Thursday, August 11, 2022

Part 2 – Why Did the DOJ and FBI Execute the Raid on Trump – The Evidence Within the Documents

Background

  • During the timeframe of December 2015 through April 2016 the NSA database was being exploited by contractors within the intelligence community, specifically within the FBI, doing unauthorized searches
  • President Trump carried documents that outlined how this process took place as it pertained to his entry into politics, thus the raid to retrieve them
  • When you compile the timeline with the people involved; and the specific wording of the resulting NSA review, which was then delivered to the FISA court; and overlay the activity that was taking place in the 2016 political primary, you discover a process where the metadata collected by the NSA was being searched for political opposition research and surveillance

During the Obama administration, access to the NSA database was continually used to conduct surveillance

  • This is the critical point that leads to understanding the origin of "Spygate", as it unfolded in the Spring and Summer of 2016
  • The discovery of the database exploitation and the removal of access as a surveillance tool caused the initial problem for the FBI political unit in Washington, DC

In December 2015 there were 17 GOP candidates, all needing opposition research.

  • When Donald Trump won New Hampshire, Nevada and South Carolina the field was significantly whittled down to Trump, Cruz, Rubio, Kasich and Carson

The next day, March 9, 2016, is when NSA security alerts warned internal oversight personnel that something sketchy was going on

  • The NSA database was how political surveillance was being conducted during Obama's second term in office
  • When the system was flagged, and when NSA Director Mike Rogers shut down "FBI contractor" access to the system, the system users needed to develop another way to get access
  • There were tens-of-thousands of unauthorized search queries; and there is no reason to believe the 85% non-compliant rate was any different from the abuse of the NSA database going back to 2012, the same year the FBI collocated a workspace within Perkins Coie.

How Did It Work?

  • Immediately after NSA flags were raised March 9, 2016, the same FBI and CIA intelligence agencies began using confidential human sources (CHS’s) to run into the Trump campaign
  • By activating intelligence assets like Joseph Mifsud and Stefan Halper the IC (CIA, FBI) and system users had now created an authorized way to continue the same political surveillance operations
  • Once they created the FBI surveillance door, Fusion-GPS was needed to get the FBI known commodity of Chris Steele activated as a pipeline
  • One mistake from the database extraction, likely during an "about" query, shows up as a New Yorker named Michael Cohen in Prague

Internal auditors noted the FBI was sharing “raw FISA information, including but not limited to Section 702-acquired information”

  • who were they sharing it with? Perkins Coie?
  • The raw search returns were being shared with unknown entities without any attempt to “minimize” or “redact” the results
  • the person(s) attached to the search results were named and obvious
  • database access was from the FBI network

Many of these non-compliant queries involved the use of the same identifiers over different date ranges.

  • This tells us the system users were searching the same phone number, email address, and/or electronic identifier repeatedly over different dates.
  • Put another way, specific person(s) were being tracked/monitored.

Who was 2012 FBI Director?

  • Robert Mueller
  • Who was Mueller’s chief-of-staff? Aaron Zebley
  • John Brennan
  • James Clapper
  • Ash Carter
  • Wanted NSA Director Mike Rogers fired in 2016
  • Also signed off on the January 2017 Intelligence Community Assessment

Who was involved?

  • Private contractors with access to “raw FISA information that went well beyond what was necessary to respond to FBI’s requests".

Summary:

  • FISA court identified and quantified tens-of-thousands of search queries of the NSA/FBI database using the FISA-702(16)(17) system.
  • The database was repeatedly used by persons with FBI contractor access who unlawfully searched and extracted the raw results without redacting the information and shared it with an unknown number of entities.

The beginning decision to use FISA(702) as a domestic surveillance and political spy mechanism appears to have started in/around 2012

  • Spygate, Russia-Gate, the Steele Dossier, and even the 2017 Intelligence Community Assessment were needed to create a cover-story and protect themselves from discovery of this four-year weaponization, political surveillance and unlawful spying
  • Everything that comes after March 9, 2016, had a dual purpose: (1) done to cover up the weaponization of the FISA database.
  • (2) they needed to keep the surveillance going.

NSA Director Mike Rogers explains how he was notified of what was happening and what he did after the notification

  • Knowing that Perkins Coie and the FBI were working together on this targeting operation, makes everything else make sense
  • The involvement of official government agencies like NSA Admiral Mike Rogers creates a paper trail
  • Search queries, notifications to Mike Rogers, and notifications to the FISA Court all create an internal trail of government documents that become a risk to the people who operate within the system
  • Trump filed a civil lawsuit against the Clinton campaign and everyone involved in the targeting operation 

https://theconservativetreehouse.com/blog/2022/08/11/part-2-why-did-the-doj-and-fbi-execute-the-raid-on-trump-the-evidence-within-the-documents/ 

No comments: