FBI contractors

August 8, 2019 – Bruce Ohr 302 reports released

“Bruce Ohr is a DOJ official who was interviewed by the FBI during the DOJ/FBI collaborative effort to target president-elect Donald Trump after the 2016 election.

Mr. Ohr was interviewed on 12 different occasions between November 22nd 2016 and May 15th 2017.  Judicial Watch has finally received the copies of the FBI investigative notes, aka “302 reports.”

The last interview of Bruce Ohr (May 15th, 2017) took place two days prior to the appointment of special counsel Robert Mueller.  Throughout the interviews (full pdf below) Bruce Ohr was acting as the go-between delivering information from his wife Nellie Ohr at Fusion GPS and one of Fusion’s contract investigators, Christopher Steele.

The 302 reports are heavily redacted (sources and methods); however, we already know the majority of names underneath the redactions.  Here are the *302 investigative notes:

(Conservative Treehouse, 8/08/2019)

October 18, 2018 – DNI Declassifies FISA Judge James Boasberg 2018 Ruling – FBI conducts “tens of thousands” of unauthorized NSA database queries

“There is a lot to unpack in a decision today by the Director of National Intelligence to declassify (with redactions) a 2018 FISA court ruling about ongoing unauthorized database search queries by FBI agents/”contractors” in the period covering 2017/2018.

BACKGROUND: In April 2017 the DNI released a FISA report written by Presiding Judge Rosemary Collyer that showed massive abuse, via unauthorized searches of the NSA database, in the period of November 2015 through May 2016. Judge Collyer’s report specifically identified search query increases tied to the 2016 presidential primary.  Two years of research identified this process as the DOJ/FBI and IC using the NSA database to query information related to political candidates, specifically Donald Trump.

Judge James Boasberg (Credit: public domain)

Now we fast-forward to Judge Boasberg in a similar review (full pdf below), looking at the time period of 2017 through March 2018.

The timing here is an important aspect.

It is within this time-period where ongoing DOJ and FBI activity transfers from the Obama administration (Collyer report) into the Trump administration (Boasberg report).

It cannot be overemphasized as you read the Boasberg opinion, or any reporting on the Boasberg opinion, that officials within DOJ and FBI are/were on a continuum.  Meaning the “small group” activity didn’t stop after the election but rather continued with the Mueller and Weissmann impeachment agenda.

Remember, the 2016 ‘insurance policy’ was to hand Mueller the 2016 FBI investigation so they could turn it into the 2017 special counsel investigation. Mueller, Weissmann and the group then used the ‘Steele Dossier’ as the cornerstone for the special counsel review.  The goal of the Mueller investigation was to construct impeachment via obstruction. The same players transferred from “crossfire hurricane” into the Mueller ‘obstruction‘ plan.

Within Judge Boasberg’s review of the 2017 activity, he outlines an identical set of FISA violations from within the FBI units and “contractors” as initially outlined by Judge Collyer a year earlier.  Judge Boasberg wrote his opinion in October 2018 and that opinion was declassified today (October 8th, 2019). Boasberg is reviewing 2017 through March 2018.  [Main link to all legal proceedings here]

(Via Wall Street Journal)  The intelligence community disclosed Tuesday that the Foreign Intelligence Surveillance Court last year found that the FBI’s pursuit of data about Americans ensnared in a warrantless internet-surveillance program intended to target foreign suspects may have violated the law authorizing the program, as well as the Constitution’s Fourth Amendment protections against unreasonable searches.

The court concluded that the FBI had been improperly searching a database of raw intelligence for information on Americans—raising concerns about oversight of the program, which as a spy program operates in near-total secrecy.

(…)  The court ruling identifies tens of thousands of improper searches of raw intelligence databases by the bureau in 2017 and 2018 that it deemed improper in part because they involved data related to tens of thousands of emails or telephone numbers—in one case, suggesting that the FBI was using the intelligence information to vet its personnel and cooperating sources. Federal law requires that the database only be searched by the FBI as part of seeking evidence of a crime or for foreign intelligence information.

In other cases, the court ruling reveals improper use of the database by individuals. In one case, an FBI contractor ran a query of an intelligence database—searching information on himself, other FBI personnel and his relatives, the court revealed.  (more)

As with the Collyer report, I am going line-by-painstaking-line through the Boasberg report (yeah, swamped); and what is clear is that in 2017 the FBI ‘bad actors’ and ‘contractors’ were continuing to try and subvert the safeguards put into place by former NSA Director Admiral Mike Rogers.   The 2017 non-compliance rate is similar to the 2016 review.

Judge Boasberg touches on the April 2017 Judge Collyer report.  Here is the carefully worded DNI explanation of the connective tissue (emphasis mine):

(…)  The FISC also concluded that the FBI’s querying and minimization procedures, as implemented, were inconsistent with Section 702 and the Fourth Amendment, in light of certain identified compliance incidents involving queries of Section 702 information.

These incidents involved instances in which personnel either misapplied or misunderstood the query standard, such that the queries were not reasonably likely to return foreign intelligence information or evidence of a crime. Some of these instances involved queries concerning large numbers of individuals.

While stating that the Government had taken “constructive steps” to address the identified issues, the FISC held that these steps did not fully address the statutory and Fourth Amendment concerns raised by the compliance incidents.

(…) Additionally, the FISC considered the scope of certain new restrictions regarding “abouts” communications that were enacted in the FISA Amendments Reauthorization Act of 2017. “Abouts” collection is the acquisition of communications that contain a reference to, but are not to or from, a Section 702 target. As the NSA explained in April 2017 (see NSA’s April 28, 2017 Statement), the NSA stopped acquiring any upstream internet communications that are solely “about” a foreign intelligence target and, instead, limited its Section 702 collection to only those communications that are directly “to” or “from” a foreign intelligence target.

NSA’s 2018 Targeting Procedures contained the same limitation. Although the Government did not seek to resume “abouts” collection, the FISC, with assistance from amici, reviewed whether the “abouts” restrictions applied to any other types of Section 702 acquisitions currently being conducted. While the FISC held that the “abouts” restrictions apply across Section 702 acquisitions, it found that current Section 702 acquisitions did not implicate the “abouts” restrictions. (read more)

(Read more: Conservative Treehouse, 10/09/2019) (Archive)

Here is the October 2018 Boasberg Opinion:

April 26, 2017 – The FISC report reveals the Obama administration conducted political surveillance as early as mid-2012

“Former U.S. Attorney to the District of Columbia, Joe diGenova, discusses the declassification of intelligence documents relating to political surveillance; and the origin of the database abuses outlined by FISC Presiding Judge Rosemary Collyer.

Given last weeks visit to Main Justice by congressman Mark Meadows; and considering the visit was specifically to review unredacted Page-Strzok-McCabe messages; it could be surmised the first series of declassified documents might be those communiques. Additionally, John Solomon has stated “Bucket Five” is likely the first release prior to the IG report:

Bucket Five – Intelligence documents that were presented to the Gang of Eight in 2016 that pertain to the FISA application used against U.S. person Carter Page; including all exculpatory intelligence documents that may not have been presented to the FISA Court.  Presumably this would include the recently revealed State Dept Kavalac email; and the FBI transcripts from wiretaps of George Papadopoulos (also listed in Carter Page FISA).

Now that we have significant research files on the 2015 and 2016 political surveillance program; which includes the trail evident within the Weissmann/Mueller report; in combination with the Obama-era DOJ “secret research project” (their words, not mine); we are able to overlay the entire objective and gain a full understanding of how political surveillance was conducted over a period of approximately four to six years.

This is why there’s panic.

Working with a timeline, but also referencing origination material in 2015/2016 – CTH hopes to show how the program operated. This explains an evolution from The IRS Files in 2010 to the FISA Files in 2016.

More importantly, research indicates the modern political exploitation of the NSA database, for weaponized intelligence surveillance of politicians, began mid-2012.

The FISA-702 database extraction process, and utilization of the protections within the smaller intelligence community, was the primary process. We start by reviewing the established record from the 99-page FISC opinion rendered by presiding Judge Rosemary Collyer on; and explain the details within the FISC opinion.

I would strongly urge everyone to read the FISC report (full pdf below) because Judge Collyer outlines how the DOJ, which includes the FBI, had an “institutional lack of candor” in responses to the FISA court. In essence, the Obama administration was continually lying to the court about their activity, and the rate of fourth amendment violations for illegal searches and seizures of U.S. persons’ private information for multiple years.

Unfortunately, due to intelligence terminology Judge Collyer’s brief and ruling is not an easy read for anyone unfamiliar with the FISA processes outlined. The complexity also helps the media avoid discussing, and as a result most Americans have no idea the scale and scope of the issues. So we’ll try to break down the language. View this document on Scribd

For the sake of brevity and common understanding CTH will highlight the most pertinent segments showing just how systemic and troublesome the unlawful electronic surveillance was.

Early in 2016 NSA Director Admiral Mike Rogers was alerted of a significant uptick in FISA-702(17) “About” queries using the FBI/NSA database that holds all metadata records on every form of electronic communication.

The NSA compliance officer alerted Admiral Mike Rogers who then initiated a full compliance audit on/around March 9th, 2016, for the period of November 1st, 2015, through May 1st, 2016.

While the audit was ongoing, due to the severity of the results that were identified, Admiral Mike Rogers stopped anyone from using the 702(17) “about query” option, and went to the extraordinary step of blocking all FBI contractor access to the database on April 18, 2016 (keep these dates in mind).

Here are some significant segments:

The key takeaway from these first paragraphs is how the search query results were exported from the NSA database to users who were not authorized to see the material. The FBI contractors were conducting searches and then removing, or ‘exporting’, the results. Later on, the FBI said all of the exported material was deleted.

Searching the highly classified NSA database is essentially a function of filling out search boxes to identify the user-initiated search parameter and get a return on the search result.

(…) Search an ip address “about” and read all data into that server; put in an email address and gain everything about that account. Or use the electronic address of a GPS enabled vehicle (about) and you can withdraw more electronic data and monitor in real time. Search a credit card number and get everything about the account including what was purchased, where, when, etc. Search a bank account number, get everything about transactions and electronic records etc. Just about anything and everything can be electronically searched; everything has an electronic ‘identifier’.

The search parameter is only limited by the originating field filled out. Names, places, numbers, addresses, etc. By using the “About” parameter there may be thousands or millions of returns. Imagine if you put “@realdonaldtrump” into the search parameter? You could extract all following accounts who interacted on Twitter, or Facebook etc. You are only limited by your imagination and the scale of the electronic connectivity.

As you can see below, on March 9th, 2016, internal auditors noted the FBI was sharing “raw FISA information, including but not limited to Section 702-acquired information”.

In plain English the raw search returns were being shared with unknown entities without any attempt to “minimize” or redact the results. The person(s) attached to the results were named and obvious. There was no effort to hide their identity or protect their 4th amendment rights of privacy:

But what’s the scale here? This is where the story really lies.

Read this next excerpt carefully.

The operators were searching “U.S Persons”. The review of November 1, 2015, to May 1, 2016, showed “eighty-five percent of those queries” were unlawful or “non compliant”.

85% !! “representing [redacted number].”

We can tell from the space of the redaction the number of searches were between 1,000 and 9,999 [five digits]. If we take the middle number of 5,000 – that means 4,250 unlawful searches out of 5,000.

The [five digit] amount (more than 1,000, less than 10,000), and 85% error rate, was captured in a six month period.

Also notice this very important quote: “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” So they were searching the same phone number, email address, electronic “identifier”, or people, repeatedly over different dates. Specific people were being tracked/monitored.

Additionally, notice the last quote: “while the government reports it is unable to provide a reliable estimate of” these non lawful searches “since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 coincided with an unusually high error rate”.

That means the 85% unlawful FISA-702(16)(17) database abuse has likely been happening since 2012. (Again, remember that date, 2012) Who was FBI Director? Who was his chief-of-staff? Who was CIA Director? ODNI? etc. Remember, the NSA is inside the Pentagon (Defense Dept) command structure. Who was Defense Secretary? And finally, who wrote and signed-off-on the January 2017 Intelligence Community Assessment?

Tens of thousands of searches over four years (since 2012), and 85% of them are illegal. The results were extracted for?…. (I believe this is all political opposition use; and I’ll explain why momentarily.)

OK, that’s the stunning scale; but who was involved?

Private contractors with access to “raw FISA information that went well beyond what was necessary to respond to FBI’s requests“:

And as noted, the contractor access was finally halted on April 18th, 2016.

(Coincidentally (or not), the wife of Fusion-GPS founder Glenn Simpson, Mary Jacoby, goes to the White House the next day on April 19th, 2016.)

None of this is conspiracy theory.

All of this is laid out inside this 99-page opinion from FISC Presiding Judge Rosemary Collyer who also noted that none of this FISA abuse was accidental in a footnote on page 87: “deliberate decisionmaking“:

This specific footnote, if declassified, would be key.  Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”, this sentence has the potential to expose an internal decision; withheld from congress and the FISA court by the Obama administration; that outlines a process for access and distribution of surveillance data.

Note: “no notice of this practice was given to the FISC until 2016“, that is important.

Summary of this aspect: The FISA court identified and quantified tens-of-thousands of search queries of the NSA/FBI database using the FISA-702(16)(17) system. The database was repeatedly used by persons with contractor access who unlawfully searched and extracted the raw results without redacting the information and shared it with an unknown number of entities.” (Read more: Conservative Treehouse, 5/24/2019)

April 26, 2017 – DOJ oversight conducted a review of Section 702 Acquired Information between November 2015-May 2016 and found 85% of U.S. persons queries were unlawful or non-compliant

“Research indicates the modern political exploitation of the NSA database, for weaponized intelligence surveillance of politicians, began mid 2012.

The FISA-702 database extraction process, and utilization of the protections within the smaller intelligence community, was the primary process. Start by reviewing the established record from the 99-page FISC opinion rendered by Presiding Judge Rosemary Collyer on April 26th, 2017; and explain the details within the FISC opinion.

I would strongly urge everyone to read the FISC report because Judge Collyer outlines how the DOJ, which includes the FBI, had an “institutional lack of candor” in responses to the FISA court. In essence, the Obama administration was continually lying to the court about their activity, and the rate of fourth amendment violations for illegal searches and seizures of U.S. persons’ private information for multiple years.

(…) The key takeaway from these first paragraphs is how the search query results were exported from the NSA database to users who were not authorized to see the material. The FBI contractors were conducting searches and then removing, or ‘exporting’, the results. Later on, the FBI said all of the exported material was deleted.

Searching the highly classified NSA database is essentially a function of filling out search boxes to identify the user-initiated search parameter and get a return on the search result.

FISA-702(16) is a search of the system returning a U.S. person (“702”); and the “16” is a check box to initiate a search based on “To and From“. Example, if you put in a date and a phone number and check “16” as the search parameter the user will get the returns on everything “To and From” that identified phone number for the specific date. Calls, texts, contacts etc. Including results for the inbound and outbound contacts.

FISA-702(17) is a search of the system returning a U.S. person (702); and the “17” is a check box to initiate a search based on everything “About” the search qualifier. Example, if you put a date and a phone number and check “17” as the search parameter the user will get the returns of everything about that phone. Calls, texts, contacts, geolocation (or gps results), account information, user, service provider etc. As a result, 702(17) can actually be used to locate where the phone (and user) was located on a specific date or sequentially over a specific period of time which is simply a matter of changing the date parameters.

And that’s just from a phone number.

Search an ip address “about” and read all data into that server; put in an email address and gain everything about that account. Or use the electronic address of a GPS enabled vehicle (about) and you can withdraw more electronic data and monitor in real time. Search a credit card number and get everything about the account including what was purchased, where, when, etc. Search a bank account number, get everything about transactions and electronic records etc. Just about anything and everything can be electronically searched; everything has an electronic ‘identifier’.

The search parameter is only limited by the originating field filled out. Names, places, numbers, addresses, etc. By using the “About” parameter there may be thousands or millions of returns. Imagine if you put “@realdonaldtrump” into the search parameter? You could extract all following accounts who interacted on Twitter, or Facebook etc. You are only limited by your imagination and the scale of the electronic connectivity.

As you can see below, on March 9th, 2016, internal auditors noted the FBI was sharing “raw FISA information, including but not limited to Section 702-acquired information”.

In plain English the raw search returns were being shared with unknown entities without any attempt to “minimize” or redact the results. The person(s) attached to the results were named and obvious. There was no effort to hide their identity or protect their 4th amendment rights of privacy:

But what’s the scale here? This is where the story really lies.

Read this next excerpt carefully.

The operators were searching “U.S Persons”. The review of November 1, 2015, to May 1, 2016, showed “eighty-five percent of those queries” were unlawful or “non compliant”.

85% !! “representing [redacted number].”

We can tell from the space of the redaction the number of searches were between 1,000 and 9,999 [five digits]. If we take the middle number of 5,000 – that means 4,250 unlawful searches out of 5,000.

The [five digit] amount (more than 1,000, less than 10,000), and 85% error rate, was captured in a six month period.

Also notice this very important quote: “many of these non-compliant queries involved the use of the same identifiers over different date ranges.” So they were searching the same phone number, email address, electronic “identifier”, or people, repeatedly over different dates. Specific people were being tracked/monitored.

Additionally, notice the last quote: “while the government reports it is unable to provide a reliable estimate of” these non lawful searches “since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 coincided with an unusually high error rate”.

That means the 85% unlawful FISA-702(16)(17) database abuse has likely been happening since 2012. (Again, remember that date, 2012) Who was FBI Director? Who was his chief-of-staff? Who was CIA Director? ODNI? etc. Remember, the NSA is inside the Pentagon (Defense Dept) command structure. Who was Defense Secretary? And finally, who wrote and signed-off-on the January 2017 Intelligence Community Assessment?

Tens of thousands of searches over four years (since ), and 85% of them are illegal. The results were extracted for?…. (I believe this is all political opposition use; and I’ll explain why momentarily.)

OK, that’s the stunning scale; but who was involved?

Private contractors with access to “raw FISA information that went well beyond what was necessary to respond to FBI’s requests“:

And as noted, the contractor access was finally halted on April 18th, 2016.

Coincidentally (or not), the wife of Fusion-GPS founder Glenn Simpson, Mary Jacoby, goes to the White House the next day on April 19th, 2016.

None of this is conspiracy theory.

All of this is laid out inside this 99-page opinion from FISC Presiding Judge Rosemary Collyer who also noted that none of this FISA abuse was accidental in a footnote on page 87: “deliberate decisionmaking“:

This specific footnote, if declassified, would be key.  Note the phrase: “([redacted] access to FBI systems was the subject of an interagency memorandum of understanding entered into [redacted])”, this sentence has the potential to expose an internal decision; withheld from congress and the FISA court by the Obama administration; that outlines a process for access and distribution of surveillance data.

Note: “no notice of this practice was given to the FISC until 2016“, that is important.

Summary: The FISA court identified and quantified tens-of-thousands of search queries of the NSA/FBI database using the FISA-702(16)(17) system. The database was repeatedly used by persons with FBI contractor access who unlawfully searched and extracted the raw results without redacting the information and shared it with an unknown number of entities.

There is little doubt the FISA-702(16)(17) database system was used by Obama-era officials, from 2012 through April 2016, as a way to spy on their political opposition. Quite simply there is no other intellectually honest explanation for the scale and volume of database abuse that was taking place.

When we reconcile what was taking place and who was involved, then the actions of the exact same principle participants take on a jaw-dropping amount of clarity.

All of the action taken by CIA Director Brennan, FBI Director Comey, ODNI Clapper and Defense Secretary Ashton Carter make sense. Including their effort to get NSA Director Mike Rogers fired.

Everything after March 9th, 2016, was done to cover up the weaponization of the FISA database. [Explained Here] Spygate, Russia-Gate, the Steele Dossier, and even the 2017 Intelligence Community Assessment (drawn from the dossier and signed by the above) were needed to create a cover-story and protect themselves from discovery of this four year weaponization, political surveillance and unlawful spying. Even the appointment of Robert Mueller as special counsel makes sense; he was FBI Director when this began.

The beginning decision to use FISA(702) as a domestic surveillance and political spy mechanism appears to have started in/around 2012. Perhaps sometime shortly before the 2012 presidential election and before John Brennan left the White House and moved to CIA. However, there was an earlier version of data assembly that preceded this effort.” (Read more: Conservative Treehouse, 8/12/2019)

April 18, 2016 – NSA Director Rogers shuts down all outside contractor access to raw FISA information, particularly contractors working for the FBI

(…) “In March of 2016, NSA Director Rogers became aware of improper access to raw FISA data (Page 83 of Court Ruling).

In April of 2016, Rogers directed the NSA’s Office of Compliance to conduct a “fundamental baseline review of compliance associated with 702” (Senate testimony & Page 83-84 of Court Ruling).

On April 18, 2016, Rogers shut down all outside contractor access to raw FISA information – specifically outside contractors working for the FBI. The discovery that outside contractors were accessing raw FISA data is probably the event that precipitated Rogers ordering a full compliance review (Page 84 of Court Ruling).

On April 18, 2016, both the FBI and DOJ’s NSD become aware of Rogers’ compliance review. They may have known earlier but they were certainly aware after outside contractor access was halted. (Read more: themarketswork.com, 4/05/2018)

March 9 2016: NSA Director Admiral Mike Rogers discovers FBI contractors doing FISA-702 “About Queries”

Admiral Mike Rogers (Credit: public domain)

“November 2015 through April 2016 FISA-702(17) “About Queries”, returns from searches, were identified by NSA Director Admiral Mike Rogers, being conducted by the intelligence community (FBI), by “contractors” and “individuals” for reasons that:

  • were unauthorized;
  • were directly related to U.S. persons;
  • and had nothing to do with National Security;
  • and were conducted by people who did not request FISA Court Approval.

Director Mike Rogers discovered FBI contractors doing FISA-702 “About Searches” that resulted in returns providing information on Americans.  Those results were passed on to people outside government.

Pg 83. “FBI gave raw Section 702–acquired information to a private entity that was not a federal agency and whose personnel were not sufficiently supervised by a federal agency for compliance minimization procedures.” (2017 FISA Court Opinion)

Someone inside the FBI was giving FISA-702 search results on U.S. individuals to a private entity that had nothing to do with government.   Those 702 (American Citizen) results were not “minimized” and exposed the private data of the American citizen(s).

In addition, NSA Director Mike Rogers, who is also in charge of Cyber Command, discovered people within the intelligence community were doing “searches” of the NSA and FBI database that were returning information that had nothing to do with “Foreign Individuals”.

Rogers requested a full FISA-702 Compliance Review.

As an outcome of that review, the DOJ/FBI compliance officer noted FISA violations. Again, the FISA Court (page 84):

We do not know how many FISA-702 violations took place prior to NSA Mike Rogers initiating the full FISA-702 review in April 2016. Nor do we know who the insider FBI individuals were; or what results were passed on; or what was done with the results.

However, given the nature of what was taking place at the time (March, April, May, 2016) it appears likely this was part of the DOJ/FBI/Fusion-GPS collision to gather information on the candidacy of Donald Trump.” (Read more: Conservative Treehouse, 1/14/2018)

June 2015 – February 2017: James Comey’s unpaid, memo leaking “Special Government Employee” – Daniel Richman

“When considering who were the FBI contractors, with special program access to the NSA database, conducting unauthorized searches and extracting results… there’s a specific type of contractor described by FISA Judge Rosemary Collyer.  One who was able to work around the security protocols: [Page 21] “systems …. that do not interface with NSA’s query audit system“.

In 2018 congressman Jim Jordan made mention of an issue where James Comey had a special employee on assignment ‘off-the-books’.  People started asking questions and Fox News Catherine Herridge detailed how Daniel Richman held special access privileges to the FBI, as an outcome of former FBI Director James Comey authorizing his friend as a “Special Government Employee” or SGE.

(VIA FOX) […] The professor, Daniel Richman, confirmed the special status in response to an inquiry from Fox News, while referring other questions, including on the scope of his work, to the FBI.

“I did indeed have SGE status with the Bureau (for no pay),” Richman wrote in an email.

Richman emerged last year as the former FBI director’s contact for leaking memos documenting his private discussions with President Trump – memos that are now the subject of an inspector general review over the presence of classified material. Sources familiar with Richman’s status at the FBI told Fox News that he was assigned to “special projects” by Comey, and had a security clearance as well as badge access to the building. Richman’s status was the subject of a Memorandum of Understanding. (read more)

Wait, let’s look at something here.

From the article the benefits included: “Sources familiar with Richman’s status at the FBI told Fox News that he was assigned to “special projects” by Comey, and had a security clearance as well as badge access to the building. Richman’s status was the subject of a Memorandum of Understanding.”

A few paragraphs later, this: “Richman’s portfolio included the use of encrypted communications by terror suspects.”

Oh my. Well, well, well… You see what’s being described here. There’s only one way to gain access to “encrypted communications” and that means having access to the FBI and NSA database.

Accepting he obviously had such access…. what would be the probability that Daniel Richman was one of these?

Daniel Richman

(Read more: Conservative Treehouse, 4/23/2019)