2010 DHS Contract to General Dynamics Information Systems for Domestic “Media Monitoring and Social Media Networking” – Investment Watch

by Sundance

Throughout my journey to DC in the summertime of 2020 there have been a myriad of disconcerting datapoints assembled; revelations that made sense of the insanity and disappointments discovered in all places. Nevertheless, one of many key notations for future reference was to look at the political evolution of Dept of Homeland Safety (DHS) and spot the bounce the place the ideological outlook turns into particular authorities motion.

With that in thoughts, this recent discovery of a 2010 to 2015 DHS contract to a really well-known USG protection contractor, Basic Dynamics Superior Info Methods Inc., surfaces.

As many are actually changing into conscious, DHS is the lead company behind the entire engagements with Twitter and different social media.


The Workplace of the Director of Nationwide Intelligence (ODNI), particularly created as an end result of the post-911 Patriot Act, is the pivot level on the surveillance radar sweep.

Previous to the DNI the final Intelligence Neighborhood (IC) surveillance confronted offshore and swept overseas adversaries. If any menace was picked up that included the potential for home terrorism, the recognized contact transferred from the CIA, NSA, DoD into the DOJ and FBI.  The DOJ then used the FISA Courtroom to request switch of focusing on from overseas to home.

Nevertheless, after 911 it was decided the nationwide safety surveillance radar wanted to brush a full 360° to incorporate home surveillance.  The ODNI was the workplace created to handle the pivot level.  As a selected end result of the Patriot Act, Americans have been now underneath the identical surveillance as overseas adversaries.  The brand new definition of Americans being threats to the nationwide safety state is finally what led to our taking off sneakers at TSA checkpoints in airports.   TSA is a subsidiary company of DHS.

Offshore surveillance now flowed from the CIA, DoD, NSA, IC into the ODNI, who then filtered it, and if wanted transferred it to the newly created DHS.

Because the design was laid out, the DHS would then contact the DOJ or FBI whereas affording the U.S. individual (goal) in query their duly constitutional protections towards illegal searches and seizures. The sketchy authorized dynamic is what created the necessity for the DOJ Nationwide Safety Division (DOJ-NSD).

On the similar time, onshore home surveillance could be performed by DHS by new methods just like the Transportation Security Administration and so forth.  Native, state and federal regulation enforcement would determine points or investigative targets, then ship the focusing on information upstream into the DHS database.  DHS transfers the discovering to the ODNI who cross-reference it with CIA, NSA, and so forth.  This was the unique design.

Nevertheless, it was particularly Barack Obama and Eric Holder who noticed a chance with the newly created system.  The outcome, DHS home surveillance was weaponized.  The timing of this DHS contract (2010) to General Dynamics for “media monitoring and social media help” matches completely in step with the recognized timeline of how DHS was weaponized.

Barack Obama and Eric Holder didn’t create a weaponized DOJ and FBI; the establishments have been already weaponized by the Patriot Act.  What Obama and Holder did was take the preexisting system and retool it, so the weapons of presidency solely focused one facet of the political continuum.

This level is the place many individuals understandably get confused.

Elevator Speech:

(1) The Patriot Act turned the intel surveillance radar from overseas searches for terrorists to home searches for terrorists.

(2) Obama/Biden then redefined what’s a “terrorist” to incorporate their political opposition.


Twitter is to the U.S. authorities as TikTok is to China. The overarching dynamic is the necessity to management public perceptions and opinions.

DHS has been in ever growing management of Twitter because the public-private partnership was shaped in 2011/2012.  Nevertheless, it’s not simply Twitter.  The identical elementary relationships are actually at work inside Google, Microsoft, YouTube, Instagram and Fb.

With all of the shiny issues surfacing from the Twitter Recordsdata, few are wanting on the origin of what the federal government is making an attempt to maintain hidden….

Within the period shortly after 9/11 the DC nationwide safety equipment, instructed by Vice President Dick Cheney, was constructed to protect continuity of presidency and concurrently view all People as potential threats. The Division of Homeland Safety (DHS) and the Workplace of the Director of Nationwide Intelligence (ODNI) have been created particularly for this function.

After 9/11/01 the digital surveillance system that was initially created to watch threats from overseas was retooled to watch threats inside our nation.  That’s when all of our digital ‘metadata’ got here underneath federal surveillance.

That inflection level, and the method that adopted, was precisely what Edward Snowden tried to level out.

What Barack Obama and Eric Holder did with that new assemble was refine the inner focusing on mechanisms in order that solely their political opposition turned the goal of this new nationwide safety system.

The issues we face now as a rustic are instantly an end result of two very distinct factors that have been merged by Barack Obama. (1) The put up 9/11 monitoring of digital communication of Americans; and (2) Obama’s staff making a fine-tuning knob that it centered on the politics of the targets.  This is essential to know as you dig deeper into this analysis define.

Washington DC created the fashionable nationwide safety equipment instantly and hurriedly after 9/11/01.  The Division of Homeland Safety got here alongside in 2002, and inside the Intelligence Reform and Terrorism Prevention Act of 2004 the Workplace of the Director of Nationwide Intelligence (ODNI) was shaped.

When President Barack Obama and Legal professional Basic Eric Holder arrived just a few years later, these newly shaped establishments have been considered as alternatives to create a really particular nationwide safety equipment that will focus nearly solely towards their political opposition.

The preexisting Federal Bureau of Investigation (FBI) and Dept of Justice (DOJ) have been then repurposed to change into two of the 4 pillars of the home nationwide safety equipment: a home surveillance state. Nevertheless, this new assemble would have a focusing on mechanism primarily based on political ideology.

The DHS, ODNI, DOJ and FBI turned the 4 pillars of this new establishment. Atop these pillars is the place you will see that the Fourth Department of Authorities.

We weren’t sleeping when this occurred, we have been unsleeping. Nevertheless, we have been stunningly distracted by the financial collapse that was happening in 2006 and 2007 when the engineers behind Obama began to assemble the design. By the point Obama took workplace in 2009, we sensed one thing profound was shifting, however we will solely see precisely what shifted within the aftermath. The 4 pillars have been put into place, and a brand new Fourth Department of Authorities was quietly created.

As time handed, and the system operators turned acquainted with their new instruments, know-how allowed the tentacles of the system to succeed in out and contact us. That’s after we first began to note that one thing very disconcerting was taking place. These 4 pillars are the basis of it, and if we take the time to know how the Fourth Department originated, questions on this present state of perpetual angst will begin to make sense.

We choose up the expansive and weaponized intelligence system because it manifests after 9/11/01, and my aim is to focus on how the fashionable model of the overall intelligence equipment has metastasized right into a Fourth Department of Authorities. It’s this superseding department that now touches and influences each side of our life.  We The Folks are underneath surveillance.

If we take the fashionable assemble, originating on the velocity of technological change, we will additionally see how the oversight or “verify/stability” in our system of presidency turned functionally obsolescent.

After a few years of granular analysis concerning the intelligence equipment inside our authorities, in the summertime of 2020 I visited Washington DC to ask particular questions. My aim was to go the place the affect brokers inside authorities truly function, and to find the individuals deep contained in the establishments nobody elected, and few individuals take note of.

It was throughout this process once I found how data is purposefully put into containment silos; basically a proper course of to dam the circulate of data between companies and between the unique branches. Whereas irritating to find, the silo impact was vital as a result of understanding the communication between networks results in our means to reconcile battle between what we understand and what’s truly happening.

After days of analysis and conferences in DC throughout 2020; amid a city that was serendipitously shut down resulting from COVID-19; I discovered a letter slid underneath the door of my room in a virtually empty lodge with an introduction of kinds. The next discussions have been maybe a very powerful. After many hours of particular questions and solutions on particular examples, I noticed why our nation is on this mess. That’s once I found the fourth and superseding department of presidency, the Intelligence Department.

I’m going to clarify how the Intelligence Department works: (1) to manage each different department of presidency; (2) the way it capabilities as a wholly unbiased department of presidency with no oversight; (3) how and why it was created to be unbiased from oversight; (4) what’s the present mission of the IC Department, and most significantly (5) who operates it.

The Intelligence Department is an unbiased functioning department of presidency, it’s now not a subsidiary set of companies inside the Govt Department as most would assume. To grasp the Intelligence Department, we have to drop the elementary faculty civics class classes about three coequal branches of presidency and substitute that outlook with the fashionable system that created itself.

The Intelligence Department capabilities very like the State Dept, by a novel set of public-private partnerships that help it. Large Tech business collaboration with intelligence operatives is a part of that functioning, nearly like an NGO. Nevertheless, the method is rather more vital than most assume. On this problematic perspective of a corrupt system of presidency, the method is the flaw – not the end result.

There are individuals making choices inside this little recognized, unregulated and out-of-control department of presidency that impression each side of our lives.

Not one of the individuals working deep contained in the Intelligence Department have been elected; and our elected consultant Home members genuinely have no idea how the system works. I assert this place affirmatively as a result of I’ve talked to Home and Senate staffers, together with the chiefs of workers for a number of Home & Senate committee seats. They aren’t malicious individuals; nonetheless, they’re genuinely clueless of issues that occur exterior their silo. That’s a part of the aim of me explaining it, with examples, in full element with daylight.

We start….

In April of 2016, the FBI launched a counterintelligence operation towards presidential candidate Donald Trump. The questioning about that operation is what New York Consultant Elise Stefanik cites in March of 2017, roughly 11 months later (First Two Minutes).

Issues to notice:

♦ Discover how FBI Director James Comey simply matter-of-factly explains nobody exterior the DOJ was knowledgeable concerning the FBI operation. Why? As a result of that’s simply the way in which issues are carried out. His justification for unilateral operations was “due to the sensitivity of the matter“, completely ignoring any constitutional or regulatory framework for oversight; as a result of, effectively, fairly merely, there isn’t any. The intelligence equipment contained in the DOJ/FBI can, and does, function primarily based on their very own unbiased determinations of authority.

♦ Discover additionally how FBI Director Comey shares his perspective that informing the Nationwide Safety Council (NSC) is the equal of notifying the White Home. The FBI management expressly imagine they bear no accountability to transient the Chief Govt. So long as they inform some unknown, unelected, bureaucratic entity contained in the NSC, their unwritten accountability to tell the highest of their institutional silo is full. If the IC needs to carve out the Oval Workplace, they merely plant data contained in the NSC and, from their perspective, their civic accountability to comply with checks-and-balances is full. That is an intentional assemble.

♦ Discover how Comey obfuscates notification to the Director of Nationwide Intelligence (DNI), by avoiding the very fact James Clapper was the DNI from outset of the counterintelligence operation all through the rest of Obama’s time period. Once I get deeper into the method, we’ll perceive how the Intelligence Department has deliberately used the creation of the DNI place (established put up 9/11/01) as a technique to keep away from oversight, not improve it. Maintaining an oblivious doofus like James Clapper in place held strategic worth [Doofus Reminder HERE].

That video of James Comey being questioned by Elise Stefanik was the primary instance given to me by somebody who knew the background of all the things that was happening previous that March 20, 2017, listening to. That FBI reference level is a key to know how the Intelligence Department operates with unilateral authority above Congress (legislative department), above the White Home (government department), and even above the courtroom system (judicial department).

Additionally, watch this brief video of James Clapper, as a result of it’s seemingly many readers have forgotten, and sure much more readers have by no means seen it. Watch carefully how then White Home nationwide safety adviser John Brennan is responding in that video. That is earlier than Brennan turned CIA Director, that is when Brennan was serving to Barack Obama put the pillars into place. WATCH:

[Sidebar: Every time I post this video it gets scrubbed from YouTube (example), so save it if you ever want to see it again.]

The video of James Clapper highlights how the ODNI place (created with good nationwide safety intention) ended up changing into the fulcrum for contemporary weaponization, and is now an workplace manipulated by companies with a vested curiosity in retaining energy. The Intelligence Department holds energy over the ODNI by their affect and partnership with the physique that authorizes the ability inside it, the Senate Choose Committee on Intelligence (SSCI).

Factually, the fashionable intelligence equipment makes use of checks and balances of their favor. The checks create silos of proprietary data, categorized data, vaults of data that work round oversight points. The silos, which embody the exploitation of the Overseas Intelligence Surveillance Courtroom (FISA Courtroom, or FISC) are a part of the issue.

Paradoxically, the Workplace of the Director of Nationwide Intelligence was created within the aftermath of 9/11/01 expressly to eradicate the silos of data which they felt led to a home terrorist assault that might have been prevented. The ODNI was created particularly upon the advice of the 9/11 fee.

The intent was to create a central hub of intelligence data, contained in the Govt Department, the place the CIA, NSA, DoD, DoS, and DIA might deposit their distinctive intelligence merchandise and a repository could be created in order that home intelligence operations, just like the DOJ and FBI might entry them when wanted to investigate threats to the U.S. This, they hoped, would guarantee the plain flags missed within the 9/11 assaults wouldn’t be missed once more.

Nevertheless, the creation of the DNI workplace additionally created an unconstitutional surveillance system of the American individuals.  The DNI workplace turned the software to take huge quantities of information and use it to focus on particular People.  Weaponizing the DNI workplace for political focusing on is now the aim of the DNI workplace because it exists.

The unlawful and illegal nature of the surveillance creates a necessity for cautious safety amid the group who function within the shadows of digital data and home surveillance. You will notice the way it was vital to put in an individual uniquely expert in being an fool, James Clapper, into that willfully blind position whereas intelligence operatives labored across the workplace to assemble the Intelligence Department of Authorities.

• The final federal price range that flowed by the normal budgetary course of was signed into regulation in September of 2007 for fiscal 12 months 2008 by George W. Bush. Each price range since then has been a fragmented course of of constant resolutions and particular person spending payments.

Why does this matter? As a result of many individuals assume defunding the Intelligence Neighborhood is an answer; it’s not…. at the least, not but. Worse but, the corrupt divisions deep contained in the U.S. intelligence system can now fund themselves from multinational non-public sector partnerships (banks, companies and overseas entities).

• When Democrats took over the Home of Representatives in January 2007, they took workplace with a plan. Nancy Pelosi turned Speaker, and Democrats managed the Senate the place Harry Reid was Majority Chief. Barack Obama was a junior senator from Illinois.

Pelosi and Reid deliberately didn’t advance a price range in 2008 (for fiscal 12 months 2009) as a result of their plan included putting in Barack Obama (and all that got here with him) with an open checkbook made much more profitable by a worsening monetary disaster and a course of known as baseline budgeting. Baseline budgeting means the prior fiscal 12 months price range is accepted as the start line for the following 12 months price range. All earlier expenditures are baked into the cake inside baseline budgeting.

Huge bailouts preceded Obama’s set up resulting from U.S. financial collapse, and large bailouts continued after his set up. That is the ‘by no means let a disaster go to waste’ side. TARP (Troubled Asset Restoration Program), auto bailouts (GM), and the large stimulus spending invoice, the American Restoration and Reinvestment Act (ARRA, ie. these shovel prepared jobs) have been all a part of the non-budget spending. The federal reserve assisted with Quantitative Easing (QE1 and QE2) as congress handed numerous Porkulous spending payments additional spending and changing the formal price range course of.

Observe: There has by no means been a price range handed within the regular/conventional course of since September of 2007.

• Whereas Obama’s radical ‘transformation‘ was triggered throughout a broad vary of presidency establishments, concurrently spending on the U.S. navy was lower, however spending on the intelligence equipment expanded. We have been all distracted by Obamacare, and the Republican Celebration wished to maintain us that method. Nevertheless, within the background there was a strategy of transformation happening that included very particular motion by Eric Holder and focused effort towards the latest government company the ODNI.

The individuals behind Obama, those self same individuals now behind Joe Biden, knew from years of strategic planning that ‘radical transformation’ would require management over particular parts contained in the U.S. authorities. Eric Holder performed a key position in his place as U.S. Legal professional Basic within the DOJ.

AG Holder recruited ideologically aligned political operatives who have been conscious of the bigger institutional goals. A kind of goals was weaponizing the DOJ-Nationwide Safety Division (DOJ-NSD) a division contained in the DOJ that had no inspector normal oversight. For most individuals the DOJ-NSD weaponization surfaced with a hindsight awakening of the DOJ-NSD focusing on candidate Donald Trump a few years later. Nevertheless, by then the Holder crew had executed nearly eight full years of background work.

• The second bigger Obama/Holder goal was management over the FBI. Why was that vital? As a result of the FBI does the home investigative work on anybody who wants or holds a safety clearance. The elimination of safety clearances could possibly be used as a filter to additional construct the inner ideological military they have been assembling. Moreover, with new energy within the ODNI created as a downstream consequence of the Patriot Act, new protocols for U.S. safety clearances have been straightforward to justify.

Fastidiously deciding on fellow ideological vacationers was facilitated by this filtration inside the safety clearance course of. How does that difficulty later manifest? Simply go searching at how politicized each intelligence company has change into, particularly together with the FBI.

• At the very same time this new background safety clearance course of was ongoing, once more everybody distracted by the battle over Obamacare, contained in the Division of State (Secretary Hillary Clinton) a political alignment making room for the following part was being assembled. Names like Samantha Energy, Susan Rice and Hillary Clinton have been acquainted on tv whereas Lisa Monaco labored as a authorized liaison between the Obama White Home and Clinton State Division.

By the Dept of State (DoS) the intelligence equipment started engaged on their first steps to align Large Tech with a bigger home institutional goal. These of you who bear in mind the “Arab Spring”, some say “Islamist Spring”, will bear in mind it was triggered by Barack Obama’s speech in Cairo – his first overseas journey. The State Division labored with grassroots organizers (largely Muslim Brotherhood) in Egypt, Syria, Bahrain, Qatar and Libya. Obama leaned closely on the organizational community of Turkish President Recep Erdogan for contacts and help.

Why does this side matter to us? Properly, you may bear in mind how a lot effort the Obama administration put into recruiting Fb and Twitter as assets for the varied mideast rebellions the White Home and DoS supported. This was the purpose of contemporary merge between the U.S. intelligence neighborhood and Large Tech social media.

In some ways, the coordinated political outcomes in Libya and Egypt have been the beta take a look at for the coordinated home political outcomes we noticed within the 2020 U.S. presidential election. The U.S. intelligence neighborhood working with social media platforms and political operatives.

Overlaying all of that background exercise was additionally a brand new alignment of the Obama-era intelligence equipment with ideological federal “contractors“. The place does this contractor exercise manifest? Within the FISA Courtroom opinion of Rosemary Collyer who cited the “interagency memorandum of understanding”, or MOU.

Hopefully, you possibly can see a small a part of how tentacled the system to arrange/weaponize the intelligence equipment was. None of this was unintended, all of this was by design, and the US Senate was answerable for deliberately permitting most of this to happen.  The instruments the federal government used to watch threats have been now getting used to watch each American.  WE THE PEOPLE have been now the menace the nationwide safety system was monitoring.

That’s the 30,000/ft stage backdrop historical past of what was taking place as the fashionable IC was created. Subsequent, we’ll go into how all these numerous intelligence networks started working in unison and the way they presently management the entire different DC establishments underneath them; together with how they will carve out the President from understanding their exercise.

♦ When Barack Obama was put in in January 2009, the Democrats held a 60-seat majority within the U.S. Senate. Because the individuals behind the Obama set up started executing their longer-term plan, the Senate Choose Committee on Intelligence was a software to create the Intelligence Department; it was not an unintentional sequence of occasions.

When Obama was put in, Dianne Feinstein was the Chair of the Senate Choose Committee on Intelligence (SSCI), and Democrat operative Dan Jones was her lead staffer. Feinstein was fully managed by these round her together with Senate Majority Chief Harry Reid. The CIA was within the strategy of turning over personnel following the Bush period, and on account of a large multi-year narrative of diminished credibility (Iraq WMD), a deep purge was underway. Obama/Holder have been within the strategy of shifting intelligence alignment and the intensely political Democrat Chief Harry Reid was a key participant.

THE TRAP – Many individuals say that Congress is the answer to eliminating the Fourth and superseding Department of Authorities, the Intelligence Department. That is an train in futility as a result of the Legislative Department, particularly the SSCI, facilitated the creation of the Intelligence Department. The SSCI can’t put the genie they created again within the bottle with out admitting they too are corrupt; and the background story of their corruption is method too intense to be uncovered now.

Each member of the SSCI is compromised in some controlling method. These Senators who disliked the management over them; particularly disliked as a result of the chance of daylight was tenuous and, effectively, attainable; have both left fully or stepped down from the committee. Not one of the SSCI members previous or current would ever ponder saying brazenly what their tenure concerned.

[Note: You might remember when Vice Chairman Mark Warner’s text messages surfaced, there was a controlled Republican SSCI member who came to his defense in February of 2018. It was not accidental that exact Senator later became the chair of the SSCI himself. That Republican Senator is Marco Rubio, now vice-chair since the Senate re-flipped back to the optics of Democrat control in 2021.]

All of President Obama’s 2009 intelligence appointments required affirmation from the Senate. The nominees needed to first move by the Democrat managed SSCI, after which to a full Senate vote the place Democrats held a 60-vote majority. Primarily, Obama obtained everybody he wished in place simply. Rahm Emmanuel was Obama’s Chief of Employees, and Valerie Jarrett was Senior Advisor.

Tim Geithner was Treasury Secretary in 2010 when the joint DOJ/FBI and IRS operation to focus on the Tea Celebration occurred after the midterm “shellacking” attributable to the Obamacare backlash. Mitch McConnell was Minority Chief within the Senate however supported the focusing on of the Tea Celebration as his Senate colleagues have been getting primaried by an angry and effective grassroots marketing campaign. McConnell’s pal, Senator Bob Bennett, getting overwhelmed in Utah was the ultimate straw.

Soiled Harry and Mitch McConnell noticed the TEA Celebration by the identical prism. The TEA Celebration took Kennedy’s seat in Massachusetts (Scott Brown); Sharon Angle was about to take out Harry Reid in Nevada; Arlen Spector was taken down in Pennsylvania; Senator Robert Byrd died; Senator Lisa Murkowski misplaced her major to Joe Miller in Alaska; McConnell’s nominee Mike Fortress misplaced to Christine O’Donnell in Delaware; Rand Paul received in Kentucky. That is the background. The peasants have been revolting…. and visibly indignant Mitch McConnell desperately made a cope with the satan to guard himself.

In some ways, the TEA Celebration motion was/is similar to the MAGA motion. The distinction in 2010 was the absence of a head of the motion, in 2015 Donald Trump turned that head determine who benefited from the TEA Celebration power. Trump got here into workplace in 2017 with the identical congressional opposition because the profitable TEA Celebration candidates in 2011.

Republicans took management of the Senate following the 2014 mid-terms. Republicans took management of the SSCI in January 2015. Senator Richard Burr turned chairman of the SSCI, and Dianne Feinstein shifted to Vice-Chair. Soiled Harry Reid left the Senate, and Mitch McConnell took energy once more.

Republicans have been accountable for the Senate Intelligence Committee in 2015 when the Intelligence Department operation towards candidate Donald Trump was underway. [Feinstein’s staffer, Dan Jones, left the SSCI so he could act as a liaison and political operative between private-sector efforts (Fusion GPS, Chris Steele) and the SSCI.] The SSCI was a participant in that Fusion GPS/Chris Steele operation, and as a direct consequence Republicans have been inherently tied to the issue with President Trump taking workplace in January of 2017. Indiana Republican Senator Dan Coats was a member of the SSCI.

Backside line…. When it got here to the intelligence system focusing on Donald Trump throughout the 2015/2016 major, the GOP was simply as a lot in danger as their Democrat counterparts.

When Trump unexpectedly received the 2016 election, the SSCI was shocked greater than most. They knew countermeasures would have to be deployed to guard themselves from any publicity of their prior intelligence conduct.  Instantly Senator Dianne Feinstein stepped down from the SSCI, and Senator Mark Warner was elevated to Vice Chairman.

Indiana’s personal Mike Pence, now Vice President, really useful fellow Hoosier, SSCI Senator Dan Coats, to change into President Trump’s Director of Nationwide Intelligence (ODNI). [Apply hindsight here]

• To present an concept of the Intelligence Department energy dynamic, remind your self how Home Everlasting Choose Committee on Intelligence (HPSCI), Chairman Devin Nunes, tried to get entry to the DOJ/FBI information of the FISA utility used towards the Trump marketing campaign by way of Carter Web page.

Bear in mind, Devin Nunes solely noticed a portion of the FISA path from his overview of a Presidential Every day Transient (PDB) beforehand given to President Obama. Chairman Nunes needed to overview the PDB on the White Home SCIF resulting from compartmented intelligence, one other instance of the silo profit.

Bear in mind the large stonewalling and blocking of the DOJ/FBI towards Nunes? Bear in mind the back-and-forth battle over declassification surrounding the Nunes memo?

Bear in mind, after Nunes went on to Home Speaker Paul Ryan for assist (didn’t get any), the DOJ solely permitted two members from every celebration inside the HPSCI to overview the paperwork, and solely on the DOJ workplaces of fundamental justice?

Distinction that quantity of Home Intel Committee railroading by intelligence operatives within the DOJ, DOJ-NSD and FBI, with the easy request by Senate Intelligence Vice Chairman Mark Warner asking to see the Carter Web page FISA utility and instantly a replica being delivered to him on March seventeenth 2017.

Are you able to see which intelligence committee is aligned with the deepest a part of the deep state?

Oh, how rapidly we forget:

The distinction of ideological alignment between the Home, Senate and Intelligence Department is crystal clear when considered by the prism of cooperation. You may see which legislative committee holds the ability and help of the Intelligence Department. The Senate Intel Committee facilitates the corrupt existence of the IC Department, so the IC Department solely cooperates with the Senate Intel Committee. It truly is that easy.

• The Intelligence Department fastidiously selects its personal members by controlling how safety clearances are investigated and allowed (FBI). The Intelligence Department additionally makes use of compartmentalization of intelligence as a approach to maintain every company, and every downstream department of presidency (government, legislative and judicial), at arm’s size as a technique to cease anybody from seeing the bigger image of their exercise. I name this the “silo effect“, and it’s carried out by design.

I’ve checked out shocked faces once I introduced declassified silo product from one company to the silo clients of one other. You’d be astonished at what they don’t know as a result of it’s not of their ‘silo’.

By the recommendation and consent guidelines, the Intelligence Department makes use of the SSCI to maintain out individuals they think about harmful to their ongoing operations. Any appointee to the intelligence neighborhood should first move by the Senate Choose Committee on Intelligence, earlier than they get a full Senate vote. If the SSCI rejects the candidate, they merely refuse to take up the nomination. The president is then blocked from that appointment. That is what occurred with President Trump again and again.

• Moreover, the Intelligence Department protects itself, and its facilitating allies by the formal classification course of. The Intelligence Department will get to resolve unilaterally what data might be launched and what data might be saved secret. There is no such thing as a entity exterior the Intelligence Department, and sure that features the President of the US, who can supersede the classification authority of the Intelligence Department. {Go Deep} and {Go Deep} That is one thing 99.9% of the individuals on our facet get completely and frustratingly fallacious.

Nobody can declassify, or make public, something the Intelligence Department won’t conform to. Doubt this? Ask Ric Grenell, John Ratcliffe, and even President Trump himself.

• The classification course of is decided contained in the Intelligence Department, all by themselves. They get to decide on what rank of classification exists on any work product they create; they usually get to resolve what the classification standing is of any work product that’s created by anybody else. The Intelligence Department has full management over what is taken into account categorized data and what’s not. The Intelligence Department defines what’s a “nationwide safety curiosity” and what’s not. An ideal method for hiding fingerprints of corrupt and criminal activity.

[For familiar reference see the redactions to Lisa Page and Peter Strzok text messages. The Intelligence Branch does all redactions.]

• Equally, the declassification course of is a request by an company, even a historically superior company just like the President of the US, to the Intelligence Department asking for them to launch the knowledge. The Intelligence Department once more holds full unilateral management.

If the pinnacle of the CIA refuses to adjust to the declassification instruction of the President, what can the president do besides fireplace him/her? {Once more, GO DEEPHow does the President substitute the non-compliant cupboard member? They must undergo the SSCI affirmation. See the issue?

Sure, there are methods to interrupt up the Intelligence Department, however they don’t begin with any congressional effort. As you possibly can see above, the method is the flaw – not the answer. Most conservative pundits have their emphasis on the fallacious syllable. Their cornerstone is fake.

For their very own self-preservation, the Intelligence Department has been interfering in our elections for years. The best way to tear this aside begins with STATE LEVEL election reform that blocks the Legislative Department from coordinating with the Intelligence Department.

The acute federalism method is vital and likewise explains why Joe Biden has instructed Legal professional Basic Merrick Garland to make use of the total energy of the DOJ to cease state stage election reform efforts. The concern of profitable state stage election management can be why the Intelligence Department now must help the federal takeover of elections.

Our elections have been usurped by the Intelligence Department. Begin with sincere elections and we’ll see simply how a lot Democrat AND Republican corruption depends on manipulated election outcomes. Begin on the state stage. Begin there…. all the things else is downstream.

♦ COLLAPSED OVERSIGHT – The fashionable system to ‘verify’ the Govt Department was the creation of the legislative “Gang of Eight,” a legislative oversight mechanism supposed to offer a bridge of oversight between the authority of the intelligence neighborhood inside the Govt Department.

The Go8 assemble was designed to permit the President authority to hold out intelligence operations and supply essentially the most delicate notifications to a choose group inside Congress.

The Go8 oversight is directed to the place, not the individual, and consists of: (1) The Speaker of the Home; (2) The Minority Chief of the Home; (3) The Chair of the Home Everlasting Choose Committee on Intelligence, HPSCI; (4) The Rating Member (minority) of the HPSCI; (5) The Chief of the Senate; (6) The Minority Chief of the Senate; (7) The Chair of the Senate Choose Committee on Intelligence, SSCI; and at last (8) the Vice-Chair of the SSCI.

Instance: When the Chief Govt (the President) initiates an intelligence operation on behalf of the US, the President triggers a “discovering memo.” In essence, the instruction to the intel company or companies to authorize a covert operation. When that course of takes place, the Go8 are the primary individuals notified. Relying on the sensitivity of the operation, typically the G08 are notified instantly after the operation is performed. The notification is usually a cellphone name or an in-person briefing.

Due to the sensitivity of their intelligence data, the Gang of Eight maintain safety clearances that allow them to obtain and overview all intelligence operations. The intelligence neighborhood are additionally answerable for briefing the Go8 with the identical data they use to transient the President.

~ 2021 Gang of Eight ~

The Go8 design is meant to place intelligence oversight upon each political events in Congress; it’s designed that method by informing the minority leaders of each the Home and Senate in addition to the rating minority members of the SSCI and HPSCI. Below the idea, the President can’t conduct an intelligence operation; and the intelligence neighborhood can’t perform intelligence gathering operations with out the bulk and minority events understanding about it.

The fashionable design of this oversight system was carried out to maintain rogue and/or corrupt intelligence operations from taking place. Nevertheless, as we shared within the preview to this complete dialogue, the method was usurped throughout the Obama period. {GO DEEP}

Former FBI Director James Comey brazenly admitted to Congress on March 20, 2017, that the FBI, FBI Counterintelligence Division, DOJ and DOJ-Nationwide Safety Division, along with the Workplace of the Director of Nationwide Intelligence (ODNI) and the CIA, had been conducting unbiased investigations of Donald Trump for over a 12 months with out informing the Go8. Comey justified the dearth of informing Go8 oversight by saying, “due to the sensitivity of the matter.”

Stupidly, Congress by no means pressed James Comey on that difficulty. The conceitedness was astounding, and the acceptance by Congress was infuriating. Nevertheless, that particular instance highlighted simply how politically corrupt the system had change into. In essence, Group Obama usurped the whole design of congressional oversight…. and Congress simply brushed it off.

Take into accout, Comey didn’t say the White Home was unaware; in truth he stated precisely the alternative, he said, “The White Home was knowledgeable by the Nationwide Safety Council,” (the NSC). The unavoidable implication and James Comey admission that everybody simply brushed apart, was that President Obama’s Nationwide Safety Advisor, Susan Rice, was knowledgeable of the intelligence operation(s) towards Donald Trump. In spite of everything, the NSC studies to the Nationwide Safety Advisor.

Does the January 20, 2017, Susan Rice memo look totally different now?

Once more, nobody noticed the rapid difficulty. What Comey simply described on that March Day in 2017 was the usurpation of the whole motive the Gang of Eight exists; to eradicate the potential for political weaponization of the Intelligence Neighborhood by the manager department. The G08 notifications to the bulk and minority are particularly designed to verify what James Comey admitted to doing was by no means alleged to occur.

Group Obama carried out a political operation utilizing the intelligence neighborhood and the checks-and-balances within the system have been deliberately usurped. That is an undeniable fact.

Worse nonetheless, the whole legislative department of Congress, which then particularly included the Republicans that now managed the Home and Senate, did nothing. They only ignored what was admitted. The usurpation was willfully ignored.

The mechanism of the G08 was bypassed and not using a twitch of condemnation or investigation…. as a result of the frequent enemy was Donald Trump.

This instance highlights the collapse of the system. Obama, the Govt Department, collapsed the system by usurping the method; in essence the method turned the larger difficulty, and the dearth of rapid Legislative Department response turned proof of open acceptance. The outcomes of the usurpation performed out over the following 4 years, Donald J. Trump was kneecapped and misplaced his presidency due to it. Nevertheless, the larger difficulty of the collapse nonetheless exists.

The downstream consequence of the Legislative Department accepting the Govt Department usurpation meant each intelligence committees have been compromised. Moreover, the management of each the Home and Senate have been complicit. Take into consideration this fastidiously. The Legislative Department allowance of the intelligence usurpation meant the Legislative Department was now subservient to the Intelligence Department.

That’s the place we’re.

Proper now.

That’s the place we’re.

Time period-3 Obama is now again within the White Home with Joe Biden.

NOTE: Former Obama Nationwide Safety aide and counsel to the President, Lisa Monaco, is in her present place as Deputy Legal professional Basic, particularly to verify all of those revelations don’t change into a authorized danger to Barack Obama and the individuals who created them.  The SSCI confirmed Monaco for this function as a result of the Senate is simply as a lot in danger.

Time period-1 and Time period-2 Obama usurped the ‘verify and stability‘ inside the system and weaponized the intelligence equipment. Throughout Trump’s time period that weaponization was coated up by a compliant congress, complicit senate intelligence committee, and never a single member of the oversight known as it out. Now, Time period-3 Obama steps again in to proceed the duvet up and proceed the weaponization.

Hopefully, now you can see the size of the issue that surrounds us with particular quotation for what has taken place. What I simply defined to you above just isn’t conspiracy concept, it’s admitted incontrovertible fact that anybody can look upon. But….

Have you ever seen this talked about anyplace? Have you ever seen this known as out by anybody in Congress? Have you ever seen anybody in media (ally or adversary) name this out? Have you ever seen any member of the Judicial Department rise up and say wait, what’s happening just isn’t okay? Have you ever seen a single candidate for elected workplace level this out? Have you ever seen anybody advising a candidate to level this out?

That is our present standing. It’s not deniable. The reality exists no matter our consolation.

Not a single individual in energy will say brazenly what has taken place. They’re terrified of the Fourth Department. The proof of what has taken place is true there in entrance of our face. The phrases, actions and actions of those that participated on this course of will not be deniable, in truth most of it’s on report.

There are solely two members of the Gang of Eight who’ve existed in place from January 2007 (the true starting of Obama’s time period, two years earlier than he took workplace when the Congress flipped). Solely two members of the G08 have been constantly in place from January of 2007 to proper now, at present. All of the others got here and went, however two members of the Gang of Eight have been a part of that failed and collapsed oversight all through the previous 15 years, Nancy Pelosi and Mitch McConnell.

♦ TECHNOLOGY – On a worldwide scale – the fashionable intelligence gathering networks are actually depending on information assortment to execute their intelligence missions. Within the digital age nations have been executing numerous strategies to assemble that information. Digital surveillance has changed different strategies of interception. These surveillance efforts have resulted in a coalescing of regional information networks primarily based on historic multi-national relationships.

Now we have a latest body of reference for the “U.S. information assortment community” inside the NSA. By the allied course of the 5 Eyes nations all depend on the NSA surveillance database (U.Okay, Australia, Canada, New Zealand and U.S.) The NSA database gives the digital baseline for intelligence operations in protection of our allies. The portals into the NSA database are basically an meeting of allies in like-minded ideological connection to the US.

Sadly, there have been some revelations concerning the NSA database getting used to watch our allies, like within the instance of Germany and surveillance on Angela Merkel’s cellphone. So long as “the great guys” are working honorably, allies of the US can really feel assured about having safety from the NSA surveillance of world digital information. We warn our mates if we detect one thing harmful and so forth.

The U.S. has nodes on communication pipelines to intercept and extract information. Now we have additionally launched a whole lot, maybe hundreds, of satellites to conduct surveillance and collect up information. All of this information is fed into the NSA database the place it’s monitored (presumably) as a nationwide safety mechanism, and in protection of our allies.

Nevertheless, what about information assortment or information networks which are exterior the NSA database? What do our enemies do? The NSA database is only one intelligence operation of digital surveillance amid the whole world, and we don’t permit entry by adversaries we’re monitoring. So what do they do? What do our allies do who won’t belief the US resulting from previous inconsistencies, ie. the Center East?

The solutions to these questions spotlight different information assortment networks. So, a quick overview of the key gamers is required.

♦ CHINA – China operates their very own database. They, just like the NSA, scoop up information for his or her system. Like us, China launches satellites and deploys different digital information assortment strategies to obtain into their database. Because of this the problems of digital gadgets manufactured in China turns into problematic. A part of the Chinese language information assortment system includes using spyware and adware, hacking and extraction.

Points with Chinese language communication firm Huawei tackle an added dimension when you think about the aim of the Chinese language authorities to conduct surveillance and assemble a community of information to compete with the US by way of the NSA. Different Chinese language strategies of surveillance and data-collection are much less subversive, as within the examples of TicTok and WeChat. These are Chinese language social media firms which are scraping information identical to the NSA scrapes information from Fb, Twitter and different Silicon Valley tech firms. [ Remember, the Intelligence Branch is a public-private partnership. ]

♦ RUSSIA – It is rather seemingly that Russia operates their very own database. We all know Russia launches satellites, identical to China and the USA, for a similar functions. Russia can be very proficient at hacking into different databases and extracting data to retailer and make the most of in their very own community. The distinction between the U.S., China and Russia is probably going that Russia spends extra time on the hacking side as a result of they don’t generate precise know-how methods as quickly because the U.S. and China.

The latest database creation is an end result of an ally having to take motion as a result of they can’t depend on the ideology of the US remaining constant, because the administrations ping-pong primarily based on ideology.

 SAUDI ARABIA – Sure, in 2016 we found that Saudi Arabia was now working their very own intelligence data-gathering operation. It might make sense, given the character of the Center East and the fixed fluctuations in political help from the US. It’s a lesson the allied Arab neighborhood and Gulf Cooperation Council discovered rapidly when President Obama went to Cairo in 2009 and launched the Islamist Spring (Arab Spring) upon them.

I’ve little question the creation of the Saudi intelligence community was particularly as a result of the Obama administration began supporting radical Islamists inside the Muslim Brotherhood and threw gasoline on the fires of extremism everywhere in the Arab world.

Give it some thought., What would you do if you happen to have been Saudi Arabia, Egypt, Bahrain, Kuwait, the UAE, Jordan, Oman or Yemen and also you knew the US might simply set off an inside rebellion of al-Qaeda, ISIS and the political arm of the Muslim Brotherhood to hunt your destruction?

Indubitably, these pressing classes from 2009, 2010, 2011 triggered the formation of the Arab Intelligence Community as a community to defend itself with consistency. They assembled the community and activated it in 2017 as pictured above.

 Israel – Alongside the same outlook to the Arab community, little question Israel operates an unbiased information assortment system as a technique of defending itself from ever-changing U.S. politics amid a area that’s extraordinarily hostile to its very existence. Just like the others, Israel launches proprietary satellites, and we could be certain they use covert strategies to assemble digital information identical to the U.S. and China.

As we’ve just lately seen within the Pegasus story, Israel creates spyware and adware packages which are in a position to monitor and monitor cellular phone communications of targets. The spyware and adware wouldn’t work until Israel had entry to some community the place the cellphone meta-data was truly saved. So yeah, it is sensible for Israel to function an unbiased intelligence database.

♦ Abstract: As we perceive the US Intelligence Department of presidency because the superseding entity that controls the inner politics of our nation, we additionally should think about that a number of nations have the identical difficulty. There are main intelligence networks world wide beside the NSA “5-Eyes” database. China, Russia, Saudi Arabia and Israel all function proprietary databases deploying the identical instruments and strategies for meeting.

The geopolitical battle that has all the time existed has now shifted right into a digital battle-space. The Intelligence Companies from these areas are actually working because the spine of the federal government that makes use of them and has change into depending on them. [<- Reread that].

When you settle for the digital-era intelligence equipment of China, Russia, Saudi-Arabia, America and Israel, are actually the first nationwide safety mechanisms for stabilization of presidency; you then settle for the significance of these intelligence operations.

When you perceive how foundational these fashionable intelligence operations have change into for the steadiness and continuity of these governments…… you then start to know simply how the US intelligence neighborhood turned extra vital than the federal government that created it.

From that time it’s then vital to know that home intelligence operations are underway to watch the digital communication of Americans inside our personal nation.  YOU are underneath surveillance.  The dad and mom who confront faculty boards are underneath surveillance.  The political operatives contained in the FBI are monitoring everybody who comes onto the radar, that’s the reason the Nationwide College Boards Affiliation requested the White Home, then the DOJ, to have the FBI begin focusing on dad and mom.  Are issues making sense now?

♦ Public Non-public Partnership – The fashionable Fourth Department of Authorities is simply attainable due to a Public-Non-public partnership with the intelligence equipment. You shouldn’t have to take my phrase for it, the partnership is so brazened they’ve made public admissions.

The most important names in Large Tech introduced in June their partnership with the 5 Eyes intelligence community, finally managed by the NSA, to: (1) monitor all exercise of their platforms; (2) determine extremist content material; (3) search for expressions of Home Violent Extremism (DVE); after which, (4) put the content material particulars right into a database the place the 5 Eyes intelligence companies (U.Okay., U.S., Australia, Canada, New Zealand) can entry it.

Fb, Twitter, Google and Microsoft are all partnering with the intelligence equipment. It may be troublesome to fathom how brazenly they admit this, however they do. Take a look at this sentence in the press release (emphasis mine):

[…] “The Group will use lists from intelligence-sharing group 5 Eyes including URLs and PDFs from extra teams, together with the Proud Boys, the Three Percenters and neo-Nazis.”

Take into consideration that sentence construction very fastidiously. They’re “including to” the preexisting listing…. admitting the group (aka Large Tech) have already got entry to the the intelligence-sharing database… and likewise admitting there’s a preexisting listing created by the 5 Eyes consortium.

Clearly, who and what’s outlined as “extremist content material” might be decided by the Large Tech insiders themselves. This gives a gateway, one other believable deniability side, to cowl the Intelligence Department from any oversight.

When the Intelligence Department inside authorities needs to conduct surveillance and monitor Americans, they run up towards issues as a result of Structure of the US. They get round these authorized limitations by sub-contracting the intelligence gathering, the precise information mining, and permitting exterior events (contractors) to have entry to the central database.

The federal government can’t conduct digital searches (4th modification difficulty) and not using a warrant; nonetheless, non-public people can search and report again so long as they’ve entry. What’s being admitted is precisely that preexisting partnership. The distinction is that Large Tech will flag the content material from inside their platforms, and now a secondary database full of the extracted data might be offered brazenly for the Intelligence Department to take advantage of.

The amount of metadata captured by the NSA has all the time been an issue due to the filters wanted to make the focusing on helpful. There may be loads of noise in accumulating all information that makes the elements you actually need to determine tougher to seize. This new admission places a brand new huge filtration system within the metadata that circumvents any privateness protections for people.

Beforehand, the Intelligence Department labored across the constitutional and illegal search difficulty through the use of assets that weren’t in the US. A home U.S. company, engaged on behalf of the U.S. authorities, can’t hear in your calls and not using a warrant. Nevertheless, if the U.S. company sub-contracts to say a Canadian group, or overseas ally, the privateness invasion is now not legally restricted by U.S. regulation.

What was introduced in June 2021 is an alarming admission of a previous relationship together with open intent to outline their home political opposition as extremists.

July 26 (Reuters) – A counterterrorism group shaped by a number of the greatest U.S. tech firms together with Fb (FB.O) and Microsoft (MSFT.O) is considerably increasing the sorts of extremist content material shared between companies in a key database, aiming to crack down on materials from white supremacists and far-right militias, the group informed Reuters.

Till now, the World Web Discussion board to Counter Terrorism’s (GIFCT) database has centered on movies and pictures from terrorist teams on a United Nations listing and so has largely consisted of content material from Islamist extremist organizations corresponding to Islamic State, al Qaeda and the Taliban.

Over the following few months, the group will add attacker manifestos – usually shared by sympathizers after white supremacist violence – and different publications and hyperlinks flagged by U.N. initiative Tech Towards Terrorism. It can use lists from intelligence-sharing group 5 Eyes, including URLs and PDFs from extra teams, together with the Proud Boys, the Three Percenters and neo-Nazis.

The companies, which embody Twitter (TWTR.N) and Alphabet Inc’s (GOOGL.O) YouTube, share “hashes,” distinctive numerical representations of authentic items of content material which have been faraway from their providers. Different platforms use these to determine the identical content material on their very own websites in an effort to overview or take away it. (read more)

The affect of the Intelligence Department now reaches into our lives, our private lives.

[The Intercept] – […] Behind closed doorways, and thru stress on non-public platforms, the U.S. authorities has used its energy to attempt to form on-line discourse. In line with meeting minutes and different information appended to a lawsuit filed by Missouri Legal professional Basic Eric Schmitt, a Republican who can be working for Senate, discussions have ranged from the size and scope of presidency intervention in on-line discourse to the mechanics of streamlining takedown requests for false or deliberately deceptive data.

“Platforms have gotten to get snug with gov’t. It’s actually fascinating how hesitant they continue to be,” Microsoft government Matt Masterson, a former DHS official, texted Jen Easterly, a DHS director, in February.

In a March meeting, Laura Dehmlow, an FBI official, warned that the specter of subversive data on social media might undermine help for the U.S. authorities. Dehmlow, in keeping with notes of the dialogue attended by senior executives from Twitter and JPMorgan Chase, burdened that “we want a media infrastructure that’s held accountable.” (read more)

Within the many years earlier than 9/11/01 the intelligence equipment intersected with authorities, influenced authorities, and undoubtedly managed many establishments with it. The legislative oversight operate was weak and rising weaker, but it surely nonetheless existed and will have been used to maintain the IC in verify. Nevertheless, after the occasions of 9/11/01, the short-sighted legislative reactions opened the door to permit the surveillance state to weaponize towards home enemies.

[…]  The extent to which the DHS initiatives have an effect on People’ each day social feeds is unclear. In the course of the 2020 election, the federal government flagged quite a few posts as suspicious, a lot of which have been then taken down, paperwork cited within the Missouri legal professional normal’s lawsuit disclosed. And a 2021 report by the Election Integrity Partnership at Stanford College discovered that of practically 4,800 flagged objects, know-how platforms took motion on 35 % — both eradicating, labeling, or soft-blocking speech, which means the customers have been solely in a position to view content material after bypassing a warning display. The research was carried out “in session with CISA,” the Cybersecurity and Infrastructure Safety Company.

Previous to the 2020 election, tech firms together with Twitter, Fb, Reddit, Discord, Wikipedia, Microsoft, LinkedIn, and Verizon Media met on a month-to-month foundation with the FBI, CISA, and different authorities representatives. In line with NBC Information, the conferences have been a part of an initiative, nonetheless ongoing, between the private sector and government to debate how companies would deal with misinformation throughout the election. (keep reading)

After the Patriot Act was triggered, not coincidentally solely six weeks after 9/11, a gradual and harmful fuse was lit that ends with the intelligence equipment being granted a large quantity of energy.  Concurrently the mission of the intelligence neighborhood now encompassed monitoring home threats as outlined by the individuals who function the surveillance system.

The issue with assembled energy is all the time what occurs when a Machiavellian community takes management over that energy and begins the method to weaponize the instruments for their very own malicious profit. That’s precisely what the community of President Barack Obama did.

The Obama community took pre-assembled intelligence weapons (we should always by no means have allowed to be created) and turned these FBI, DOJ-NSD, DHS and ODNI weapons into political instruments for his radical and elementary change. The goal was the important cloth of our nation.

In the end, this corrupt political course of gave energy to create the Fourth Department of Authorities, the Intelligence Department and a large nationwide surveillance state. From that perspective the basic change was profitable.

That is the size of corrupt political compromise on each side of the DC dynamic that we’re up towards.  Preserving this surveillance system, a public-private partnership, can be what eradicating Donald Trump was all about….  The focusing on of President Trump in an effort to protect the system, the system that was weaponized throughout the Obama administration, is what the actions of the DOJ, FBI and DHS are all about.

What would highly effective individuals in DC do to cease the American individuals from discovering this out?

A managed 2020 election?  An elevated censorship within the aftermath?  A raid on Mar-a-Lago?

…The necessity for management is a response to concern.


Leave a Comment

Copyright © 2024. All Rights Reserved. Finapress | Flytonic Theme by Flytonic.