Quantcast

Attorney General Merrick Garland Provides Cover for Obama-Biden Surveillance, DOJ Now Barred from Investigating Intelligence Community Leaks to Journalists

Once you take a nuclear action on something corrupt, there is no return.  The Obama-era weaponization of the intelligence apparatus for political purposes was one such nuclear action.  That weaponization was an escalation of action that forever sealed the need to hide it.

The intelligence apparatus, including the DOJ/FBI and aligned agencies, in addition to the DOJ officials within the Mueller probe, previously exploited their surveillance access to records and communication of Donald Trump and his administration.  Those intelligence operatives then spun and leaked parts of those records in order to build a fictitious Trump-Russia narrative and simultaneously distract from the prior unlawful surveillance.

Today the AP is reporting that Attorney General Merrick Garland is barring any DOJ office from seizing the communication of any journalists.  In essence Garland is providing cover for the prior and ongoing coordination of Intelligence Community leaks to media allies.  Remember, the Intelligence Branch operates as a public-private partnership; part of that purpose requires an alignment with corrupt U.S. media.

WASHINGTON (AP) — Attorney General Merrick Garland on Monday formally prohibited federal prosecutors from seizing the records of journalists in leak investigations, with limited exceptions, reversing years of department policy.

The new policy largely codifies the commitment Garland made in June, when he said the Justice Department would abandon the practice of seizing reporters’ records in leak investigations.

(more…)

The Guardian Outlines “Project Pegasus” an Expose’ into Multiple Governments Using Spyware Created by An Israeli Surveillance Company Called NSO

In the United States we have the National Security Agency (NSA). The NSA collects all available metadata on almost all electronic devices worldwide that can be reached. Access to that database underpins the “Fourth Branch of Government,” the most powerful branch, the U.S. Intelligence Branch.

In addition to a global scraping of metadata, the NSA also collects the domestic private information of all Americans.  This was the essential background story that NSA Contractor Edward Snowden broke several years ago.   We now know this to be an accepted fact.

The United States internal political debate shifted from ‘should they do this’ to ‘how can we manage the people who do this‘?

The results over the last ten years of trying to manage the exploitation of this database have been a case study in failure.

Year after year, the NSA admits their control over the database is structurally flawed, essentially non-existent.  The fourth amendment protections of U.S. citizens have been erased, and now even U.S. government contractors are using the NSA database to monitor whoever and whatever they want.  Again, I repeat: ‘The Fourth Branch of government is a public-private partnership”.

However, beyond domestic exploitation, the NSA database is presumably only used by, accessed by and available to, the foreign allies that make up the “Five Eyes” partners. The U.S., U.K, Australia, Canada and New Zealand make up the allies within the Five Eyes intelligence apparatus. These allies have access to the same NSA database as U.S. operatives.

Putting aside how the NSA database is exploited inside the U.S. for a moment – if you are a government outside the Five Eyes system; and you wanted to spy on your own citizens and political enemies the way the NSA conducts surveillance on its own citizens; you would need some other access point to spy on your opposition. That’s where an Israeli company called NSO comes into the picture.  {Guardian Report}

(more…)

Andrew Weissmann Says the Quiet Part Out Loud

There’s an interesting aspect to an Andrew Weissmann statement on MSNBC that almost everyone is missing.  Before watching the brief excerpt, let me put the comments into context.  Remember, the Intelligence Branch uses intelligence silos to protect themselves; however, the Intelligence Branch also violates those silos when ever they want.

First, Andrew Weissmann comes from the DOJ-National Security Division (DOJ-NSD).  More specifically, in that division Andrew Weissmann was in charge of the section that used FARA (Foreign Agent Registration Act), or FARA-951 as a weapon against their political enemies.

The only targets Weissmann ever selected for FARA investigations were political opposition. You might also remember it was Weissmann who led the Mueller team, and in that position Weissmann went after every target (Flynn, Rafiekian, Manafort, Papadopoulos, Phares, even Rudy Guiliani etc.) with accusations of FARA violations.

Second, the DOJ-NSD had no inspector general oversight.

During the Obama administration the DOJ-NSD exempted themselves from DOJ Inspector General review.  In 2015 the Office of the Inspect General (OIG) requested oversight and it was Deputy AG Sally Yates who responded with a lengthy 58-page legal explanation saying, essentially, ‘nope – not allowed.’ (PDF HERE) All of the DOJ is subject to oversight, except the NSD.

There is a very specific reason for this intentional avoidance of oversight as we found out through the Carter Page FISA warrant.  The DOJ-NSD is the weaponized mechanism against domestic political opposition inside the DOJ.  [Sidebar: I would not be surprised to find out the DOJ-NSD operatives used their FARA authorities to control and threaten political opposition around Washington DC, using lobbying investigations as leverage/blackmail.]

As the current story is told a whistleblower in the intelligence community told Tucker Carlson his communication was intercepted by the NSA.  By the NSA originating standard, the same standard they claim to uphold publicly, the NSA has a foreign intelligence mission; and their data collection is supposed to be in a silo related to foreign intelligence gathering.  If an American is picked up ‘incidentally‘ by the NSA collection, that information is supposed to remain inside that silo.

However, as you watch this MSNBC segment, notice how casually Andrew Weissmann says that Tucker Carlson should have gone to the DOJ (Main Justice) with any concerns about his communication being intercepted by the NSA.  Listen carefully to how Weissmann frames what Carlson “should have done” (prompted):

(more…)

UPDATE: The NSA Leaked Details of Their Tucker Carlson Surveillance to Allied Deep State Media

This is a great example of how the Intelligence Branch of the U.S. government now operates.  Not only did the NSA conduct surveillance of Tucker Carlson’s electronic communication, but the NSA also leaked Carlson’s emails to allied intelligence media (Axios, CNN, New York Times, Washington Post) who operate as PR firms on behalf of the Intelligence Branch.

Watch this Tucker Carlson interview with Maria Bartiromo this morning:

I’ll keep repeating this for as many years as needed until people on our side finally catch-on.  The most well documented, evidenced and provable example of a severely compromised Intelligence Community operation to manipulate politics and shape U.S. media is found in the story of the Senate Select Committee on Intelligence (SSCI) Security Director, James Wolfe, and his years of leaking classified information to the media.

The SSCI is supposed to be the primary oversight mechanism looking over U.S. intelligence operations and the people within them.  However, the SSCI has partnered with the Intelligence Community (writ large) in a collaborative effort to (1) gain more power; then (2) retain that power.  The SSCI functions as the mechanism that permits the existence of the most powerful branch of government.  The fourth branch, the ‘Intelligence Branch‘.

SSCI Security Director James Wolfe was told to leak the Top-Secret Title-1 FISA warrant used against Carter Page.  James Wolfe was told to leak the document to media.  Wolfe chose Ali Watkins (Buzzfeed) and others.  Wolfe was told to leak the FISA on March 17, 2017, by Senators in the committee, that’s why Wolfe was never prosecuted for leaking it by the DOJ.

Wolfe’s defense lawyers threatened to subpoena the senators on the committee {LINK}, and immediately the SSCI, with the help of the Mueller/Weissmann team, came to Wolfe’s rescue.   They simply could not let the background story ever surface.  Think deeply about the profound ramifications of that real world example.

(more…)

Preview, The Fourth Branch of Government

After many years of granular research about the intelligence apparatus inside our government, in the summer of 2020 I visited Washington DC to ask specific questions.

My goal was to go where the influence agents within government actually operate, and discover the people deep inside the institutions no-one pays any attention to.

It was during this process when I discovered how information is purposefully put into containment silos; essentially a formal process to block the flow of information between agencies, and between the original branches. While frustrating to discover, the silo effect was important to understand because comprehension of communication networks leads to our ability to reconcile conflict between what we perceive and what’s actually taking place.

In the next few days I am going to explain how the Intelligence Branch works: (1) to control every other branch of government; (2) how it functions as an entirely independent branch of government with no oversight; (3) how and why it was created to be independent from oversight; (4) what is the current mission of the IC Branch, and most importantly (5) who operates it.

When we understand how the Fourth Branch works, questions about our dysfunctional U.S. modern government are answered. Additionally, the motives and intentions of people inside the institutions start to reconcile. Before beginning a deeper explanation, here’s an example almost everyone overlooked.  Remind yourself of a question raised in March of 2017 by Elise Stefanik, and a set of follow-up questions that were never asked.

In April of 2016 the FBI launched a counterintelligence operation against presidential candidate Donald Trump.  The questioning about that operation is what Rep. Stefanik cites in March of 2017, approximately 11 months later.

(more…)

Tucker Carlson Pushing Back Against NSA Surveillance, However The Intelligence Branch of Government is Much Larger Than Most Consider

Tucker Carlson used his TV broadcast on Wednesday night to continue pushing-back against NSA operational data collection that appears to have caught him in their surveillance dragnet.  However, what Carlson (and many others) have yet to reconcile is the totality of control held by the newest branch of government, the Intelligence Branch.

CTH has been contacted by numerous interested stakeholders in the larger dynamic.  Tomorrow we hope to be able to give readers an explanation of exactly how each traditional branch of government; including the administrative agencies within them; have been taken over by a methodical expansion of the Intelligence Community.  Everything is now controlled by the Intelligence Branch, and the underlying mechanisms of government have abdicated, perhaps even abandoned, their oversight.

In the interim, here’s the latest segment from Carlson along with one of CTH earlier outlines on how the NSA database became a surveillance tool for President Barack Obama.  We are almost 15 years into a process that facilitates the Intelligence Branch as the most powerful -and unelected- governmental system.  After the Carlson segment remind yourself how President Obama exploited a process he created.

There is no workable solution to debate until the American people and congressional representatives admit and accept the totality of the current corrupt system.  In essence, until everyone realizes there is a fourth branch of government now in control.

The process to create the Intelligence Branch started around the time the office of the DNI was created (post 9/11/01).  However, it was President Obama and AG Eric Holder who took advantage of the framework the ODNI system created with an immediate and methodical plan in 2008.  The effectiveness of what they constructed shows up toward the end of the Obama presidency when they were using that system to assist Hillary Clinton.

That is the context to remember a time-frame between December 2015 and April 2016 when the NSA database was being exploited by contractors within the intelligence community, using windows opened by the Obama-era DOJ/FBI, to facilitate unauthorized searches.

(more…)

NSA Responds to Tucker Carlson Claim of Surveillance, The Generic and Very Political Non-Denial Should Alarm Everyone

Last night Fox news host Tucker Carlson reported on a whistleblower contact from within the intelligence community who informed him the NSA was conducting electronic surveillance of his private communication (email and text messages).  Tonight the NSA responded via Twitter:

Techno Fog spotted something most of us would also note {SEE HERE} the NSA statement is an obtuse non-denial.   However, there’s a lot more in that statement that should alarm everyone.  I don’t know if I can cover it all here; this is actually serendipitous for a larger framework article I have been working on.  But here’s some top-line initial reactions.

First, notice the time of the tweet message.  Exactly 8:00pm to coincide with the beginning of Tucker Carlson’s broadcast.  That’s typical political operative snark, which wouldn’t be too surprising if it were not the fact this is from the National Security Agency.

Many people in/around the intelligence apparatus have noted and confirmed to me that most of the modern human resources, within the working analytical part of the intelligence apparatus, are immature, solitary and emotionally stunted individuals.  Accepting things as they directly appear, this subtle snark is actual confirmation.

(more…)

Fox News Host Tucker Carlson Reveals NSA Conducting Surveillance on His Electronic Communication, Texts and Emails

As disturbing as this statement is, considering the prior admissions of warrantless wiretapping by the FBI using the NSA database, this does not come as a surprise.

Remember, for five consecutive years the U.S. intelligence community has admitted to the FISA court they continually conduct illegal searches of U.S. citizen data, using the NSA database, and they admit to illegally extracting information which is illegally shared with interests outside the intelligence community.

Tonight on Tucker Carlson the Fox News Host outlined how an NSA whistleblower contacted him and told him the NSA was conducting electronic surveillance of his communication.  To verify the authenticity of the claim the whistleblower told Carlson what the content of his private text messages and emails contained.  While alarming in part, again this should not be surprising.  WATCH:

https://youtu.be/YbinnvVirW8

(more…)

Newt Gingrich is Exactly Right, Liz Cheney is Positioning to Support the Deep State With an Independent Run for Office…

Newt Gingrich gave an interview to Maria Bartiromo this morning that is worth reviewing in total.  However, for this moment I want to key-in on a specific conversation topic at the 09:30 point of the video below.

The former Speaker is exactly correct.  Cheney is pre-positioning herself to run against the potential for a 2024 Trump re-election bid.  The objective here is transparently obvious.  Liz Cheney is the 2024 version of former 2016 candidate Evan McMullin.   Both Cheney and McMullin come from the same origin within the intelligence apparatus.  Let me be very clear about something…. The Intelligence Community are the deep state operatives who control government.

https://youtu.be/RfTFGQsFCwU?t=570

.

At the 30,000 foot level, the U.S. Intelligence Community, known as the “IC” are the people and institutions behind the entire operation of the United States government.  There are no longer three branches of government.  All branches (executive, legislative and judicial) now defer to the IC.  {Go Deep Here}

The IC network, including their ability to reach into all systems, networks, institutions and agencies for surveillance, contains all of the elements of control over all other institutions.  Former CIA operative Evan McMullin, running for president in 2016, was part of this system effort.  It is now crystal clear that Liz Cheney, daughter to former Def Sec. Dick Cheney, is operating on behalf of this same system effort. THAT is the connective tissue.

(more…)

Comrades, Big Pharma Creates COVID Vaccination Wristbands To Help Speed Up Checkpoint Passage

Comrades, let it not be said the ministry of COVID compliance does not listen to the citizens.  After considering the bad optics of armbands, due to negative historic references, the government is allowing the private sector to create a modern method of compliance with vaccination protocols.

To enjoy your new freedom the COVID Ministry is working on QR Code wristbands to speed up the vaccination checkpoint scanning process.

The wristbands will be connected to a secure governmental database so you don’t have to worry about your travel habits being tracked, and the governmental contractors have promised they will not use the data to monitor citizens.  The government cares about you.

Your unique wristband may even come in a variety of colors so you can coordinate your outfits.

(CNN/Meredith) — New technology in the form of a wearable wristband could carry your COVID-19 vaccination card’s information and tell others around you that you’ve been fully vaccinated.

ImmunaBand is a blue silicone bracelet that has two purposes — first, it has a built-in QR code that carries your COVID-19 vaccination card’s information that can be used as a back-up for people who lose or misplace their CDC vaccination card. ImmunaBand’s second function is to show an outward display that a person has been fully vaccinated, thus making them safe to be near.

(more…)