently corrupt and immoral government we are now maintaining.
The CIA Director will lie to President Trump (they did, remember). The FBI Leadership will lie to President Trump (they did, remember). The AG will lie, the DNI will lie, the NSA will lie, and all the deputies therein will lie.
Washington DC puts it this way, you probably heard Bill Barr talking about ad-infinitum. The IC leadership is responsible for maintaining the “continuity of government” at all costs. The government is more important than The President.
If the continuity of government is maintained by lying to the office of the President, then so be it. Or, as James Comey said when justifying his lies to the President and his manipulation on March 20th, 2017: “because of the sensitivity of the matter.”
You can get as angry as you want about this, it’s just the DC system that exists. We must deal with what exists, not what we would pretend there is.
If a candidate for an IC position is not willing to lie to the President, the Senate will not confirm him/her. This is why President Trump needs an emissary.
The role of the emissary is critical, the qualifications for that role are extremely important.
Remember, this person is speaking on behalf of President Trump. And representing the responding voice with a similar level of clarity.
The emissary must be of incredible moral character. They must be honest. The person should be entirely altruistic. They must have exceptional judgement, possess no ego, be impervious to scrutiny or review. They must maintain themselves at the highest moral standards at all times and exhibit incredible judgement and wisdom.
Due to the nature of the position the emissary is extremely powerful; therefore, a disposition of humility is also critical. The President must be able to trust this person without reservation or issue. At the same time, the entire weight of the U.S. Intelligence Community apparatus will seek to compromise the emissary as they try to put walls around the President who holds silo-busting power.
Honesty, integrity, humility, trustworthiness, unimpeachable character and exceptional judgement, establish the baseline of traits the emissary must possess.
This is a choice that will be deeply important to President Trump. Fortunately, it is not a position that requires any confirmation or external approval. Judgement, discernment, wisdom and silence are the strength characteristics.


hacking 100% deep state and their in house chinese comrades…..
Are phones that use the Starlink system hackable?
Yes to the Chinese comrades among the “elites”
“EXCLUSIVE: GOP Lawmakers Urge Biden Admin To Investigate Dem Rep With Deep China Ties”
https://dailycaller.com/2024/10/30/exclusive-gop-lawmakers-urge-biden-admin-to-investigate-dem-rep-with-deep-china-ties/
There is also this one.
“Chinese National Charged With Illegally Voting in Crucial Swing State; Will His Ballot Count?”
https://redstate.com/rusty-weiss/2024/10/30/non-citizen-charged-with-illegally-voting-in-crucial-swing-state-his-ballot-is-still-going-to-count-n2181311
MSNBC is absolutely outraged that the Chinese hacked and surveilled Trumps phones…..Not!
They are going after BRICS countries, and still going after Trump!
The grandmother I never wanted
So….the USIC telling us that China is responsible for hacking Trump’s phone is sort of like me telling my teacher that the dog ate my homework?
Every bit as plausible. Every bit as believable………..
Exactly.
I wonder if the IC did advisory calls to Tim Walz, Joe Biden or Mark Milley just to make sure no feathers were ruffled.
The IC called them, but they were all on the phone with Beijing.
Hunter was just calling to say, “I’m sitting next to my father”. That’s all, nothing to worry about!
Oh how I wish those two would be prosecuted!
Probably not. No need to. I don’t think those three know enough to be bothered with participating in the conversation.
Dogs don;t eat paper unless you plaster some peanut butter on it.
I know from experience.
Problem is tomorrow the “let’s tend to your chores” routine becomes academic.
Wrong. My dog ate my electric bill in Italy that was slipped under the door.
My dogs thinks toilet paper 🧻 is a delicacy…
The government can leave the DNA of whoever they wish to blame
Yep. Old ruse: program and comment in local dialects/idioms. US has been doing it for decades.
Since China currently runs the White House, guess it’s fair to blame them for everything that the current occupants are up to.
For sure
IMO Too many so called Americans are helping communist China every day.
https://www.theautopian.com/ford-ceo-admits-hes-been-driving-a-chinese-electric-sports-car-for-six-months/
Israel runs the WH.
THE BLOB runs two of three branches. Watch Mike Benz’s detailed proof in interviews.
Israel has some influence, but they are far from running the show. They are, however, a leading customer of our Military Industrial Complex’s war machine. It does hamper their clout a bit when we consider all those war purchases made with money we’ve sent them. Think of Israel as the MIC’s Money Laundromat of the Middle East. The current Ukrainian business model is fashioned after the Israeli’s.
Build
BackBombs Better!!resolute: US military funding for Israel never leaves the US. The funds are spent in the US on US-made weapons. Some of those funds end up in the pockets of DC politicians. That’s how the aid program is designed.
But it’s money borrowed, and not spent on Americans.
I call it a circular tax. We give $3.8B in foreign aid; they keep 1/4 as their cut, and launder back the remainder as politcal donations (or stock plays, boosting the politicals’ own ‘privately managed portfolios’). We are taxed to pay for our own political capture!
Note, this applies to all ‘foreign aid’, the politicals are in the business of putting out “for sale” signs to all prospective buyers, sovereign or corporate.
Note that China is most especially prominent in this game.
I really, really like Maquis’ term below, “Yellow-washing”.
Ukraine and Israel are tied at the hip. The Ukrainian business model is the Israeli business model because it is altogether one enterprise.
Far more than just the WH:
Stealth War: How China Took Over While America’s Elite Slept – 2019 [they weren’t “sleeping”; the mountains of cash to be made blocked their vision – W]
Red-Handed: How American Elites Get Rich Helping China Win Hardcover – 2022
Through Blackrock, mind you.
Sundance for Emissary.
Exactly
Hear Here! 🙏🏽❤️
My very first reaction as well.
Translated…
China-hacked
Russia-hacked &
Iran-hacked
…are all “code” for CIA and FBI-hacked. They can’t possibly believe that we’re stupid enough to believe their bullshit after the past six years?
I don’t think most conservatives even know this. The average Democrat voter does not either. I would not understand it at all except for Sundance. I assumed that the spying continued post presidency but did not understand the interplay btwn all the IC agencies and the Senate. This is the only place I see it discussed in depth.
“This is the only place I see it discussed in depth.”
More than a discussion. Thanks to Sundance, this is the only place where we maintain an informed discussion based on facts. The democrat base, and many others, are merely parroting whatever they hear from their government approved three letter news agencies.
I don’t think they really care if WE know or not. Remember when those 51 IC Officers ALL said Hunter’s Laptop From Hell was Russian (Dis)information?
Why would they care? Not a one suffered any consequences.
Very true and that has to change!
Tell me, who found the monitoring, and why disclose the discovery, if the USIC would desire to continue to monitor Trump? China, USIC would want to remain undetected, correct?
They must acknowledge the “source” of the “hacking” in order to use anything they acquire or make up.
They then leak it to their selected mouthpieces.
Real or not, first they tell us about it, then they tell us what it’s all about.
The US IC is deflecting it to China to take the eye off of themselves.
Yellow-washing their surveillance to disguise their fingerprints as they weaponize it.
They have their ‘best people’ on it. Ending scene in warehouse from Raiders of the Lost Arc
The whole damn government is booby trapped to set up and take down the sitting president at any given moment. This is how it’s been for how long? Since Eisenhower? JFK?
Since Eisenhower. And up until Trump he was the most dangerous to the IC. He knew them, understood their ways, and had the foresight to warn us about them, as best he could at the time. Having worked along side them, he understood how dangerous they needed to be. That was all well and good when that power was needed to win the most perilous war we had seen to date. Unfortunately, I don’t think Eisenhower anticipated, or could anticipate, just how powerful, and corrupt the military industrial complex, and the intelligence apparatus that controls it, would become.
It was never well and good. The war was never well and good.
Not ‘become’. Already were.
All of it a trap, a massive, inhuman trap.
So that Something could manifest in the world, to take the domain it felt belonged to it.
Eisenhower. Remember what the oil cartel and three letter did to those yankee boys coming after their oil depletion tax of 27%. Among other things.
Links in the chain of Chinese hackers include:
Iran, Iran, Iran
becomes
China, China, China
^^^^^^^^^^^^^^^
Look here, squirrels!!!!
All the while Pegasus<< (NSO) (I referred to very recently), an Israeli front for their IC!! 👀
Guess who took money from Pegasus before becoming and outed as NSA (national security advisor)?????
FLYNN
Inthoight Inremembered that it was Turkey that Flynn took money from or had a FARA issue with Turkey…Also Pegasus?
I thought I remembered…
Yes, he did take money from Turkey. But that is the only one that was reported by MSM.
They only wanted that one to get the limelight.
Use Wiki and look up NSO Group payments to Flynn.
Barely covered but it’s out there. 😉
NSO Group is or was filled with former Unit 8200 members.
Wilco, BK. Thanks.
Some may think Lin Wood is a nutty fella
but he has been onto Mr. Flynn.
Yes he has, and so as BK. 😉
Trump needs a mole in the IC…. several of them. After all of the stuff he has gone through, he needs to be 110% they are no longer subverting the elected government as they CLEARLY are now.
Don’t worry! Mike Pompeo has got President Trump’s back!!! LOL
It’s kinda funny that the ‘intel’ community couldn’t figure out that DiFi had a Chinese driver for years, Adam Skipped any Brains was banging a Chinese spy named Fang Bang, Tampon Timmy was a regular guest of the CCP, they openly own Joe Biden and his cocaine-snorting son, the Clintons sold missile guidance technology to China, and Mitch the *itch has been feeding them info for decades through his Chinese wife. Still, they claim they can tie about anything to President Trump and his family. You really can’t make this kind of stuff up!!
Almost the entirety of the California political class
poisoning DC and all of US are controlled by chop stick
wielding marionettes. That of course includes Gov.
hair gel.
They never let us forget that they are expert at PROJECTION.
They knew
President Trump gets elected.
President Trump issues tariffs.
President Trump accused of using tariffs as “revenge” against China for hacking.
God bless you SD.
Maybe Elon can assist in keeping the transition team communications private?
This is something Oracle can certainly take care of .
Is PDJT using an emissary?
I fear the IC is all in on stopping Trump. How that comes about, I don’t know. Demonic assets are capable of anything. Jesus must kick in!
I can see their PR release now NSO/MOSSAD –
“Pegasus for I-Phone 15 now available! It’s like PROMIS but for your phone!”
Only thing we know for sure. It’s not being run by any of the Czech/Israeli/UK Robert Maxwell clan – because 🙂
Sarcasm suits you.
Tennessee Tuxedo
Really? That’s a shame. Sarcasm is just poorly expressed sardonicism.
I’ll work on that.
Touche. You got me.
Well played.
😃 😀 😄 😁 🤣 😂 👍
😉 lol
How badly bugged will the White House be if PDJT is allowed inauguration?
Is there any way around it?
They found gold in those walls.
The walls have ears!
Fish bowl on steroids.
The phrase that outright tells you that your government is spying on its citizens:
…“these people said, speaking on condition of anonymity to describe a sensitive ongoing investigation.”
They’re all hacks
cold, deliberate a*nger
“Chinese-linked hackers” could easily be Walz’ aides. The DHS is dealing with a whistleblower who has warned that Walz as VAp would be letting the Chinese frighteningly close to the top.
The transition team should consider reverting to manual typewriters and mimeograph machines for internal communications, at least until President Trump takes office again.
Ham radios. 😎👍
So old school. Hat tip to Nellie Ohr for keeping it real in Ruskie on her ham radio.
.
No manual typewriter needed. Just pull the plug on the router to the internet. Computers do not have to be on-line.
.
Not so simple anymore. Single purpose isolated machine in a secure facility, print once. Take paper and copy it elsewhere <might> work. Does sending by shortwave remove document signatures? Ask Nellie.
Bannon said we are going to have to put our lives and fortunes on the line. We have to be made of the same stuff that our ancestors were made of in 1776. I know not everyone is 13th generation American but by god we are all going to have to channel it one way or another.
“The emissary must be of incredible moral character. They must be honest. The person should be entirely altruistic. They must have exceptional judgement, possess no ego, be impervious to scrutiny or review. They must maintain themselves at the highest moral standards at all times and exhibit incredible judgement and wisdom.”
“Due to the nature of the position the emissary is extremely powerful; therefore, a disposition of humility is also critical.”
Only one person I know of could fill these qualifications, and St. Teresa of Calcutta is dead.
Or her BFAM Ben “Calcutta” Carson. 😎❤️
Sundance, you need not confirm, but please ensure this info (Emissary & other positions suggestions) is getting to Trump.
We know it does.
😎
The irony is immense…
Remember Trump saying “China! China! China!” while the IC was saying “Russia! Russia! Russia!”
It’s like the little boy who cried wolf! one too many times. We just don’t believe them any more.
David ‘only’ had to go up against Goliath.
Trump has to go up against the Vampyroteuthis Infernalis.
Found in the bin… 🙁
David ‘only’ had to go up against Goliath.
Trump has to go up against the Vampyroteuthis Infernalis.
Intended or not, that is one of the most accurate analogies I’ve ever seen used to describe Trump’s and We the People (Americans) real enemies.
The profoundness of it will escape almost everyone else’s attention, perception and understanding no matter how hard they try..
But, I know what exactly what it describes. 😉
.
Emphasis on Infernalis.
d’un ver luisant.
Vraiment.
Hail Hydra!
The Iran Assassination Fraud! must not have allowed them to wiretap everybody they wanted “by the book”.
Hence a shiny new China Hacker Fraud! to allow more wiretapping from Judge “Bugsy” Boasberg and Ma McCord.
Next week, it will be ISIS-K’s! turn again.
Anyone heard from Dr. Ben Carson lately??
Trump has a plan this time around, and a really good one, he is not a person that ignores lessons from the past.
But first WE have to win this, and THAT unfortunately will depend on the cheat.
It’s already set up as I write this. All of a sudden, the MSM is now parroting that the race is too close to call (never has been).
That’s the first part of the setup which makes the cheat believable. It all starts there, exactly the playbook for BASEMENT Biden in 2020…
Seems to me the MSM has been claiming it’s too close to call for at least a couple weeks.
They started doing that as soon as the Kommie-La Balloon started leaking.
Dr. Ben Carson comes to mind.
Can envision Ben Carson tying the IC up in knots just by being Ben Carson
Dr Ben Carson
What if the senate select committee on intelligence is maga? I can dream, can’t I?
I believe that is called a Fever Dream.
I believe that the concern is that the malfeasance is being attributed{projected} to a foreign enemy, rather than the enemy domestic, which has been so prevalently exposed.
Trust God. Fear not.
Almost every DC politician and political operative is “China linked.”
I believe you misspelled “owned.”
AIPAC also as Sundance has previously disclosed.
IIRC, only 1 member of either house does not have an AIPAC lobbyist assigned, Massie (?).
Fake fear porn for the proles while setting up their catbird seat.
It’s Iran, Iran, Iran. It’s Russia, Russia, Russia. It’s China, China, China.
When it is actually being done under the auspices of Georgia Tech or Georgetown U. or Langley.
Ben Carson.
Sixty-Thousand Ways to Surveil.
Trump is the target.
The other names are vectors or chaff.
Bingo.
Some of the vectors become chaff.
Some vectors are diversions.
But Trump is the primary target, or family so they can attempt to extort or threaten.
Sho’nuff.
It would seem the only emissary DJT can FULLY trust is a family member.
And the only communication they can FULLY trust that can’t be easedropped on is the face to face verbal kind.
Maybe they’ll consider using a ham radio.
What a mess.
Family member? Disagree. Family needs to be kept well away from the WH this second term.
What about Dana White? I know PDJT thinks highly of him, and DW has been solid with and for Trump. Not sure what skeletons he may have in his college though.
i was thinking dana white as well.
would any “skeletons” even matter?
he is an emissary for PT, representing PT – the integrity of the emissary is all that matters.
i believe Dr. Carson needs to tend to his health, which i fervently hope is not a continuing issue for him.🙏🏻
Integrity cannot be maintained if there are cracks in their armor that can be exploited.
Uprightness is critical.
i love the english language, always worth discussing!😁
https://www.merriam-webster.com/dictionary/integrity
Integrity:
1. a firm adherence to a code of especially moral or artistic values, INCORRUPTIBILITY.
2. an unimpaired condition, SOUNDNESS.
3. the quality or state of being complete or undivided
https://www.merriam-webster.com/dictionary/upright
Uprightness:
1. PERPENDICULAR, VERTICAL, erect in carriage or posture,
having the main axis or a main part perpendicular
2. marked by strong moral rectitude
did read up a bit on dana white, nothing jumps out, but i guess one never knows.
the fact that PT has maintained a friendship with him for 25 years says a lot.
have a lovely evening!
“College?” Well, that, too, but closet is what I meant.
This could be stopped but to many in this country have excepted the $$$ for selling the country out.
Every government agency has been “Hacked” allowed to be penetrated just like the balloons
Maybe a technically savvy someone outside their (IC) circle found something interesting and they (IC) are being proactive in defence, knowing they had been motted – but perhaps they don’t know by whom, hence the need to include so many others.
And they can’t find out?
The age old trick of a burglar leaving all the doors unlocked and wide open behind them, so some random dupe can enter the unguarded property later that night. The dupe gets caught and blamed. The first burglar has escaped with all the loot.
Love it!
“from inside the house.”
Snuck that in just before Halloween. SD is hilarious!
“Before outlining the who’s, what’s and transparently predictable “why’s” of the story, let us first outline what the USIC is leaking to the New York Times.”
“So far, the list of targeted phones includes devices used by high-profile people, including Mr. Trump, his son Eric Trump and his son-in-law Jared Kushner.”
Taking everything at face value…
Perhaps I missed it, but exactly WHY would the NY Times find this newsworthy? How did they come about this story?
This would not be the kind of story some reporter overhears at the local coffee shop and decides to start a little digging.
The answers to the questions above would lead to the same conclusion as what Sundance wrote. No reporter got this story. Some reporter acted as a stenographer for a few thugs getting their side out in case something is discovered.
Why Jared and Eric?
Oh, and a few supposed State Department flunkies? Really?
Sundance!!! Amazing reporting. I certainly hope and pray that you have direct access President Trump on a regular basis. 🙏🏻🙏🏻🇺🇸🇺🇸
Yeah, this seems a setup to allow them to spy on Trump’s 2nd term. They’ve already moved on from the election. The assassination attempts are all they got left in the bag, now.
I didn’t get the emissary thing initially, but now it does seem the only sure way to counter spying and disinformation flows. The agency secs all work for McConnell and Trump must work around them. I’d fire those guys early and often.