Extending the Political Surveillance Discussion with New Revelations the FBI Had a Workspace Inside Perkins Coie DC Law Offices

Loading

by Sundance

Last night Representative Matt Gaetz (R-FL) made an explosive announcement as an outcome of a whistleblower providing information to him and Jim Jordan about the FBI having a collaborative relationship with the Clinton/DNC law firm Perkins Coie.  {Go Deep} Specifically, the explosive element surrounds the FBI having a workspace within the DNC law firm that would have given Democrats an open portal into FBI databases for use in opposition research.
 
Secondarily, Clinton campaign lawyer Michael Sussmann being in charge of this working arrangement within Perkins Coie for the past year, since the departure of Marc Elias, becomes a far greater issue. The potential ramifications of this joint collaborative activity are vast.
 
The FBI can exploit the NSA database to conduct searches of all cell phone, computer, email, text message, social media, electronic communication and all private data/communication belonging to Americans; this would include geolocation.  If the FBI was operating within Perkins Coie since 2012, then the democrats have held access to fully intrusive electronic surveillance of their political opposition, or anyone else – anywhere, for a decade.
 
Mainstream conservative defenders of the DOJ and FBI institutions, as a result of their prior tenure inside those same agencies, have long denied the Dept of Justice and FBI are corrupt political entities.  The revelation of the FBI and Perkins Coie working collaboratively to exploit this data portal is something that people like Margot Cleveland, Andrew McCarthy, Johnathan Turley and many others need to deny in order to retain the premise of institutional credibility.
 
However, the FBI and DNC law firm working collaboratively on issues of joint importance goes far beyond the ‘image of impropriety or conflicted interest‘ and extends to the actual corruption within the foundational institutions of government.  Transparently, if these reports are accurate all of the inexplicable dynamics within the “two tiers of justice” suddenly reconcile.  The FBI and Perkins Coie having the ability to conduct electronic surveillance of any target is a thermonuclear level of sunlight, that reconciles years of visible issues.
 
There is a common misconception about why the FBI and intelligence apparatus began investigating the political campaign of Donald Trump.
 
In this refresher outline I hope to provide some deep source material that will provide context to the revelation of the FBI-Perkins Coie relationship against numerous historic reference points that reconcile with the new revelation.
 
During the timeframe of December 2015 through April 2016 the NSA database was being exploited by contractors within the intelligence community, specifically within the FBI, doing unauthorized searches.
 
On March 9, 2016, oversight personnel doing a review of FBI system access were alerted to thousands of unauthorized FBI search queries of specific U.S. persons within the NSA database.
 
NSA Director Mike Rogers was made aware.
 
Subsequently NSA Director Rogers initiated a full compliance review of the system to identify who was doing the searches; & what searches were being conducted.
 
On April 18, 2016, following the preliminary audit results, Director Rogers shut down all FBI contractor access to the database after he learned FISA-702 “about”(17) and “to/from”(16) search queries were being done without authorization.
 
Thus begins the first discovery of a much bigger background story.
 
When you compile the timeline with the people involved; and the specific wording of the resulting review, which was then delivered to the FISA court; and overlay the activity that was taking place in the 2016 political primary; what we discover is a process where the metadata collected by the NSA was being searched for political opposition research and surveillance.
 
Tens-of-thousands of unauthorized and unlawful searches were identified by the FISA court as likely extending much further than the compliance review period: “while the government reports it is unable to provide a reliable estimate of the non compliant queries since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 period coincided with an unusually high error rate”.
 
In short, during the Obama administration access to the NSA database was continually used to conduct surveillance.  This is the critical point that leads to understanding the origin of “Spygate”, as it unfolded in the Spring and Summer of 2016.
 
It was the discovery of the database exploitation and the removal of access as a surveillance tool that seemed to create the initial problem for the FBI political unit in Washington, DC.  Here’s how we can tell.
 
In December 2015 there were 17 GOP candidates, all needing opposition research.
 
However, when Donald Trump won New Hampshire, Nevada and South Carolina the field was significantly whittled. Trump, Cruz, Rubio, Kasich and Carson remained.
 
On Super Tuesday, March 2, 2016, Donald Trump won seven states (VT, AR, VA, GA, AL, TN, MA) it was then clear that Trump was the GOP frontrunner with momentum to become the presumptive nominee.
 
On March 5th, 2016, DonaldTrump won Kentucky and Louisiana; and on March 8th Trump won Michigan, Mississippi and Hawaii.
 
The next day, March 9, 2016, is when NSA security alerts warned internal oversight personnel that something sketchy was going on.  This timing is not coincidental.
 
As FISA Judge Rosemary Collyer later wrote in her report, “many of these non-compliant queries involved the use of the same identifiers over different date ranges.”  Put another way: attributes belonging to a specific individual(s) were being targeted and queried, unlawfully.  Given what was later discovered, it seems obvious the primary search targets, over multiple date ranges, were political candidates, specifically Donald Trump.
 
There were tens-of-thousands of unauthorized search queries; and as Judge Collyer stated in her report, there is no reason to believe the 85% non compliant rate was any different from the abuse of the NSA database going back to 2012, the same year the FBI collocated a workspace within Perkins Coie.
 
As you will see below the NSA database was how political surveillance was being conducted during Obama’s second term in office.  However, when the system was flagged, and when NSA Director Mike Rogers shut down “FBI contractor” access to the system, the system users needed to develop another way to get access.
 
Mike Rogers shuts down access on April 18, 2016.  On April 19, 2016, Fusion-GPS founder Glenn Simpson’s wife, Mary Jacoby visits the White House.  Immediately thereafter, the DNC and Clinton campaign contract Fusion GPS… who then hire Christopher Steele.
 
Knowing it was federal “contractors”, outside government with FBI access to the system doing the unauthorized searches, the question becomes: who were the contractors?
 
The possibilities are quite vast. Essentially anyone the FBI or intelligence apparatus was using could have participated.  Crowdstrike was a known FBI contractor; they were also contracted by the DNC.  Shawn Henry was the former head of the FBI office in DC and later become part of Crowdstrike’s leadership team, a rather dubious contractor for the government and a politically connected data security and forensic company.
 
FBI Director James Comey’s special friend Daniel Richman was an unpaid FBI “special employee” with security access to the database.  Nellie Ohr began working for Fusion-GPS on the Trump project in November 2015 and she was a previous open-source CIA contractor; and now that we know the FBI and Perkins Coie were in a collaborative relationship, we can also presume they were FBI contractors with similar clearances and access.
 
Remember the Sharyl Attkisson computer intrusions?  It’s all part of this same network; Attkisson even names Shawn Henry as a defendant in her ongoing lawsuit.
 
All of the aforementioned names, and so many more, held a political agenda in 2016.
 
It seems likely if the NSA flags were never triggered then the contracted FBI system users would have continued exploiting the NSA database for political opposition research; which would then be funneled to the Clinton team.  However, once the unauthorized flags were triggered, the system users (including those inside the FBI and sister agency the CIA) would need to find another back-door to continue… Again, the timing becomes transparent.
 
Immediately after NSA flags were raised March 9, 2016, the same FBI and CIA intelligence agencies began using confidential human sources (CHS’s) to run into the Trump campaign.  By activating intelligence assets like Joseph Mifsud and Stefan Halper the IC (CIA, FBI) and system users had now created an authorized way to continue the same political surveillance operations.
 
When Donald Trump hired Paul Manafort on March 28, 2016, it was a perfect scenario for those doing the surveillance.   Manafort was a known entity to the FBI and was previously under investigation.  Paul Manafort’s entry into the Trump orbit was perfect for Glenn Simpson to sell his prior research on Manafort as a Trump-Russia collusion script two weeks later.
 
The shift from “unauthorized exploitation of the NSA database” to legally authorized exploitation of the NSA database was now in place. This was how they continued the political surveillance. This is the confluence of events that originated “spygate”, or what officially blossomed into the FBI investigation known as “Crossfire Hurricane” on July 31.
 
If the NSA flags were never raised; and if Director Rogers had never initiated the compliance audit; and if the FBI political contractors were never blocked from access to the database; they would never have needed to create a legal back-door, a justification to retain the surveillance.  The political operatives/contractors would have just continued the targeted metadata exploitation.
 
Once they created the FBI surveillance door, Fusion-GPS was then needed to get the FBI known commodity of Chris Steele activated as a pipeline. Into that pipeline all system users pushed opposition research.  However, one mistake from the database extraction, likely during an “about” query, shows up as a New Yorker named Michael Cohen in Prague.
 
[the_ad id=”157875″]
 
That misinterpreted data from a FISA-702 “about query” is then piped to Steele and turns up inside the dossier; it was the wrong Michael Cohen. It wasn’t Trump’s lawyer, it was an art dealer from New York City with the same name; the same “identifier”.
 
A DEEP DIVE – How Did It Work?
 
Start by reviewing the established record from the 99-page FISC opinion rendered by Presiding Judge Rosemary Collyer on April 26, 2017. Review the details within the FISC opinion.
 
I would strongly urge everyone to read the FISC report (full pdf below) because Judge Collyer outlines how the DOJ, which includes the FBI, had an “institutional lack of candor” in responses to the FISA court. In essence, the Obama administration was continually lying to the FISA court about their activity, and the rate of fourth amendment violations for illegal searches and seizures of U.S. persons’ private information for multiple years.
 
Unfortunately, due to intelligence terminology Judge Collyer’s brief and ruling is not an easy read for anyone unfamiliar with the FISA processes. That complexity also helps the media avoid discussing it; and as a result most Americans have no idea the scale and scope of the Obama-era surveillance issues. So we’ll try to break down the language..
 

Top Secret FISA Court Order… by The Conservative Treehouse

 
For the sake of brevity and common understanding CTH will highlight the most pertinent segments showing just how systemic and troublesome the unlawful electronic surveillance was.
 
Early in 2016 NSA Director Admiral Mike Rogers was alerted of a significant uptick in FISA-702(17) “About” queries using the FBI/NSA database that holds all metadata records on every form of electronic communication.
 
The NSA compliance officer alerted Admiral Mike Rogers who then initiated a full compliance audit on/around March 9th, 2016, for the period of November 1st, 2015, through May 1st, 2016.
 
While the audit was ongoing, due to the severity of the results that were identified, Admiral Mike Rogers stopped anyone from using the 702(17) “about query” option, and went to the extraordinary step of blocking all FBI contractor access to the database on April 18, 2016 (keep these dates in mind).
 
Here are some significant segments:
 
The key takeaway from these first paragraphs is how the search query results were exported from the NSA database to users who were not authorized to see the material. The FBI contractors were conducting searches and then removing, or ‘exporting’, the results. Later on, the FBI said all of the exported material was deleted.
 

 
Searching the highly classified NSA database is essentially a function of filling out search boxes to identify the user-initiated search parameter and get a return on the search result.
 
♦ FISA-702(16) is a search of the system returning a U.S. person (“702”); and the “16” is a check box to initiate a search based on “To and From“. Example, if you put in a date and a phone number and check “option 16” as the search parameter the user will get the returns on everything “To and From” that identified phone number for the specific date. Calls, texts, contacts etc. Including results for the inbound and outbound contacts.
 
♦ FISA-702(17) is a search of the system returning a U.S. person (702); and the “17” is a check box to initiate a search based on everything “About” the search qualifier. Example, if you put a date and a phone number and check “option 17” as the search parameter the user will get the returns of everything about that phone. Calls, texts, contacts, geolocation (or gps results), account information, user, service provider etc. As a result, 702(17) can actually be used to locate where the phone (and user) was located on a specific date or sequentially over a specific period of time which is simply a matter of changing the date parameters.
 
And that’s just from a phone number.
 
Search an ip address “about” and read all data into that server; put in an email address and gain everything about that account. Or use the electronic address of a GPS enabled vehicle (about) and you can withdraw more electronic data and monitor in real time. Search a credit card number and get everything about the account including what was purchased, where, when, etc. Search a bank account number, get everything about transactions and electronic records etc. Just about anything and everything can be electronically searched; everything has an electronic ‘identifier’.
 
The search parameter is only limited by the originating field filled out. Names, places, numbers, addresses, etc. By using the “About” parameter there may be thousands or millions of returns. Imagine if you put “@realdonaldtrump” into the search parameter? You could extract all following accounts who interacted on Twitter, or Facebook etc. The search result is only limited by the operators’ imagination and the scale of the electronic connectivity.

Read more
 

0 0 votes
Article Rating
Subscribe
Notify of
8 Comments
Inline Feedbacks
View all comments

HRC was supposed to be installed. They got sloppy and let Trump win, democratically (as he should). Then they committed a coup and simply made up stuff without any evidence. It’s treason.

Then Covid and a rigged election to get their next puppet, Biden into the WH.

Now we are at war with Russia, crippling inflation, less jobs, higher prices, higher crime.

Biden won nothing, and will never be our president.

What the democrat party did was political insurrection. The democrat party has shown what is is and why they are truly the enemy of America.
People like greg and the democrat party should be exterminated

“Exterminated?” No way I agree with that. It appears that globalist/Euro money got into our government and installed many, mostly Democrats. They are pushing for a globalist totalitarian regime, and not the will of the People of the US.

I vote for both parties, and will continue to do so. greg is ALWAYS free to lie and speak and spread whatever propaganda he’s being paid to do.

I was firmly an atheist Leftist decades ago. As they started using worse and worse language, I told they we were in danger of becoming the very thing we were fighting against: cultic, fundamentalist loons who put their dogma over everything.

They did that, which is why some shit stain like “michael” feels free to make into the 1980s strawman that doesn’t even exist.

I’d say the same to you: careful with the words. I have the hope that those indoctrinated Leftists see where their ideas go, and pull back into sanity.

When half the population is told Trump didn’t win in 2016 based off of a actual case of internal espionage and treason, then tells them Biden actual won in 2020 after so-obvious-it-hurts election fraud, we have a real problem.

Metaphorically speaking my friend. I would not advocate going Margaret Sanger on them. The democrat party as an institution should be exterminated.

I understand, man. For sure. I just can’t allow one party to destroy the other, which means the only way to go is a cleaned up GOP and Democrat Party. Lobbyists and corporate donations should be banned.

Specifically, the explosive element surrounds the FBI having a workspace within the DNC law firm that would have given Democrats an open portal into FBI databases for use in opposition research.

Ha, ha, ha, ha, ha, ha! They had unlimited access to all data and they STILL had to make shit up! Trump never did ANYTHING wrong! Ha, ha, ha, ha, ha, ha!

F**king idiots. Loser Democrats.



comment image

comment image