Do not under any circumstance write the full wording for what “CRS” means anywhere on this thread in the comments. Got it? I cannot stress this enough. If you do – I’ll have to delete this post.
You know where I was on July 3rd. You probably also know why I was there. Look at both the publication date of this “Media Advisory” – and the “Event Date“. (link)
Well here you go. Here’s the final bread crumb trail to a discussion I’ve shared with you for months. Many of you have actually, and understandably, struggled to understand it. Even more cannot fathom how this is possible. [DiwataMan, this one is also special just for you]
If there is any possibility of the case being dropped by “motion of direct verdict” upon presentation to the judge, then how is it possible for this to be pre-scheduled ? Again, look at the date of the CRS hosted CRB event – And you will understand how scripted this entire trial actually is. The schedule is, and has been, pre-determined all along. Coordinated by the Feds and the DOJ through the CRS.

(more…)
Obviously I’ve been a little distracted, but this does not pass the immediate sniff test. President Obama, Valerie Jarrett and Eric Holder would not go after this guy unless they wanted him disposed. That always raises my spidey sense alert. This administration sticks with people who have engaged in SERIOUS criminal conduct…. yet they are super out-in-front of getting James Cartwright capped at the knees….. Hmmm
WASHINGTON DC – Legal sources tell NBC News that the former second ranking officer in the U.S. military is now the target of a Justice Department investigation into a politically sensitive leak of classified information about a covert U.S. cyber attack on Iran’s nuclear program.

According to legal sources, Retired Marine Gen. James “Hoss” Cartwright, the former vice chairman of the Joint Chiefs of Staff, has received a target letter informing him that he’s under investigation for allegedly leaking information about a massive attack using a computer virus named Stuxnet on Iran’s nuclear facilities. Gen. Cartwright, 63, becomes the latest individual targeted over alleged leaks by the Obama administration, which has already prosecuted or charged eight individuals under the Espionage Act. (more…)
You mean President Obama and the administration officials lied? Ya’ don’t say…
(Via The Guardian) Top secret documents submitted to the court that oversees surveillance by US intelligence agencies show the judges have signed off on broad orders which allow the NSA to make use of information “inadvertently” collected from domestic US communications without a warrant.
The Guardian is publishing in full two documents submitted to the secret Foreign Intelligence Surveillance Court (known as the Fisa court), signed by Attorney General Eric Holder and stamped 29 July 2009. They detail the procedures the NSA is required to follow to target “non-US persons” under its foreign intelligence powers and what the agency does to minimize data collected on US citizens and residents in the course of that surveillance.
The documents show that even under authorities governing the collection of foreign intelligence from foreign targets, US communications can still be collected, retained and used. (more…)
First it is important to watch this video (hat tip FDR in Hell):
Then read this report from yesterday (more…)
WASHINGTON DC – With a new poll showing falling support for the Gang of Eight comprehensive immigration reform bill, Senate Majority Leader Harry Reid has announced an accelerated schedule in which the Senate would take a final, up-or-down vote on passing the bill by the end of next week. […]
Reid warned his fellow lawmakers that if they want to consider amendments to the Gang of Eight bill, they need to be prepared to work virtually nonstop between now and then. “This may not be one of our normal weekends,” Reid said. “We’ve got to move forward on this legislation.” (more…)
Last Friday CBS News confirmed that Sharyl Attkisson’s computer was hacked by “an unauthorized, external, unknown party on multiple occasions.” Today she reveals they have identified who did it:
“I think I know. But I’m just not prepared to go into that. We’re continuing our investigations. There are multifaceted looks at what to do next… Let me just say, whoever did it, to come into a private citizen’s home, whether I’m a journalist or not, and look in my family’s computer and look into my work computer… Well, it’s outrageous.”
WASHINGTON DC – The National Security Agency has acknowledged in a new classified briefing that it does not need court authorization to listen to domestic phone calls.
Rep. Jerrold Nadler, a New York Democrat, disclosed this week that during a secret briefing to members of Congress, he was told that the contents of a phone call could be accessed “simply based on an analyst deciding that.”

If the NSA wants “to listen to the phone,” an analyst’s decision is sufficient, without any other legal authorization required, Nadler said he learned. “I was rather startled,” said Nadler, an attorney and congressman who serves on the House Judiciary committee. (more…)
(Via Gateway Pundit) NSA leaker Edward Snowden released documents to The South China Morning Post this week that detailed classified NSA data on targeted Chinese IP addresses. Bretibart reported:
NSA leaker Edward Snowden showed a Hong Kong newspaper classified documents that revealed the specific IP addresses in Hong Kong and China the National Security Agency may have hacked.
Snowden gave the information to the South China Morning Post, which reported on Saturday that though the “detailed records” cannot be independently verified, they “show specific dates and the IP addresses of computers in Hong Kong and on the mainland hacked by the National Security Agency over a four-year period” and “also include information indicating whether an attack on a computer was ongoing or had been completed.” (more…)
One of the few reporters to investigate the truth behind the DOJ Fast and Furious gun running scheme, and the Benghazi terror attacks, finds her computer was hacks and information copied (exfiltration). Gee, I wonder who would be snooping on her data?
CBS Statement: A cyber security firm hired by CBS News has determined through forensic analysis that Sharyl Attkisson’s computer was accessed by an unauthorized, external, unknown party on multiple occasions in late 2012. Evidence suggests this party performed all access remotely using Attkisson’s accounts.
While no malicious code was found, forensic analysis revealed an intruder had executed commands that appeared to involve search and exfiltration of data. (more…)




