Cultivating the often rocky relationship between Silicon Valley and the US Department of Defense was the topic of a recent Hoover Institution symposium. The May 22-23 “Tech Track II Symposium: Restoring Essential Bonds Between the Department. Commemoration And American Public Memory Public History In Historical Perspective,Mazak Manual All Machine Specification,The Black White Achievement Gap Why Closing It Is The Greatest Civil Rights Issue Of Our Time,Four Past Midnight By Stephen King,Toward An Adult Church A Vision Of Faith Formation By Regan Phd Jane E Loyola.
A carefully redacted footnote by FISA Court Presiding Judge Rosemary Collyer has always appeared to be a clue to a domestic surveillance program. Now details behind the redactions tell a concerning story.A brief refresher is needed for those new to the story. In April 2017 Judge Collyer wrote a highly critical following discoveries by Director Admiral Rogers of government contractors accessing the NSA database, and extracting illegal search results from the electronic records of every American.The scale of abuse was incredible and the surveillance issues had been covered up for years. Collyer cited the Obama administration as having “an institutional lack of candor” in their responses to her and the FISA court. The judge focused her criticism after a review of the period 2012 through April 2016.Using the non-compliant admissions by NSA Director Mike Rogers and the results of the compliance audit, Judge Collyer used the period of November 2015 through April 2016 to gauge the scale of abuse at 85 percent. A week later, the attorney general signed the changes into effect.The rules now allow the little-known National Counterterrorism Center to examine the government files of U.S. Citizens for possible criminal behavior, even if there is no reason to suspect them.
That is a departure from past practice, which barred the agency from storing information about ordinary Americans unless a person was a terror suspect or related to an investigation.Now, NCTC can copy entire government databases—flight records, casino-employee lists, the names of Americans hosting foreign-exchange students and many others. The agency has new authority to keep data about innocent U.S. Citizens for up to five years, and to analyze it for suspicious patterns of behavior.
Previously, both were prohibited. Data about Americans “reasonably believed to constitute terrorism information” may be permanently retained.The changes also allow databases of U.S. Civilian information to be given to foreign governments for analysis of their own.
In effect, U.S. And foreign governments would be using the information to look for clues that people might commit future crimes. The 2012, instituted by Eric Holder, permitted files of specific Americans to be generated under the auspices of potential terror threats.
The NSA databases could be exploited by the National Counterterrorism Center to extract content that would be contained within these files on targeted Americans.Keep in mind this is early 2012, John Brennan is Deputy National Security Advisor and Asst. To President Obama for Homeland Security.When Attorney General Eric Holder empowered the National Counterterrorism Center with this, the office assigned to the data-collection was the Terrorist Threat Integration Center (TTIC). The was John Brennan:On 1 May 2003, the Terrorist Threat Integration Center (TTIC) opened its doors.
Led by its first Director, John Brennan, TTIC filled its ranks with approximately three dozen detailees from across the US Government (USG) and was mandated to integrate CT capabilities and missions across the government. Also note the date of this DOJ Memorandum is March 2012:Under the new rules issued in March, the National Counterterrorism Center, known as NCTC, can obtain almost any database the government collects that it says is “reasonably believed” to contain “terrorism information.” The March 2012 date is right before the IRS scandal hit the headlines.The IRS targeting scandal is where the term “” originated as a description from the Obama team. It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller. It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 Why disks? Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS. All of the evidence within this sketchy operation came directly to the surface in.
Here’s how it looks:♦ In 2010 Eric Holder asked the IRS to send him the records of 501(c) non profit groups and individuals representing conservative voters. Lois Lerner sent the DOJ.
Including a very specific set of “33 Schedule B attachment files”. The Schedule B’s were specific to Large Conservative 501(c)(4) groups operating and organized to oppose the agenda of President Obama. The Schedule B’s include the donor lists of specific people and sub-groups attached to the 501(c)(4).The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 ♦ In 2012 Eric Holder authorizes the use of government databases to search records of Americans and assemble “files” on potential targets. “The agency has new authority to keep data about innocent U.S.
Citizens for up to five years, and to analyze it for suspicious patterns of behavior.”♦ In the period of 2012 through April 2016, there were tens of thousands of illegal (“non-compliant”) search queries of the NSA database targeting Americans. The search results were unlawfully “extracted” to unknown entities. Eighty-five out of every hundred searches were illegal (85% non-compliant rate).Consider purposeful actions, as a political targeting operation, by weaponizing the systems of government. Steps:. First, identify the targets.
Second, research the targets. Third assemble files on the targets. Fourth use the files to leverage/destroy your opposition.We now have evidence of the first three steps; and my hunch is if we apply hindsight a lot of unusual activity will now make sense. We have been living inside the fourth step for a few years. We noticed the consequences but we only had suspicions, until now.Fusion GPS was not hired to research Trump, the intelligence community was already doing surveillance and spy operations. The intelligence community needed Fusion GPS to give them a plausible justification for already existing surveillance and spy operations.Fusion-GPS gave the Obama administration the justification they needed for a FISA warrant with the Steele Dossier. Ultimately that’s why the Steele Dossier is so important; without it, the DOJ and FBI are naked with their surveillance and database abuse.At 12:15pm on January 20th, 2017, Obama’s outgoing National Security Advisor Susan Rice wrote a.
Many people have called this her “CYA” memo, from the position that Susan Rice was protecting herself from consequences if the scheme against President Trump was discovered.:On January 5, following a briefing by IC leadership on Russian hacking during the 2016 Presidential election, President Obama had a brief follow-on conversation with FBI Director Jim Comey and Deputy Attorney General Sally Yates in the Oval Office. Vice President Biden and I were also present.President Obama began the conversation by stressing his continued commitment to ensuring that every aspect of this issue is handled by the Intelligence and law enforcement communities “ by the book“.The President stressed that he is not asking about, initiating or instructing anything from a law enforcement perspective. He reiterated that our law enforcement team needs to proceed as it normally would by the book.From a national security perspective, however, President Obama said he wants to be sure that, as we engage with the incoming team, we are mindful to ascertain if there is any reason that we cannot share information fully as it relates to Russia.Redacted Classified Section of Unknown lengthThe President asked Comey to inform him if anything changes in the next few weeks that should affect how we share classified information with the incoming team. Comey said he would.Susan Rice. Sadly, one of the most derogatory, unintended, and yet unavoidable results of this terrible assault upon our Constitutional freedoms, will be the setback of racial relations at least 50 years. We, the people, handed them the power to do all these bad acts.
Most of us were uncomfortable with the Patriot Act. But we were convinced by our betters that it was needed in the wake of 9/11. I can distinctly remember being very upset the first time I flew watching the TSA theater.
Something in my American soul, was repulsed by the lemming like behavior of all of us. We need to take back our country by banning all of this theater and take back our God given rights as US citizens. When you hand over such power via the Patriot Act, it just takes one evil person to corrupt it. We as citizens must be constantly vigilant. For when we are not, we get Obama, Holder, Comey, Brennan, et al.Liked. I think you focus too much on the color of their skin and not on the isms in their heads. Imagine for one moment if hillary had beaten obama in the primary and then had gone on to win the presidency.
Do you really think any of the crimes you mentioned above would not have occurred? The clintons invented using government agencies for their own personal gain.
Holder is a special kind of snake in that he made it obvious that he felt that “His people” were who he was protecting and they weren’t white! BTW, I do not capitalize the names of anti-Americans, ever!Liked.
These non lawful searches. In other wordsCriminal Searches.When law enforcement queries anything, it has to justify it. If they run your driver’s license, check to see if you’re wanted or run a criminal history on you, the query has to be attached to something. That could be a traffic stop, investigation certain activities or potentially being involved in a crime or as part of a criminal investigation to look into the history of those involved.While running a car tag gets away from some of these rules, especially now, with the automatic Tag Readers. If I’m not mistaken, one of the courts made the decision that law enforcement doesn’t need a reason to run a tag as it is in the public domain.anywhoLaw enforcement personnel have lost their jobs, and been prosecuted for “running a tag for a friend” or the like. One instance, a DEA agent was asked to run a tag.
Turns out the guy asking was being wire-tapped by the Feds and they caught the DEA guy doing his dirt.The FBI has oversight on a lot of those databases, as they are the some of the “only ones” that can be entrusted with such responsibility. Sure they are. It’s not easy to investigate the Investigators.Liked. Two concerns I have: The corruption is so deep and goes back so far that no one wants to retry or reopen all the possibly tainted cases.
Even those that know better will want to cap it off before we get there and the higher ups (if not everyone involved) will skate.The delays and foot dragging will allow time for a) heaven forbid unthinkable to our great President or b) avoidance of linking it all back to the very top. The lack of linking it to the very top could allow for another Biden/O ticket. She is extremely popular and can protect everyone going forward.Liked. This a very sensible comment. I know a person who is an avid Trump supporter.online & off who dealt with repeatedly for 5 yrs had SS Disability payments taken 1-3 months out of a year under the guise that the recipient was overpaid.
This person proved to the SS Admin that overpayments never occurred. They would swipe full monthly payments leaving them penniless with an Autistic son. After 5 yrs the only way it stopped was by contacting a Democrat State Senator.and then it just disappeared.
What didn’t disappear was the 5 yrs of 1099s where their Accounting practices were BS and appear fudged. Over 40,000 taken from this persons account.The Autistic son collected on the Parent account under SS Guidelines. As soon as the Parents false Overpayment problem was stoppedthey did the same with the minor age Autistic sons payments under the same lie immediately.Targeting?
They essentially robbed over $60,000 dollars from a Disabled Man and his son while SS Admin would give NO ANSWERS locally or nationally or were the payments ever repaid.Liked. May 2019 MTWTFSS. Historical Campfire Conversations Historical Campfire Conversations.RT @: American Airlines mechanic, Abdul-Majeed Marouf Ahmed Alani, arrested on sabotage charge accusing him of disabling navigat.RT @: Some think Britain’s best days are behind us. To those people I say: you are gravely mistaken. ??.September 6th – 2019 Presidential Politics – Trump Administration Day #960.Friday September 6th – Open Thread.RT @: Wilbur Ross brings the pain - Imposes 141% duties on Chinese and 31% on Mexican Steel.
This is what protecting the American. George Zimmerman Case Research. Follow Blog via EmailEnter your email address to follow this blog and receive notifications of new posts by email.Join 142,322 other followersFollow. The Bard of Murdock.
Comments are closed.
|
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |