RealWeekendWarrior – March 23rd, 2023
NASA research has led me here.



“I’m Telling You, He Did It”
He made the decision in order to bolster his re-election chances as a War President. ~Seymour Hersh
Paul Joseph Watson
Last month, Hersh published a report asserting that the pipelines were destroyed by the US as part of a covert operation.
According to Hersh’s sources, the explosives were planted in June 2022 by US Navy divers under the guise of the BALTOPS 22 NATO exercise and were detonated three months later with a remote signal sent by a sonar buoy.
One source told Hersh that the plotters knew the covert operation was an “act of war,” with some in the CIA and State Department warning, “Don’t do this. It’s stupid and will be a political nightmare if it comes out.”
Last week, the New York Times reported that a “pro-Ukrainian group” had sabotaged the pipelines, using a team with as few as six people involved in the mission, contradicting previous assumptions that only a state would have had the resources to carry out the operation.
According to Hersh, referring to Biden, “He did it. He did it, I’m telling you, he did it, adding, The Biden game is to wait it out and never say yes.”
The journalist claimed that Biden wanted to escalate the conflict in order to position himself as a war president.
“I think Biden also saw beating up Russia as a ticket. Jack Kennedy is a classic example – presidents always did well politically in wars,” he said.
Hersh claimed that Biden made the decision in January 2022 to “see if we can find a way to blow… those pipelines, and put [the Russians] back in the dark ages.”
The Pulitzer-Prize winner went on to savage the legacy media for completely failing to follow up on his report that the U.S. was responsible for the attack, which took out three of the four pipelines.
Meanwhile, China has reacted with skepticism towards the explanation that a pro-Ukrainian group was responsible for the blasts.
During a press briefing, Foreign Ministry spokesman Wang Wenbin called for “an objective, impartial and professional investigation” into the bombing.
“We have noted that some Western media have been mysteriously quiet after Hersh reported that the US was behind the Nord Stream blast. But now these media are unusually simultaneous in making their voice heard. How would the US account for such abnormality? Is there anything hidden behind the scene?” Wang asked.
New reports also reveal that a German spy ship was in the area where the attack occurred at the time of the blasts on September 26.
According to a report by German magazine Der Spiegel, the CIA warned Berlin about a potential attack on gas pipelines in the Baltic Sea weeks before it happened.
Header featured image (edited) credit: Hersh/Robert Daemmrich Photography Inc / Contributor via Getty Images
Emphasis added by (TLB) editors
The Liberty Beacon Project is now expanding at a near exponential rate, and for this we are grateful and excited! But we must also be practical. For 7 years we have not asked for any donations, and have built this project with our own funds as we grew. We are now experiencing ever increasing growing pains due to the large number of websites and projects we represent. So we have just installed donation buttons on our websites and ask that you consider this when you visit them. Nothing is too small. We thank you for all your support and your considerations … (TLB)
Comment Policy: As a privately owned web site, we reserve the right to remove comments that contain spam, advertising, vulgarity, threats of violence, racism, or personal/abusive attacks on other users. This also applies to trolling, the use of more than one alias, or just intentional mischief. Enforcement of this policy is at the discretion of this websites administrators. Repeat offenders may be blocked or permanently banned without prior warning.
Disclaimer: TLB websites contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to our readers under the provisions of “fair use” in an effort to advance a better understanding of political, health, economic and social issues. The material on this site is distributed without profit to those who have expressed a prior interest in receiving it for research and educational purposes. If you wish to use copyrighted material for purposes other than “fair use” you must request permission from the copyright owner.
Disclaimer: The information and opinions shared are for informational purposes only including, but not limited to, text, graphics, images and other material are not intended as medical advice or instruction. Nothing mentioned is intended to be a substitute for professional medical advice, diagnosis or treatment.
House Committee on the Judiciary – Streamed live on Mar 10, 2023
| Hearing on the Weaponization of the Federal Government | Select Subcommittee on the Weaponization of the Federal Government | EVENT ID 115442|
TWITTER: https://twitter.com/HouseJudiciary
FACEBOOK: https://www.facebook.com/HouseJudDems/
INSTAGRAM: https://www.instagram.com/housejuddems/
MEDIUM: https://medium.com/housejudiciary
Please sign up for updates from our committee below: https://judiciary.house.gov/news/docu…
By TONY MOBILIFONITIS
A RANTING little pro-vax “mom” bursts onto media, surrounded by placard carriers, and accuses anti-vaxxers of endangering her and her children’s lives. A few years pass and the actor becomes a star player in a massive disinformation campaign backed by the CIA and the mainstream media pushing vaccines in preparation for the Covid plandemic.
The ranting “little mom” was Renee DiResta, aka “#DeepStateDiResta”, as she is now tagged on Twitter thanks to Elon Musk. DiResta was exposed as a CIA operative in Twitter Files dropped on Thursday (US time) by former Rolling Stone reporter Matt Taibbi. In the video clip DiResta is shown demanding passage of SB277, the totalitarian state bill that stripped Californians of their right to decline vaccinations.
After posing as a “battling mom” DiResta went on to be rewarded with the cosy and well-paying positions doled out by CIA businesses. She became director of research at Yonder (formerly named New Knowledge) “a company from Austin, Texas, that specializes in information integrity”, which roughly translated means “a company designed to manipulate information for the private sector on behalf of the CIA”. Yonder in fact showed its CIA/deep state colours when it helped build the “Russian interference in the 2016 US presidential election” narrative.
DiResta is the current technical research manager for the Stanford Internet Observatory, the “cute” name for a internet monitoring and analysis site that targets so-called disinformation, which means information that contradicts the globalist narratives of think tanks, big business and the governments they own.
More recently, Yonder’s CEO and researchers funnelled “expert commentary” to the New York Times and Axios about “5G and COVID-19 misinformation”. Apparently the Times and Axios reporters were too stupid to find out for themselves what was true about 5G and Covid and what wasn’t.
DiResta went on to become a founding member of Haven, a logistics company providing all the latest software to make global trade run smoothly. Not a bad step-up for a “little mom” speaking her mind about unjabbed children. She also appeared in the documentary The Social Dilemma and is a contributor at Wired and The Atlantic… naturally.
Taibbi meanwhile, has just appeared before a committee in the US House of Representatives exposing the massive disinformation operation involving the mainstream media’s so-called fact-checking network and organisations like the Institute for Strategic Dialogue, who call themselves “a fiercely independent global organisation dedicated to powering solutions to extremism, hate and disinformation.”
The dishonesty and stupidity of this organisation would be laughable if it wasn’t serious. This is what they say about some hot topics covered by Cairns News: “‘Climate lockdown’ conspiracies have gained traction since the pandemic, most recently seeping into discussions of ‘15-minute cities’, trying to turn public opinion against climate action by claiming govt overreach & sinister motives.” This is high-school level commentary at its best.
Last year Taibbi was fed some 600,000 pages of “Twitter files” from an online source. One of the first topics covered was the pre-Musk Twitter’s censorship of the Biden laptop story. Taibbi said his computer lit up like a Los Vegas slot machine. “In one remarkable email, the Virality Project recommends that multiple platforms take action even against “stories of true vaccine side effects” and “true posts which could fuel hesitancy,” Taibbi tweeted.
He said the pre-Musk Twitter “was more like a partner to government. With other tech firms it held a regular “industry meeting” with FBI and DHS, and developed a formal system for receiving thousands of content reports from every corner of government: HHS, Treasury, NSA, even local police…”
His comments on Thursday referred to the “Censorship-Industrial Complex’s” recent report called “Information Disorder”, compiled after a conference hosted by the globalist Aspen Institute at Aspen… of course: “Their taxpayer-backed conclusions: the state should have total access to data to make searching speech easier, speech offenders should be put in a “holding area,” and government should probably restrict disinformation, “even if it means losing some freedom.”
“The report was co-authored by Katie Couric and Chris Krebs, the founder of the DHS’s Cybersecurity and Infrastructure Security Agency (CISA). Yoel Roth of Twitter and Nathaniel Gleicher of Facebook were technical advisors. Prince Harry joined Couric as a Commissioner,” Haibbi Tweeted.
Story will continue:
Attorney Mike Davis has some good constructive criticism surrounding the current construct and status of the House Select Subcommittee on the Weaponization of Govt. {Direct Rumble Link}
As Mr. Davis notes the current allocated budget ($2 million) and staffing (5 persons) of the committee itself does not reflect a priority, and the demands of the regular House Judiciary Committee upon Jim Jordan (chairs both) means his time focused on the subcommittee is curtailed.
I’m not sure the issue is as dire as Davis notes; obviously we do not know the background work that might be taking place; but the lack of general urgency -in combination with the history of the GOP in congress- does lend credibility to the overall concerns. WATCH:
.
My own perspective on the challenge is somewhat conflicted. On one hand the scale of addressing the issue of this size doesn’t fit the traditional model of legislative oversight. On the other hand, this entire process is the only one available that conforms to the role of government oversight.
I have previously outlined the scale of the opposition the House Subcommittee faces and will face. Knowing the size of the opposition, you can make an argument that it takes a long time to prepare for this battle. However, the issues raised by Mike Davis are fair and legitimate.
I am cynical about congress’s ability, given the scope of the effort required. However, we live our best life and remain pragmatically hopeful. If they have genuine intent, we will all benefit. The only thing we can do is provide proactive input and advice; ultimately, it is up to the republicans in congress to determine if this is their priority.
BACKGROUND – The 118th Congress has authorized a “Select Subcommittee on the Weaponization of the Federal Government.” The subcommittee falls under the jurisdiction of the House Judiciary Committee led by Chairman Jim Jordan. Additionally, Thomas Massie (R-KY) is being reported as a representative under consideration for the chairmanship of the House Subcommittee.
House Judiciary Chairman Jim Jordan should have a grasp of the scale and scope of the opposition they are about to face. Assuming they have a fully prepared staff to support them – willing to take on a very consequential investigation; then we begin by first anticipating who will oppose their effort to investigate the “weaponization of government“. Which is to say, everyone!
The defensive apparatus of the DC political system will likely do everything in their power, individually and with collective assistance, to ensure this committee fails. The stakes are quite high. As readers here can well attest, DC politics is an institutional system of purposefully created compartmentalized silos.
The compartmented information silos permit plausible deniability, and this collection of weaponized institutions contains career bureaucrats who view their opposition as the American people.
Example – The Senate Select Committee on Intelligence (SSCI), and every Republican member therein, including SSCI Vice-Chairman Marco Rubio, will make it their willfully blind priority to obstruct any investigation that touches on how the intelligence apparatus of the United States Government is weaponized against the people.
The SSCI is the institution that facilitated the creation of the National Security State. Any effort to investigate the outcome of that system will make the House investigators adversarial to their colleagues in the Senate.
Additionally, every executive branch intelligence institution, including the DOJ-NSD, FBI, DHS, ODNI, CIA, DoD, DIA, NSC and every sub-agency within their authorities, will do anything and everything to block a subcommittee looking into their domestic activity.
A lot of bad decisions have led to really bad things. DC does not want those bad things discussed.
Every national security justification that exists, and some that have yet to be created by the DOJ National Security Division solely for the expressed interest of blocking this subcommittee, will be deployed.
Every member of the subcommittee and their staff will be under constant surveillance. Phones will be tapped and tracked, electronic devices monitored, cars and offices bugged, physical surveillance deployed, and top tier officials at every subsidiary agency of the U.S. government will assign investigative groups and contract agents to monitor the activity of the subcommittee and provide weekly updates on their findings.
The White House together with the National Security Council will also backchannel to and from these agencies doing the surveillance.
The intelligence apparatus media will be deployed, and daily leaks from the various agencies to their contact lists in the New York Times, Politico, Wall Street Journal, Washington Post, ABC, CBS, NBC, CNN and MSNBC will be in constant two-way communication for narrative assembly and counterpropaganda efforts.
This is the context of opposition to begin thinking about before anything moves forward.
Additionally, the national security state will demand the House investigation take place on their terms. They will demand secrecy, national security classification and require House subcommittee members to adhere to the Intelligence Community terms for review and discussion of anything.
Each agency will not voluntarily assist or participate in the investigation of any of their conduct. Every official within every agency will do the same; and they will require legal representation that will be provided to them by Lawfare, political operatives skilled in the use of “National Security” and “classified information”, as a justification for non-compliance and non-assistance. A protracted legal battle should be predicted.
Lastly, anticipate Special Counsel Jack Smith using his position to block the House Subcommittee from receiving evidence. The House should anticipate that congressional representatives are already under investigation as a result of the authorities granted to Jack Smith by Deputy Attorney General Lisa Monaco {Go Deep}. The White House and all of the executive branch agencies will use the existing Special Counsel to block House investigation. Heck, that looks to be the primary purpose of the appointment.
As a result, expect the House Subcommittee members to be under constant threat from the DOJ, via the Special Counsel, specifically from DAG Lisa Monaco, with statements that House Subcommittee investigative efforts are “obstructing” a special counsel investigation. The aforementioned agencies and the Senate Intel Committee will work with the DOJ to use the Jack Smith special counsel as a shield to block participation with the House Subcommittee.
♦ First, everything has to be done in sunlight and maximum transparency, even the planning and organization of the committee construct, purpose and goals.
The committee can have no shadow operations, unknown guiding hands or secrets that can be discovered and then weaponized against the intent. Sunlight is the best disinfectant.
I know DC has little concept of working like this, but you can train yourself to do it. You have nothing to hide; however, those who are being investigated have everything to hide. Do not provide them ammunition by retaining secrets that can be weaponized against you.
As Andrew Breitbart said, be open with your secrets.
Your second cousin Alice will be a source for the New York Times to write about the Thanksgiving dinner three years ago when she heard the “N” word or a tasteless joke about something outrageous. Every member of the committee and staff need to prepare for a dossier completed by the FBI about them and distributed to the government allies in mainstream media.
Security clearances will be leveraged and threatened as a tool of the national security state to stop the secrecy envelope from being opened publicly. This will happen; so just anticipate it. When the security clearance of [insert_name_here] is threatened, go to the microphones and tell the public who is doing the threatening, and why.
♦GOALS – The goal needs to be crystal clear to anyone and everyone who would contemplate assisting. Yes, there needs to be a legislative intent in order to legally formulate the committee; that’s a no-brainer. However, the ultimate goal should NOT BE accountability on those who may have perpetrated or supported weaponized activity against American Citizens. The ultimate goal SHOULD BE for maximum public information, transparency and sunlight about the weaponization as it is discovered.
Let us assume the goal is accepted. Before moving forward, the subcommittee needs a professional communication strategy in place before the rules, terms and member outlines are structured or made public.
A thoughtful communication strategy so that information can come from the committee to the public without the filtration of a corrupt system that will bend and skew the findings as a weapon against the committee itself.
♦COMMUNICATION PORTAL – Hire a communication staff, and set up a website for the sharing of information directly from the committee to the public. The daily activity of the committee should be shared publicly in granular detail. The witness names as scheduled, documents requested, everything that involves the committee activity should be known to the general public. This system should be updated at least DAILY, or as information is compiled.
This communication network should also contain a separate staff assigned to solicit, accept and distribute information provided by the public to the subcommittee. Yes, you read that correctly, the subcommittee website should be able to accept information provided by the public as it relates to the ongoing committee work.
Crowdsource We The People as research leverage against the much more effective Lawfare operations you will face in opposition. This means a portal where the ‘open source’ information can be delivered by researchers, many of those on the spectrum, who hold deep knowledge of the information and system processes in the silos.
In the past several years, thousands of documents have been retrieved by FOIA and public records investigations. Hundreds of experts in the granular details of the DHS, FBI, DoD and DOJ-NSD systems have knowledge that can benefit the committee; you just need a way for them to transmit the evidence/information to you.
That ‘open source’ evidence should flow into the committee portal with address sourcing that allows the committee staff to review and locate it independently. This avoids the predictable counterargument, from the national security state, that Russia (or foreign actors) is feeding disinformation into the committee.
The documentary evidence will mostly be “open source,” extracted and then cross-referenced from within the multiple silo system the national security state uses as a shield. And the origination of the documents will be traceable and easy to duplicate, thereby providing secure provenance. The internal staff manager for this inbound portal is critical (think former HPSCI Nunes staff).
Documents found by the committee should then be uploaded to the same communication system (website), permitting the public -especially the autists- to review and then cross reference the committee material; ultimately channeling information back into the committee if important dots connect or puzzle pieces clarify. Think of this as a massive counter Lawfare operation with hundreds of Deep State subject matter experts assisting the committee.
Witness transcripts should be uploaded within 36 hours of testimony. Then let the public do the research, background review and dot connecting from the testimony. If you build it, they will come.
♦ Next, GO PUBLIC with everything. Do not use the terms and conditions of the secretive administrative state. Tell the public what you are finding as you are finding it. You can share information without violating “sources and methods.” Schedule a media appearance at the 8pm hour twice weekly with a high visibility broadcast media network to provide updates and answer questions.
These scheduled appearances should be in addition to random media press releases and press comments as pertinent information to the subcommittee arrives. What this means is that you do not wait to produce a 2,000-page final report before releasing the information. The final report should be an update and summary of all previous findings that have been released to the public along the way.
♦ At the outset, put no rules on media contacts with any subcommittee staff or member. Counter the darkness that fuels the intelligence community agenda with maximum sunlight and transparency. Use truth as a weapon against disinformation. That means no nondisclosure agreements at any part of the process.
Yes, this is radical change in approach, but this is also a radical enemy you are facing. Playing the secrecy game works in their favor, not yours. Transparency is your tool, not theirs – use it.
Use truth as a weapon.
Every member of the committee can say anything they want about any of the material or witness testimony they hear during the course of the investigation. Public hearing or closed-door sessions, it matters not. The same rule applies. Committee members are completely free to discuss any findings as the information is reviewed.
The goal should NOT BE accountability on those who may have perpetrated or supported weaponized activity against American Citizens. The goal SHOULD BE for maximum public information, transparency and sunlight about the weaponization as it is discovered. This approach makes We The People the accountability portion of the process. As a result, the next section is again rather groundbreaking….
♦ Every witness to the committee should be granted full legal immunity provided by the House and House Speaker for anything said during the testimony or admitted as being done as part of the evidence fact-finding. Again, the goal is transparency and openness, not prosecution and accountability. Use sunlight as a weapon to draw out the truth, then let the American people be the judges of what that truth means when contrasted against the constitution of our nation.
Let me repeat this… There should be ZERO legal liability for any conduct that happened as a part of any witness effort to weaponize the United States government against the American people. The immunity should cover everything *except* perjury from the witness to the committee itself (ex. Oliver North). If the witness lies, the immunity evaporates.
Why this approach? Because (a) it circumvents any issues that might impede testimony, removes hurdles; (b) immunity compels confession, honest sunlight and the urgency of the situation; (c) immunity makes the truth more likely; and finally, (d) you are not going to get legal convictions anyway. The truth has no agenda.
Another reason for the immunity is because the operation of the subcommittee should be heavily focused on witness testimony, not documents. The documents can come as part of the follow-up to the witness testimony, but it is the witness testimony needed; the publication of the transcripts then provides the public sunlight. This is key.
90% of the committee work should be focused on witnesses and questions therein. Only 10% of the committee work should be seeking documents. Avoiding the documents shortens the time needed for investigative disclosures and avoids protracted legal battles therein. If the people on the committee, those who are asking the questions, do not already know the details behind the questions and the locations of the supportive documents, then you have the wrong people on the committee.
Every response to a questioned witness should come with the following question: “How do you know this?” That is how you will discover the nature of the documents, communications, emails etc that support the fact-finding mission. “How do you know this” also leads to more witnesses. Work the issue from the bottom up. How do you know this; who told you this; why did you do this; what authority guided you; who authorized this approach? etc. etc. etc.
Use fully immunized witnesses to tell the story, then go look for the documents to corroborate the witness statements using the ‘under oath’ transcript as part of the impenetrable subpoena itself; but don’t wait, keep questioning witnesses.
♦DOCUMENTS – Once you identify the location of documents that would assist the sunlight objective, don’t only rely on the government side of the conversation as the targeted source for retrieval. If the document contains communication to external parties, ie public-private partnership, then move to gain the documents from the private side, thereby avoiding the roadblocks inside government.
Regardless of the status of the document search, and regardless of whether legal battles will be needed to retrieve those documents, keep moving forward with the witness testimony. Do not stop committee work just because internal silo opposition is being fought. Keep working the plan and bringing immunized witnesses, both inside government and outside government, forward for questioning. Leaders within organizations and agencies are important, but clerks, staff, and administrative aides in/around those same leaders could also provide important information.
This subcommittee approach, along with the people needed, will obviously take more time to assemble. However, once put together everything thereafter moves at a very rapid pace, which is also part of the strategy. Flood the information zone with maximum sunlight and keep the opposition off balance.
The goal is sunlight. Rip the Band-Aid off, call the baby ugly and start the process to fix this crap by exposing it. Restore the First and Fourth Amendments, and heal the injury.
From the Church Commission we got the secret FISA court and more tools for violations of our Fourth Amendment rights. From the 911 Commission we got The Patriot Act, DHS, TSA, DNI and many more violations of our rights and Fourth Amendment protections. We do not need any legislation as an outcome of the House “Select Subcommittee on the Weaponization of the Federal Government.”
We do not need your legislative help. All prior legislative help only ended up making things worse.
What we need is a full, uncensored, brutally honest expose’ of how bad things have become and how that system can be dismantled. The existing constitution is the protection, just remove the stuff that is violating it.
I know this approach is rather different from the norm. However, if this roadmap seems reasonable, I am certain you will find support from within the silo system that is currently operating, and from people outside the government who will volunteer time and effort to assist.
Summarized: (1) Know the scale of opposition. (2) Formulate a communication strategy around it and build a website. (3) Communicate findings by telling the story to the American people as it is discovered. (4) Grant immunity to all witnesses. (5) Don’t wait until the end to generate another useless report that few will read. (6) Make sunlight the motive of the committee. (7) Consider success when the American people can see the problem. (8) Dissolve any weaponized systems. (9) Don’t create new ones.
If you tell us the truth, We The People will fix it ourselves.
ChristianPatriotNews – March 5th, 2023
Get Your Gold IRA FREE Investor Guide Today! Click Below 👇👇👇
https://www.patriotgoldgroup.com/download/ira-investor-guide-cp.html
Call 844-402-0988 TODAY!
Do you have enough food to get you through a crisis?
PREPARE TODAY! Click Here –> http://www.preparewithcpn.com <– to SAVE $227 from Christian Patriot News!
Prepare With Christian News is part of the nation’s #1 Emergency Food Company!
JOIN US ON TELEGRAM:
https://t.me/ChristianPatriotNews
JOIN US ON TRUTH Social:
https://truthsocial.com/@ChristianPatriotNews
Sponsor A Show: [email protected]
We are the enemy of Big Tech, Big Money and Big Media!
Together, let’s expose the lies of the enemy. Impart a little truth every day. Especially the Truth that Jesus Christ is Lord!
Any support you can provide is greatly appreciated. We’re in this together. Together WE WILL WIN! Please support the fight.
GIVE SEND GO (Christian Site) *U.S. PLUS INTERNATIONAL*
https://givesendgo.com/ChristianPatriotNews
Donor Box (accepts eChecks)
https://donorbox.org/christian-patriot-news
Cash App Cash Tag: $ChristianPatriot
Here’s my Cash App Link:
https://cash.app/$ChristianPatriot
On March 2, 2023, the people in control of the Joe Biden administration officially announced that government control of internet content was now officially a part of the national security apparatus. [White House Link] If you have followed the history of how the Fourth Branch of Government has been created, you will immediately recognize the intent of this new framework.
The “National Cybersecurity Strategy” aligns with, supports, and works in concert with a total U.S. surveillance system, where definitions of information are then applied to “cybersecurity” and communication vectors. This policy is both a surveillance system and an information filtration prism where the government will decide what is information, disinformation, misinformation and malinformation, then act upon it.
In part, this appears to be a response to the revelations around government influence of social media, the Twitter Files. Now we see the formalization of the intent. The government will be the arbiter of truth and cyber security, not the communication platforms or private companies. This announcement puts the government in control.
All of the control systems previously assembled under the guise of the Dept of Homeland Security now become part of the online, digital national security apparatus. I simply cannot emphasis enough how dangerous this is, and the unspoken motive behind it; however, to the latter, you are part of a small select group who are capable of understanding what is in this announcement without me spelling it out.
Remember, we have already lost the judicial branch to the interests of the national security state. All judicial determinations are now in deference to what is called broadly “national security,” and the only arbiter of what qualifies to be labeled as a national security interest is the same institutional system who hides the corruption and surveillance behind the label they apply.
We cannot fight our way through the complexity of what is being assembled, until the American People approach the big questions from the same baseline of understanding. What is the root cause that created the system? From there, this announcement takes on a more clarifying context – where we realize this is the formalization of the previously hidden process.
Barack Obama and Eric Holder did not create a weaponized DOJ and FBI; the institutions were already weaponized by the Patriot Act. What Obama and Holder did was take the preexisting system and retool it, so the weapons of government only targeted one side of the political continuum.
This point is where many people understandably get confused.
Elevator Speech:
DEEP DIVE:
Twitter is to the U.S. government as TikTok is to China. The overarching dynamic is the need to control public perceptions and opinions.
DHS has been in ever increasing control of Twitter since the public-private partnership was formed in 2011/2012. However, it’s not just Twitter. The same fundamental relationships are now at work within Google, Microsoft, YouTube, Instagram and Facebook.
With all the shiny things surfacing from the Twitter Files, few are looking at the origin of what the government is trying to keep hidden….
In the era shortly after 9/11, the DC national security apparatus, instructed by Vice President Dick Cheney, was constructed to preserve continuity of government and simultaneously view all Americans as potential threats. The Department of Homeland Security (DHS) and the Office of the Director of National Intelligence (ODNI) were created specifically for this purpose.
After 9/11/01, the electronic surveillance system that was originally created to monitor threats from abroad was retooled to monitor threats inside our country. That is when all of our electronic ‘metadata’ came under federal surveillance.
That inflection point, and the process that followed, was exactly what Edward Snowden tried to point out.
What Barack Obama and Eric Holder did with that new construct was refine the internal targeting mechanisms so that only their political opposition became the target of this new national security system.
The problems we face now as a country are directly an outcome of two very distinct points that were merged by Barack Obama. (1) The post 9/11 monitoring of electronic communication of American citizens; and (2) Obama’s team creating a fine-tuning knob that it focused on the politics of the targets. This is very important to understand as you dig deeper into this research outline.
Washington DC created the modern national security apparatus immediately and hurriedly after 9/11/01. The Department of Homeland Security came along in 2002, and within the Intelligence Reform and Terrorism Prevention Act of 2004 the Office of the Director of National Intelligence (ODNI) was formed.
When President Barack Obama and Attorney General Eric Holder arrived a few years later, those newly formed institutions were viewed as opportunities to create a very specific national security apparatus that would focus almost exclusively against their political opposition.
The preexisting Federal Bureau of Investigation (FBI) and Dept of Justice (DOJ) were then repurposed to become two of the four pillars of the domestic national security apparatus: a domestic surveillance state. However, this new construct would have a targeting mechanism based on political ideology.
The DHS, ODNI, DOJ and FBI became the four pillars of this new institution. Atop these pillars is where you will find the Fourth Branch of Government.
We were not sleeping when this happened, we were wide awake. However, we were stunningly distracted by the economic collapse that was taking place in 2006 and 2007 when the engineers behind Obama started to assemble the design. By the time Obama took office in 2009, we sensed something profound was shifting, but we can only see exactly what shifted in the aftermath. The four pillars were put into place, and a new Fourth Branch of Government was quietly created.
As time passed, and the system operators became familiar with their new tools, technology allowed the tentacles of the system to reach out and touch us. That is when we first started to notice that something very disconcerting was happening. Those four pillars are the root of it, and if we take the time to understand how the Fourth Branch originated, questions about this current state of perpetual angst will start to make sense.
We pick up the expansive and weaponized intelligence system as it manifests after 9/11/01, and my goal is to highlight how the modern version of the total intelligence apparatus has metastasized into a Fourth Branch of Government. It is this superseding branch that now touches and influences every facet of our life. We The People are under surveillance.
If we take the modern construct, originating at the speed of technological change, we can also see how the oversight or “check/balance” in our system of government became functionally obsolescent.
After many years of granular research about the intelligence apparatus inside our government, in the summer of 2020 I visited Washington DC to ask specific questions. My goal was to go where the influence agents within government actually operate, and to discover the people deep inside the institutions no one elected, and few people pay attention to.
It was during this process when I discovered how information is purposefully put into containment silos; essentially a formal process to block the flow of information between agencies and between the original branches. While frustrating to discover, the silo effect was important because understanding the communication between networks leads to our ability to reconcile conflict between what we perceive and what’s actually taking place.
After days of research and meetings in DC during 2020, amid a town that was serendipitously shut down due to COVID-19, I found a letter slid under the door of my room in a nearly empty hotel with an introduction of sorts. The subsequent discussions were perhaps the most important. After many hours of specific questions and answers on specific examples, I realized why our nation is in this mess. That is when I discovered the fourth and superseding branch of government, the Intelligence Branch.
I am going to explain how the Intelligence Branch works: (1) to control every other branch of government; (2) how it functions as an entirely independent branch of government with no oversight; (3) how and why it was created to be independent from oversight; (4) what is the current mission of the IC Branch, and most importantly (5) who operates it.
The Intelligence Branch is an independent functioning branch of government; it is no longer a subsidiary set of agencies within the Executive Branch as most would think. To understand the Intelligence Branch, we need to drop the elementary school civics class lessons about three coequal branches of government, and replace that outlook with the modern system that created itself.
The Intelligence Branch functions much like the State Dept, through a unique set of public-private partnerships that support it. Big Tech industry collaboration with intelligence operatives is part of that functioning, almost like an NGO. However, the process is much more important than most think. In this problematic perspective of a corrupt system of government, the process is the flaw – not the outcome.
There are people making decisions inside this little known, unregulated and out-of-control branch of government that impact every facet of our lives.
None of the people operating deep inside the Intelligence Branch were elected, and our elected representative House members genuinely do not know how the system works. I assert this position affirmatively because I have talked to House and Senate staffers, including the chiefs of staff for multiple House & Senate committee seats. They are not malicious people; however, they are genuinely clueless of things that happen outside their silo. That is part of the purpose of me explaining it, with examples, in full detail with sunlight.
In April of 2016, the FBI launched a counterintelligence operation against presidential candidate Donald Trump. The questioning about that operation is what New York Representative Elise Stefanik cites in March of 2017, approximately 11 months later (First Two Minutes).
♦ Notice how FBI Director James Comey just matter-of-factly explains no one outside the DOJ was informed about the FBI operation. Why? Because that’s just the way things are done. His justification for unilateral operations was “because of the sensitivity of the matter“, totally ignoring any constitutional or regulatory framework for oversight, because, well, quite simply, there isn’t any. The intelligence apparatus inside the DOJ/FBI can, and does, operate based on their own independent determinations of authority.
♦ Notice also how FBI Director Comey shares his perspective that informing the National Security Council (NSC) is the equivalent of notifying the White House. The FBI leadership expressly believe they bear no responsibility to brief the Chief Executive. As long as they tell some unknown, unelected, bureaucratic entity inside the NSC, their unwritten responsibility to inform the top of their institutional silo is complete. If the IC wants to carve out the Oval Office, they simply plant information inside the NSC and, from their perspective, their civic responsibility to follow checks-and-balances is complete. This is an intentional construct.
♦ Notice how Comey obfuscates notification to the Director of National Intelligence (DNI), by avoiding the fact James Clapper was the DNI from outset of the counterintelligence operation throughout the remainder of Obama’s term. When I get deeper into the process, we will understand how the Intelligence Branch has intentionally used the creation of the DNI position (established post 9/11/01) as a method to avoid oversight, not enhance it. Keeping an oblivious doofus like James Clapper in position held strategic value [Doofus Reminder HERE].
That video of James Comey being questioned by Elise Stefanik was the first example given to me by someone who knew the background of everything that was taking place preceding that March 20, 2017, hearing. That FBI reference point is a key to understand how the Intelligence Branch operates with unilateral authority above Congress (legislative branch), above the White House (executive branch), and even above the court system (judicial branch).
Also, watch this short video of James Clapper, because it is likely many readers have forgotten, and likely even more readers have never seen it. Watch closely how then White House National Security Adviser John Brennan is responding in that video. This is before Brennan became CIA Director; this is when Brennan was helping Barack Obama put the pillars into place. WATCH:
[Sidebar: Every time I post this video it gets scrubbed from YouTube (example), so save it if you ever want to see it again.]
The video of James Clapper highlights how the ODNI position (created with good national security intention) ended up becoming the fulcrum for modern weaponization, and is now an office manipulated by agencies with a vested interest in retaining power. The Intelligence Branch holds power over the ODNI through their influence and partnership with the body that authorizes the power within it, the Senate Select Committee on Intelligence (SSCI).
Factually, the modern intelligence apparatus uses checks and balances in their favor. The checks create silos of proprietary information, classified information, vaults of information that work around oversight issues. The silos, which include the exploitation of the Foreign Intelligence Surveillance Court (FISA Court, or FISC) are part of the problem.
Ironically, the Office of the Director of National Intelligence was created in the aftermath of 9/11/01 expressly to eliminate the silos of information which they felt led to a domestic terrorist attack that could have been prevented. The ODNI was created specifically upon the recommendation of the 9/11 commission.
The intent was to create a central hub of intelligence information, inside the Executive Branch, where the CIA, NSA, DoD, DoS, and DIA could deposit their unique intelligence products and a repository would be created so that domestic intelligence operations, like the DOJ and FBI could access them when needed to analyze threats to the U.S. This, they hoped, would ensure the obvious flags missed in the 9/11 attacks would not be missed again.
However, the creation of the DNI office also created an unconstitutional surveillance system of the American people. The DNI office became the tool to take massive amounts of data and use it to target specific Americans. Weaponizing the DNI office for political targeting is now the purpose of the DNI office as it exists.
The illegal and unlawful nature of the surveillance creates a need for careful protection amid the group who operate in the shadows of electronic information and domestic surveillance. You will see how it was critical to install a person uniquely skilled in being an idiot, James Clapper, into that willfully blind role while intelligence operatives worked around the office to assemble the Intelligence Branch of Government.
• The last federal budget that flowed through the traditional budgetary process was signed into law in September of 2007 for fiscal year 2008 by George W. Bush. Every budget since then has been a fragmented process of continuing resolutions and individual spending bills.
Why does this matter? Because many people think defunding the Intelligence Community is a solution; it is not…. at least, not yet. Worse yet, the corrupt divisions deep inside the U.S. intelligence system can now fund themselves from multinational private sector partnerships (banks, corporations and foreign entities).
• When Democrats took over the House of Representatives in January 2007, they took office with a plan. Nancy Pelosi became Speaker, and Democrats controlled the Senate where Harry Reid was Majority Leader. Barack Obama was a junior senator from Illinois.
Pelosi and Reid intentionally did not advance a budget in 2008 (for fiscal year 2009) because their plan included installing Barack Obama (and all that came with him) with an open checkbook made even more lucrative by a worsening financial crisis and a process called baseline budgeting. Baseline budgeting means the prior fiscal year budget is accepted as the starting point for the next year budget. All previous expenditures are baked into the cake within baseline budgeting.
Massive bailouts preceded Obama’s installation due to U.S. economic collapse, and massive bailouts continued after his installation. This is the ‘never let a crisis go to waste’ aspect. TARP (Troubled Asset Recovery Program), auto bailouts (GM), and the massive stimulus spending bill, the American Recovery and Reinvestment Act (ARRA, ie. those shovel ready jobs) were all part of the non-budget spending. The federal reserve assisted with Quantitative Easing (QE1 and QE2) as congress passed various Porkulous spending bills further spending and replacing the formal budget process.
Note: There has never been a budget passed in the normal/traditional process since September of 2007.
• While Obama’s radical ‘transformation‘ was triggered across a broad range of government institutions, simultaneously spending on the U.S. military was cut, but spending on the intelligence apparatus expanded. We were all distracted by Obamacare, and the Republican Party wanted to keep us that way. However, in the background there was a process of transformation taking place that included very specific action by Eric Holder and targeted effort toward the newest executive agency the ODNI.
The people behind Obama, those same people now behind Joe Biden, knew from years of strategic planning that ‘radical transformation’ would require control over specific elements inside the U.S. government. Eric Holder played a key role in his position as U.S. Attorney General in the DOJ.
AG Holder recruited ideologically aligned political operatives who were aware of the larger institutional objectives. One of those objectives was weaponizing the DOJ-National Security Division (DOJ-NSD) a division inside the DOJ that had no inspector general oversight. For most people the DOJ-NSD weaponization surfaced with a hindsight awakening of the DOJ-NSD targeting candidate Donald Trump many years later. However, by then the Holder crew had executed almost eight full years of background work.
• The second larger Obama/Holder objective was control over the FBI. Why was that important? Because the FBI does the domestic investigative work on anyone who needs or holds a security clearance. The removal of security clearances could be used as a filter to further build the internal ideological army they were assembling. Additionally, with new power in the ODNI created as a downstream consequence of the Patriot Act, new protocols for U.S. security clearances were easy to justify.
Carefully selecting fellow ideological travelers was facilitated by this filtration within the security clearance process. How does that issue later manifest? Just look around at how politicized every intelligence agency has become, specifically including the FBI.
• At the exact same time this new background security clearance process was ongoing, again everyone distracted by the fight over Obamacare, inside the Department of State (Secretary Hillary Clinton) a political alignment making room for the next phase was being assembled. Names like Samantha Power, Susan Rice and Hillary Clinton were familiar on television while Lisa Monaco worked as a legal liaison between the Obama White House and Clinton State Department.
Through the Dept of State (DoS) the intelligence apparatus began working on their first steps to align Big Tech with a larger domestic institutional objective. Those of you who remember the “Arab Spring”, some say “Islamist Spring”, will remember it was triggered by Barack Obama’s speech in Cairo – his first foreign trip. The State Department worked with grassroots organizers (mostly Muslim Brotherhood) in Egypt, Syria, Bahrain, Qatar and Libya. Obama leaned heavily on the organizational network of Turkish President Recep Erdogan for contacts and support.
Why does this aspect matter to us? Well, you might remember how much effort the Obama administration put into recruiting Facebook and Twitter as resources for the various mideast rebellions the White House and DoS supported. This was the point of modern merge between the U.S. intelligence community and Big Tech social media.
In many ways, the coordinated political outcomes in Libya and Egypt were the beta test for the coordinated domestic political outcomes we saw in the 2020 U.S. presidential election. The U.S. intelligence community working with social media platforms and political operatives.
Overlaying all of that background activity was also a new alignment of the Obama-era intelligence apparatus with ideological federal “contractors“. Where does this contractor activity manifest? In the FISA Court opinion of Rosemary Collyer who cited the “interagency memorandum of understanding”, or MOU.
Hopefully, you can see a small part of how tentacled the system to organize/weaponize the intelligence apparatus was. None of this was accidental, all of this was by design, and the United States Senate was responsible for intentionally allowing most of this to take place. The tools the government used to monitor threats were now being used to monitor every American. WE THE PEOPLE were now the threat the national security system was monitoring.
That’s the 30,000/ft level backdrop history of what was happening as the modern IC was created. Next, we will go into how all these various intelligence networks began working in unison and how they currently control all of the other DC institutions under them; including how they can carve out the President from knowing their activity.
♦ When Barack Obama was installed in January 2009, the Democrats held a 60-seat majority in the U.S. Senate. As the people behind the Obama installation began executing their longer-term plan, the Senate Select Committee on Intelligence was a tool to create the Intelligence Branch; it was not an unintentional series of events.
When Obama was installed, Dianne Feinstein was the Chair of the Senate Select Committee on Intelligence (SSCI), and Democrat operative Dan Jones was her lead staffer. Feinstein was completely controlled by those around her including Senate Majority Leader Harry Reid. The CIA was in the process of turning over personnel following the Bush era, and as a result of a massive multi-year narrative of diminished credibility (Iraq WMD), a deep purge was underway. Obama/Holder were in the process of shifting intelligence alignment and the intensely political Democrat Leader Harry Reid was a key participant.
THE TRAP – Many people say that Congress is the solution to eliminating the Fourth and superseding Branch of Government, the Intelligence Branch. This is an exercise in futility because the Legislative Branch, specifically the SSCI, facilitated the creation of the Intelligence Branch. The SSCI cannot put the genie they created back in the bottle without admitting they too are corrupt; and the background story of their corruption is way too intense to be exposed now.
Every member of the SSCI is compromised in some controlling manner. Those Senators who disliked the control over them; specifically disliked because the risk of sunlight was tenuous and, well, possible; have either left completely or stepped down from the committee. None of the SSCI members past or present would ever contemplate saying openly what their tenure involved.
[Note: You might remember when Vice Chairman Mark Warner’s text messages surfaced, there was a controlled Republican SSCI member who came to his defense in February of 2018. It was not accidental that exact Senator later became the chair of the SSCI himself. That Republican Senator is Marco Rubio, now vice-chair since the Senate re-flipped back to the optics of Democrat control in 2021.]
All of President Obama’s 2009 intelligence appointments required confirmation from the Senate. The nominees had to first pass through the Democrat controlled SSCI, and then to a full Senate vote where Democrats held a 60-vote majority. Essentially, Obama got everyone he wanted in place easily. Rahm Emmanuel was Obama’s Chief of Staff, and Valerie Jarrett was Senior Advisor.
Tim Geithner was Treasury Secretary in 2010 when the joint DOJ/FBI and IRS operation to target the Tea Party took place after the midterm “shellacking” caused by the Obamacare backlash. Mitch McConnell was Minority Leader in the Senate but supported the targeting of the Tea Party as his Senate colleagues were getting primaried by an angry and effective grassroots campaign. McConnell’s friend, Senator Bob Bennett, getting beaten in Utah was the final straw.
Dirty Harry and Mitch McConnell saw the TEA Party through the same prism. The TEA Party took Kennedy’s seat in Massachusetts (Scott Brown); Sharon Angle was about to take out Harry Reid in Nevada; Arlen Spector was taken down in Pennsylvania; Senator Robert Byrd died; Senator Lisa Murkowski lost her primary to Joe Miller in Alaska; McConnell’s nominee Mike Castle lost to Christine O’Donnell in Delaware; Rand Paul won in Kentucky. This is the background. The peasants were revolting…. and visibly angry Mitch McConnell desperately made a deal with the devil to protect himself.
In many ways, the TEA Party movement was/is very similar to the MAGA movement. The difference in 2010 was the absence of a head of the movement, in 2015 Donald Trump became that head figure who benefited from the TEA Party energy. Trump came into office in 2017 with the same congressional opposition as the successful TEA Party candidates in 2011.
Republicans took control of the Senate following the 2014 mid-terms. Republicans took control of the SSCI in January 2015. Senator Richard Burr became chairman of the SSCI, and Dianne Feinstein shifted to Vice-Chair. Dirty Harry Reid left the Senate, and Mitch McConnell took power again.
Republicans were in control of the Senate Intelligence Committee in 2015 when the Intelligence Branch operation against candidate Donald Trump was underway. [Feinstein’s staffer, Dan Jones, left the SSCI so he could act as a liaison and political operative between private-sector efforts (Fusion GPS, Chris Steele) and the SSCI.] The SSCI was a participant in that Fusion GPS/Chris Steele operation, and as a direct consequence Republicans were inherently tied to the problem with President Trump taking office in January of 2017. Indiana Republican Senator Dan Coats was a member of the SSCI.
Bottom line…. When it came to the intelligence system targeting Donald Trump during the 2015/2016 primary, the GOP was just as much at risk as their Democrat counterparts.
When Trump unexpectedly won the 2016 election, the SSCI was shocked more than most. They knew countermeasures would need to be deployed to protect themselves from any exposure of their prior intelligence conduct. Immediately Senator Dianne Feinstein stepped down from the SSCI, and Senator Mark Warner was elevated to Vice Chairman.
Indiana’s own Mike Pence, now Vice President, recommended fellow Hoosier, SSCI Senator Dan Coats, to become President Trump’s Director of National Intelligence (ODNI). [Apply hindsight here]
• To give an idea of the Intelligence Branch power dynamic, remind yourself how House Permanent Select Committee on Intelligence (HPSCI), Chairman Devin Nunes, tried to get access to the DOJ/FBI records of the FISA application used against the Trump campaign via Carter Page.
Remember, Devin Nunes only saw a portion of the FISA trail from his review of a Presidential Daily Brief (PDB) previously given to President Obama. Chairman Nunes had to review the PDB at the White House SCIF due to compartmented intelligence, another example of the silo benefit.
Remember the massive stonewalling and blocking of the DOJ/FBI toward Nunes? Remember the back-and-forth battle over declassification surrounding the Nunes memo?
Remember, after Nunes went directly to House Speaker Paul Ryan for help (didn’t get any), the DOJ only permitted two members from each party within the HPSCI to review the documents, and only at the DOJ offices of main justice?
Contrast that amount of House Intel Committee railroading by intelligence operatives in the DOJ, DOJ-NSD and FBI, with the simple request by Senate Intelligence Vice Chairman Mark Warner asking to see the Carter Page FISA application and immediately a copy being delivered to him on March 17th 2017.
Can you see which intelligence committee is aligned with the deepest part of the deep state?
Oh, how quickly we forget:
The contrast of ideological alignment between the House, Senate and Intelligence Branch is crystal clear when viewed through the prism of cooperation. You can see which legislative committee holds the power and support of the Intelligence Branch. The Senate Intel Committee facilitates the corrupt existence of the IC Branch, so the IC Branch only cooperates with the Senate Intel Committee. It really is that simple.
• The Intelligence Branch carefully selects its own members by controlling how security clearances are investigated and allowed (FBI). The Intelligence Branch also uses compartmentalization of intelligence as a way to keep each agency, and each downstream branch of government (executive, legislative and judicial), at arm’s length as a method to stop anyone from seeing the larger picture of their activity. I call this the “silo effect“, and it is done by design.
I have looked at stunned faces when I presented declassified silo product from one agency to the silo customers of another. You would be astonished at what they don’t know because it is not in their ‘silo’.
Through the advice and consent rules, the Intelligence Branch uses the SSCI to keep out people they consider dangerous to their ongoing operations. Any appointee to the intelligence community must first pass through the Senate Select Committee on Intelligence, before they get a full Senate vote. If the SSCI rejects the candidate, they simply refuse to take up the nomination. The president is then blocked from that appointment. This is what happened with President Trump over and over again.
• Additionally, the Intelligence Branch protects itself, and its facilitating allies through the formal classification process. The Intelligence Branch gets to decide unilaterally what information will be released and what information will be kept secret. There is no entity outside the Intelligence Branch, and yes that includes the President of the United States, who can supersede the classification authority of the Intelligence Branch. {Go Deep} and {Go Deep} This is something 99.9% of the people on our side get totally and frustratingly wrong.
No one can declassify, or make public, anything the Intelligence Branch will not agree to. Doubt this? Ask Ric Grenell, John Ratcliffe, or even President Trump himself.
• The classification process is determined inside the Intelligence Branch, all by themselves. They get to choose what rank of classification exists on any work product they create; and they get to decide what the classification status is of any work product that is created by anyone else. The Intelligence Branch has full control over what is considered classified information and what is not. The Intelligence Branch defines what is a “national security interest” and what is not. A great technique for hiding fingerprints of corrupt and illegal activity.
[For familiar reference see the redactions to Lisa Page and Peter Strzok text messages. The Intelligence Branch does all redactions.]
• Similarly, the declassification process is a request by an agency, even a traditionally superior agency like the President of the United States, to the Intelligence Branch asking for them to release the information. The Intelligence Branch again holds full unilateral control.
If the head of the CIA refuses to comply with the declassification instruction of the President, what can the president do except fire him/her? {Again, GO DEEP} How does the President replace the non-compliant cabinet member? They have to go through the SSCI confirmation. See the problem?
Yes, there are ways to break up the Intelligence Branch, but they do not start with any congressional effort. As you can see above, the process is the flaw – not the solution. Most conservative pundits have their emphasis on the wrong syllable. Their cornerstone is false.
For their own self-preservation, the Intelligence Branch has been interfering in our elections for years. The way to tear this apart begins with STATE LEVEL election reform that blocks the Legislative Branch from coordinating with the Intelligence Branch.
The extreme federalism approach is critical and also explains why Joe Biden has instructed Attorney General Merrick Garland to use the full power of the DOJ to stop state level election reform efforts. The worry of successful state level election control is also why the Intelligence Branch now needs to support the federal takeover of elections.
Our elections have been usurped by the Intelligence Branch. Start with honest elections and we will see just how much Democrat AND Republican corruption is dependent on manipulated election results. Start at the state level. Start there…. everything else is downstream.
♦ COLLAPSED OVERSIGHT – The modern system to ‘check’ the Executive Branch was the creation of the legislative “Gang of Eight,” a legislative oversight mechanism intended to provide a bridge of oversight between the authority of the intelligence community within the Executive Branch.
The Go8 construct was designed to allow the President authority to carry out intelligence operations and provide the most sensitive notifications to a select group within Congress.
The Go8 oversight is directed to the position, not the person, and consists of: (1) The Speaker of the House; (2) The Minority Leader of the House; (3) The Chair of the House Permanent Select Committee on Intelligence, HPSCI; (4) The Ranking Member (minority) of the HPSCI; (5) The Leader of the Senate; (6) The Minority Leader of the Senate; (7) The Chair of the Senate Select Committee on Intelligence, SSCI; and finally (8) the Vice-Chair of the SSCI.
Example: When the Chief Executive (the President) initiates an intelligence operation on behalf of the United States, the President triggers a “finding memo.” In essence, the instruction to the intel agency or agencies to authorize a covert operation. When that process takes place, the Go8 are the first people notified. Depending on the sensitivity of the operation, sometimes the G08 are notified immediately after the operation is conducted. The notification can be a phone call or an in-person briefing.
Because of the sensitivity of their intelligence information, the Gang of Eight hold security clearances that permit them to receive and review all intelligence operations. The intelligence community are also responsible for briefing the Go8 with the same information they use to brief the President.
The Go8 design is intended to put intelligence oversight upon both political parties in Congress; it is designed that way by informing the minority leaders of both the House and Senate as well as the ranking minority members of the SSCI and HPSCI. Under the concept, the President cannot conduct an intelligence operation; and the intelligence community cannot carry out intelligence gathering operations without the majority and minority parties knowing about it.
The modern design of this oversight system was done to keep rogue and/or corrupt intelligence operations from happening. However, as we shared in the preview to this entire discussion, the process was usurped during the Obama era. {GO DEEP}
Former FBI Director James Comey openly admitted to Congress on March 20, 2017, that the FBI, FBI Counterintelligence Division, DOJ and DOJ-National Security Division, together with the Office of the Director of National Intelligence (ODNI) and the CIA, had been conducting independent investigations of Donald Trump for over a year without informing the Go8. Comey justified the lack of informing Go8 oversight by saying, “because of the sensitivity of the matter.”
Stupidly, Congress never pressed James Comey on that issue. The arrogance was astounding, and the acceptance by Congress was infuriating. However, that specific example highlighted just how politically corrupt the system had become. In essence, Team Obama usurped the entire design of congressional oversight…. and Congress just brushed it off.
Keep in mind, Comey did not say the White House was unaware; in fact he said exactly the opposite, he said, “The White House was informed through the National Security Council,” (the NSC). The unavoidable implication and James Comey admission that everyone just brushed aside, was that President Obama’s National Security Advisor, Susan Rice, was informed of the intelligence operation(s) against Donald Trump. After all, the NSC reports to the National Security Advisor.
Does the January 20, 2017, Susan Rice memo look different now?
Again, no one saw the immediate issue. What Comey just described on that March Day in 2017 was the usurpation of the entire reason the Gang of Eight exists; to eliminate the potential for political weaponization of the Intelligence Community by the executive branch. The G08 notifications to the majority and minority are specifically designed to make sure what James Comey admitted to doing was never supposed to happen.
Team Obama carried out a political operation using the intelligence community and the checks-and-balances in the system were intentionally usurped. This is an indisputable fact.
Worse still, the entire legislative branch of Congress, which then specifically included the Republicans that now controlled the House and Senate, did nothing. They just ignored what was admitted. The usurpation was willfully ignored.
The mechanism of the G08 was bypassed without a twitch of condemnation or investigation…. because the common enemy was Donald Trump.
This example highlights the collapse of the system. Obama, the Executive Branch, collapsed the system by usurping the process; in essence the process became the bigger issue, and the lack of immediate Legislative Branch reaction became evidence of open acceptance. The outcomes of the usurpation played out over the next four years; Donald J. Trump was kneecapped and lost his presidency because of it. However, the bigger issue of the collapse still exists.
The downstream consequence of the Legislative Branch accepting the Executive Branch usurpation meant both intelligence committees were compromised. Additionally, the leadership of both the House and Senate were complicit. Think about this carefully. The Legislative Branch allowance of the intelligence usurpation meant the Legislative Branch was now subservient to the Intelligence Branch.
That’s where we are.
Right now.
That’s where we are.
Term-3 Obama is now back in the White House with Joe Biden.
Lisa Monaco running the DOJ.
Victoria Nuland running State Dept (Ukraine)
Avril Haines running Intelligence Community.
Samantha Power is running USAID.
Mary McCord is running Jack Smith Special Counsel operation…. The great pretending continues.
NOTE: Former Obama National Security Aide and Counsel to the President, Lisa Monaco, is in her current position as Deputy Attorney General, specifically to make sure all of these revelations do not become a legal risk to Barack Obama and the people who created them. The SSCI confirmed Monaco for this purpose, because the Senate is just as much at risk.
Term-1 and Term-2 Obama usurped the ‘check and balance‘ within the system and weaponized the intelligence apparatus. During Trump’s term that weaponization was covered up by a compliant congress, complicit senate intelligence committee, and not a single member of the oversight called it out. Now, Term-3 Obama steps back in to continue the cover up and continue the weaponization.
Hopefully, you can now see the scale of the problem that surrounds us with specific citation for what has taken place. What I just explained to you above is not conspiracy theory; it is admitted fact that anyone can look upon. Yet….
Have you seen this mentioned anywhere? Have you seen this called out by anyone in Congress? Have you seen anyone in media (ally or adversary) call this out? Have you seen any member of the Judicial Branch stand up and say wait, what is taking place is not okay? Have you seen a single candidate for elected office point this out? Have you seen anyone advising a candidate to point this out?
This is our current status. It is not deniable. The truth exists regardless of our comfort.
Not a single person in power will say openly what has taken place. They are scared of the Fourth Branch. The evidence of what has taken place is right there in front of our face. The words, actions and activities of those who participated in this process are not deniable, in fact most of it is on record.
There are only two members of the Gang of Eight who have existed in place from January 2007 (the real beginning of Obama’s term, two years before he took office when the Congress flipped). Only two members of the G08 have been consistently in place from January of 2007 to right now, today. All the others came and went, but two members of the Gang of Eight have been part of that failed and collapsed oversight throughout the past 15 years, Nancy Pelosi and Mitch McConnell.
♦ TECHNOLOGY – On a global scale – the modern intelligence gathering networks are now dependent on data collection to execute their intelligence missions. In the digital age nations have been executing various methods to gather that data. Digital surveillance has replaced other methods of interception. Those surveillance efforts have resulted in a coalescing of regional data networks based on historic multi-national relationships.
We have a recent frame of reference for the “U.S. data collection network” within the NSA. Through the allied process the Five Eyes nations all rely on the NSA surveillance database (U.K, Australia, Canada, New Zealand and U.S.) The NSA database provides the digital baseline for intelligence operations in defense of our allies. The portals into the NSA database are essentially an assembly of allies in like-minded ideological connection to the United States.
Unfortunately, there have been some revelations about the NSA database being used to monitor our allies, like in the example of Germany and surveillance on Angela Merkel’s phone. As long as “the good guys” are operating honorably, allies of the United States can feel confident about having protection from the NSA surveillance of global digital data. We warn our friends if we detect something dangerous etc.
The U.S. has nodes on communication pipelines to intercept and extract data. We have also launched hundreds, perhaps thousands, of satellites to conduct surveillance and gather up data. All of this data is fed into the NSA database where it is monitored (presumably) as a national security mechanism, and in defense of our allies.
However, what about data collection or data networks that are outside the NSA database? What do our enemies do? The NSA database is just one intelligence operation of digital surveillance amid the entire world, and we do not allow access by adversaries we are monitoring. So what do they do? What do our allies do who might not trust the United States due to past inconsistencies, ie. the Middle East?
The answers to those questions highlight other data collection networks. So, a brief review of the major players is needed.
♦ CHINA – China operates their own database. They, like the NSA, scoop up data for their system. Like us, China launches satellites and deploys other electronic data collection methods to download into their database. This is why the issues of electronic devices manufactured in China becomes problematic. Part of the Chinese data collection system involves the use of spyware, hacking and extraction.
Issues with Chinese communication company Huawei take on an added dimension when you consider the goal of the Chinese government to conduct surveillance and assemble a network of data to compete with the United States via the NSA. Other Chinese methods of surveillance and data-collection are less subversive, as in the examples of TicTok and WeChat. These are Chinese social media companies that are scraping data just like the NSA scrapes data from Facebook, Twitter and other Silicon Valley tech companies. [ Remember, the Intelligence Branch is a public-private partnership. ]
♦ RUSSIA – It is very likely that Russia operates their own database. We know Russia launches satellites, just like China and the USA, for the same purposes. Russia is also very proficient at hacking into other databases and extracting information to store and utilize in their own network. The difference between the U.S., China and Russia is likely that Russia spends more time on the hacking aspect because they do not generate actual technology systems as rapidly as the U.S. and China.
The most recent database creation is an outcome of an ally having to take action because they cannot rely on the ideology of the United States remaining consistent, as the administrations ping-pong based on ideology.
♦ SAUDI ARABIA – Yes, in 2016 we discovered that Saudi Arabia was now operating their own intelligence data-gathering operation. It would make sense, given the nature of the Middle East and the constant fluctuations in political support from the United States. It is a lesson the allied Arab community and Gulf Cooperation Council learned quickly when President Obama went to Cairo in 2009 and launched the Islamist Spring (Arab Spring) upon them.
I have no doubt the creation of the Saudi intelligence network was specifically because the Obama administration started supporting radical Islamists within the Muslim Brotherhood and threw fuel on the fires of extremism all over the Arab world.
Think about it., What would you do if you were Saudi Arabia, Egypt, Bahrain, Kuwait, the UAE, Jordan, Oman or Yemen and you knew the United States could just trigger an internal uprising of al-Qaeda, ISIS and the political arm of the Muslim Brotherhood to seek your destruction?
Without a doubt, those urgent lessons from 2009, 2010, 2011 triggered the formation of the Arab Intelligence Network as a network to defend itself with consistency. They assembled the network and activated it in 2017 as pictured above.
♦ Israel – Along a similar outlook to the Arab network, no doubt Israel operates an independent data collection system as a method of protecting itself from ever-changing U.S. politics amid a region that is extremely hostile to its very existence. Like the others, Israel launches proprietary satellites, and we can be sure they use covert methods to gather electronic data just like the U.S. and China.
As we have recently seen in the Pegasus story, Israel creates spyware programs that are able to track and monitor cell phone communications of targets. The spyware would not work unless Israel had access to some network where the phone meta-data was actually stored. So yeah, it makes sense for Israel to operate an independent intelligence database.
♦ Summary: As we understand the United States Intelligence Branch of government as the superseding entity that controls the internal politics of our nation, we also must consider that multiple nations have the same issue. There are major intelligence networks around the world beside the NSA “Five-Eyes” database. China, Russia, Saudi Arabia and Israel all operate proprietary databases deploying the same tools and techniques for assembly.
The geopolitical conflict that has always existed has now shifted into a digital battle-space. The Intelligence Agencies from these regions are now operating as the backbone of the government that uses them and has become dependent on them. [<- Reread that].
Once you accept the digital-era intelligence apparatus of China, Russia, Saudi-Arabia, The United States and Israel, are now the primary national security mechanisms for stabilization of government; then you accept the importance of those intelligence operations.
Once you understand how foundational those modern intelligence operations have become for the stability and continuity of those governments…… then you begin to understand just how the United States intelligence community became more important than the government that created it.
From that point it is then critical to understand that domestic intelligence operations are underway to monitor the electronic communication of American citizens inside our own country. YOU are under surveillance. The parents who confront school boards are under surveillance. The political operatives inside the FBI are monitoring everyone who comes onto the radar, that is why the National School Boards Association asked the White House, then the DOJ, to have the FBI start targeting parents. Are things making sense now?
♦ Public Private Partnership – The modern Fourth Branch of Government is only possible because of a Public-Private partnership with the intelligence apparatus. You do not have to take my word for it, the partnership is so brazened they have made public admissions.
The biggest names in Big Tech announced in June their partnership with the Five Eyes intelligence network, ultimately controlled by the NSA, to: (1) monitor all activity in their platforms; (2) identify extremist content; (3) look for expressions of Domestic Violent Extremism (DVE); and then, (4) put the content details into a database where the Five Eyes intelligence agencies (U.K., U.S., Australia, Canada, New Zealand) can access it.
Facebook, Twitter, Google and Microsoft are all partnering with the intelligence apparatus. It might be difficult to fathom how openly they admit this, but they do. Look at this sentence in the press release (emphasis mine):
[…] “The Group will use lists from intelligence-sharing group Five Eyes adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.”
Think about that sentence structure very carefully. They are “adding to” the preexisting list…. admitting the group (aka Big Tech) already have access to the the intelligence-sharing database… and also admitting there is a preexisting list created by the Five Eyes consortium.
Obviously, who and what is defined as “extremist content” will be determined by the Big Tech insiders themselves. This provides a gateway, another plausible deniability aspect, to cover the Intelligence Branch from any oversight.
When the Intelligence Branch within government wants to conduct surveillance and monitor American citizens, they run up against problems due to the Constitution of the United States. They get around those legal limitations by sub-contracting the intelligence gathering, the actual data mining, and allowing outside parties (contractors) to have access to the central database.
The government cannot conduct electronic searches (4th amendment issue) without a warrant; however, private individuals can search and report back as long as they have access. What is being admitted is exactly that preexisting partnership. The difference is that Big Tech will flag the content from within their platforms, and now a secondary database filled with the extracted information will be provided openly for the Intelligence Branch to exploit.
The volume of metadata captured by the NSA has always been a problem because of the filters needed to make the targeting useful. There is a lot of noise in collecting all data that makes the parts you really want to identify more difficult to capture. This new admission puts a new massive filtration system in the metadata that circumvents any privacy protections for individuals.
Previously, the Intelligence Branch worked around the constitutional and unlawful search issue by using resources that were not in the United States. A domestic U.S. agency, working on behalf of the U.S. government, cannot listen on your calls without a warrant. However, if the U.S. agency sub-contracts to say a Canadian group, or foreign ally, the privacy invasion is no longer legally restricted by U.S. law.
What was announced in June 2021 is an alarming admission of a prior relationship along with open intent to define their domestic political opposition as extremists.
July 26 (Reuters) – A counterterrorism organization formed by some of the biggest U.S. tech companies including Facebook (FB.O) and Microsoft (MSFT.O) is significantly expanding the types of extremist content shared between firms in a key database, aiming to crack down on material from white supremacists and far-right militias, the group told Reuters.
Until now, the Global Internet Forum to Counter Terrorism’s (GIFCT) database has focused on videos and images from terrorist groups on a United Nations list and so has largely consisted of content from Islamist extremist organizations such as Islamic State, al Qaeda and the Taliban.
Over the next few months, the group will add attacker manifestos – often shared by sympathizers after white supremacist violence – and other publications and links flagged by U.N. initiative Tech Against Terrorism. It will use lists from intelligence-sharing group Five Eyes, adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.
The firms, which include Twitter (TWTR.N) and Alphabet Inc’s (GOOGL.O) YouTube, share “hashes,” unique numerical representations of original pieces of content that have been removed from their services. Other platforms use these to identify the same content on their own sites in order to review or remove it. (read more)
The influence of the Intelligence Branch now reaches into our lives, our personal lives.
[The Intercept] – […] Behind closed doors, and through pressure on private platforms, the U.S. government has used its power to try to shape online discourse. According to meeting minutes and other records appended to a lawsuit filed by Missouri Attorney General Eric Schmitt, a Republican who is also running for Senate, discussions have ranged from the scale and scope of government intervention in online discourse to the mechanics of streamlining takedown requests for false or intentionally misleading information.
“Platforms have got to get comfortable with gov’t. It’s really interesting how hesitant they remain,” Microsoft executive Matt Masterson, a former DHS official, texted Jen Easterly, a DHS director, in February.
In a March meeting, Laura Dehmlow, an FBI official, warned that the threat of subversive information on social media could undermine support for the U.S. government. Dehmlow, according to notes of the discussion attended by senior executives from Twitter and JPMorgan Chase, stressed that “we need a media infrastructure that is held accountable.” (read more)
In the decades before 9/11/01 the intelligence apparatus intersected with government, influenced government, and undoubtedly controlled many institutions with it. The legislative oversight function was weak and growing weaker, but it still existed and could have been used to keep the IC in check. However, after the events of 9/11/01, the short-sighted legislative reactions opened the door to allow the surveillance state to weaponize against domestic enemies.
[…] The extent to which the DHS initiatives affect Americans’ daily social feeds is unclear. During the 2020 election, the government flagged numerous posts as suspicious, many of which were then taken down, documents cited in the Missouri attorney general’s lawsuit disclosed. And a 2021 report by the Election Integrity Partnership at Stanford University found that of nearly 4,800 flagged items, technology platforms took action on 35 percent — either removing, labeling, or soft-blocking speech, meaning the users were only able to view content after bypassing a warning screen. The research was done “in consultation with CISA,” the Cybersecurity and Infrastructure Security Agency.
Prior to the 2020 election, tech companies including Twitter, Facebook, Reddit, Discord, Wikipedia, Microsoft, LinkedIn, and Verizon Media met on a monthly basis with the FBI, CISA, and other government representatives. According to NBC News, the meetings were part of an initiative, still ongoing, between the private sector and government to discuss how firms would handle misinformation during the election. (keep reading)
After the Patriot Act was triggered, not coincidentally only six weeks after 9/11, a slow and dangerous fuse was lit that ends with the intelligence apparatus being granted a massive amount of power. Simultaneously the mission of the intelligence community now encompassed monitoring domestic threats as defined by the people who operate the surveillance system.
The problem with assembled power is always what happens when a Machiavellian network takes control over that power and begins the process to weaponize the tools for their own malicious benefit. That is exactly what the network of President Barack Obama did.
The Obama network took pre-assembled intelligence weapons (we should never have allowed to be created) and turned those FBI, DOJ-NSD, DHS and ODNI weapons into political tools for his radical and fundamental change. The target was the essential fabric of our nation.
Ultimately, this corrupt political process gave power to create the Fourth Branch of Government, the Intelligence Branch and a massive nationwide surveillance state. From that perspective the fundamental change was successful.
This is the scale of corrupt political compromise on both sides of the DC dynamic that we are up against. Preserving this surveillance system, a public-private partnership, is also what removing Donald Trump was all about…. The targeting of President Trump in order to preserve the system, the system that was weaponized during the Obama administration, is what the actions of the DOJ, FBI and DHS are all about.
What would powerful people in DC do to stop the American people from finding this out?
Last point…. The Twitter Files represent a gateway of discovery into how government assisted creating social media “Oligarchical Systems.” Surveillance and control systems within social media, delivering mutual benefits called public-private partnerships were formed.
Readers here are months ahead of where the arc of this story is destined. However, oligarchical beneficiaries will always defend the system against rogue oligarchs who become a threat.
In part, this explains why there are major inconsistencies in the public narrative as it swirls around Elon Musk and Twitter.
How could a businessman, an entrepreneur like Elon Musk, spend $44 billion, that’s BILLION, on an enterprise without knowing the basic outline of how that enterprise was operating. In a world of financial due diligence, on a scale of this size, the contradictions do not make sense.
Yet, if we are to take Elon Musk at his word, he had no idea that DHS operates control portals into the network. He also had no idea about James Baker working as Twitter legal counsel and carrying such a massive conflict of interest. Additionally, Musk claimed to have no idea that Perkins Coie was legally representing Twitter.
How does an owner/operator take ownership of an organization and not know these senior executive issues? Reconcile these questions, and we begin to reconcile a background of activity that even Mr. Musk may not know about. The alternative explanation is much more nefarious and involves Musk as a willing participant.
I’m not sure how to wake people up to the dangers inherent in this newly admitted White House “cybersecurity strategy,” but the clarity of purpose is transparent to those who have followed this construct. We need more trumpet!… and from there we can start talking about deconstructing it.
RT – Feb 28th, 2023
RT brings you an exclusive interview with former US mercenary John McIntyre, who signed up for the Ukrainian army at the start of the conflict, and later defected to Russia. He shares his experiences on alleged atrocities by the Ukrainian forces, and the direct role of the US in the conflict.
—————————————————————————————–
Freedom over censorship, truth over narrative.
Follow us on Facebook: https://www.facebook.com/RTnews
Follow us on Telegram: https://t.me/rtnews
Follow us on Twitter: https://twitter.com/RT_com