Quantcast

Election Over, Washington Post Quietly Reports Construct of FBI Top Secret Narrative Around Trump Mar-a-Lago Documents Was False

Go figure.  If you read between the lines of the Washington Post’s current description of the “classified” documents, as noted by anonymous federal officials connected to the investigation, the ‘classified‘ documents in context were personal correspondence between President Trump and Chairman Kim Jong Un about the need to chill out on the nuclear stuff.

President Trump considered these types of papers personal mementos, while the administrative state -seeking to weaponize the DOJ/FBI for maximum political damage and narrative engineering- considered them top secret national security documents.

The election is over, so the narrative is no longer needed. Narrative dropped…

(Via WaPo) – Federal agents and prosecutors have come to believe former president Donald Trump’s motive for allegedly taking and keeping classified documents was largely his ego and a desire to hold on to the materials as trophies or mementos, according to people familiar with the matter.

As part of the investigation, federal authorities reviewed the classified documents that were recovered from Trump’s Mar-a-Lago home and private club, looking to see if the types of information contained in them pointed to any kind of pattern or similarities, according to these people, who spoke on the condition of anonymity to discuss an ongoing investigation.

That review has not found any apparent business advantage to the types of classified information in Trump’s possession, these people said. FBI interviews with witnesses so far, they said, also do not point to any nefarious effort by Trump to leverage, sell or use the government secrets. Instead, the former president seemed motivated by a more basic desire not to give up what he believed was his property, these people said.

(more…)

Within Minutes of Arizona Gov Election Call, Twitter, DHS and Big Tech Begin Blocking Discussion of Difference Between “Ballots and Votes”

I’m going to skip noting that Elon Musk Twitter is essentially unchanged, regarding the relationship between Twitter, the Dept of Homeland Security and the disinformation police, as many keep saying Musk Twitter has not had time to reformat.

That said, five days after our post-election review of the difference between ballots and votes, and within minutes of the controversial Arizona governor contest being announced by DHS media outlets, suddenly any discussion about “Ballots -vs- Votes” is considered a risk to democracy. [LINK}

The need for control is a reaction to fear.

Twitter specifically, and Big Tech writ large, has now placed a warning on the CTH article where we draw attention to the general difference between ballots and votes. The timing of the intervention, as related to the content discussed, is transparent. Sunlight is a great disinfectant and must be controlled at all costs.

In one sense this effort to block discussion is irrelevant, the discussion is now taking place; attentions are being paid; the horse is out of the barn; millions are now expanding the discussion and applying Occam’s Razor to the simple reality. This is why information providers and independent researchers must work with urgency and diligence to control their own platforms.

CTH is never going to stop discussing the uncomfortable stuff because Truth Has No Agenda, regardless of our personal feelings or opinions on the matter.

Yes, in this discussion there is a clear difference between two electioneering priorities, one focused on ballot assembly and the other focused on winning votes.  However, in the broader sense this censorship effort to control discussion of these distinctions shows just how far and fast we are collapsing into a totalitarian and Orwellian nightmare.

(more…)

DOJ Announces Sending Election Enforcement Division to 64 Counties in 24 States to Ensure Correct Votes for Biden Regime

In foreign countries when the ruling government sends federal police or military agents of the regime in power to “monitor elections,” U.S. politicians and media call it intimidation, corruption and election fraud.  When Joe Biden sends federal police to monitor elections, U.S. politicians and media call it “protecting democracy.”  The process is identical.

Comrades, earlier today the political branch of the Dept of Justice announced their dispatch to key Democrat cities and counties in order to support the correct regime voting process.  No, really, they did. [LINK]

(DOJ) – The Justice Department announced today its plans to monitor compliance with federal voting rights laws in 64 jurisdictions in 24 states for the Nov. 8, 2022 general election. Since the passage of the Voting Rights Act of 1965, the Civil Rights Division has regularly monitored elections in the field in jurisdictions around the country to protect the rights of voters. The Civil Rights Division will also take complaints from the public nationwide regarding possible violations of the federal voting rights laws through its call center. The Civil Rights Division enforces the federal voting rights laws that protect the rights of all citizens to access the ballot.   

For the general election, the Civil Rights Division will monitor for compliance with the federal voting rights laws on Election Day and/or in early voting in 64 jurisdictions: 

(more…)

A Data Point to Understanding the DHS Portal Within Twitter is Found in Transcript of Former CEO Jack Dorsey

At this point in history, anyone who is claiming the U.S. Government is not directly coordinating with social media platforms to shape opinion and cull information adverse to their interests, is being intellectually dishonest.   There is simply too much evidence of the intelligence apparatus, specifically the Dept of Homeland Security, being enmeshed with the platforms of Twitter, Facebook, Instagram, Google and Microsoft.

The DHS justifications for the relationship all involve claims of ‘national security’ and domestic terror threats.  However, the simple and transparent motivations of the relationship are all political.  The DHS terms of “disinformation, misinformation and malinformation” are simply excuses for the platforms to adhere to the demands of the government and censor or remove discussion that is against the interests of those in power.  The truth of this is in the sunlight now.

That said, the relationship between the intelligence community and social media is one of mutual benefit.  DHS gets to conduct surveillance and control permitted speech in the public square, and in return Big Tech gets assurances of their ability to continue monopolistic enterprise and simultaneously receive subsidies on operational costs.  The legislative branch allows this synergy without oversight because the legislative branch is in alignment with the larger ‘national security’ ruse.

Into this mix it is worth revisiting congressional testimony from former Twitter founder and CEO Jack Dorsey on March 25, 2021.  The hearing was on “disinformation” [Transcript Link]:

 

A shared hashing protocol is a form of data system integration.   Look at what Dorsey was saying about “Blue Sky” his latest big tech initiative, on March 25,2021.

Now, remember the admissions in July, 2021:

(more…)

Tucker Carlson Discusses Leaked Documents Reflecting Direct DHS Portals to Social Media Companies

My suspicious cat sensibilities are triggered by the timing of these “leaked explosive documents,” in relation to the Elon Musk Twitter takeover.  That said, here is Tucker Carlson interviewing Intercept journalist Lee Fang. {Direct Rumble Link} – WATCH:

.

Lee Fang… “Over the last five years“… Yeah, bulls**t on that. Sorry.  CTH has outlined in painstakingly granular detail, the weaponization of the networks involved began immediately after January 2009 – specifically right after Obama’s Cairo speech that kicked off the ‘Arab Spring‘ movement.  That’s when Facebook and Twitter were recruited for participation in the construct.

After a few years of beta-testing the govt-corporate relationship, and simultaneously measuring the influence factor, things sped up, and by 2011 Obama-era DHS operatives began collaborating with Big Tech in constructing the modern surveillance and influence system for domestic rollout.

This system didn’t just pop-up “over the past five years.”   A timeframe which, not coincidentally according to the Intercept, removes Barack H Obama from the era of accountability.  The effort to construct a fraudulent timeline makes me even more suspicious of this “leak.”

Tucker Carlson saying “I’m not sure why you wrote this“… indicates to me his own awareness of the suspicious timing.   Watch the other hand.

(more…)

Catherine Englebrecht and Gregg Phillips Put in Jail for Refusing to Outline Sources Who Revealed Konnech U.S. Election Data Transfer to China

True the Vote founder Catherine Englebrecht and election data security analyst, Gregg Phillips, have been held in contempt of court and placed in jail for failing to outline the participants in a 2020 hotel discussion that revealed the Konnech election data compromise that was transmitted to Chinese networks.  {Go Deep}

On October 4th, the CEO of  Konnech – a company specializing in proprietary PollChief software to manage election workers – was arrested. [link] Konnech Corporation Chief Executive Officer Eugene Yu was arrested for exploiting access to U.S. election data, including election worker information, and transferring the files to China.

The information that led to Yu’s arrest was the information given to the FBI and first revealed to Englebrecht and Phillips.  However, the Konnech corporation filed a civil lawsuit against Englebrecht and Phillips claiming defamation.  A Texas federal judge allowed the civil lawsuit to continue despite the arrest of Eugene Yu.

Federal Judge Kenneth Hoyt demanded that Phillips and Englebrecht reveal the names of everyone who was in a hotel room when the original data files were presented to True the Vote.  Englebrecht and Phillips stated they did not ever possess the data file, do not have it and refused to name all the participants who may have seen it.   Today Judge Hoyt threw them in jail until Englebrecht and Phillips give up the names.

(Post Millennial) – On Monday, US Marshalls took into custody Catherine Engelbrecht and Gregg Phillips of True the Vote, for refusing to identify a confidential informant.

Federal Judge Kenneth Hoyt delivered the order, holding the two in contempt of court for refusing to identify the informant, according to independent journalist Ivory Hecker.

Hoyt ordered that Engelbrcht and Phillips be held in custody for at least a day, until they divulge that information.  (read more)

(more…)

Well, Conspiracy No More – Leaked DHS Documents Show Portal Connections Where Govt Officials Backchannel Instructions to Social Media Engineers and Conduct Surveillance

Before getting to the latest revelation/evidence which affirms CTH research for multiple years, let me just remind everyone of the commonsense aspect.  If the Dept of Homeland Security (DHS) was actually doing what I have long said it appeared they were doing, then…

…The databases of the identified social media platforms appear to be integrated with the U.S. intelligence system.  This relationship makes the U.S government a stakeholder in the financial sustainability of the enterprise(s).  Thus, a collaborative effort to financially subsidize the underlying data processing fits the mutual benefit scenario.  ~ Sundance

DHS gets domestic surveillance tools under the guise of ‘national security’.  Meanwhile, massive social media companies get financial offsets for the extreme data processing costs associated with millions of simultaneous users.  That’s the mutual benefit behind “Jack’s Magic Coffee Shop.”  Previously people called it a ‘conspiracy theory‘, I didn’t care, still don’t, it just makes the most sense; Occam’s Razor applies.

Today, all that was almost certain is now brought forth with buckets of evidence showing how social media enterprises have direct portals to DHS to transmit information and receive instructions. It’s a public-private partnership, just like it always appeared.  To quote succinctly, we been knew.

Now before getting all giddy and excited about the documents leaked to The Intercept, proving what CTH has outlined for years, allow me to temper the thirst for immediate I toldyaso’s,   Slow your roll…

Remind yourself when everyone was giddy about getting to see for the first time in history a released ‘top secret’ Title-1 FISA application (Carter Page) and how everyone rushed to review and discuss it without asking the first question(s) first.  We know these are bad actors, so why was it released and who released it?

The same applies here.  We know the change of ownership within Twitter might pose a threat to discovery of government conduct that has taken place inside the enterprise under prior management.  So why is the DHS connection to Twitter, Facebook, Instagram, YouTube etc. and social media being revealed now?  What are their motives, and who is leaking it?  We do not yet know.

As to what is being revealed in the leak, it’s a remarkable affirmation of how the Fourth Branch of Government operates.  Specifically, what CTH has outlined for years about the use of the Dept of Homeland Security, as a political surveillance weapon under the justification of national security.

(more…)

Whistleblower Releases Internal FBI Guidance Document Highlighting Disinformation as an Election Crime

The dissidents at Project Veritas have received leaked whistleblower information from the FBI highlighting a guidance document that puts “disinformation” into the category of an “election crime.” [Source Article Here]   According to the internal guidance, sharing “false or inaccurate information intended to mislead others” may lead the FBI to charge people with election crimes.

[WASHINGTON, D.C. – Oct. 27, 2022] Project Veritas published a newly leaked document today provided by an FBI whistleblower.

The document details how the Bureau will tackle what they consider to be “election crimes.”

It lists “misinformation” as a potential election crime, describing it as “false or misleading information spread mistakenly or unintentionally.”

(more…)

Musk Twitter Purchase Back on Table, Unfortunately with Plan for Everything App

The only thing I can do is research and write about it.  With an even stronger degree of certainty than originally expressed, and with all of the subsequent data points falling into alignment with the initial suspicions, the background of Jack’s Magic Coffee shop remains unchanged. {Go Deep}

Six weeks ago, the Twitter security ‘whistleblower’ came forward to congress.  The whistleblower is a former technology expert who came from within the research farm of DARPA, the Defense Advanced Research Projects Agency.  Peiter “Mudge” Zatko, is a well-known cybersecurity expert who left government work, entered the public world, and eventually became the head of Twitter security, reporting directly to the CEO. {Go Deep}

According to a recent SEC filing [LINK HERE], Elon Musk is now back to supporting the purchase of Twitter as the first step in creating the “everything app.”

{{{sarcastic voice}}} Gee, what could this be about?  I mean what could go wrong?….  We already know the infrastructure of Twitter’s operational database is tied into portals with the Dept of Homeland security {citation}, and now Musk wants to use that central infrastructure to create an all-inclusive “everything app”?

(more…)

Citing the Need to Defer to National Security Claims of DOJ, 11th Circuit Court Grants Motion for Stay Over Florida Judge Ruling in Mar-a-Lago Document Case, Special Master Blocked from Reviewing Classified Documents

The 11th Circuit Court of Appeals has ruled in favor of the U.S. Dept of Justice, National Security Division, and blocked the lower court order instructing the Special Master to review the DOJ claimed, “classified documents.” [pdf Ruling Here]

Essentially the order of the appellate court is based on the DOJ calling the material “classified” and “vital to national security”, and the court’s determination they have no authority to question the decision of the executive branch when it comes to matters of national security.

The court (judicial branch) openly states they defer to the DOJ (executive branch) as to any/all claims of harm to national security that may be caused by a review of documents the DOJ-NSD determine, on their own authority, to be identified as classified (sensitive, secret or top-secret).

Therefore, if the DOJ states sharing the “classified documents” with a special master may harm national security, the court must accept that position without challenge.

(more…)