Posted on 02/13/2022 2:37:28 AM PST by gattaca
Against the latest court filings by John Durham, highlighting the tip of the political surveillance iceberg, I have been asked to re-post the deep dive into the totality of the scale of the iceberg. I will add some of the latest information into the outline to show how it all connects.
Barack Obama and Eric Holder did not create a weaponized DOJ and FBI; instead, what they did was take the preexisting system and retool it, so the weapons only targeted one side of the political continuum.
Together they recalibrated the domestic surveillance capabilities, the internal spying systems, so that only their political opposition would be targeted. This point is where many people understandably get confused.
(Excerpt) Read more at theconservativetreehouse.com ...
Between the internal enemies of America, in the form of Obama and Holder, and the external enemies of America, in the form of China.... I do not give us good odds.
Hold on, 0 and Holder are both geniuses?
I would argue it’s a different kind of case now. Once you lay out a case involving a government computer, and a tech team hired to infiltrate it and install false data, it’s a federal cyber crime case.
You don’t usually lose those because there’s a path left there, with financial ‘path’ somewhere in the midst (someone had profits because of their illegal work).
In a court, you’d have to ask the technician who hired you, and what guidance they gave. So that minimum amount of information will become public knowledge. My guess is that the amount of money will come up as well.
The question is....who in the Clinton camp directed this, where the money came from (maybe a PAC, maybe the charity foundation), and if they want to drag that person in...to share the second half of the story (where the idea came from and who in the campaign discussed this).
I will offer this observation. Hillary Clinton is not computer literate, and other than standing in the room and blinking her eyes, I don’t think she’s smart enough to grasp what exactly they were going to do.
It looks like the persons who have identified themselves as “targeted individuals” are vindicated. There are plenty of books you can get through Amazon written by these individuals.
I would suggest reading the whole article to really understand this. It’s very long and very detailed but very, very valuable to understanding what is going on and what has been going on for years.
Hillary Clinton is just a minor player. The whole operation is run by the parties in what Sundance calls the “Fourth Branch of Government,” the “Intelligence Branch.” This is the morphing of Bush’s ill-advised new security agencies into a set of interlocking intelligence agencies that are the most powerful entity in the US government and are the true “Deep State.” This “Intelligence Branch” was built by Obama and Holder as a political tool, and it has only gotten worse and more solidified over the years since Obama.
Sundance writes: “I am going to explain how the Intelligence Branch works: (1) to control every other branch of government; (2) how it functions as an entirely independent branch of government with no oversight; (3) how and why it was created to be independent from oversight; (4) what is the current mission of the IC Branch, and most importantly (5) who operates it.”
It’s a long explanation, but worth every minute of the time it takes to read it.
Amen, and vindicates Durham and the long time his investigation is taking.
This is how and why we have the current, installed, vegetable president...who supposedly garnered more than 81 million votes. Not sure our country will survive the next 3 years.
Slow and thorough, is better than fast and sloppy. (I think Mae West once said that...) Heh.
I read the whole article, long but well worth the read, contains a lot of very important information and connects a lot of dots.
Been years and zero from this slug./
Once you lay out a case involving a government computer, and a tech team hired to infiltrate it and install false data, it’s a federal cyber crime case.
Except Tech company 1 had the contract to protect the EOB including the WH.
NO HACK INVOLVED
Some of that isn't true, Many clearances are issued by State, DoD, etc. I don't know who investigates Congressional staff or White House staff. If that's the FBI that's going to be a problem since that's where the politics can be involved.
DOD does their own investigations as does CIA and others, now having said that, they contract much of it out now. How corruptible is doing it by contracting? Good question!
Layer Sundance’s explanation over activities of a certain actor Robert Kadlec who worked at HSS. He was a proponent of using “low grade” bio weapons against our enemies as a way of degrading their economies (Poultry and pig virus appeared in China in the late teens prior to Covid, inflicting a lot of damage on a Chinas food supply) The theory goes rogue elements in US agencies orchestrated thru Wuhan lab the release of Covid on US enemies (Where did it first appear? China & then Iran). Google his involvement in a training excercise called the Crimson Contagion.
Oh and… Kadlec was Deputy Staff Director for the United States Senate Select Committee on Intelligence prior to his role at HHS!
Man, that one serious deep dive.
When this is over, Durham will have a dozen or so referrals to Garland’s ‘Justice’ Department.
LOL.
Recalibrated the domestic surveillance capabilities.
To the highest degree back to the USSR.
Puzzle pieces all over the article... interesting read.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.