
by Sundance at The Conservative Treehouse
There’s a reason why the J6 Committee deleted the records of their activity, an angle missed by most. When you understand what they hid and why they did it, you then understand why current Speaker of The House Mike Johnson will not go near the subject.
The J6 Committee used interfaces with the NSA database and pre-existing portals with aligned DHS Social Media databases (including Twitter, see prior “Twitter Files”), as research and evidence gathering mechanisms for their investigations.
https://twitter.com/i/status/1965058356647002444
The J6 targets were identified through a collaboration between the legislative research group and the FBI. [That’s unlawful by the way – but that’s another matter]. The FBI contracted Palantir to identify the targets using facial recognition software and private sector databases.
Once identified, the targets were then searched in the NSA database for a fulsome context of identity. All subsequent electronic metadata of the targets was retrieved and utilized in prosecution; however, no one ever discovered this was the collaborative method. That has not come out yet.
Ultimately, the J6 Committee hiding and deleting their files and operational techniques was due to several issues. They really didn’t have a choice given the unknowns of an incoming republican majority.
First, the collaboration with the FBI is unconstitutional. Legislative officers are not law enforcement officers. There is a separation of powers issue.
Second, ultimately – and most consequentially – all of the participants did not want the American public aware of the mass surveillance techniques that were carried out as part of the ’round up.’
Wait to see what the next NSA compliance audit looks like. Remember, these reports are more than a year behind the activity they highlight.
This is where a complete mental reset is needed.
The modern application of the fifty-year-old concept around FISA as a constitutional mechanism to search the private papers (data) of American citizens, is a fraud, a complete ruse.
The Foreign Intelligence Surveillance Act, FISA, represents the method used by the intelligence apparatus of the FBI to conduct surveillance. It was purposefully designed, as a method to avoid the problems with 4th amendment protections. However, the modern application of the FISA justification has no lawful basis.
♦CONTEXT – Beginning in/around 2012, after the Dept of Justice National Security Division was created by President Barack Obama and Attorney General Eric Holder, the use of FISA warrants were extended to include electronic searches of captured information held within the National Security Agency (NSA). This was the database into which former NSA employee Edward Snowden was creating the search engine software.
The capturing of information was relatively new; technology was still being developed. Rapid scale-ups of archives and data processing was underway. Various iterations of the search tools and processes were being tested and deployed.
Prior to 2010/2012 we were mostly talking about emails, phone calls and text messages. However, as more and more technology was deployed, the interfaces expanded. Today, almost every electronic interface is captured/stored within either the NSA database, or a private sector database with connections to the NSA search portals.
Arguably,…
Continue Reading