Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: MtnClimber

From the article..
Consider purposeful actions, as a political targeting operation, by weaponizing the systems of government. Steps:

First, identify the targets (IRS Database).
Second, research the targets (NSA Database).
Third assemble files on the targets (DOJ Authorization).
Fourth use the files to leverage/destroy your opposition.


8 posted on 05/28/2019 5:33:53 PM PDT by Track9 (I mess up the bell curve.)
[ Post Reply | Private Reply | To 2 | View Replies ]


To: Track9
Fourth use the files to leverage/destroy your opposition.

Be sure to copy all the files to another location so they can be used in any way you want, any time you want, against the people whose information is on them. This is apparently what Obama's people did. Even if the entire scheme is exposed, the files are still in the hands of the Dems. They never dreamed that someone as clean of cheating and illegal behavior as Trump would become President.

This sure makes the Clinton's stolen 900 FBI files on Republican legislators seem small. We never found out who stole those files. No one was ever held accountable for them. Hopefully someone will be held accountable this time.

11 posted on 05/28/2019 6:06:07 PM PDT by Freee-dame (Best election ever! 2016)
[ Post Reply | Private Reply | To 8 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson