Unraveling The Abuse Of Intelligence Gathering

Opposition research is part of any good political campaign. To some extent, dirty tricks also appear in political campaigns. Politics is a blood sport, and many of our politicians are extremely Machiavellian. However, when government agencies are used against a political candidate, we have ventured into something dangerous and illegal that must be stopped. That is the place we find ourselves with the FISA Warrants issued to spy on the Trump campaign.

Yesterday The Conservative Treehouse posted an article about the abuses of FISA during the 2016 presidential campaign. It is a very complex article, but I will attempt to post some of the highlights. I strongly suggest that you follow the link above to read the entire article and watch the video.

The article reports:

Way back when CTH first began the deep dive into the systems and processes that were deployed in the 2015/2016 election cycle we eventually came to the conclusion that everything of substance, within the larger intelligence abuses, revolved around DOJ and FBI abuses of the FISA process.

As an outcome of multiple research deep-dives we then focused on a specific foundational block of that usurpation, the fraudulent application presented to the FISA Court by officials within the FBI and DOJ-NSD (National Security Division).  The October 21st, 2016, application to the FISA Court for surveillance authority upon U.S. person Carter Page; and by extension the Donald Trump campaign.

Throughout all further inquiries this central component remains at the center of the issue.  Unlawful surveillance is the originating principal behind Operation Crossfire Hurricane; it is also the originating issue within the Peter Strzok “insurance policy”; additionally, it is the originating aspect to the Clinton/Steele dossier; etc. etc. the list is long.  Chase any of the corrupt threads back to their source of origin and you eventually come back to the surveillance authority within the FISA processes.

The article explains what is being done to prevent future FISA abuses:

FISA is a process, and when used appropriately, within all guidelines, is essentially a surveillance tool. However, it is a tool that is entirely subject to the honor of the user. If the user is corrupt, or holds corrupt intent, the tool easily becomes a weapon. That’s what happened in 2015, 2016 and likely long before that. The weaponization is so easy to initiate that NSA Director Admiral Mike Rogers admitted the intelligence community could not adequately prevent it. So Rogers went about eliminating massive aspects to it, completely.

…The movement of the U.S. Cyber Command, literally into another combatant command, essentially merging NSA into a functional branch of the U.S. military, is clear evidence that people like Admiral Mike Rogers took action, in hindsight, knowing the Obama administration weaponized data collection, a function of government, for political benefit. Now, in hindsight, the action they took in May of this year all begins to make sense.

The article includes a statement by Rod Rosenstein about the FISA warrant he signed:

…We sit down with a team of attorneys from the Department of Justice. All of whom review that and provide a briefing for us for what’s in it. And I’ve reviewed that one in some detail, and I can tell you the information about that doesn’t match with my understanding of the one that I signed, but I think it’s appropriate to let the Inspector General complete that investigation. These are serious allegations. I don’t do the investigation — I’m not the affiant. I’m reviewing the finished product, sir.

Loosely translated Rosenstein is saying that he doesn’t have the courage to take on the deep state so he is letting the Inspector General deal with it.

The article concludes:

Many of those DOJ-NSD officials who participated in the Rosenstein briefing, or assembled the underlying briefing material, left after the time-period in question (June 2017).  Additionally, almost all of the FBI officials left, retired, resigned after this time-period.  There was also massive exit of all of corrupt support officials from inside the DOJ-NSD and FBI when the Page/Strzok text messages surfaced (December 2017) and the evidence of the political operation became public.

However, as all of these *inside* officials left the DOJ and FBI, another entire set of *outside* DOJ and FBI officials replaced them; and the originating counterintelligence operation was rebranded and handed over to Robert Mueller.

The inside government usurpation operation became an outside government usurpation operation, essentially using contract agents hired by the inside group prior to exit.  The remaining fragments of the ‘insurance policy‘ are in the hands of Robert Mueller’s team.

We need to gather intelligence to protect ourselves from people in other countries who mean us harm. However, we also need to protect ourselves from people within our government who abuse our intelligence gathering capabilities.