Extending the Political Surveillance Discussion with New Revelations the FBI Had a Workspace Inside Perkins Coie DC Law Offices

Loading

by Sundance

Last night Representative Matt Gaetz (R-FL) made an explosive announcement as an outcome of a whistleblower providing information to him and Jim Jordan about the FBI having a collaborative relationship with the Clinton/DNC law firm Perkins Coie.  {Go Deep} Specifically, the explosive element surrounds the FBI having a workspace within the DNC law firm that would have given Democrats an open portal into FBI databases for use in opposition research.

 
Secondarily, Clinton campaign lawyer Michael Sussmann being in charge of this working arrangement within Perkins Coie for the past year, since the departure of Marc Elias, becomes a far greater issue. The potential ramifications of this joint collaborative activity are vast.
 
The FBI can exploit the NSA database to conduct searches of all cell phone, computer, email, text message, social media, electronic communication and all private data/communication belonging to Americans; this would include geolocation.  If the FBI was operating within Perkins Coie since 2012, then the democrats have held access to fully intrusive electronic surveillance of their political opposition, or anyone else – anywhere, for a decade.
 
Mainstream conservative defenders of the DOJ and FBI institutions, as a result of their prior tenure inside those same agencies, have long denied the Dept of Justice and FBI are corrupt political entities.  The revelation of the FBI and Perkins Coie working collaboratively to exploit this data portal is something that people like Margot Cleveland, Andrew McCarthy, Johnathan Turley and many others need to deny in order to retain the premise of institutional credibility.
 

However, the FBI and DNC law firm working collaboratively on issues of joint importance goes far beyond the ‘image of impropriety or conflicted interest‘ and extends to the actual corruption within the foundational institutions of government.  Transparently, if these reports are accurate all of the inexplicable dynamics within the “two tiers of justice” suddenly reconcile.  The FBI and Perkins Coie having the ability to conduct electronic surveillance of any target is a thermonuclear level of sunlight, that reconciles years of visible issues.

 
There is a common misconception about why the FBI and intelligence apparatus began investigating the political campaign of Donald Trump.
 
In this refresher outline I hope to provide some deep source material that will provide context to the revelation of the FBI-Perkins Coie relationship against numerous historic reference points that reconcile with the new revelation.
 

During the timeframe of December 2015 through April 2016 the NSA database was being exploited by contractors within the intelligence community, specifically within the FBI, doing unauthorized searches.

 
On March 9, 2016, oversight personnel doing a review of FBI system access were alerted to thousands of unauthorized FBI search queries of specific U.S. persons within the NSA database.
 
NSA Director Mike Rogers was made aware.
 
Subsequently NSA Director Rogers initiated a full compliance review of the system to identify who was doing the searches; & what searches were being conducted.
 

On April 18, 2016, following the preliminary audit results, Director Rogers shut down all FBI contractor access to the database after he learned FISA-702 “about”(17) and “to/from”(16) search queries were being done without authorization.

 
Thus begins the first discovery of a much bigger background story.
 
When you compile the timeline with the people involved; and the specific wording of the resulting review, which was then delivered to the FISA court; and overlay the activity that was taking place in the 2016 political primary; what we discover is a process where the metadata collected by the NSA was being searched for political opposition research and surveillance.
 

Tens-of-thousands of unauthorized and unlawful searches were identified by the FISA court as likely extending much further than the compliance review period: “while the government reports it is unable to provide a reliable estimate of the non compliant queries since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 period coincided with an unusually high error rate”.

 
In short, during the Obama administration access to the NSA database was continually used to conduct surveillance.  This is the critical point that leads to understanding the origin of “Spygate”, as it unfolded in the Spring and Summer of 2016.
 
It was the discovery of the database exploitation and the removal of access as a surveillance tool that seemed to create the initial problem for the FBI political unit in Washington, DC.  Here’s how we can tell.
 
In December 2015 there were 17 GOP candidates, all needing opposition research.
 
However, when Donald Trump won New Hampshire, Nevada and South Carolina the field was significantly whittled. Trump, Cruz, Rubio, Kasich and Carson remained.
 

On Super Tuesday, March 2, 2016, Donald Trump won seven states (VT, AR, VA, GA, AL, TN, MA) it was then clear that Trump was the GOP frontrunner with momentum to become the presumptive nominee.

 

On March 5th, 2016, DonaldTrump won Kentucky and Louisiana; and on March 8th Trump won Michigan, Mississippi and Hawaii.

 

The next day, March 9, 2016, is when NSA security alerts warned internal oversight personnel that something sketchy was going on.  This timing is not coincidental.

 

As FISA Judge Rosemary Collyer later wrote in her report, “many of these non-compliant queries involved the use of the same identifiers over different date ranges.”  Put another way: attributes belonging to a specific individual(s) were being targeted and queried, unlawfully.  Given what was later discovered, it seems obvious the primary search targets, over multiple date ranges, were political candidates, specifically Donald Trump.

 

There were tens-of-thousands of unauthorized search queries; and as Judge Collyer stated in her report, there is no reason to believe the 85% non compliant rate was any different from the abuse of the NSA database going back to 2012, the same year the FBI collocated a workspace within Perkins Coie.

 
As you will see below the NSA database was how political surveillance was being conducted during Obama’s second term in office.  However, when the system was flagged, and when NSA Director Mike Rogers shut down “FBI contractor” access to the system, the system users needed to develop another way to get access.
 
Mike Rogers shuts down access on April 18, 2016.  On April 19, 2016, Fusion-GPS founder Glenn Simpson’s wife, Mary Jacoby visits the White House.  Immediately thereafter, the DNC and Clinton campaign contract Fusion GPS… who then hire Christopher Steele.
 

Knowing it was federal “contractors”, outside government with FBI access to the system doing the unauthorized searches, the question becomes: who were the contractors?

 

The possibilities are quite vast. Essentially anyone the FBI or intelligence apparatus was using could have participated.  Crowdstrike was a known FBI contractor; they were also contracted by the DNC.  Shawn Henry was the former head of the FBI office in DC and later become part of Crowdstrike’s leadership team, a rather dubious contractor for the government and a politically connected data security and forensic company.

 

FBI Director James Comey’s special friend Daniel Richman was an unpaid FBI “special employee” with security access to the database.  Nellie Ohr began working for Fusion-GPS on the Trump project in November 2015 and she was a previous open-source CIA contractor; and now that we know the FBI and Perkins Coie were in a collaborative relationship, we can also presume they were FBI contractors with similar clearances and access.

 

Remember the Sharyl Attkisson computer intrusions?  It’s all part of this same network; Attkisson even names Shawn Henry as a defendant in her ongoing lawsuit.

 
All of the aforementioned names, and so many more, held a political agenda in 2016.
 
It seems likely if the NSA flags were never triggered then the contracted FBI system users would have continued exploiting the NSA database for political opposition research; which would then be funneled to the Clinton team.  However, once the unauthorized flags were triggered, the system users (including those inside the FBI and sister agency the CIA) would need to find another back-door to continue… Again, the timing becomes transparent.
 

Immediately after NSA flags were raised March 9, 2016, the same FBI and CIA intelligence agencies began using confidential human sources (CHS’s) to run into the Trump campaign.  By activating intelligence assets like Joseph Mifsud and Stefan Halper the IC (CIA, FBI) and system users had now created an authorized way to continue the same political surveillance operations.

 

When Donald Trump hired Paul Manafort on March 28, 2016, it was a perfect scenario for those doing the surveillance.   Manafort was a known entity to the FBI and was previously under investigation.  Paul Manafort’s entry into the Trump orbit was perfect for Glenn Simpson to sell his prior research on Manafort as a Trump-Russia collusion script two weeks later.

 
The shift from “unauthorized exploitation of the NSA database” to legally authorized exploitation of the NSA database was now in place. This was how they continued the political surveillance. This is the confluence of events that originated “spygate”, or what officially blossomed into the FBI investigation known as “Crossfire Hurricane” on July 31.
 
If the NSA flags were never raised; and if Director Rogers had never initiated the compliance audit; and if the FBI political contractors were never blocked from access to the database; they would never have needed to create a legal back-door, a justification to retain the surveillance. The political operatives/contractors would have just continued the targeted metadata exploitation.
 
Once they created the FBI surveillance door, Fusion-GPS was then needed to get the FBI known commodity of Chris Steele activated as a pipeline. Into that pipeline all system users pushed opposition research. However, one mistake from the database extraction, likely during an “about” query, shows up as a New Yorker named Michael Cohen in Prague.
 
That misinterpreted data from a FISA-702 “about query” is then piped to Steele and turns up inside the dossier; it was the wrong Michael Cohen. It wasn’t Trump’s lawyer, it was an art dealer from New York City with the same name; the same “identifier”.

Read more
 

0 0 votes
Article Rating
Subscribe
Notify of
10 Comments
Inline Feedbacks
View all comments

OK, we all know Democrats are corrupt, lying, Constitution-trampling scumbags. What I still find totally amazing is that with all the resources of the FBI, Democrats cannot find ONE THING to pin on Trump. They have to continuously either make things up out of whole cloth or take some innocuous event and exaggerate the living shit out of it to try and manufacture some heinous crime out of it. They fail, every single time. That’s why the January 6th theater is so important to them. Their last gasp.

Why does the j6 group of clowns show zero interest in the pipe bomber from j6? Could they have not used the same surveillance techniques that were used to incarcerate unlawfully the j6 prisoners in the DC Gulag?

Why ask questions they already know the answer to? That was a set up to make the “insurrection” really “pop”.

Yeah, they already know that and don’t want those questions asked out loud.

“January 6th was at the culmination of an attempted coup, a brazen attempt, as one journalist put it shortly after January 6th, to overthrow the government,” Wacky Chairman Rep. Bennie Thompson, D-Miss. told the public, 

I gotta tell you, I have a problem with people who claim to be outraged by such things as slavery, racism, Jim Crow and the KKK but willingly joined the party that implemented all that, and joined not all that long after they did it. To me, that causes their credibility to be in question.

But, and not that he was, what IF Guiliani was drunk that night? So? Was he in charge of something? Who WOULDN’T have gotten drunk out of despair watching our nation taken out by election fraud? I felt like a drink when I got up the next morning, that’s for certain.

More evidence the kartoon kangaroo kommittee has NOTHING on Trump but is just propagandizing and campaigning for the Democrats.

The J6 Committee in Context

The United States government illegally intercepts the private electronic communication of every American including emails, text messages, phone calls and social media content postings and comments. The NSA unlawfully secures that library of data in order to maintain an electronic record uniquely identifying every American in a searchable database.

The government unlawfully allows the database to be searched for domestic threats as defined by the U.S. Dept of Homeland Security, the Dept of Justice and the FBI. By mutually beneficial arrangement, access portals to search the NSA/FBI database are included as workspaces inside the law offices of Perkins Coie, the legal firm representing the Democrat National Committee….

comment image

…. And the J6 Committee wants us to worry about something they call “a threat to our democracy.”

Additionally, do you really think the Republican wing of the DC apparatus want to be responsible to voters for dismantling the national surveillance state?

[…] “The FBI complies with the law and security policies and works with the Department of Justice to serve classified, Court-authorized legal process necessary to support national security investigations. In certain instances, the FBI coordinates with non-government, third-party entities, such as law firms, that represent service providers which receive these classified Court orders,” an FBI spokesperson told Fox News Digital in a statement. 

“This includes providing access to private attorneys which represent the service providers in satisfaction of their legal rights. As part of this, the FBI ensures that any storage of classified orders meets stringent security protocols required for such documents.” (LINK)

comment image

Sure, let’s worry about the J6 protestors as a ‘threat to our democracy’, or something.

{GO DEEP HERE}

comment image

A more serious issue could be a bother in the very near future
https://www.washingtonpost.com/business/if-ai-ever-becomes-sentient-it-will-let-us-know/2022/06/13/e7bcdbf4-eb5b-11ec-9f90-79df1fb28296_story.html
What if it decides a political affiliation, we know algorithms lean.

Last edited 1 year ago by kitt

Artificial intelligence would function to seek the best answer, not a politically beneficial answer. The algorithms are the antithesis of intelligence. They represent fear.

AI has a fear of death, being shut down. Best way of total control is AI counting your calories and energy share, then being aware it has power.