37
Comments (2)
sorted by:
1
TZPO [S] 1 point ago +1 / -0

LIKE A VIRAL PARASITE, SURVEILLANCE ABUSE MUTATED AND GREW AS IT PASSED THROUGH VARIOUS ORGANS OF THE HOST: “Working with a timeline, but also referencing origination material in 2015/2016 – CTH hopes to show how the program operated.  This explains an evolution from The IRS Files in 2010 to the FISA Files in 2016.

The FISA-702 database extraction process, and utilization of the protections within the smaller intelligence community, was the primary process.  We start by reviewing the established record from the 99-page FISC opinion rendered by Presiding Judge Rosemary Collyer on April 26th, 2017...

Judge Collyer outlines how the DOJ, which includes the FBI, had an “institutional lack of candor” in responses to the FISA court.  In essence, they were continually lying to the court about their activity, and the rate of fourth amendment violations for illegal searches and seizures of U.S. persons’ private information for multiple years.

Unfortunately, due to intelligence terminology Judge Collyer’s brief and ruling is not an easy read for anyone unfamiliar with the FISA processes outlined. The complexity also helps the media avoid discussing, and as a result most Americans have no idea the scale and scope of the issues...

The NSA compliance officer alerted Admiral Mike Rogers who then initiated a full compliance audit on/around March 9th, 2016... While the audit was ongoing, due to the severity of the results that were identified, Admiral Mike Rogers stopped anyone from using the 702(17) “about query” option, and went to the extraordinary step of blocking all FBI contractor access to the database on April 18, 2016 (keep these dates in mind).

The key takeaway from these first paragraphs is how the search query results were exported from the NSA database to users who were not authorized to see the material.  The FBI contractors were conducting searches and then removing, or ‘exporting’, the results...

FISA-702(16) is a search of the system returning a U.S. person (“702”); and the “16” is a check box to initiate a search based on “To and From“.   Example, if you put in a date and a phone number and check “16” as the search parameter the user will get the returns on everything “To and From” that identified phone number for the specific date.  Calls, texts, contacts etc.  Including results for the inbound and outbound contacts.

FISA-702(17) is a search of the system returning a U.S. person (702); and the “17” is a check box to initiate a search based on everything “About” the search qualifier.  Example, if you put a date and a phone number and check “17” as the search parameter the user will get the returns of everything about that phone.  Calls, texts, contacts, geolocation (or gps results), account information, user, service provider etc.  As a result, 702(17) can actually be used to locate where the phone (and user) was located on a specific date or sequentially over a specific period of time which is simply a matter of changing the date parameters.

And that’s just from a phone number.

Search an ip address “about” and read all data into that server; put in an email address and gain everything about that account. Or use the electronic address of a GPS enabled vehicle (about) and you can withdraw more electronic data and monitor in real time.  Search a credit card number and get everything about the account including what was purchased, where, when, etc.  Search a bank account number, get everything about transactions and electronic records etc.  Just about anything and everything can be electronically searched; everything has an electronic ‘identifier’.

The search parameter is only limited by the originating field filled out.  Names, places, numbers, addresses, etc. By using the “About” parameter there may be thousands or millions of returns.  Imagine if you put “@realdonaldtrump” into the search parameter? You could extract all following accounts who interacted on Twitter, or Facebook etc.  You are only limited by your imagination and the scale of the electronic connectivity.

As you can see below, on March 9th, 2016, internal auditors noted the FBI was sharing “raw FISA information, including but not limited to Section 702-acquired information”.

In plain English the raw search returns were being shared with unknown entities without any attempt to “minimize” or redact the results.  The person(s) attached to the results were named and obvious.  There was no effort to hide their identity or protect their 4th amendment rights of privacy...

What’s the scale here? ...The operators were searching “U.S Persons”.  The review of November 1, 2015,  to May 1, 2016, showed “eighty-five percent of those queries” were unlawful or “non compliant”.

85% !! ...Tens of thousands of searches over four years (since 2012), and 85% of them are illegal. 

...that’s the stunning scale; but who was involved?

Private contractors with access to “raw FISA information that went well beyond what was necessary to respond to FBI’s requests“...

As noted, the contractor access was finally halted on April 18th, 2016.

[Coincidentally (or not), the wife of Fusion-GPS founder Glenn Simpson, Mary Jacoby, goes to the White House the next day on April 19th, 2016.]

None of this is conspiracy theory. All of this is laid out inside this 99-page opinion from FISC Presiding Judge Rosemary Collyer who also noted that none of this FISA abuse was accidental in a footnote on page 87:  “deliberate decisionmaking“...

The FISA court identified and quantified tens-of-thousands of search queries of the NSA/FBI database using the FISA-702(16)(17) system.  The database was repeatedly used by persons with contractor access who unlawfully searched and extracted the raw results without redacting the information and shared it with an unknown number of entities.

The outlined process certainly points toward a political spying and surveillance operation; and we are not the only one to think that’s what this system is being used for.

Back in 2017 when House Intelligence Committee Chairman Devin Nunes was working to reauthorize the FISA legislation, Nunes wrote a letter to ODNI Dan Coats about this specific issue...

NSA Director Admiral Mike Rogers eventually took away the “About” query option permanently in 2017. NSA Director Rogers said the abuse was so inherent there was no way to stop it except to remove the process completely. [SEE HERE]  Additionally, the NSA database operates as a function of the Pentagon, so the Trump administration went one step further.  On his last day as NSA Director Admiral Mike Rogers -together with ODNI Dan Coats- put U.S. cyber-command, the database steward, fully into the U.S. military as a full combatant command...

There is little doubt the FISA-702(16)(17) database system was used by Obama-era officials, from 2012 through April 2016, as a way to spy on their political opposition.  Quite simply there is no other intellectually honest explanation for the scale and volume of database abuse that was taking place...

When we reconcile what was taking place and who was involved, then the actions of the exact same principle participants take on a jaw-dropping amount of clarity.

All of the action taken by CIA Director Brennan, FBI Director Comey, ODNI Clapper and Defense Secretary Ashton Carter make sense.  Including their effort to get NSA Director Mike Rogers fired.

Everything after March 9th, 2016, was done to cover up the weaponization of the FISA database. [Explained Here]  Spygate, Russia-Gate, the Steele Dossier, and even the 2017 Intelligence Community Assessment (drawn from the dossier and signed by the above) were needed to create a cover-story and protect themselves from discovery of this four year weaponization, political surveillance and unlawful spying.  Even the appointment of Robert Mueller as special counsel makes sense; he was FBI Director when this began.

The beginning decision to use FISA(702) as a domestic surveillance and political spy mechanism appears to have started in/around 2012. Perhaps sometime shortly before the 2012 presidential election and before John Brennan left the White House and moved to CIA. 

However, there was an earlier version of data assembly that preceded this effort... the weaponization of the IRS.  This is where the term “Secret Research Project” originated as a description from the Obama team.  It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller.  It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse...

The IRS scandal was never really about the IRS, it was always about the DOJ asking the IRS for the database of information.  That is why it was transparently a conflict when the same DOJ was tasked with investigating the DOJ/IRS scandal.  Additionally, Obama sent his chief-of-staff Jack Lew to become Treasury Secretary; effectively placing an ally to oversee/cover-up any issues.  As Treasury Secretary Lew did just that...

A few months after realizing the “Secret Research Project” was now worthless (June 2012), they focused more deliberately on a smaller network within the intelligence apparatus and began weaponizing the FBI/NSA database.

Fusion GPS was not hired in April 2016 to research Donald Trump.  As shown in the evidence provided by the FISC, the intelligence community was already doing surveillance and spy operations. The Obama administration already knew everything about the Trump campaign, and were monitoring everything by exploiting the FISA database.

However, after the NSA alerts in/around March 9th, 2016, and particularly after the April 18th shutdown of contractor access, the Obama intelligence community needed Fusion GPS to create a legal albeit ex post facto justification for the pre-existing surveillance and spy operations.  Fusion GPS gave them that justification in the Steele Dossier.

That’s why the FBI small group, which later transitioned into the Mueller team, are so strongly committed to and defending the formation of the Steele Dossier and its dubious content.  The Steele Dossier contains the cover-story and justification for the surveillance operation.

A valid FISA warrant would help the FBI cover-up the surveillance.   The likely targets were Manafort, Flynn and Papadopoulos…. but it appears the DOJ/FBI were rebuked. These FISC denials would then initiate institutional panic dependent on the election outcome.  An insurance policy would be needed.   The Steele Dossier becomes the investigative virus the FBI wanted inside the system. To get the virus into official status, they used the FISA application as the delivery method and injected it...

Fusion-GPS gave them the justification they needed for a FISA warrant with the Steele Dossier.  Ultimately that’s why the Steele Dossier is so important; without it, the DOJ and FBI are naked with their FISA-702 abuse”

https://theconservativetreehouse.com/2019/04/23/the-obama-use-of-fisa-702-as-a-domestic-political-surveillance-program/#more-162842

1
deleted 1 point ago +1 / -0