Email/Dossier/Govt Corruption Investigations

June 2012 – Ukrainian oligarch Victor Pinchuk, is invited to the Clintons home during the final year of her secretary of state tenure

Victor Pinchuk, Leonid Kuchma, Bill Clinton, and Olena Pinchuk attend the 4th Yalta Summit in June 2007. (Credit: Pinchuk Foundation)

“Emails made public Tuesday show a Ukrainian businessman and major Clinton Foundation donor was invited to Hillary Clinton’s home during the final year of her diplomatic tenure, despite her spokesman’s insistence in 2014 that the donor never crossed paths with Clinton while she served as secretary of state.

Amid scrutiny of Clinton’s ties to Pinchuk in 2014, the Democratic nominee’s spokesman, Nick Merrill, said Pinchuk had never met with Clinton during that time. He told the New York Times that, “from Jan. 21, 2009, to Feb. 1, 2013,” the Ukrainian businessman “was never on her schedule.”

Pinchuk, who has given up to $25 million to the Clinton Foundation, appeared on the guest list that was sent between Dennis Cheng, an executive at the foundation, and Huma Abedin, then Clinton’s deputy chief of staff at the State Department, ahead of a June 2012 dinner. Abedin noted in a subsequent email that the gathering would be hosted in Clinton’s home.

Pinchuk’s dinner invitation was exposed in a series of emails obtained by Citizens United.” (Read more: Washington Examiner, 8/24/2016)  (WSJ Archive)

2012 – 2017: DOJ Political Surveillance – From the IRS, to the FISA Court

An assembly of government reports and public records now indicates political exploitation of the NSA database, for weaponized intelligence surveillance of politicians, began mid-2012.  After an initial attempt to exploit IRS records, the legal tool used to access the NSA database was the Foreign Intelligence Surveillance Act or FISA.

With research files on the ’15, ’16 and ’17 political surveillance program; including information from the Mueller report and information from the IG Horowitz report; in combination with the Obama-era DOJ “secret research project” (their words, not mine); we are able to overlay the Obama-era domestic IC operations & gain a full understanding of how political surveillance was conducted over a period of four to six years.

The FISA-702 database extraction process, and utilization of the protections within the smaller intelligence community, became the primary process only after a previous DOJ effort ran into trouble. The established record from the 99-page FISC opinion rendered by Presiding Judge Rosemary Collyer on April 26, 2017, helps explain the details.

I would strongly urge everyone to read the FISC report because Judge Collyer outlines how the DOJ, which includes the FBI, had an “institutional lack of candor” in responses to the FISA court.  Very specifically, the court outlined how the Obama administration was continually lying to the court about both their activity and the rate of fourth amendment violations for illegal searches and seizures of U.S. persons’ private information. These violations continued for multiple years throughout Obama’s terms.

Unfortunately, due to intelligence terminology, Judge Collyer’s brief and ruling is not an easy read for anyone unfamiliar with the FISA processes outlined. The complexity also helps the media avoid discussing, and as a result, most Americans have no idea the scale and scope of the issues. So we’ll try to break down the language.

For the sake of brevity and common understanding, CTH will highlight the most pertinent segments showing just how systemic and troublesome the unlawful electronic surveillance was.

Early in 2016, NSA Director Admiral Mike Rogers was alerted of a significant uptick in FISA-702(17) “About” queries using the FBI/NSA database that holds all metadata records on every form of electronic communication.

The NSA compliance officer alerted Admiral Mike Rogers who then initiated a full compliance audit on/around March 9th, 2016, for the period of November 1st, 2015, through May 1st, 2016.

While the audit was ongoing, due to the severity of the results that were identified, Admiral Mike Rogers stopped anyone from using the 702(17) “about query” option and went to the extraordinary step of blocking all FBI contractor access to the database on April 18, 2016 (keep these dates in mind).

Here are some significant segments:

The key takeaway from these first paragraphs is how the search query results were exported from the NSA database to users who were not authorized to see the material. The FBI contractors were conducting searches and then removing, or ‘exporting’, the results. Later on, the FBI said all of the exported material was deleted.

Searching the highly classified NSA database is essentially a function of filling out search boxes to identify the user-initiated search parameter and get a return on the search result.

FISA-702(16) is a search of the system returning a U.S. person (“702”), and the “16” is a checkbox to initiate a search based on “To and From“. For example, if you put in a date and a phone number and check “16” as the search parameter the user will get the returns on everything “To and From” that identified phone number for the specific date. Calls, texts, contacts, etc. Including results for the inbound and outbound contacts.

FISA-702(17) is a search of the system returning a U.S. person (702), and the “17” is a checkbox to initiate a search based on everything “About” the search qualifier. For example, if you put a date and a phone number and check “17” as the search parameter the user will get the returns of everything about that phone. Calls, texts, contacts, geolocation (or GPS results), account information, user, service provider, etc. As a result, 702(17) can actually be used to locate where the phone (and user) was located on a specific date or sequentially over a specific period of time which is simply a matter of changing the date parameters.

And that’s just from a phone number.

Search an IP address “about” and read all data into that server; put in an email address and gain everything about that account. Or use the electronic address of a GPS enabled vehicle (about) and you can withdraw more electronic data and monitor in real-time. Search a credit card number and get everything about the account including what was purchased, where, when, etc. Search a bank account number, get everything about transactions and electronic records, etc. Just about anything and everything can be electronically searched; everything has an electronic ‘identifier’.

The search parameter is only limited by the originating field filled out. Names, places, numbers, addresses, etc. By using the “About” parameter there may be thousands or millions of returns. Imagine if you put “@realdonaldtrump” into the search parameter? You could extract all following accounts who interacted on Twitter, or Facebook, etc. You are only limited by your imagination and the scale of the electronic connectivity.

As you can see below, on March 9th, 2016, internal auditors noted the FBI was sharing “raw FISA information, including but not limited to Section 702-acquired information”.

In plain English, the raw search returns were being shared with unknown entities without any attempt to “minimize” or redact the results. The person(s) attached to the results were named and obvious. There was no effort to hide their identity or protect their 4th amendment rights of privacy:

But what’s the scale here? This is where the story really lies.

Read this next excerpt carefully.

The operators were searching “U.S Persons”. The review of November 1, 2015, to May 1, 2016, showed “eighty-five percent of those queries” were unlawful or “non-compliant.”

85% !! “representing [redacted number].”

We can tell from the space of the redaction the number of searches was between 1,000 and 9,999 [five digits]. If we take the middle number of 5,000 – that means 4,250 unlawful searches out of 5,000.

The [five digit] amount (more than 1,000, less than 10,000), and 85% error rate, was captured in a six month period, November 2015 to April 2016.

Also, notice this very important quote:

”many of these non-compliant queries involved the use of the same identifiers over different date ranges.”

This tells us the system users were searching the same phone number, email address, electronic “identifier”, or people, repeatedly over different dates.

Specific people were being tracked/monitored.

Additionally, notice the last quote: “while the government reports it is unable to provide a reliable estimate of” these non-lawful searches “since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 coincided with an unusually high error rate”.

That means the 85% rate of unlawful FISA-702(16)(17) database abuse has likely been happening since 2012.

2012 is an important date in this database abuse because a network of specific interests is assembled that also shows up in 2016/2017:

  • Who was the 2012 FBI Director? Robert Mueller.  The same Mueller selected by the FBI group to become a special prosecutor in 2017.
  • Who was Robert Mueller’s chief-of-staff? Aaron Zebley.  The same Aaron Zebley, who became one of the lead lawyers on the Mueller special counsel.
  • Who was the 2012 CIA Director? John Brennan.
  • Who was the 2012 ODNI? James Clapper.
  • Remember, the NSA is inside the Pentagon (Defense Dept) command structure. Who was Defense Secretary? Ash Carter.

Now it becomes important to remember in 2016:

  • Who wanted NSA Director Mike Rogers fired? Brennan, Clapper, and Carter.
  • And finally, who wrote and signed-off-on the January 2017 Intelligence Community Assessment and then lied about the use of the Steele Dossier? John Brennan, James Clapper

Tens of thousands of searches over four years (since 2012), and 85% of them are illegal. The results were extracted for?…. (I believe this is all political opposition use, and I’ll explain why momentarily.)

OK, that’s the stunning scale; but who was involved?

Private contractors with access to “raw FISA information that went well beyond what was necessary to respond to FBI’s requests“:

And as noted, the contractor access was finally halted on April 18th, 2016.

[Coincidentally (or not), the wife of Fusion-GPS founder Glenn Simpson, Mary Jacoby, goes to the White House the next day on April 19th, 2016.]

None of this is a conspiracy theory.

All of this is laid out inside this 99-page opinion from FISC Presiding Judge Rosemary Collyer who also noted that none of this FISA abuse was accidental in a footnote on page 87: “deliberate decisionmaking“:

This specific footnote, if declassified, would be key. Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”, this sentence has the potential to expose an internal decision; withheld from congress and the FISA court by the Obama administration; that outlines a process for access and distribution of surveillance data.

Note also: “no notice of this practice was given to the FISC until 2016“, that is important.

Important summary of this aspect: •The FISA court identified and quantified tens-of-thousands of search queries of the NSA/FBI database using the FISA-702(16)(17) system dating back to around 2012.  •The NSA database was repeatedly used by persons with contractor access who unlawfully searched and extracted the raw results without redacting the information and shared it with an unknown number of entities. •The same people had multiple searches performed against their private information from November of 2015 to May of 2016, the exact time of the Republican presidential primary.

The outlined process certainly points toward a political spying and surveillance operation, and we are not the only one to think that’s what this system is being used for.” (Read more: Conservative Treehouse, 3/09/2020)  (Archive)

Cheryl Mills conducts interviews to find the Clinton Foundation’s next leader while working as Clinton’s chief of staff, raising a possible conflict of interest.

120619CherylMillsFoundationReuters

Cheryl D. Mills speaks during a commitment workshop titled “Haiti: Lessons for the Future” at the Clinton Global Initiative (CGI) annual meeting on September 24, 2012. The CGI logo is in the background. (Credit: Reuters)

On June 19, 2012, Clinton’s chief of staff Cheryl Mills travels from Washington, DC, to New York City. The next day, she interviews two high-level business executives in order to help the Clinton Foundation find a new leader.

When Clinton became secretary of state, she and the Clinton Foundation agreed to abide by rules specially created in an agreement with the Obama administration not to “create conflicts or the appearance of conflicts for Senator Clinton as Secretary of State.”

When news of this trip is made public in August 2016, Clinton’s campaign will claim that any work Mills did for the Clinton Foundation, such as this trip, was strictly voluntary.

The two executives interviewed by Mills had worked at Pfizer and WalMart, companies that CNN points out “have been huge donors to Foundation, and have worked with the Clinton Global Initiative.” However, neither of them get the job. (CNN, 8/11/2016)

Clinton’s reply to a Blumenthal email indicates she knows Blumenthal is getting his intelligence from a former CIA official.

Hillary Clinton and Sidney Blumenthal (Credit: Zumey Press and Evangelical Press Association)

Hillary Clinton and Sidney Blumenthal (Credit: Zumey Press and Evangelical Press Association)

Clinton confidant Sid Blumenthal sends Clinton an email with the subject heading: “H: Here it is: latest, latest intell on MB/SCAF inside deal. Sid.” “MB” stands for the “Muslim Brotherhood,” who recently took power in Egypt, and “SCAF” stands for the “Supreme Council of the Armed Forces” of Egypt. The email alleges to contain inside intelligence about political intrigues in that country.

Clinton forwards the email to her aide Jake Sullivan with the comment: “Fyi [For your information]. Worth forwarding.”

Sullivan replies, “Will do. Wonder who his source is.”

Clinton answers, “Former US intell w continuing contacts.” (US Department of State, 1/7/2016)

The FBI will ask her about this in a July 2016 interview. The State Department later marked the email unclassified and left it entirely unredacted. But presumably the FBI is interested in her “Former US intell w continuing contacts” comment, which indicates she knows Blumenthal’s emails are mainly based on intelligence from former CIA official Tyler Drumheller, and she might have some knowledge of Drumheller’s contacts.

But Clinton’s answer doesn’t appear to address that. According to the FBI, “Clinton commented it was a confusing time in Egypt and [the] State [Department] was trying to obtain all of the intelligence it could on Egypt. However, she had no concerns regarding the classification of the email.” (Federal Bureau of Investigation, 9/2/2016)

Clinton sends President Obama an email from on or above Russian soil; Obama uses a pseudonym for his email address.

Clinton meets with Russian Foreign Minister Sergey Lavrov in St. Petersburg, Russia, on June 29, 2012. (State Department)

Clinton meets with Russian Foreign Minister Sergey Lavrov in St. Petersburg, Russia, on June 29, 2012. (State Department)

It has been reported that Clinton and President Obama exchanged 18 emails in the four years of Clinton’s secretary of state tenure. However, very few details have been released about any of them, except for this one. This email is an exception because when Clinton will be interviewed by the FBI in July 2016, she will be asked about the email, apparently since it was sent from Russia. A September 2016 FBI report will mention it is sent on July 1, 2012 and that the subject line is: “Fw: Congratulations!”

Additionally, an FBI summary of her interview will mention, “Clinton stated she received no particular guidance as to how she should use the president’s email address [redacted]. Since the foregoing email was sent from Russia, Clinton stated she must have sent it from the plane.”

Elsewhere in the FBI report, it will be mentioned that the FBI was unable to determine whenever Clinton sent emails overseas while on the ground or in an airplane because the State Department didn’t give the FBI detailed enough information about her travel schedule. (Federal Bureau of Investigation, 9/2/2016)

Clinton’s former deputy chief of staff Huma Abedin will be asked about this email in an April 2016 FBI interview, though it will be described as “an email chain dated June 28, 2012, with the subject ‘Re: Congratulations!'” According to the FBI summary, “Abedin did not recognize the name of the sender. Once informed that the sender’s name is believed to be a pseudonym used by [President Obama], Abedin exclaimed ‘How is this not classified?’ Abedin then expressed her amazement at the president’s use of a pseudonym and asked if she could have a copy of the email. Abedin provided that she did not go on the trip to St. Petersburg [Russia] and noted that security protocols in St. Petersburg were not necessarily the same as they were in Moscow, where they were not allowed use to their BlackBerrys.” (Federal Bureau of Investigation, 9/23/2016)

Based on Abedin’s comments, it appears probable that Clinton sends an email in the chain with her BlackBerry from St. Petersburg, Russia, though it is unclear if she is on an airplane at the time or not, or if the plane is flying on on the ground.

Accordng to some basic details that will be revealed about the Clinton-Obama emails in September 2016, it appears Obama emails Clinton on June 28, 2012, then Clinton replies to him on June 28, 2012, which coincides with her time in St. Petersburg, on June 28 and 29, 2012. Then her aide Monica Hanley sends an email to Obama on July 1, 2012. It is not clear why this Hanley email will later be included in a list of Obama-Clinton emails or why the FBI wil refer to a July 1, 2012 email in Clinton’s FBI interview instead of the June 28, 2012 Clinton email mentioned in the Abedin FBI interview. (Vice News, 09/15/16) (Vicc News, 09/15/16)