Real Wages Drop Again as Inflation Continues to Outpace Pay Increases

Knowing, not predicting – knowing – the Biden economic policies were going to create massive U.S. inflation in the years to follow, in 2021 I pinned a tweet thread to the top of my timeline on the CTH Twitter account that could be used as a reference. [You Can Read Here] Not a single month of statistical data has come in the past two years that was not entirely predictable.  Today’s report from the Bureau of Labor and Statistics (BLS) [DATA HERE] is no different.

Inflation is a measure of the change in a price. It is usually presented in terms of a percentage of change. When inflation starts to lessen, what that means is the rate of the price increase slows down. The price is still going up, but at a slower pace.

February prices overall increased 0.4% for the month, putting the current rate of annual inflation at 6.0%.  Meaning prices (on aggregate) are 6% higher than this exact same time last year.

Meanwhile, wages increased 0.2% for the month, and hours worked dropped 0.3% [DATA]. Wages only rising by half the rate of prices, and hours worked dropping, means the net ‘real wages’ declined, yet again, by 0.4%.

Workers are going backwards.

The very real impact on the working class is getting worse.  The blue-collar team who works for a living and does not take Instagram pictures of their lunches, are getting crushed in the Biden economy.  The divide between the ‘haves’ and the ‘have-nots’ is getting wider.

Put another way, Team MAGA, the entire continuum of normally apolitical working class, is watching the rust growing and feeling the worst part of the Biden economic outcome.  I have often spoken in my immediate circle of influence with phrase, “financial anxiety is a very real concern the closer you get to the laundromat,” and many people have no idea what that means.

The biggest BS statement of the day goes to CNBC with this sentence:

“Inflation began rising in early 2021 due to a supply-and-demand imbalance. Now, it’s largely fueled by strong demand for labor, economists said.”  (link)

I challenge you to find a more encapsulating pile of horsepucky that represents the financial media era of great pretending.  When I read stuff like this, I begin to think the next great eruption of a violent war is getting even closer, and this war will have nothing to do with nations.

Our current inflation crisis is directly related to the western aligned intentional Build Back Better/Green New Deal, climate change policy decisions that have destroyed energy production and created massive increases in energy costs.  Those costs go everywhere and drive up the unit price of all goods and services.

Nothing about the Biden economic plan, which is really an extension of the collective WEF economic plan, has anything to do with ordinary supply-and-demand imbalances, other than the forced and intentional destruction of oil, coal and natural gas development.

The WEF climate change energy policy is destroying the U.S. economy, creating pain for all U.S. workers and consumers, driving up prices and doing the same thing in every western country that is following it.

Source

Is The Task Too Big for Current House Weaponization Subcommittee Structure?

Is The Task Too Big for Current House Weaponization Subcommittee Structure?

Attorney Mike Davis has some good constructive criticism surrounding the current construct and status of the House Select Subcommittee on the Weaponization of Govt. {Direct Rumble Link}

As Mr. Davis notes the current allocated budget ($2 million) and staffing (5 persons) of the committee itself does not reflect a priority, and the demands of the regular House Judiciary Committee upon Jim Jordan (chairs both) means his time focused on the subcommittee is curtailed.

I’m not sure the issue is as dire as Davis notes; obviously we do not know the background work that might be taking place; but the lack of general urgency -in combination with the history of the GOP in congress- does lend credibility to the overall concerns.  WATCH:

.

My own perspective on the challenge is somewhat conflicted.  On one hand the scale of addressing the issue of this size doesn’t fit the traditional model of legislative oversight. On the other hand, this entire process is the only one available that conforms to the role of government oversight.

I have previously outlined the scale of the opposition the House Subcommittee faces and will face.  Knowing the size of the opposition, you can make an argument that it takes a long time to prepare for this battle.  However, the issues raised by Mike Davis are fair and legitimate.

I am cynical about congress’s ability, given the scope of the effort required.  However, we live our best life and remain pragmatically hopeful.  If they have genuine intent, we will all benefit.  The only thing we can do is provide proactive input and advice; ultimately, it is up to the republicans in congress to determine if this is their priority.

BACKGROUND – The 118th Congress has authorized a “Select Subcommittee on the Weaponization of the Federal Government.”   The subcommittee falls under the jurisdiction of the House Judiciary Committee led by Chairman Jim Jordan.  Additionally, Thomas Massie (R-KY) is being reported as a representative under consideration for the chairmanship of the House Subcommittee.

House Judiciary Chairman Jim Jordan should have a grasp of the scale and scope of the opposition they are about to face.  Assuming they have a fully prepared staff to support them – willing to take on a very consequential investigation; then we begin by first anticipating who will oppose their effort to investigate the “weaponization of government“.   Which is to say, everyone!

The defensive apparatus of the DC political system will likely do everything in their power, individually and with collective assistance, to ensure this committee fails.  The stakes are quite high.  As readers here can well attest, DC politics is an institutional system of purposefully created compartmentalized silos.

The compartmented information silos permit plausible deniability, and this collection of weaponized institutions contains career bureaucrats who view their opposition as the American people.

Example – The Senate Select Committee on Intelligence (SSCI), and every Republican member therein, including SSCI Vice-Chairman Marco Rubio, will make it their willfully blind priority to obstruct any investigation that touches on how the intelligence apparatus of the United States Government is weaponized against the people.

The SSCI is the institution that facilitated the creation of the National Security State.  Any effort to investigate the outcome of that system will make the House investigators adversarial to their colleagues in the Senate.

Additionally, every executive branch intelligence institution, including the DOJ-NSD, FBI, DHS, ODNI, CIA, DoD, DIA, NSC and every sub-agency within their authorities, will do anything and everything to block a subcommittee looking into their domestic activity.

A lot of bad decisions have led to really bad things.  DC does not want those bad things discussed.

Every national security justification that exists, and some that have yet to be created by the DOJ National Security Division solely for the expressed interest of blocking this subcommittee, will be deployed.

Every member of the subcommittee and their staff will be under constant surveillance.  Phones will be tapped and tracked, electronic devices monitored, cars and offices bugged, physical surveillance deployed, and top tier officials at every subsidiary agency of the U.S. government will assign investigative groups and contract agents to monitor the activity of the subcommittee and provide weekly updates on their findings.

The White House together with the National Security Council will also backchannel to and from these agencies doing the surveillance.

The intelligence apparatus media will be deployed, and daily leaks from the various agencies to their contact lists in the New York Times, Politico, Wall Street Journal, Washington Post, ABC, CBS, NBC, CNN and MSNBC will be in constant two-way communication for narrative assembly and counterpropaganda efforts.

This is the context of opposition to begin thinking about before anything moves forward.

Additionally, the national security state will demand the House investigation take place on their terms.  They will demand secrecy, national security classification and require House subcommittee members to adhere to the Intelligence Community terms for review and discussion of anything.

Each agency will not voluntarily assist or participate in the investigation of any of their conduct.  Every official within every agency will do the same; and they will require legal representation that will be provided to them by Lawfare, political operatives skilled in the use of “National Security” and “classified information”, as a justification for non-compliance and non-assistance.  A protracted legal battle should be predicted.

Lastly, anticipate Special Counsel Jack Smith using his position to block the House Subcommittee from receiving evidence.  The House should anticipate that congressional representatives are already under investigation as a result of the authorities granted to Jack Smith by Deputy Attorney General Lisa Monaco {Go Deep}.  The White House and all of the executive branch agencies will use the existing Special Counsel to block House investigation. Heck, that looks to be the primary purpose of the appointment.

As a result, expect the House Subcommittee members to be under constant threat from the DOJ, via the Special Counsel, specifically from DAG Lisa Monaco, with statements that House Subcommittee investigative efforts are “obstructing” a special counsel investigation.  The aforementioned agencies and the Senate Intel Committee will work with the DOJ to use the Jack Smith special counsel as a shield to block participation with the House Subcommittee.

With all of that in mind, what is the successful path forward?

♦ First, everything has to be done in sunlight and maximum transparency, even the planning and organization of the committee construct, purpose and goals.

The committee can have no shadow operations, unknown guiding hands or secrets that can be discovered and then weaponized against the intent.  Sunlight is the best disinfectant.

I know DC has little concept of working like this, but you can train yourself to do it.  You have nothing to hide; however, those who are being investigated have everything to hide.  Do not provide them ammunition by retaining secrets that can be weaponized against you.

As Andrew Breitbart said, be open with your secrets.

Your second cousin Alice will be a source for the New York Times to write about the Thanksgiving dinner three years ago when she heard the “N” word or a tasteless joke about something outrageous.  Every member of the committee and staff need to prepare for a dossier completed by the FBI about them and distributed to the government allies in mainstream media.

Security clearances will be leveraged and threatened as a tool of the national security state to stop the secrecy envelope from being opened publicly.  This will happen; so just anticipate it.  When the security clearance of [insert_name_here] is threatened, go to the microphones and tell the public who is doing the threatening, and why.

♦GOALS – The goal needs to be crystal clear to anyone and everyone who would contemplate assisting.  Yes, there needs to be a legislative intent in order to legally formulate the committee; that’s a no-brainer.  However, the ultimate goal should NOT BE accountability on those who may have perpetrated or supported weaponized activity against American Citizens.  The ultimate goal SHOULD BE for maximum public information, transparency and sunlight about the weaponization as it is discovered.

Let us assume the goal is accepted.  Before moving forward, the subcommittee needs a professional communication strategy in place before the rules, terms and member outlines are structured or made public.

A thoughtful communication strategy so that information can come from the committee to the public without the filtration of a corrupt system that will bend and skew the findings as a weapon against the committee itself.

♦COMMUNICATION PORTAL – Hire a communication staff, and set up a website for the sharing of information directly from the committee to the public.  The daily activity of the committee should be shared publicly in granular detail.  The witness names as scheduled, documents requested, everything that involves the committee activity should be known to the general public. This system should be updated at least DAILY, or as information is compiled.

This communication network should also contain a separate staff assigned to solicit, accept and distribute information provided by the public to the subcommittee.  Yes, you read that correctly, the subcommittee website should be able to accept information provided by the public as it relates to the ongoing committee work.

Crowdsource We The People as research leverage against the much more effective Lawfare operations you will face in opposition.  This means a portal where the ‘open source’ information can be delivered by researchers, many of those on the spectrum, who hold deep knowledge of the information and system processes in the silos.

In the past several years, thousands of documents have been retrieved by FOIA and public records investigations.  Hundreds of experts in the granular details of the DHS, FBI, DoD and DOJ-NSD systems have knowledge that can benefit the committee; you just need a way for them to transmit the evidence/information to you.

That ‘open source’ evidence should flow into the committee portal with address sourcing that allows the committee staff to review and locate it independently.  This avoids the predictable counterargument, from the national security state, that Russia (or foreign actors) is feeding disinformation into the committee.

The documentary evidence will mostly be “open source,” extracted and then cross-referenced from within the multiple silo system the national security state uses as a shield. And the origination of the documents will be traceable and easy to duplicate, thereby providing secure provenance.   The internal staff manager for this inbound portal is critical (think former HPSCI Nunes staff).

Documents found by the committee should then be uploaded to the same communication system (website), permitting the public -especially the autists- to review and then cross reference the committee material; ultimately channeling information back into the committee if important dots connect or puzzle pieces clarify.   Think of this as a massive counter Lawfare operation with hundreds of Deep State subject matter experts assisting the committee.

Witness transcripts should be uploaded within 36 hours of testimony.  Then let the public do the research, background review and dot connecting from the testimony.  If you build it, they will come.

♦ Next, GO PUBLIC with everything.  Do not use the terms and conditions of the secretive administrative state.  Tell the public what you are finding as you are finding it.  You can share information without violating “sources and methods.”   Schedule a media appearance at the 8pm hour twice weekly with a high visibility broadcast media network to provide updates and answer questions.

These scheduled appearances should be in addition to random media press releases and press comments as pertinent information to the subcommittee arrives.   What this means is that you do not wait to produce a 2,000-page final report before releasing the information.  The final report should be an update and summary of all previous findings that have been released to the public along the way.

♦ At the outset, put no rules on media contacts with any subcommittee staff or member.  Counter the darkness that fuels the intelligence community agenda with maximum sunlight and transparency.  Use truth as a weapon against disinformation.  That means no nondisclosure agreements at any part of the process.

Yes, this is radical change in approach, but this is also a radical enemy you are facing.  Playing the secrecy game works in their favor, not yours.  Transparency is your tool, not theirs – use it.

Use truth as a weapon.

Every member of the committee can say anything they want about any of the material or witness testimony they hear during the course of the investigation.  Public hearing or closed-door sessions, it matters not.  The same rule applies.  Committee members are completely free to discuss any findings as the information is reviewed.

The goal should NOT BE accountability on those who may have perpetrated or supported weaponized activity against American Citizens.  The goal SHOULD BE for maximum public information, transparency and sunlight about the weaponization as it is discovered.  This approach makes We The People the accountability portion of the process.  As a result, the next section is again rather groundbreaking….

♦ Every witness to the committee should be granted full legal immunity provided by the House and House Speaker for anything said during the testimony or admitted as being done as part of the evidence fact-finding.  Again, the goal is transparency and openness, not prosecution and accountability.  Use sunlight as a weapon to draw out the truth, then let the American people be the judges of what that truth means when contrasted against the constitution of our nation.

Let me repeat this… There should be ZERO legal liability for any conduct that happened as a part of any witness effort to weaponize the United States government against the American people.  The immunity should cover everything *except* perjury from the witness to the committee itself (ex. Oliver North).   If the witness lies, the immunity evaporates.

Why this approach?  Because (a) it circumvents any issues that might impede testimony, removes hurdles; (b) immunity compels confession, honest sunlight and the urgency of the situation; (c) immunity makes the truth more likely; and finally, (d) you are not going to get legal convictions anyway.   The truth has no agenda.

Another reason for the immunity is because the operation of the subcommittee should be heavily focused on witness testimony, not documents.  The documents can come as part of the follow-up to the witness testimony, but it is the witness testimony needed; the publication of the transcripts then provides the public sunlight.  This is key.

90% of the committee work should be focused on witnesses and questions therein.  Only 10% of the committee work should be seeking documents.   Avoiding the documents shortens the time needed for investigative disclosures and avoids protracted legal battles therein.  If the people on the committee, those who are asking the questions, do not already know the details behind the questions and the locations of the supportive documents, then you have the wrong people on the committee.

Every response to a questioned witness should come with the following question: “How do you know this?”   That is how you will discover the nature of the documents, communications, emails etc that support the fact-finding mission.  “How do you know this” also leads to more witnesses.  Work the issue from the bottom up.   How do you know this; who told you this; why did you do this; what authority guided you; who authorized this approach? etc. etc. etc.

Use fully immunized witnesses to tell the story, then go look for the documents to corroborate the witness statements using the ‘under oath’ transcript as part of the impenetrable subpoena itself; but don’t wait, keep questioning witnesses.

DOCUMENTS – Once you identify the location of documents that would assist the sunlight objective, don’t only rely on the government side of the conversation as the targeted source for retrieval.  If the document contains communication to external parties, ie public-private partnership, then move to gain the documents from the private side, thereby avoiding the roadblocks inside government.

Regardless of the status of the document search, and regardless of whether legal battles will be needed to retrieve those documents, keep moving forward with the witness testimony.  Do not stop committee work just because internal silo opposition is being fought.  Keep working the plan and bringing immunized witnesses, both inside government and outside government, forward for questioning.  Leaders within organizations and agencies are important, but clerks, staff, and administrative aides in/around those same leaders could also provide important information.

This subcommittee approach, along with the people needed, will obviously take more time to assemble.  However, once put together everything thereafter moves at a very rapid pace, which is also part of the strategy.  Flood the information zone with maximum sunlight and keep the opposition off balance.

The goal is sunlight. Rip the Band-Aid off, call the baby ugly and start the process to fix this crap by exposing it. Restore the First and Fourth Amendments, and heal the injury.

From the Church Commission we got the secret FISA court and more tools for violations of our Fourth Amendment rights.  From the 911 Commission we got The Patriot Act, DHS, TSA, DNI and many more violations of our rights and Fourth Amendment protections.   We do not need any legislation as an outcome of the House “Select Subcommittee on the Weaponization of the Federal Government.”

We do not need your legislative help.  All prior legislative help only ended up making things worse.

What we need is a full, uncensored, brutally honest expose’ of how bad things have become and how that system can be dismantled.  The existing constitution is the protection, just remove the stuff that is violating it.

I know this approach is rather different from the norm.  However, if this roadmap seems reasonable, I am certain you will find support from within the silo system that is currently operating, and from people outside the government who will volunteer time and effort to assist.

Summarized: (1) Know the scale of opposition.  (2) Formulate a communication strategy around it and build a website. (3)  Communicate findings by telling the story to the American people as it is discovered. (4) Grant immunity to all witnesses. (5) Don’t wait until the end to generate another useless report that few will read. (6) Make sunlight the motive of the committee. (7) Consider success when the American people can see the problem.  (8) Dissolve any weaponized systems.  (9) Don’t create new ones.

If you tell us the truth, We The People will fix it ourselves.

Source

Tucker Carlson Outlines Review of Capitol Hill J6 CCTV Tapes and Publicizes Footage

Tucker Carlson Outlines Review of Capitol Hill J6 CCTV Tapes and Publicizes Footage

As promised, Fox News host Tucker Carlson began publicizing the closed-circuit TV footage from Capitol Hill on January 6, 2021.  In the introduction to the footage, Mr Carlson outlines the process and limitations that his producers encountered.

Tucker Carlson states no one from the House of Representatives placed any restrictions on the footage as reviewed. Additionally, Carlson notes that no one at Fox News leadership had any input into the review that his team undertook.  As he describes, much of the 40,000 hours of footage was innocuous, empty rooms with CCTV camera footage showing very little.  However, the footage that did show events, does not support the “violent insurrectionist” narrative as promoted by the J6 committee.  WATCH:

.

Additional footage and continued segment below.

.

Source

People Behind Biden Announce Creation of Formal National Surveillance State, Yet No One Seems Bothered

On March 2, 2023, the people in control of the Joe Biden administration officially announced that government control of internet content was now officially a part of the national security apparatus. [White House Link] If you have followed the history of how the Fourth Branch of Government has been created, you will immediately recognize the intent of this new framework.

The “National Cybersecurity Strategy” aligns with, supports, and works in concert with a total U.S. surveillance system, where definitions of information are then applied to “cybersecurity” and communication vectors.  This policy is both a surveillance system and an information filtration prism where the government will decide what is information, disinformation, misinformation and malinformation, then act upon it.

In part, this appears to be a response to the revelations around government influence of social media, the Twitter Files.  Now we see the formalization of the intent. The government will be the arbiter of truth and cyber security, not the communication platforms or private companies.  This announcement puts the government in control.

All of the control systems previously assembled under the guise of the Dept of Homeland Security now become part of the online, digital national security apparatus. I simply cannot emphasis enough how dangerous this is, and the unspoken motive behind it; however, to the latter, you are part of a small select group who are capable of understanding what is in this announcement without me spelling it out.

Remember, we have already lost the judicial branch to the interests of the national security state.  All judicial determinations are now in deference to what is called broadly “national security,” and the only arbiter of what qualifies to be labeled as a national security interest is the same institutional system who hides the corruption and surveillance behind the label they apply.

We cannot fight our way through the complexity of what is being assembled, until the American People approach the big questions from the same baseline of understanding.  What is the root cause that created the system?  From there, this announcement takes on a more clarifying context – where we realize this is the formalization of the previously hidden process.

Barack Obama and Eric Holder did not create a weaponized DOJ and FBI; the institutions were already weaponized by the Patriot Act.  What Obama and Holder did was take the preexisting system and retool it, so the weapons of government only targeted one side of the political continuum.

This point is where many people understandably get confused.

Elevator Speech:

(1) The Patriot Act turned the intel surveillance radar from foreign searches for terrorists to domestic searches for terrorists.

(2) Obama/Biden then redefined what is a “terrorist” to include their political opposition.

DEEP DIVE:

Twitter is to the U.S. government as TikTok is to China. The overarching dynamic is the need to control public perceptions and opinions.

DHS has been in ever increasing control of Twitter since the public-private partnership was formed in 2011/2012.  However, it’s not just Twitter.  The same fundamental relationships are now at work within Google, Microsoft, YouTube, Instagram and Facebook.

With all the shiny things surfacing from the Twitter Files, few are looking at the origin of what the government is trying to keep hidden….

In the era shortly after 9/11, the DC national security apparatus, instructed by Vice President Dick Cheney, was constructed to preserve continuity of government and simultaneously view all Americans as potential threats. The Department of Homeland Security (DHS) and the Office of the Director of National Intelligence (ODNI) were created specifically for this purpose.

After 9/11/01, the electronic surveillance system that was originally created to monitor threats from abroad was retooled to monitor threats inside our country.  That is when all of our electronic ‘metadata’ came under federal surveillance.

That inflection point, and the process that followed, was exactly what Edward Snowden tried to point out.

What Barack Obama and Eric Holder did with that new construct was refine the internal targeting mechanisms so that only their political opposition became the target of this new national security system.

The problems we face now as a country are directly an outcome of two very distinct points that were merged by Barack Obama. (1) The post 9/11 monitoring of electronic communication of American citizens; and (2) Obama’s team creating a fine-tuning knob that it focused on the politics of the targets.  This is very important to understand as you dig deeper into this research outline.

Washington DC created the modern national security apparatus immediately and hurriedly after 9/11/01.  The Department of Homeland Security came along in 2002, and within the Intelligence Reform and Terrorism Prevention Act of 2004 the Office of the Director of National Intelligence (ODNI) was formed.

When President Barack Obama and Attorney General Eric Holder arrived a few years later, those newly formed institutions were viewed as opportunities to create a very specific national security apparatus that would focus almost exclusively against their political opposition.

The preexisting Federal Bureau of Investigation (FBI) and Dept of Justice (DOJ) were then repurposed to become two of the four pillars of the domestic national security apparatus: a domestic surveillance state. However, this new construct would have a targeting mechanism based on political ideology.

The DHS, ODNI, DOJ and FBI became the four pillars of this new institution. Atop these pillars is where you will find the Fourth Branch of Government.

We were not sleeping when this happened, we were wide awake. However, we were stunningly distracted by the economic collapse that was taking place in 2006 and 2007 when the engineers behind Obama started to assemble the design. By the time Obama took office in 2009, we sensed something profound was shifting, but we can only see exactly what shifted in the aftermath. The four pillars were put into place, and a new Fourth Branch of Government was quietly created.

As time passed, and the system operators became familiar with their new tools, technology allowed the tentacles of the system to reach out and touch us. That is when we first started to notice that something very disconcerting was happening. Those four pillars are the root of it, and if we take the time to understand how the Fourth Branch originated, questions about this current state of perpetual angst will start to make sense.

We pick up the expansive and weaponized intelligence system as it manifests after 9/11/01, and my goal is to highlight how the modern version of the total intelligence apparatus has metastasized into a Fourth Branch of Government. It is this superseding branch that now touches and influences every facet of our life.  We The People are under surveillance.

If we take the modern construct, originating at the speed of technological change, we can also see how the oversight or “check/balance” in our system of government became functionally obsolescent.

After many years of granular research about the intelligence apparatus inside our government, in the summer of 2020 I visited Washington DC to ask specific questions. My goal was to go where the influence agents within government actually operate, and to discover the people deep inside the institutions no one elected, and few people pay attention to.

It was during this process when I discovered how information is purposefully put into containment silos; essentially a formal process to block the flow of information between agencies and between the original branches. While frustrating to discover, the silo effect was important because understanding the communication between networks leads to our ability to reconcile conflict between what we perceive and what’s actually taking place.

After days of research and meetings in DC during 2020, amid a town that was serendipitously shut down due to COVID-19, I found a letter slid under the door of my room in a nearly empty hotel with an introduction of sorts. The subsequent discussions were perhaps the most important. After many hours of specific questions and answers on specific examples, I realized why our nation is in this mess. That is when I discovered the fourth and superseding branch of government, the Intelligence Branch.

I am going to explain how the Intelligence Branch works: (1) to control every other branch of government; (2) how it functions as an entirely independent branch of government with no oversight; (3) how and why it was created to be independent from oversight; (4) what is the current mission of the IC Branch, and most importantly (5) who operates it.

The Intelligence Branch is an independent functioning branch of government; it is no longer a subsidiary set of agencies within the Executive Branch as most would think. To understand the Intelligence Branch, we need to drop the elementary school civics class lessons about three coequal branches of government, and replace that outlook with the modern system that created itself.

The Intelligence Branch functions much like the State Dept, through a unique set of public-private partnerships that support it. Big Tech industry collaboration with intelligence operatives is part of that functioning, almost like an NGO. However, the process is much more important than most think. In this problematic perspective of a corrupt system of government, the process is the flaw – not the outcome.

There are people making decisions inside this little known, unregulated and out-of-control branch of government that impact every facet of our lives.

None of the people operating deep inside the Intelligence Branch were elected, and our elected representative House members genuinely do not know how the system works. I assert this position affirmatively because I have talked to House and Senate staffers, including the chiefs of staff for multiple House & Senate committee seats. They are not malicious people; however, they are genuinely clueless of things that happen outside their silo. That is part of the purpose of me explaining it, with examples, in full detail with sunlight.

We begin….

In April of 2016, the FBI launched a counterintelligence operation against presidential candidate Donald Trump. The questioning about that operation is what New York Representative Elise Stefanik cites in March of 2017, approximately 11 months later (First Two Minutes).

Things to note:

♦ Notice how FBI Director James Comey just matter-of-factly explains no one outside the DOJ was informed about the FBI operation. Why? Because that’s just the way things are done. His justification for unilateral operations was “because of the sensitivity of the matter“, totally ignoring any constitutional or regulatory framework for oversight, because, well, quite simply, there isn’t any. The intelligence apparatus inside the DOJ/FBI can, and does, operate based on their own independent determinations of authority.

♦ Notice also how FBI Director Comey shares his perspective that informing the National Security Council (NSC) is the equivalent of notifying the White House. The FBI leadership expressly believe they bear no responsibility to brief the Chief Executive. As long as they tell some unknown, unelected, bureaucratic entity inside the NSC, their unwritten responsibility to inform the top of their institutional silo is complete. If the IC wants to carve out the Oval Office, they simply plant information inside the NSC and, from their perspective, their civic responsibility to follow checks-and-balances is complete. This is an intentional construct.

♦ Notice how Comey obfuscates notification to the Director of National Intelligence (DNI), by avoiding the fact James Clapper was the DNI from outset of the counterintelligence operation throughout the remainder of Obama’s term. When I get deeper into the process, we will understand how the Intelligence Branch has intentionally used the creation of the DNI position (established post 9/11/01) as a method to avoid oversight, not enhance it. Keeping an oblivious doofus like James Clapper in position held strategic value [Doofus Reminder HERE].

That video of James Comey being questioned by Elise Stefanik was the first example given to me by someone who knew the background of everything that was taking place preceding that March 20, 2017, hearing. That FBI reference point is a key to understand how the Intelligence Branch operates with unilateral authority above Congress (legislative branch), above the White House (executive branch), and even above the court system (judicial branch).

Also, watch this short video of James Clapper, because it is likely many readers have forgotten, and likely even more readers have never seen it. Watch closely how then White House National Security Adviser John Brennan is responding in that video. This is before Brennan became CIA Director; this is when Brennan was helping Barack Obama put the pillars into place. WATCH:

[Sidebar: Every time I post this video it gets scrubbed from YouTube (example), so save it if you ever want to see it again.]

The video of James Clapper highlights how the ODNI position (created with good national security intention) ended up becoming the fulcrum for modern weaponization, and is now an office manipulated by agencies with a vested interest in retaining power. The Intelligence Branch holds power over the ODNI through their influence and partnership with the body that authorizes the power within it, the Senate Select Committee on Intelligence (SSCI).

Factually, the modern intelligence apparatus uses checks and balances in their favor. The checks create silos of proprietary information, classified information, vaults of information that work around oversight issues. The silos, which include the exploitation of the Foreign Intelligence Surveillance Court (FISA Court, or FISC) are part of the problem.

Ironically, the Office of the Director of National Intelligence was created in the aftermath of 9/11/01 expressly to eliminate the silos of information which they felt led to a domestic terrorist attack that could have been prevented. The ODNI was created specifically upon the recommendation of the 9/11 commission.

The intent was to create a central hub of intelligence information, inside the Executive Branch, where the CIA, NSA, DoD, DoS, and DIA could deposit their unique intelligence products and a repository would be created so that domestic intelligence operations, like the DOJ and FBI could access them when needed to analyze threats to the U.S. This, they hoped, would ensure the obvious flags missed in the 9/11 attacks would not be missed again.

However, the creation of the DNI office also created an unconstitutional surveillance system of the American people.  The DNI office became the tool to take massive amounts of data and use it to target specific Americans.  Weaponizing the DNI office for political targeting is now the purpose of the DNI office as it exists.

The illegal and unlawful nature of the surveillance creates a need for careful protection amid the group who operate in the shadows of electronic information and domestic surveillance. You will see how it was critical to install a person uniquely skilled in being an idiot, James Clapper, into that willfully blind role while intelligence operatives worked around the office to assemble the Intelligence Branch of Government.

• The last federal budget that flowed through the traditional budgetary process was signed into law in September of 2007 for fiscal year 2008 by George W. Bush. Every budget since then has been a fragmented process of continuing resolutions and individual spending bills.

Why does this matter? Because many people think defunding the Intelligence Community is a solution; it is not…. at least, not yet. Worse yet, the corrupt divisions deep inside the U.S. intelligence system can now fund themselves from multinational private sector partnerships (banks, corporations and foreign entities).

• When Democrats took over the House of Representatives in January 2007, they took office with a plan. Nancy Pelosi became Speaker, and Democrats controlled the Senate where Harry Reid was Majority Leader. Barack Obama was a junior senator from Illinois.

Pelosi and Reid intentionally did not advance a budget in 2008 (for fiscal year 2009) because their plan included installing Barack Obama (and all that came with him) with an open checkbook made even more lucrative by a worsening financial crisis and a process called baseline budgeting. Baseline budgeting means the prior fiscal year budget is accepted as the starting point for the next year budget. All previous expenditures are baked into the cake within baseline budgeting.

Massive bailouts preceded Obama’s installation due to U.S. economic collapse, and massive bailouts continued after his installation. This is the ‘never let a crisis go to waste’ aspect. TARP (Troubled Asset Recovery Program), auto bailouts (GM), and the massive stimulus spending bill, the American Recovery and Reinvestment Act (ARRA, ie. those shovel ready jobs) were all part of the non-budget spending. The federal reserve assisted with Quantitative Easing (QE1 and QE2) as congress passed various Porkulous spending bills further spending and replacing the formal budget process.

Note: There has never been a budget passed in the normal/traditional process since September of 2007.

• While Obama’s radical ‘transformation‘ was triggered across a broad range of government institutions, simultaneously spending on the U.S. military was cut, but spending on the intelligence apparatus expanded. We were all distracted by Obamacare, and the Republican Party wanted to keep us that way. However, in the background there was a process of transformation taking place that included very specific action by Eric Holder and targeted effort toward the newest executive agency the ODNI.

The people behind Obama, those same people now behind Joe Biden, knew from years of strategic planning that ‘radical transformation’ would require control over specific elements inside the U.S. government. Eric Holder played a key role in his position as U.S. Attorney General in the DOJ.

AG Holder recruited ideologically aligned political operatives who were aware of the larger institutional objectives. One of those objectives was weaponizing the DOJ-National Security Division (DOJ-NSD) a division inside the DOJ that had no inspector general oversight. For most people the DOJ-NSD weaponization surfaced with a hindsight awakening of the DOJ-NSD targeting candidate Donald Trump many years later. However, by then the Holder crew had executed almost eight full years of background work.

• The second larger Obama/Holder objective was control over the FBI. Why was that important? Because the FBI does the domestic investigative work on anyone who needs or holds a security clearance. The removal of security clearances could be used as a filter to further build the internal ideological army they were assembling. Additionally, with new power in the ODNI created as a downstream consequence of the Patriot Act, new protocols for U.S. security clearances were easy to justify.

Carefully selecting fellow ideological travelers was facilitated by this filtration within the security clearance process. How does that issue later manifest? Just look around at how politicized every intelligence agency has become, specifically including the FBI.

• At the exact same time this new background security clearance process was ongoing, again everyone distracted by the fight over Obamacare, inside the Department of State (Secretary Hillary Clinton) a political alignment making room for the next phase was being assembled. Names like Samantha Power, Susan Rice and Hillary Clinton were familiar on television while Lisa Monaco worked as a legal liaison between the Obama White House and Clinton State Department.

Through the Dept of State (DoS) the intelligence apparatus began working on their first steps to align Big Tech with a larger domestic institutional objective. Those of you who remember the “Arab Spring”, some say “Islamist Spring”, will remember it was triggered by Barack Obama’s speech in Cairo – his first foreign trip. The State Department worked with grassroots organizers (mostly Muslim Brotherhood) in Egypt, Syria, Bahrain, Qatar and Libya. Obama leaned heavily on the organizational network of Turkish President Recep Erdogan for contacts and support.

Why does this aspect matter to us? Well, you might remember how much effort the Obama administration put into recruiting Facebook and Twitter as resources for the various mideast rebellions the White House and DoS supported. This was the point of modern merge between the U.S. intelligence community and Big Tech social media.

In many ways, the coordinated political outcomes in Libya and Egypt were the beta test for the coordinated domestic political outcomes we saw in the 2020 U.S. presidential election. The U.S. intelligence community working with social media platforms and political operatives.

Overlaying all of that background activity was also a new alignment of the Obama-era intelligence apparatus with ideological federal “contractors“. Where does this contractor activity manifest? In the FISA Court opinion of Rosemary Collyer who cited the “interagency memorandum of understanding”, or MOU.

Hopefully, you can see a small part of how tentacled the system to organize/weaponize the intelligence apparatus was. None of this was accidental, all of this was by design, and the United States Senate was responsible for intentionally allowing most of this to take place.  The tools the government used to monitor threats were now being used to monitor every American.  WE THE PEOPLE were now the threat the national security system was monitoring.

That’s the 30,000/ft level backdrop history of what was happening as the modern IC was created. Next, we will go into how all these various intelligence networks began working in unison and how they currently control all of the other DC institutions under them; including how they can carve out the President from knowing their activity.

♦ When Barack Obama was installed in January 2009, the Democrats held a 60-seat majority in the U.S. Senate. As the people behind the Obama installation began executing their longer-term plan, the Senate Select Committee on Intelligence was a tool to create the Intelligence Branch; it was not an unintentional series of events.

When Obama was installed, Dianne Feinstein was the Chair of the Senate Select Committee on Intelligence (SSCI), and Democrat operative Dan Jones was her lead staffer. Feinstein was completely controlled by those around her including Senate Majority Leader Harry Reid. The CIA was in the process of turning over personnel following the Bush era, and as a result of a massive multi-year narrative of diminished credibility (Iraq WMD), a deep purge was underway. Obama/Holder were in the process of shifting intelligence alignment and the intensely political Democrat Leader Harry Reid was a key participant.

THE TRAP – Many people say that Congress is the solution to eliminating the Fourth and superseding Branch of Government, the Intelligence Branch. This is an exercise in futility because the Legislative Branch, specifically the SSCI, facilitated the creation of the Intelligence Branch. The SSCI cannot put the genie they created back in the bottle without admitting they too are corrupt; and the background story of their corruption is way too intense to be exposed now.

Every member of the SSCI is compromised in some controlling manner. Those Senators who disliked the control over them; specifically disliked because the risk of sunlight was tenuous and, well, possible; have either left completely or stepped down from the committee. None of the SSCI members past or present would ever contemplate saying openly what their tenure involved.

[Note: You might remember when Vice Chairman Mark Warner’s text messages surfaced, there was a controlled Republican SSCI member who came to his defense in February of 2018. It was not accidental that exact Senator later became the chair of the SSCI himself. That Republican Senator is Marco Rubio, now vice-chair since the Senate re-flipped back to the optics of Democrat control in 2021.]

All of President Obama’s 2009 intelligence appointments required confirmation from the Senate. The nominees had to first pass through the Democrat controlled SSCI, and then to a full Senate vote where Democrats held a 60-vote majority. Essentially, Obama got everyone he wanted in place easily. Rahm Emmanuel was Obama’s Chief of Staff, and Valerie Jarrett was Senior Advisor.

Tim Geithner was Treasury Secretary in 2010 when the joint DOJ/FBI and IRS operation to target the Tea Party took place after the midterm “shellacking” caused by the Obamacare backlash. Mitch McConnell was Minority Leader in the Senate but supported the targeting of the Tea Party as his Senate colleagues were getting primaried by an angry and effective grassroots campaign. McConnell’s friend, Senator Bob Bennett, getting beaten in Utah was the final straw.

Dirty Harry and Mitch McConnell saw the TEA Party through the same prism. The TEA Party took Kennedy’s seat in Massachusetts (Scott Brown); Sharon Angle was about to take out Harry Reid in Nevada; Arlen Spector was taken down in Pennsylvania; Senator Robert Byrd died; Senator Lisa Murkowski lost her primary to Joe Miller in Alaska; McConnell’s nominee Mike Castle lost to Christine O’Donnell in Delaware; Rand Paul won in Kentucky. This is the background. The peasants were revolting…. and visibly angry Mitch McConnell desperately made a deal with the devil to protect himself.

In many ways, the TEA Party movement was/is very similar to the MAGA movement. The difference in 2010 was the absence of a head of the movement, in 2015 Donald Trump became that head figure who benefited from the TEA Party energy. Trump came into office in 2017 with the same congressional opposition as the successful TEA Party candidates in 2011.

Republicans took control of the Senate following the 2014 mid-terms. Republicans took control of the SSCI in January 2015. Senator Richard Burr became chairman of the SSCI, and Dianne Feinstein shifted to Vice-Chair. Dirty Harry Reid left the Senate, and Mitch McConnell took power again.

Republicans were in control of the Senate Intelligence Committee in 2015 when the Intelligence Branch operation against candidate Donald Trump was underway. [Feinstein’s staffer, Dan Jones, left the SSCI so he could act as a liaison and political operative between private-sector efforts (Fusion GPS, Chris Steele) and the SSCI.] The SSCI was a participant in that Fusion GPS/Chris Steele operation, and as a direct consequence Republicans were inherently tied to the problem with President Trump taking office in January of 2017. Indiana Republican Senator Dan Coats was a member of the SSCI.

Bottom line…. When it came to the intelligence system targeting Donald Trump during the 2015/2016 primary, the GOP was just as much at risk as their Democrat counterparts.

When Trump unexpectedly won the 2016 election, the SSCI was shocked more than most. They knew countermeasures would need to be deployed to protect themselves from any exposure of their prior intelligence conduct.  Immediately Senator Dianne Feinstein stepped down from the SSCI, and Senator Mark Warner was elevated to Vice Chairman.

Indiana’s own Mike Pence, now Vice President, recommended fellow Hoosier, SSCI Senator Dan Coats, to become President Trump’s Director of National Intelligence (ODNI). [Apply hindsight here]

• To give an idea of the Intelligence Branch power dynamic, remind yourself how House Permanent Select Committee on Intelligence (HPSCI), Chairman Devin Nunes, tried to get access to the DOJ/FBI records of the FISA application used against the Trump campaign via Carter Page.

Remember, Devin Nunes only saw a portion of the FISA trail from his review of a Presidential Daily Brief (PDB) previously given to President Obama. Chairman Nunes had to review the PDB at the White House SCIF due to compartmented intelligence, another example of the silo benefit.

Remember the massive stonewalling and blocking of the DOJ/FBI toward Nunes? Remember the back-and-forth battle over declassification surrounding the Nunes memo?

Remember, after Nunes went directly to House Speaker Paul Ryan for help (didn’t get any), the DOJ only permitted two members from each party within the HPSCI to review the documents, and only at the DOJ offices of main justice?

Contrast that amount of House Intel Committee railroading by intelligence operatives in the DOJ, DOJ-NSD and FBI, with the simple request by Senate Intelligence Vice Chairman Mark Warner asking to see the Carter Page FISA application and immediately a copy being delivered to him on March 17th 2017.

Can you see which intelligence committee is aligned with the deepest part of the deep state?

Oh, how quickly we forget:

The contrast of ideological alignment between the House, Senate and Intelligence Branch is crystal clear when viewed through the prism of cooperation. You can see which legislative committee holds the power and support of the Intelligence Branch. The Senate Intel Committee facilitates the corrupt existence of the IC Branch, so the IC Branch only cooperates with the Senate Intel Committee. It really is that simple.

• The Intelligence Branch carefully selects its own members by controlling how security clearances are investigated and allowed (FBI). The Intelligence Branch also uses compartmentalization of intelligence as a way to keep each agency, and each downstream branch of government (executive, legislative and judicial), at arm’s length as a method to stop anyone from seeing the larger picture of their activity. I call this the “silo effect“, and it is done by design.

I have looked at stunned faces when I presented declassified silo product from one agency to the silo customers of another. You would be astonished at what they don’t know because it is not in their ‘silo’.

Through the advice and consent rules, the Intelligence Branch uses the SSCI to keep out people they consider dangerous to their ongoing operations. Any appointee to the intelligence community must first pass through the Senate Select Committee on Intelligence, before they get a full Senate vote. If the SSCI rejects the candidate, they simply refuse to take up the nomination. The president is then blocked from that appointment. This is what happened with President Trump over and over again.

• Additionally, the Intelligence Branch protects itself, and its facilitating allies through the formal classification process. The Intelligence Branch gets to decide unilaterally what information will be released and what information will be kept secret. There is no entity outside the Intelligence Branch, and yes that includes the President of the United States, who can supersede the classification authority of the Intelligence Branch. {Go Deep} and {Go Deep} This is something 99.9% of the people on our side get totally and frustratingly wrong.

No one can declassify, or make public, anything the Intelligence Branch will not agree to. Doubt this? Ask Ric Grenell, John Ratcliffe, or even President Trump himself.

• The classification process is determined inside the Intelligence Branch, all by themselves. They get to choose what rank of classification exists on any work product they create; and they get to decide what the classification status is of any work product that is created by anyone else. The Intelligence Branch has full control over what is considered classified information and what is not. The Intelligence Branch defines what is a “national security interest” and what is not. A great technique for hiding fingerprints of corrupt and illegal activity.

[For familiar reference see the redactions to Lisa Page and Peter Strzok text messages. The Intelligence Branch does all redactions.]

• Similarly, the declassification process is a request by an agency, even a traditionally superior agency like the President of the United States, to the Intelligence Branch asking for them to release the information. The Intelligence Branch again holds full unilateral control.

If the head of the CIA refuses to comply with the declassification instruction of the President, what can the president do except fire him/her? {Again, GO DEEP} How does the President replace the non-compliant cabinet member? They have to go through the SSCI confirmation. See the problem?

Yes, there are ways to break up the Intelligence Branch, but they do not start with any congressional effort. As you can see above, the process is the flaw – not the solution. Most conservative pundits have their emphasis on the wrong syllable. Their cornerstone is false.

For their own self-preservation, the Intelligence Branch has been interfering in our elections for years. The way to tear this apart begins with STATE LEVEL election reform that blocks the Legislative Branch from coordinating with the Intelligence Branch.

The extreme federalism approach is critical and also explains why Joe Biden has instructed Attorney General Merrick Garland to use the full power of the DOJ to stop state level election reform efforts. The worry of successful state level election control is also why the Intelligence Branch now needs to support the federal takeover of elections.

Our elections have been usurped by the Intelligence Branch. Start with honest elections and we will see just how much Democrat AND Republican corruption is dependent on manipulated election results. Start at the state level. Start there…. everything else is downstream.

COLLAPSED OVERSIGHT – The modern system to ‘check’ the Executive Branch was the creation of the legislative “Gang of Eight,” a legislative oversight mechanism intended to provide a bridge of oversight between the authority of the intelligence community within the Executive Branch.

The Go8 construct was designed to allow the President authority to carry out intelligence operations and provide the most sensitive notifications to a select group within Congress.

The Go8 oversight is directed to the position, not the person, and consists of: (1) The Speaker of the House; (2) The Minority Leader of the House; (3) The Chair of the House Permanent Select Committee on Intelligence, HPSCI; (4) The Ranking Member (minority) of the HPSCI; (5) The Leader of the Senate; (6) The Minority Leader of the Senate; (7) The Chair of the Senate Select Committee on Intelligence, SSCI; and finally (8) the Vice-Chair of the SSCI.

Example: When the Chief Executive (the President) initiates an intelligence operation on behalf of the United States, the President triggers a “finding memo.” In essence, the instruction to the intel agency or agencies to authorize a covert operation. When that process takes place, the Go8 are the first people notified. Depending on the sensitivity of the operation, sometimes the G08 are notified immediately after the operation is conducted. The notification can be a phone call or an in-person briefing.

Because of the sensitivity of their intelligence information, the Gang of Eight hold security clearances that permit them to receive and review all intelligence operations. The intelligence community are also responsible for briefing the Go8 with the same information they use to brief the President.

~ 2021 Gang of Eight ~

The Go8 design is intended to put intelligence oversight upon both political parties in Congress; it is designed that way by informing the minority leaders of both the House and Senate as well as the ranking minority members of the SSCI and HPSCI. Under the concept, the President cannot conduct an intelligence operation; and the intelligence community cannot carry out intelligence gathering operations without the majority and minority parties knowing about it.

The modern design of this oversight system was done to keep rogue and/or corrupt intelligence operations from happening. However, as we shared in the preview to this entire discussion, the process was usurped during the Obama era. {GO DEEP}

Former FBI Director James Comey openly admitted to Congress on March 20, 2017, that the FBI, FBI Counterintelligence Division, DOJ and DOJ-National Security Division, together with the Office of the Director of National Intelligence (ODNI) and the CIA, had been conducting independent investigations of Donald Trump for over a year without informing the Go8. Comey justified the lack of informing Go8 oversight by saying, “because of the sensitivity of the matter.”

Stupidly, Congress never pressed James Comey on that issue. The arrogance was astounding, and the acceptance by Congress was infuriating. However, that specific example highlighted just how politically corrupt the system had become. In essence, Team Obama usurped the entire design of congressional oversight…. and Congress just brushed it off.

Keep in mind, Comey did not say the White House was unaware; in fact he said exactly the opposite, he said, “The White House was informed through the National Security Council,” (the NSC). The unavoidable implication and James Comey admission that everyone just brushed aside, was that President Obama’s National Security Advisor, Susan Rice, was informed of the intelligence operation(s) against Donald Trump. After all, the NSC reports to the National Security Advisor.

Does the January 20, 2017, Susan Rice memo look different now?

Again, no one saw the immediate issue. What Comey just described on that March Day in 2017 was the usurpation of the entire reason the Gang of Eight exists; to eliminate the potential for political weaponization of the Intelligence Community by the executive branch. The G08 notifications to the majority and minority are specifically designed to make sure what James Comey admitted to doing was never supposed to happen.

Team Obama carried out a political operation using the intelligence community and the checks-and-balances in the system were intentionally usurped. This is an indisputable fact.

Worse still, the entire legislative branch of Congress, which then specifically included the Republicans that now controlled the House and Senate, did nothing. They just ignored what was admitted. The usurpation was willfully ignored.

The mechanism of the G08 was bypassed without a twitch of condemnation or investigation…. because the common enemy was Donald Trump.

This example highlights the collapse of the system. Obama, the Executive Branch, collapsed the system by usurping the process; in essence the process became the bigger issue, and the lack of immediate Legislative Branch reaction became evidence of open acceptance. The outcomes of the usurpation played out over the next four years; Donald J. Trump was kneecapped and lost his presidency because of it. However, the bigger issue of the collapse still exists.

The downstream consequence of the Legislative Branch accepting the Executive Branch usurpation meant both intelligence committees were compromised. Additionally, the leadership of both the House and Senate were complicit. Think about this carefully. The Legislative Branch allowance of the intelligence usurpation meant the Legislative Branch was now subservient to the Intelligence Branch.

That’s where we are.

Right now.

That’s where we are.

Term-3 Obama is now back in the White House with Joe Biden.

Lisa Monaco running the DOJ.

Victoria Nuland running State Dept (Ukraine)

Avril Haines running Intelligence Community.

Samantha Power is running USAID.

Mary McCord is running Jack Smith Special Counsel operation…. The great pretending continues.

NOTE: Former Obama National Security Aide and Counsel to the President, Lisa Monaco, is in her current position as Deputy Attorney General, specifically to make sure all of these revelations do not become a legal risk to Barack Obama and the people who created them.  The SSCI confirmed Monaco for this purpose, because the Senate is just as much at risk.

Term-1 and Term-2 Obama usurped the ‘check and balance‘ within the system and weaponized the intelligence apparatus. During Trump’s term that weaponization was covered up by a compliant congress, complicit senate intelligence committee, and not a single member of the oversight called it out. Now, Term-3 Obama steps back in to continue the cover up and continue the weaponization.

Hopefully, you can now see the scale of the problem that surrounds us with specific citation for what has taken place. What I just explained to you above is not conspiracy theory; it is admitted fact that anyone can look upon. Yet….

Have you seen this mentioned anywhere? Have you seen this called out by anyone in Congress? Have you seen anyone in media (ally or adversary) call this out? Have you seen any member of the Judicial Branch stand up and say wait, what is taking place is not okay? Have you seen a single candidate for elected office point this out? Have you seen anyone advising a candidate to point this out?

This is our current status. It is not deniable. The truth exists regardless of our comfort.

Not a single person in power will say openly what has taken place. They are scared of the Fourth Branch. The evidence of what has taken place is right there in front of our face. The words, actions and activities of those who participated in this process are not deniable, in fact most of it is on record.

There are only two members of the Gang of Eight who have existed in place from January 2007 (the real beginning of Obama’s term, two years before he took office when the Congress flipped). Only two members of the G08 have been consistently in place from January of 2007 to right now, today. All the others came and went, but two members of the Gang of Eight have been part of that failed and collapsed oversight throughout the past 15 years, Nancy Pelosi and Mitch McConnell.

TECHNOLOGY – On a global scale – the modern intelligence gathering networks are now dependent on data collection to execute their intelligence missions. In the digital age nations have been executing various methods to gather that data. Digital surveillance has replaced other methods of interception. Those surveillance efforts have resulted in a coalescing of regional data networks based on historic multi-national relationships.

We have a recent frame of reference for the “U.S. data collection network” within the NSA. Through the allied process the Five Eyes nations all rely on the NSA surveillance database (U.K, Australia, Canada, New Zealand and U.S.) The NSA database provides the digital baseline for intelligence operations in defense of our allies. The portals into the NSA database are essentially an assembly of allies in like-minded ideological connection to the United States.

Unfortunately, there have been some revelations about the NSA database being used to monitor our allies, like in the example of Germany and surveillance on Angela Merkel’s phone. As long as “the good guys” are operating honorably, allies of the United States can feel confident about having protection from the NSA surveillance of global digital data. We warn our friends if we detect something dangerous etc.

The U.S. has nodes on communication pipelines to intercept and extract data. We have also launched hundreds, perhaps thousands, of satellites to conduct surveillance and gather up data. All of this data is fed into the NSA database where it is monitored (presumably) as a national security mechanism, and in defense of our allies.

However, what about data collection or data networks that are outside the NSA database? What do our enemies do? The NSA database is just one intelligence operation of digital surveillance amid the entire world, and we do not allow access by adversaries we are monitoring. So what do they do? What do our allies do who might not trust the United States due to past inconsistencies, ie. the Middle East?

The answers to those questions highlight other data collection networks. So, a brief review of the major players is needed.

CHINA – China operates their own database. They, like the NSA, scoop up data for their system. Like us, China launches satellites and deploys other electronic data collection methods to download into their database. This is why the issues of electronic devices manufactured in China becomes problematic. Part of the Chinese data collection system involves the use of spyware, hacking and extraction.

Issues with Chinese communication company Huawei take on an added dimension when you consider the goal of the Chinese government to conduct surveillance and assemble a network of data to compete with the United States via the NSA. Other Chinese methods of surveillance and data-collection are less subversive, as in the examples of TicTok and WeChat. These are Chinese social media companies that are scraping data just like the NSA scrapes data from Facebook, Twitter and other Silicon Valley tech companies. [ Remember, the Intelligence Branch is a public-private partnership. ]

RUSSIA – It is very likely that Russia operates their own database. We know Russia launches satellites, just like China and the USA, for the same purposes. Russia is also very proficient at hacking into other databases and extracting information to store and utilize in their own network. The difference between the U.S., China and Russia is likely that Russia spends more time on the hacking aspect because they do not generate actual technology systems as rapidly as the U.S. and China.

The most recent database creation is an outcome of an ally having to take action because they cannot rely on the ideology of the United States remaining consistent, as the administrations ping-pong based on ideology.

SAUDI ARABIA – Yes, in 2016 we discovered that Saudi Arabia was now operating their own intelligence data-gathering operation. It would make sense, given the nature of the Middle East and the constant fluctuations in political support from the United States. It is a lesson the allied Arab community and Gulf Cooperation Council learned quickly when President Obama went to Cairo in 2009 and launched the Islamist Spring (Arab Spring) upon them.

I have no doubt the creation of the Saudi intelligence network was specifically because the Obama administration started supporting radical Islamists within the Muslim Brotherhood and threw fuel on the fires of extremism all over the Arab world.

Think about it., What would you do if you were Saudi Arabia, Egypt, Bahrain, Kuwait, the UAE, Jordan, Oman or Yemen and you knew the United States could just trigger an internal uprising of al-Qaeda, ISIS and the political arm of the Muslim Brotherhood to seek your destruction?

Without a doubt, those urgent lessons from 2009, 2010, 2011 triggered the formation of the Arab Intelligence Network as a network to defend itself with consistency. They assembled the network and activated it in 2017 as pictured above.

Israel – Along a similar outlook to the Arab network, no doubt Israel operates an independent data collection system as a method of protecting itself from ever-changing U.S. politics amid a region that is extremely hostile to its very existence. Like the others, Israel launches proprietary satellites, and we can be sure they use covert methods to gather electronic data just like the U.S. and China.

As we have recently seen in the Pegasus story, Israel creates spyware programs that are able to track and monitor cell phone communications of targets. The spyware would not work unless Israel had access to some network where the phone meta-data was actually stored. So yeah, it makes sense for Israel to operate an independent intelligence database.

♦ Summary: As we understand the United States Intelligence Branch of government as the superseding entity that controls the internal politics of our nation, we also must consider that multiple nations have the same issue. There are major intelligence networks around the world beside the NSA “Five-Eyes” database. China, Russia, Saudi Arabia and Israel all operate proprietary databases deploying the same tools and techniques for assembly.

The geopolitical conflict that has always existed has now shifted into a digital battle-space. The Intelligence Agencies from these regions are now operating as the backbone of the government that uses them and has become dependent on them. [<- Reread that].

Once you accept the digital-era intelligence apparatus of China, Russia, Saudi-Arabia, The United States and Israel, are now the primary national security mechanisms for stabilization of government; then you accept the importance of those intelligence operations.

Once you understand how foundational those modern intelligence operations have become for the stability and continuity of those governments…… then you begin to understand just how the United States intelligence community became more important than the government that created it.

From that point it is then critical to understand that domestic intelligence operations are underway to monitor the electronic communication of American citizens inside our own country.  YOU are under surveillance.  The parents who confront school boards are under surveillance.  The political operatives inside the FBI are monitoring everyone who comes onto the radar, that is why the National School Boards Association asked the White House, then the DOJ, to have the FBI start targeting parents.  Are things making sense now?

Public Private Partnership – The modern Fourth Branch of Government is only possible because of a Public-Private partnership with the intelligence apparatus. You do not have to take my word for it, the partnership is so brazened they have made public admissions.

The biggest names in Big Tech announced in June their partnership with the Five Eyes intelligence network, ultimately controlled by the NSA, to: (1) monitor all activity in their platforms; (2) identify extremist content; (3) look for expressions of Domestic Violent Extremism (DVE); and then, (4) put the content details into a database where the Five Eyes intelligence agencies (U.K., U.S., Australia, Canada, New Zealand) can access it.

Facebook, Twitter, Google and Microsoft are all partnering with the intelligence apparatus. It might be difficult to fathom how openly they admit this, but they do. Look at this sentence in the press release (emphasis mine):

[…] “The Group will use lists from intelligence-sharing group Five Eyes adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.”

Think about that sentence structure very carefully. They are “adding to” the preexisting list…. admitting the group (aka Big Tech) already have access to the the intelligence-sharing database… and also admitting there is a preexisting list created by the Five Eyes consortium.

Obviously, who and what is defined as “extremist content” will be determined by the Big Tech insiders themselves. This provides a gateway, another plausible deniability aspect, to cover the Intelligence Branch from any oversight.

When the Intelligence Branch within government wants to conduct surveillance and monitor American citizens, they run up against problems due to the Constitution of the United States. They get around those legal limitations by sub-contracting the intelligence gathering, the actual data mining, and allowing outside parties (contractors) to have access to the central database.

The government cannot conduct electronic searches (4th amendment issue) without a warrant; however, private individuals can search and report back as long as they have access. What is being admitted is exactly that preexisting partnership. The difference is that Big Tech will flag the content from within their platforms, and now a secondary database filled with the extracted information will be provided openly for the Intelligence Branch to exploit.

The volume of metadata captured by the NSA has always been a problem because of the filters needed to make the targeting useful. There is a lot of noise in collecting all data that makes the parts you really want to identify more difficult to capture. This new admission puts a new massive filtration system in the metadata that circumvents any privacy protections for individuals.

Previously, the Intelligence Branch worked around the constitutional and unlawful search issue by using resources that were not in the United States. A domestic U.S. agency, working on behalf of the U.S. government, cannot listen on your calls without a warrant. However, if the U.S. agency sub-contracts to say a Canadian group, or foreign ally, the privacy invasion is no longer legally restricted by U.S. law.

What was announced in June 2021 is an alarming admission of a prior relationship along with open intent to define their domestic political opposition as extremists.

July 26 (Reuters) – A counterterrorism organization formed by some of the biggest U.S. tech companies including Facebook (FB.O) and Microsoft (MSFT.O) is significantly expanding the types of extremist content shared between firms in a key database, aiming to crack down on material from white supremacists and far-right militias, the group told Reuters.

Until now, the Global Internet Forum to Counter Terrorism’s (GIFCT) database has focused on videos and images from terrorist groups on a United Nations list and so has largely consisted of content from Islamist extremist organizations such as Islamic State, al Qaeda and the Taliban.

Over the next few months, the group will add attacker manifestos – often shared by sympathizers after white supremacist violence – and other publications and links flagged by U.N. initiative Tech Against Terrorism. It will use lists from intelligence-sharing group Five Eyes, adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.

The firms, which include Twitter (TWTR.N) and Alphabet Inc’s (GOOGL.O) YouTube, share “hashes,” unique numerical representations of original pieces of content that have been removed from their services. Other platforms use these to identify the same content on their own sites in order to review or remove it. (read more)

The influence of the Intelligence Branch now reaches into our lives, our personal lives.

[The Intercept] – […] Behind closed doors, and through pressure on private platforms, the U.S. government has used its power to try to shape online discourse. According to meeting minutes and other records appended to a lawsuit filed by Missouri Attorney General Eric Schmitt, a Republican who is also running for Senate, discussions have ranged from the scale and scope of government intervention in online discourse to the mechanics of streamlining takedown requests for false or intentionally misleading information.

“Platforms have got to get comfortable with gov’t. It’s really interesting how hesitant they remain,” Microsoft executive Matt Masterson, a former DHS official, texted Jen Easterly, a DHS director, in February.

In a March meeting, Laura Dehmlow, an FBI official, warned that the threat of subversive information on social media could undermine support for the U.S. government. Dehmlow, according to notes of the discussion attended by senior executives from Twitter and JPMorgan Chase, stressed that “we need a media infrastructure that is held accountable.” (read more)

In the decades before 9/11/01 the intelligence apparatus intersected with government, influenced government, and undoubtedly controlled many institutions with it. The legislative oversight function was weak and growing weaker, but it still existed and could have been used to keep the IC in check. However, after the events of 9/11/01, the short-sighted legislative reactions opened the door to allow the surveillance state to weaponize against domestic enemies.

[…]  The extent to which the DHS initiatives affect Americans’ daily social feeds is unclear. During the 2020 election, the government flagged numerous posts as suspicious, many of which were then taken down, documents cited in the Missouri attorney general’s lawsuit disclosed. And a 2021 report by the Election Integrity Partnership at Stanford University found that of nearly 4,800 flagged items, technology platforms took action on 35 percent — either removing, labeling, or soft-blocking speech, meaning the users were only able to view content after bypassing a warning screen. The research was done “in consultation with CISA,” the Cybersecurity and Infrastructure Security Agency.

Prior to the 2020 election, tech companies including Twitter, Facebook, Reddit, Discord, Wikipedia, Microsoft, LinkedIn, and Verizon Media met on a monthly basis with the FBI, CISA, and other government representatives. According to NBC News, the meetings were part of an initiative, still ongoing, between the private sector and government to discuss how firms would handle misinformation during the election. (keep reading)

After the Patriot Act was triggered, not coincidentally only six weeks after 9/11, a slow and dangerous fuse was lit that ends with the intelligence apparatus being granted a massive amount of power.  Simultaneously the mission of the intelligence community now encompassed monitoring domestic threats as defined by the people who operate the surveillance system.

The problem with assembled power is always what happens when a Machiavellian network takes control over that power and begins the process to weaponize the tools for their own malicious benefit. That is exactly what the network of President Barack Obama did.

The Obama network took pre-assembled intelligence weapons (we should never have allowed to be created) and turned those FBI, DOJ-NSD, DHS and ODNI weapons into political tools for his radical and fundamental change. The target was the essential fabric of our nation.

Ultimately, this corrupt political process gave power to create the Fourth Branch of Government, the Intelligence Branch and a massive nationwide surveillance state. From that perspective the fundamental change was successful.

This is the scale of corrupt political compromise on both sides of the DC dynamic that we are up against.  Preserving this surveillance system, a public-private partnership, is also what removing Donald Trump was all about….  The targeting of President Trump in order to preserve the system, the system that was weaponized during the Obama administration, is what the actions of the DOJ, FBI and DHS are all about.

What would powerful people in DC do to stop the American people from finding this out?

Last point…. The Twitter Files represent a gateway of discovery into how government assisted creating social media “Oligarchical Systems.” Surveillance and control systems within social media, delivering mutual benefits called public-private partnerships were formed.

Readers here are months ahead of where the arc of this story is destined.  However, oligarchical beneficiaries will always defend the system against rogue oligarchs who become a threat.

In part, this explains why there are major inconsistencies in the public narrative as it swirls around Elon Musk and Twitter.

How could a businessman, an entrepreneur like Elon Musk, spend $44 billion, that’s BILLION, on an enterprise without knowing the basic outline of how that enterprise was operating.  In a world of financial due diligence, on a scale of this size, the contradictions do not make sense.

Yet, if we are to take Elon Musk at his word, he had no idea that DHS operates control portals into the network. He also had no idea about James Baker working as Twitter legal counsel and carrying such a massive conflict of interest.  Additionally, Musk claimed to have no idea that Perkins Coie was legally representing Twitter.

How does an owner/operator take ownership of an organization and not know these senior executive issues?  Reconcile these questions, and we begin to reconcile a background of activity that even Mr. Musk may not know about.  The alternative explanation is much more nefarious and involves Musk as a willing participant.

I’m not sure how to wake people up to the dangers inherent in this newly admitted White House “cybersecurity strategy,” but the clarity of purpose is transparent to those who have followed this construct.  We need more trumpet!… and from there we can start talking about deconstructing it.

Source

EPA CERCLA, UN AGENDA 2030 & THE PLAN TO TRANSFORM THE USA — KAZER & WATTS

SGT Report – March 2nd, 2023

https://www.sgtreportgold.com/
Noble Gold is Who I Trust ^^^

Dr. Todd Watts & Diane kazer return to SGT Report to discuss the death plume over E. Palestine, Ohio and the EPA’s fascist CERCLA ‘guidelines’ which are draconian, tyrannical and likely to be selectively enforced. The EPA is in lockstep with the UN Agenda 2030 plan to terminate land ownership and human freedom. We also focus on how to detoxify our bodies from the death plume and poisons all around us.

Get the good stuff & rid yourself of parasites, HERE:
Use code SGT10 for an additional 10% off. expires March 14.
Warrior Cleanse Free Module – https://dianekazer.com/FreeDetoxSGT
The Warrior Ceanse Program – https://dianekazer.com/WarriorCleanseSGT
Parasite Full Moon Cleanse – https://dianekazer.com/ParasiteCleanseSGT
Supplement Store – https://dianekazer.com/SGT

The Wellness Company – FREE HELP for E. Palestine victims:
https://www.twc.health/

SourceSouth Australian Gov Criminal Organisation

A Dissent in the Brunson Case? Appoint a Special Master

A Dissent in the Brunson Case? Appoint a Special Master

The High Bench, Photo: supremecourt.gov

by Mary W Maxwell, LLB

Editor’s Note: In her 23 February 2023 article, Mary Maxwell created a make-believe Supreme Court ruling in the Brunson case. She played the role of Chief Justice Jane Doe.  Now she offers a dissent in which she writes as “Justice Henry Doe.”

The United States Supreme Court

Petitioner Raland Brunson v Respondents Alma Adams et al

Dissent to the ruling dated “March 21, 2023”

Justice Henry Doe, with whom Justice Jeffrey Doe joins, dissenting

The majority opinion contains three flaws: 1. Its move to revive the Court of Equity is good but does not go far enough; a special master should be appointed to look into the allegation of an internal enemy and treason. 2. The time has come to discuss directly the way in which facts are precluded if they smack of ‘conspiracy theory.’ 3. There is a need for sua sponte correction of some of our past errors, including our decision to dismiss for lack of standing the voter-fraud case brought to us by Texas in 2020. Because of these flaws, I respectfully dissent.

Flaw 1.

The majority has correctly recognized the condition of disuse into which Equity has fallen, aside from bankruptcy courts. Equity can be used effectively for this case, in which the Petitioner is Citizen Brunson, and the Respondents are 385 members of Congress plus President Biden, Vice President Harris, and former Vice President Pence.

Whatever be the history of Equity, starting in England at the time of the Pheasant Revolt, it is a legitimate method of bringing justice. Any method to bring justice is inherently “legitimate.” The Biblical book of Leviticus says “And a man who injures his countryman – as he has done, so it shall be done to him…. Just as another person has received injury from him, so it will be given to him. An eye for an eye, a tooth for a tooth.”

I don’t mean that its inclusion in Holy Scripture gives it authority; the earlier Code of Hammurabi, which was secular, said the same thing.  I mean justice is something unto itself and is not limited to what has been developed for purposes of courts. Justice is justice. I wear the name “Justice Henry Doe” and this brings overwhelming responsibility. The people see me, and the eight others, at this High Bench and assume we have extraordinary powers to help them obtain a just settlement of their complaint.

One must ask where these powers came from. They originally came from the king’s power, in England. He had courts which produced common law; those courts traveled to England’s colonies and became part of the governing authority of the various governors. Some of those were ‘company’ governors, attending to trade; presumably their holding of “a justice portfolio” was incidental. Yet it worked, most likely because humans see the leader as being the person to turn to in time of trouble or dispute.

My role at this particular High Bench is not to solve any and all problems. We act under a very limited mandate that was laid out in the United States Constitution, ratified in 1788. Article III, section 1 of the Constitution says: “The judicial Power of the United States, shall be vested in one supreme Court, and in such inferior Courts as the Congress may from time to time ordain and establish.”  Article I, section 2 says: “The judicial Power shall extend to all Cases, in Law and Equity, arising under this Constitution, the Laws of the United States…”

Although there should not have been a need for a national court, other than to enforce matters that are strictly national, nevertheless it happened that a “Supreme Court” was set up to be one of the three branches of the new federal government. It must participate in keeping the Constitution in good health.  In 1868, in the aftermath of the Civil War, a Fourteenth Amendment was, controversially, added. It says: “No State shall make or enforce any law which shall abridge the privileges or immunities of citizens of the United States” This makes our bench the final arbiter even over the courts of the states, if their rulings concern people’s constitutional privileges or immunities. Petitioner’s case started in Utah, but in federal court, not in a state court.

Some people think we justices are the law of America, but are we? Our power “shall extend to all Cases in Law and Equity, arising under this Constitution” and to all Congress-made law. So at least one can say that the High Bench does not have responsibility for the nastiness of a neighbor who blocks your driveway. But it certainly does include the complaint of the Petitioner, who feels that his vote was taken, or somehow devalued, by cheaters. Voting for political leaders is basic to our government, so it is not possible for us to wash our hands of any connection to the matter, even given our carefully limited jurisdiction.

The 385 congresspersons are alleged by Petitioner to have erred by not investigating a fraud, which, he claims, their oath of office obliged them to do. And Vice-President Mike Pence, in his role as president of the Senate is alleged to have failed to withhold certification of the Electoral ballots. It is not clear what offense Biden and Harris are accused of. Harris was a sitting senator, when the alleged offense of failing-to-investigate occurred in December 2020, and was still a senator on January 6 when she, along with most senators, declined to vote, against accepting the ballots from certain ‘battleground’ states. Harris did not become Vice President until Inauguration Day, January 20, 2021.

Congress, Photo: corg.iu.edu

Is it a criminal case? To cheat Brunson of his vote, indirectly, by devaluing it nationally, is not a crime on the books. Still, he makes accusations of crime, by 388 persons. Petitioner states: “It is an uncontestable fact that the Respondents committed fraud and treason breaching our national security … thus adhering to [a] domestic enemy that continues to breach our national security at an alarming rate on a daily basis.”  Brunson is incorrect in saying it is an incontestable fact. He also does not seem to recognize that all accused persons are entitled to due process, or that conviction for a crime will occur only if a jury finds that the elements of the crime, including intention, were met. He points to the following phrase in Article VI as evidence of the Respondents’ guilt: “The Senators and Representatives … and all executive and judicial Officers, …, shall be bound by Oath or Affirmation, to support this Constitution.” Indeed Brunson goes in circles, taking phrases from the Constitution and then asking us to remove 388 people from office.

But the dilemma is: Where can any citizen take his or her stolen-election complaint? The Framers of the Constitution distinctly made the electing of a president a matter for the states: Article II, section 1 apportions the number of Electors according to the population of their congressional districts, and authorizes state legislatures to direct the manner of appointing their Electors. The Framers did not foresee any ‘national’ elections, such as we now hold in November; they saw only the low-key meetings in the electoral colleges. Granted, there was always some role for Congress to play if no candidate got a majority — Congress’s state delegations, each having one vote, could choose the president.

But in January 2021 it fell to Congress, when counting the incoming ballots, to pause and vote on some that appeared questionable. The way to do this had been legislated for; it appears in 3 USC 15., and it was followed strictly on January 6, 2021, even after the trauma of that day which included the death of a protestor. A few Representatives and Senators announced their complaints about a few states, the proper debate was held, and in no case was there a majority asking for ballots to be rejected.  Hence, Biden won the presidency. That does not mean that no cheating occurred at the polls. Many people have produced affidavits saying that they witnessed cheating. They went to various courts to complain but no such case got adjudicated. Media often reported that such cases was “lost” when in fact they were dismissed.  This misled the public to think a court had looked into the voting and found it clean.

Arguments, sometimes very emotional, about the 2020 election are part of the reason for American’s nervousness today; people get the message that a government will do as it pleases. And it needs to be said also that members of the Blue Party or Red Party each think the other is a den of iniquity. The Reds think that the apparatus of a so-called ‘Blue state’ won’t preserve the law but will be partisan in its handling of a complaint. This is a dreadful situation for everyone. Brunson wants to speak for them. I say we cannot ignore him.

Granted, the judiciary’s duty to uphold the Constitution includes staying in our assigned role and not grabbing turf from another branch or from the states. But what if another branch is acting ultra vires?  Or is visibly corrupt? What if a problem has no workable solution? In 1863 Abraham Lincoln signed an Emancipation Proclamation, saying slaves were no longer slaves. He had no authority to do that, but it is generally thought that he was right to do it.

In 1942, President FDR had written EO 9066 ordering martial law on the West Coast after the Japan’s attack on Pearl Harbor. Congress agreed to the lockdown of Japanese Americans. In 1943, Chief Court Justice Stone, wrote the opinion in Hirabayashi v United States approving of an American-born man’s conviction for disobeying the curfew. In a concurrence, Justice Douglas wrote “If the military were right in their belief that that among citizens of Japanese ancestry there was an actual or incipient fifth column, we were indeed faced with the imminent threat….” Analyzing this in his 2019 book Reconsidering Judicial Finality, Professor Louis Fisher asks: “If? Belief? Courts are expected to operate on the basis of independent judgement and reliable evidence, not suppositions, claims, and beliefs.”

 Gordon Hirabayashi’s draft card

Without doubt, Petitioner’s case is hard for us to find a neat answer for. Brunson has a huge number of supporters all of whom are hoping the courts can address the wrongdoing. It will not be possible now to re-count all the November 2020 votes, and technically there is no way to restore Brunson’s right to influence that election, even if he could prove that his vote lost its influence. But because it is difficult does not mean we can walk away. I would have this High Bench appoint a special master to gather more knowledge of the 2020 election, and knowledge of the alleged enemy. For us not to do so would border on misprision. The special master will have the power of subpoena, and the normal court prerogative of issuing a bench warrant if someone who appears before it appears to be indictable for crime.

[Reminder, the person writing this ‘Dissent’ is not a real member of the US Supreme Court. It is Mary Maxwell, posing as Justice Henry Doe in order to play with some ideas in this very complicated and important case.]

Flaw 2.

To repeat, the Constitution has burdened our Bench with judicial power “in all cases in law and equity arising under this Constitution.” Courts of Equity can design a constructive remedy to make justice happen, but the remedies suggested by this court’s majority are too weak, asking Biden to resign voluntarily. Petitioner has said that he wants to get people removed from office because they allegedly violated their oath of office by ignoring election fraud complaints. But he also accuses them of treason on the grounds that they “adhered” to an enemy. That sounds like conspiracy theory, and most people, upon hearing a conspiracy, cancel it from their brain.

We need to face that fact on its own. “Polite people” might stay away from hearing about those things and thus miss out on a lot of truth. The assassinations of President Kennedy in 1963, President Lincoln, and Martin Luther King in 1968, are all treated as having been done by lone nutters. But anyone who studies it will realize it was a coup d’etat in each case. King’s alleged killer James Earle Ray was already exonerated in a court case, at which media was conspicuously absent. A Congressional committee in 1992 found the JFK and MLK deaths to have been likely done by a conspiracy. Clearly someone has a lot riding on hushing up the likelihood of coup d’etat.

I ask if we SCOTUS justices have a duty to follow up on Petitioner’s hint of criminality. What if there really is an enemy tampering with our elections? The United States itself is known worldwide as an expert tamperer with foreign elections. Indeed when we don’t like the person who emerges as a popular candidate abroad, we openly support his opposite number. Thus there is no reason to play at the game of “This can’t happen.” And if the United States becomes the victim of it, who holds the portfolio to deal with this? Brunson boldly insists that his constitutionally guaranteed way to get satisfaction is to throw it in our lap. I now open that for discussion.

The label “conspiracy theorist” has been a very effective way to silence citizens by indicating that they are paranoid or silly. Per the Merriam Webster Dictionary, the definition of conspiracy theory is: “A theory that explains an event or set of circumstances as the result of a secret plot by usually powerful conspirators.” Since there are now many individuals with extreme financial power, it would be almost necessary for them to conspire with others to accomplish what they want, quietly. They would engage in “secret plots.” This is standard. By labelling citizens conspiracy theorists, however, it sounds like they are unworthy of responding to. It’s as though their story could not possibly deserve a hearing.

We are guilty of that in American courts.  Consider the official story of what happened at the Pentagon on 9-11. There are no photos of the plane, Flight AA 77, that allegedly hit the Pentagon. The named pilot Hani Hanjour was not capable of piloting a jet.  The video from numerous security cameras are not shared with the owners of the Pentagon, namely, the citizens. Pentagon chief Donald Rumsfeld gave conflicting statements as to his whereabouts at the time. So it is not a stretch to say there may be something underhanded here. A soldier, April Gallop, came to US District court to say that she was there, with her son, to put him in the Pentagon Daycare Center, and he got hurt by the attack.

April Gallop and her son Elisha, Photo: WashingtonPost.com

She sued but was dismissed and so we did not benefit from Discovery. Her attorney William Veale was disciplined and fined $15,000 for abuse of process. I believe that itself is abuse of process. Who will pay for this breach of judicial ethics? Who will make good to April Gallop the damages she suffered? US District Judge Denny Chin dismissed Gallop V Cheney — probably because the conspiracy aspect is ‘unacceptable.’Another unethical aspect of judicial handling of the 9-11 matter is that all litigants are required to file their claim at just one court, namely the US District Court for the Southern District of New York. We cannot allow this to continue. As the maxim says, qui non improbat approbat — who does not disapprove, approves.

Recent acknowledgement of our government coordinating Internet  censorship is a good indicator that things are rotten in the state of Denmark. The Executive branch went to the tech giants such as Twitter and Facebook and told them to limit free speech. Our branch played its part by not responding in courts to parents who have been branded as terrorists for having attended a school board meeting to demand, say, supervision of the curriculum for their child.

The opposite of this censorship is the production of fake news and propaganda such as “The Covid Vaccine is safe and effective” when it was not even safety tested. Could this mean that we have an enemy within? Yes, logically one would deduce that. As for political propaganda, there used to be the Smith-Mundt Act of 1948 to prevent the government from propagandizing the citizenry. That protection disappeared when someone in Congress slipped a modification into the National Defense Authorization Act of 2012 that deleted Smith-Mundt.

Thus, Brunson’s case, which already has massive publicity, would be a good opportunity for us to drop the unspoken barrier against plaintiffs’ bringing evidence of government malfeasance.  The Framers were famously aware that government malfeasance is inevitable, and copious, so designed ways to stave it off.  Certainly this includes the provisions of the Constitution that assure each person that he or she can get justice though the courts.  They also gave us specific protections against corruption, such as in the requirement that a judge’s pay not be lowered during his term of service — as he thus will not be tempted to adjust his rulings to please the paymaster. And in that regard, I recommend that we establish a mechanism whereby we are inspected by citizens. The Judicial Conference, presently the only body that would discipline us, is headed by our own Chief Justice Jane Doe. As the maxim says, Nemo judex in causa sua — no man can be the judge of his own case.

In short, I dissent from the majority’s neglect of the major issue in the Brunson case, namely: was the 2020 election rigged and if so was it by an enemy? And if so, who is that enemy? We simply cannot drop the ball. It is our responsibility to let Discovery happen. The nation can only gain from this.

Flaw 3.

It is time for us to be pro-active in confessing previous wrong decisions and changing them sua sponte. An example might be the 2003 case Eldred v Ashcroft, which extended copyright of old works up to 100 years. Plaintiff’s attorney Lawrence Lessig argued that the Copyright Term Extension Act, sarcastically called the Mickey Mouse Protection Act, is unconstitutional.  Article I, section 8 says authors should receive royalties “for a limited time.” It also says the point is “to promote the Progress of Science and useful Arts” — that is, encourage an author to do the work by a payment, and later everyone can enjoy it for free. A good reason to change our decision is that everybody knows it was done for Disney.

It is urgent that we express some regret for having dismissed Texas v Pennsylvania et al. The state of Texas asked us to rule that the electoral ballots form Georgia, Michigan, Pennsylvania, and Wisconsin. Seventeen other states came in as amici curiae to support Texas’s case. WE gave an unsigned dismissal: “Texas has not demonstrated a judicially cognizable interest in the manner in which another State conducts its elections. President Trump tweeted “The Supreme Court really let us down. No Wisdom, No Courage!”

Everyone knows, too, that we must undo the damage we did in Citizens United when we gave corporations a practically exclusive way to control who gets elected, by allowing unlimited campaign donations. Every such breach of our duty to uphold the Constitution has lethal consequences.  People would be elated if we came down off our high horse and reversed some unworthy decisions. What does it profit us to be seen as causing harm rather than help to the beloved parchment?

In sum, we must focus on the future and on the task of rescuing the nation. Action by us can be justified by the current impasse and society’s distress.  My three recommendations, within the context of a constructive remedy in Equity for Brunso’s case, are: to look further into the matter of an enemy-driven coup d’etat, to establish a mechanism beyond that of the Judicial Conference for inspecting SCOTUS, and to produce some sua sponte reversals of our past decisions.

I respectfully dissent.

Source

Criminal Elites Are Getting Sloppy

Bowne Report – Feb 24, 2023

We live in a time when the Clinton body count is just a foregone conclusion. As court released details about the 2022 suicide of Bill Clinton aide Mark Middleton who signed in Jeffrey Epstein 7 out of the 17 times he visited the White House and rode on the Lolita Express as a Clinton liason, reveals he managed to tie himself to a tree with an electrical cord and shoot himself with a gun that didn’t exist at the scene. Its obvious, there are zero repercussions for those in power and the feeding frenzy by globalist parasites in league with the Clinton’s upon the American public is well underway.

That is why it is disturbing to the human fight or flight instinct when recent fires at manufacturing and food processing plants in Fayeteville West Virginia, Gothenburg Nebraska, Medley Florida, and Bedford Ohio raise alarms causing the innocent populace, dubbed by the powerful as conspiracy theorists and deplorable, to do a double take.

Who is responsible for these fires? Is it Soros Antifa, Neo Nazis, Mexican Cartels, Illegal Aliens, Russians or the Chinese? Or a combination of all of them? One thing is for sure they are increasing. And like the Clinton body count its getting sloppier.

In Frankford,Pennsylvania Multiple Law enforcement responded after a 18-inch pipe bomb that is capped at both ends was removed for further investigation.

And while the elites push for a digital ID prison planet system that they wanted implemented yesterday.

The crime scene that is East Palestine, Pennsylvania reveals more sloppy malice aforethought. Were the Trump supporters that make up most of the population of East Palestine merely a targeted Agenda 2030 digital ID experiment?

And was the density of organic farms, the Amish population, and food processing plants in and around East Palestine just another target as Bill Gates and foreign interests buy up U.S. farmland? Its right in front of you.

Support Infowars Here

SourceSouth Australian Gov Criminal Organisation

INFILTRATION FROM WITHIN – The Deep State War Series – EPISODE ONE – Part 1/2 – FINAL CUT (NEW)

MrTruthBomb – February 23rd, 2023

In this Episode we look at The Business Plot and The Kennedy’s Vs the Deep State.
This is the NEW RELAUNCHED FINAL CUT of THE DEEP STATE WAR SERIES – Episode One.

LINKS TO SUPPORT MRTRUTHBOMB:BUY MRTRUTHBOMB A COFFEE – https://www.buymeacoffee.com/mrtruthbomb

MTB MEMBERS CHANNEL – https://www.patreon.com/MrTruthBomb

STRIPE DONATION – https://buy.stripe.com/cN2bKz759fOp6ys5kk

PAYPAL – use this email – [email protected]

MrTruthBombs Telegram – https://t.me/mrtruthbombchat

MrTruthBomb TELEGRAM CHAT – https://t.me/+OiGBdAj68XU0MzNl

Join myLocals community for exclusive content at mrtruthbomb.locals.com

SOURCES:
https://www.grunge.com/748439/the-1933-business-plot-they-didnt-teach-you-about-in-school/
https://harpers.org/2007/07/1934-the-plot-against-america/
https://allthatsinteresting.com/the-business-plot
https://vigilantcitizen.com/vigilantreport/hidden-life-kennedys-elite-dynasty-got-decimated-pt-iii/
https://www.nbcnews.com/storyline/jfk-assassination-files/jfk-files-j-edgar-hoover-said-public-must-believe-lee-n814881
https://www.arcadiapublishing.com/Navigation/Community/Arcadia-and-THP-Blog/September-2018/Smedley-Butler-and-the-1930s-Plot-to-Overthrow-the
https://www.indymedia.org.uk/en/2004/08/296661.html
https://www.express.co.uk/news/world/1041665/JFK-assassination-conspiracy-theory-George-w-bush-Skull-and-bones-spt
https://www.wsws.org/en/articles/2003/06/bush-j05.html
https://fromanativeson.com/2019/06/30/jfk-coup-detat-in-the-usa-1963-by-mark-arnold/
https://readersupportednews.org/opinion2/277-75/20557-16-mind-blowing-facts-about-who-really-killed-jfk

SourceSouth Australian Gov Criminal Organisation

error

Please help truthPeep spread the word :)