Part 1, Part 2 and Part 3 of this series were devoted to a tour through history to illuminate how we have arrived at where we are today. In some cases, this history occurred more than two decades ago. It is important to always remember that there has been a long march through our government institutions. This part will focus on more specific events that have targeted PDJT and led to the raid at Mar-a-Lago.
As noted previously, in connection with Washington DC politics, there has been a fusion of the two parties into a uniParty. Exposure of this collusion threatens the very existence of the old line GOP at this point in time. PDJT is transforming the GOP into the most diverse political party in history. His leadership is allowing everyday Americans to come out and say they love America. His leadership also threatens the gravy train that elite politicians have been wallowing in for too many years.
Our current political system is fundamentally corrupt at the higher levels. Just how far down the food chain such corruption has seeped is not clear. This corruption is built on political surveillance. The IC Branch monitors information and people. They identify risks to their power and act to minimize such risk. All Americans are being surveilled. It is the only way to maintain power.
Perhaps no case better illustrates the power of the IC Branch than the Michael Flynn case. Flynn was clearly railroaded and only agreed to a guilty plea when they threatened to indict his son on spurious charges. This was after they essentially bankrupted Flynn trying to defend himself in this case. AG Barr recognized the miscarriage of justice and moved to dismiss the case. The judge in the case refused to do so. Why? The judge used various stalling tactics to keep the case from ending. Again why? If there was something in judge’s family history, who would have had access to such information?
With all of the focus on the illegal surveillance of the Trump campaign in 2015-16, many people are not aware of the bigger picture of what was going on. Sundance notes:
During the timeframe of December 2015 through April 2016 the NSA database was being exploited by contractors within the intelligence community, specifically within the FBI, doing unauthorized searches.
On March 9, 2016, oversight personnel doing a review of FBI system access were alerted to thousands of unauthorized FBI search queries of specific U.S. persons within the NSA database.
Please note that specific US persons were being surveilled. It wasn’t just Trump. Let me repeat that. It wasn’t just Trump who was being illegally surveilled. The Obama administration was spying on all the Republican candidates. In fact, in the beginning (2015), the Democratic strategy was to push the other Republicans in the direction of Trump since the Dems felt Trump was an obvious loser never having run for public office before. In 2015 the Democrats felt that Trump’s positions were not mainstream and would prove to be an anchor on whomever survived the primaries.
How do we know multiple person were being surveilled? FISA Court Judge Mary Collyer told us. She issued a redacted finding on NSA access by FBI “contractors” that indicated that many thousands of illegal searches had been done during the time period in question. Collyer also indicated there was no reason to believe that this had not been going on all the way back to 2012.
When NSA Director Admiral Mike Rogers became aware of questionable access to the NSA files, he called for a full compliance review of the system. Sundance reports:
On April 18, 2016, following the preliminary audit results, Director Rogers shut down all FBI contractor access to the database after he learned FISA-702 “about”(17) and “to/from”(16) search queries were being done without authorization.
Thus, begins the first discovery of a much bigger background story.
When you compile the timeline with the people involved; and the specific wording of the resulting NSA review, which was then delivered to the FISA court; and then you overlay the activity that was taking place in the 2016 political primary; what we discover is a process where the metadata collected by the NSA was being searched for political opposition research and surveillance.
Let’s look at that timeline.
March 2, 2016, Trump wins seven states (VT, AR, VA, GA, AL, TN, MA).
March 5, 2016, Trump wins Kentucky and Louisiana.
March 8, 2016, Trump wins Michigan, Mississippi and Ohio.
On March 9th, NSA security alerts were triggered about questionable activity going on within the NSA database. Why?
This is just speculation. Initially Trump was seen as an outsider with little chance of being nominated. Some thought he was in it just for the publicity. But, with Trump becoming the probable nominee, the Dems were likely scrambling to back fill info on Trump. Except for Ben Carson, all the others were politicians of long standing. The dossiers on them were probably quite extensive and had been compiled via illegal searches over the years.
Without identifying the individuals in question, Judge Collyer supports this conclusion by indicating in her report that “many of these non-compliant queries involved the use of the same identifiers over different date ranges.”
April, 18, 2016, Admiral Rogers shuts down FBI “contractor” access to the NSA database.
Just who were these contractors? That has been a very well-kept secret. The possibilities are endless. Crowdstrike was a known FBI contractor and was also contracted by the DNC. From the Michael Sussman trial we know that Neustar was such a contractor. They used Georgia Tech to assemble data and deliver a false report about Trump-Russia connections.
Sundance notes:
FBI Director James Comey’s special friend Daniel Richman was also an unpaid FBI “special employee” with security access to the database. Nellie Ohr began working for Fusion-GPS on the Trump project in November 2015 and she was a previous open-source CIA contractor; and now that we know the FBI and Perkins Coie were in a collaborative relationship, we can also see the DNC law firm as FBI contractors with similar clearances and access.
The Perkins Coie law firm had an open portal into the FBI databases according to a whistleblower. The FBI had apparently collocated work space within the firm’s offices in DC.
There are undoubtedly many more who were involved.
Rogers shut down all of this access. This created a problem for Obama and the Demo-Communists. The problem was how to re-establish information flow that could be used as opposition research. If the NSA flags had never been triggered, there would have been no need to create some quasi-legal backdoor to continue surveillance.
Enter the CIA and the use of confidential human sources (CHS’s) to infiltrate the Trump campaign.
Sundance reports:
Immediately after NSA flags were raised March 9, 2016, the same FBI and CIA intelligence agencies began using confidential human sources (CHS’s) to run into the Trump campaign. By activating intelligence assets like Joseph Mifsud and Stefan Halper the IC (CIA, FBI) and system users had now created an authorized way to continue the same political surveillance operations.
When Donald Trump hired Paul Manafort on March 28, 2016, it was a perfect scenario for those doing the surveillance. Manafort was a known entity to the FBI and was previously under investigation. Paul Manafort’s entry into the Trump orbit was perfect for Glenn Simpson to sell his prior research on Manafort as a Trump-Russia collusion script two weeks later.
The shift from “unauthorized exploitation of the NSA database” to legally authorized exploitation of the NSA database was now in place. This was how they continued the political surveillance. This is the confluence of events that originated “spygate”, or what officially blossomed into the FBI investigation known as “Crossfire Hurricane” on July 31.
Let me add a note to this process. The Obama administration was desperate. They actually went to a FISA judge in early June for a FISA warrant with evidence that was so flimsy they were turned down. Imagine how thin that packet must have been.
During any given year FISA judges approve FISA warrants that number in the thousands. During the same time period the number that are denied is in the single digits. It was only after using multiple CHS’s to set up evidence that the warrant was granted on July 31, 2016. This became the Crossfire Hurricane investigation.
How did it work going forward from here? That will be explored in Part 5. This is where the shocking breadth of what the government can do to any American will be exposed.