Politics turned Parody from within a Conservative Bastion inside the People's Republic of Maryland

Monday, September 22, 2025
In Praise of Monetarism
Monetarism is a school of thought in monetary economics that emphasizes the role of policy-makers in controlling the amount of money in circulation. It gained prominence in the 1970s, but was mostly abandoned as a direct guidance to monetary policy during the following decade because of the rise of inflation targeting through movements of the official interest rate
It's Time to Get Serious About Energy
If man wants to progress, he must create new forms of energy of greater and greater densities.
Sunday, September 21, 2025
What's 'Good' for the Goose is "Gravy/ Sauce" for the Gander: *Honk Honk*
...the caucus was first established in 1971 [welcome to the official birth of the race essentialism movement]With a record 62 elected Black officials, including historic firsts of two women senators and two representatives from Alabama, the Congressional Black Caucus held a swearing-in ceremony Friday morning before members took the oath of office for the 119th U.S. Congress.Five Republicans [race non-essentialists] – Sen. Tim Scott of South Carolina and Reps. Byron Donalds of Florida, Wesley Hunt of Texas, John James of Michigan and Burgess Owens of Utah – are not members of the Congressional Black Caucus and didn’t attend the ceremony. All are ardent supporters of Republican President-elect Donald Trump. With the GOP in control of the House and Senate, they have stated their support for Trump’s future policies and even a few of his controversial statements.
The formula of the Party-State, as the defining feature of twentieth-century Communism, thus needs to be complicated: there is always a gap between Party and State, corresponding to the gap between the Ego-Ideal (symbolic Law) and the Superego, for the Party remains the half-hidden obscene shadow which redoubles the State structure. There is here no distance, its organization embodying a fundamental distrust of the State organs and mechanisms, as if they need to be continually kept in check. A true twentieth-century-style Communist never fully accepts the State: there always has to be a vigilant agency outside of State control, with the power to intervene in the State's business.
Saturday, September 20, 2025
Zizek Explains what the Left Pathologically Denies
38 Now it came to pass, as they went, that he entered into a certain village: and a certain woman named Martha received him into her house.
39 And she had a sister called Mary, which also sat at Jesus' feet, and heard his word.
40 But Martha was cumbered about much serving, and came to him, and said, Lord, dost thou not care that my sister hath left me to serve alone? bid her therefore that she help me.
41 And Jesus answered and said unto her, Martha, Martha, thou art careful and troubled about many things:
42 But one thing is needful: and Mary hath chosen that good part, which shall not be taken away from her.
Friday, September 19, 2025
Shutting Down the MASSIVE Deep State Censorship Industrial Complex
Guilt-Pride Infected Media Outlets: Guilty of Accomplice to Murder?
“There is no such thing as collective guilt or collective innocence; guilt and innocence make sense only if applied to individuals.”
The German word for collective guilt is Kollektivschuld. This term, meaning "collective guilt" or "kin liability" in English, was used by figures like psychoanalyst Carl Jung in 1945 to describe the German people's shared feelings of responsibility for the atrocities committed during the Nazi era. The term is related to the broader concept of Vergangenheitsbewältigung, which refers to the difficult process of confronting and "overcoming the past".
.... in the Good vs Evil Ethics of Kitsch, of course!
“For when I speak of the banality of evil, I do so only on the strictly factual level, pointing to a phenomenon which stared one in the face at the trial. Eichmann was not Iago and not Macbeth, and nothing would have been farther from his mind than to determine with Richard III 'to prove a villain.' Except for an extraordinary diligence in looking out for his personal advancement, he had no motives at all… He merely, to put the matter colloquially, never realized what he was doing… It was sheer thoughtlessness—something by no means identical with stupidity—that predisposed him to become one of the greatest criminals of that period. And if this is 'banal' and even funny, if with the best will in the world one cannot extract any diabolical or demonic profundity from Eichmann, this is still far from calling it commonplace… That such remoteness from reality and such thoughtlessness can wreak more havoc than all the evil instincts taken together which, perhaps, are inherent in man—that was, in fact, the lesson one could learn in Jerusalem.”― Hannah Arendt, Eichmann in Jerusalem: A Report on the Banality of Evil
Must we always live in the Past? Or can we live in an Anxious, but Present, expectation of a Transcendent Future? Nope. Democrats say we must Forever Live in the Past and Dance to the Guilt-Pride Uni-Party Tango
Here We Go Stampeding Off a Cliff... AGAIN!
Tuesday, September 16, 2025
Monday, September 15, 2025
Charlie Kirk, Turning Point or Tipping Point?
Will his assassination initiate an Anti-Deep State Preference Cascade?
The End of Weaponized US Deep State Domestic Propaganda?
Utah Senator Mike Lee announced he will soon introduce groundbreaking legislation to restore the original protections of the Smith-Mundt Act—and he’s renaming it the “Charlie Kirk Act” in honor of the conservative leader assassinated just days ago.
“In the coming days, I’ll be filing my previously drafted legislation to restore Smith-Mundt, and renaming it the Charlie Kirk Act. Domestic, political, government-funded propaganda must end now,” Lee wrote on X.In the coming days, I’ll be filing my previously drafted legislation to restore Smith-Mundt, and renaming it the Charlie Kirk Act
— Mike Lee (@BasedMikeLee) September 15, 2025
Domestic, political, government-funded propaganda must end now https://t.co/lm49zS24tX
This marks one of the most aggressive steps yet to dismantle the Deep State’s stranglehold on information flow in America.
Passed in 1948, the Smith–Mundt Act (officially the United States Information and Educational Exchange Act) allowed the U.S. government to conduct foreign propaganda campaigns, radio, film, exchanges, cultural outreach, aimed at influencing foreign populations during the Cold War.
But the law contained one critical safeguard: propaganda made for foreign audiences was forbidden from being used inside the United States. Washington could not psy-op its own people. This firewall stood for more than six decades.
In 2012, tucked into the National Defense Authorization Act for FY2013, Congress passed the Smith–Mundt Modernization Act, introduced by Representative Mac Thornberry (R-TX) and signed by Barack Obama on January 2, 2013.
It shredded the firewall and legalized domestic distribution of State Department and U.S. Agency for Global Media (formerly Broadcasting Board of Governors) materials.
By July 2, 2013, it was official: U.S. citizens could now be subjected to the same government-crafted propaganda once reserved for foreigners.
Seven months ago, investigative watchdog Mike Benz revealed to Joe Rogan in an interview what really happened with the Smith-Mundt Modernization Act of 2012.
Obama’s “modernization” wasn’t modernization at all; it was the effective repeal of Smith–Mundt, a deliberate move to unleash the State Department, CIA, and USAID’s propaganda weapons on the American people.
According to Benz, it allowed the permanent “Department of Dirty Tricks” to:-Infiltrate and co-opt universities, unions, media, politicians, and judges.
-Fund groups abroad that also operate here, laundering foreign “grants” into domestic propaganda.
-Push censorship by coercing foreign governments to pass laws that attack U.S. free speech and social media.Mike Benz: Are you familiar with the Smith–Mundt Act?
Joe Rogan: Is that the 2011, 2012 thing where Obama allowed people to use propaganda against United States citizens?
Mike Benz: Yeah. What was done then under Obama was the effective repeal of it. It was called the Smith–Mundt Modernization Act. But the modernization got rid of the whole purpose of it—the firewall—because at the time, the media and media control was seen as the linchpin, the crux of winning the Cold War: piping in pro-U.S. media influence.
Because everything moved after World War II from kinetic warfare and military occupation—we used to militarily occupy the Philippines, for example, after we won the Spanish–American War—but that was banned under international law. Territorial acquisition by military force in 1948 was outlawed. So, we had to win elections, and we had to influence the passage of laws in foreign countries by having an apparatus inside those countries that influenced the hearts and minds of people, which determined who they voted for, which then determined the government. You had to move towards political vassalage rather than military occupation.
What the Smith–Mundt Act did—simultaneous with its creation in 1948—was recognize the Frankensteinian monster Congress was authorizing by creating a covert permanent Department of Dirty Tricks (their phrase, not mine). Its job was to cloak, infiltrate, and co-opt the universities, the unions, the media, the politicians, the judges—the whole sworn army—what I’ve been calling for a long time the “USAID Truman Show.” Because people in foreign countries had no idea how many of the things they interacted with were effectively a movie set being constructed by the U.S. State Department and its sister influence organizations.
But the point I’m getting at here is the Smith–Mundt Act in 1948 said, “Okay, you guys can do this. State Department can do this. CIA can do this. USAID, when it came along 13 years later, could do this.”
There was a guy named Frank Wisner, one of the godfathers of the CIA. He created what was called “Wisner’s Wurlitzer,” like a church organ. He bragged that he could play the international media like a symphony, making any narrative go viral anywhere in the world because of the CIA’s proprietary media functions and its distribution network—especially when the U.S. first moved for advantage in radio and print. It was basically the U.S. and U.K., the only real games in town, in having robust radio, film, TV, and print media.
The Smith–Mundt said, “Okay, you can do that abroad. You can plant fake news stories in France. You can pump propaganda into Africa, Western Europe, Central Asia. But it can’t come home. You can’t psy-op our own people with your propaganda organ abroad. Because the point of authorizing this is that we get cheaper gas, import–export markets, and a higher standard of living.”
If a foreign government doesn’t want to give up its resources, allow a U.S. military base, or allow joint partnerships or multinational corporations to operate there, then the American people suffer economically. It was always designed to say, “Listen, you can do this dirty stuff abroad, but it can’t come home.”
Even that protection—which lasted for 70 years and we only lost a decade ago—is gone. And now we’re up against a much deeper, darker problem with this USAID scandal, and soon with scandals breaking open at the Pentagon and State Department.
Because the issue isn’t just a Smith–Mundt problem of propaganda—it’s about funding and operations. The Blob, our foreign policy establishment, can fund groups that effectively work with prosecutors domestically, or with media, under “dual use.” We give them foreign grants to do propaganda abroad, but they operate here. Or they enforce social media censorship abroad that ends up being applied here, coercing countries to pass censorship laws explicitly designed to hit U.S. peer-to-peer speech.
We need that protection. If we’re going to keep this function at all, we need a hard firewall and absolute, grotesque penalties for any violation.The Smith-Mundt Act is trending on X, don’t let this momentum die
— Wall Street Apes (@WallStreetApes) September 14, 2025
We must Restore the Smith Mundt Act and call it The Charlie Kirk Act to end legalized mainstream media propaganda
Mike Benz talks with Joe Rogan about what Barack Obama really did by repealing the Smith–Mundt Act… pic.twitter.com/atptn5OCj3
Saturday, September 13, 2025
Technofeudalists Capture Nepal
Young Nepalis led a mass protest in Kathmandu on Monday and have paid for it with bullet wounds or their lives
The whiteboard listing the names of patients at a hospital in central Kathmandu tells the story of a protest gone badly wrong. Beside each name is written their age: 18, 22, 20, 18, 23. The list goes on.
By Wednesday morning there were still scores of Nepal’s young being treated for gunshot wounds and injuries sustained when police opened fire on protesters in Kathmandu on Monday.
These are the so-called gen Z protesters, a generation of young Nepalis who led a mass protest against government corruption, nepotism and a ban on social media sites, and paid for it with bullet wounds and in some cases their lives. Hundreds were injured and at least 22 are believed to have died.
From his hospital bed, Saurav*, an 18-year-old college student, said he had been excited to join the protest. “When it comes to the nation, there is no need for motivation. The politicians are just selling our country for their own greed. That’s not supposed to happen,” he said.
The violence that broke out before the police opened fire on the huge crowds that had gathered outside the parliament building in Kathmandu on Monday was, insists Saurav, instigated by groups outside their anti-corruption movement.
As the shooting started, a protester standing in front of Saurav was shot in the chest and died on the spot, he said. Pellets from the shot hit his hand. “I was screaming in pain and my friends carried me to this hospital … It was totally unnecessary. Killing people, I don’t think that’s humanity. That’s just disgusting,” he said.
By Tuesday afternoon the prime minister, KP Sharma Oli, had resigned and thousands of Nepalis had taken to the streets to spontaneously celebrate his downfall and express their anger.
The mood initially was one of jubilation at what many saw as the end of widespread government corruption, and bitter resentment at the killing of the protesters the day before.
For the past 10 years, Nepal has been ruled by the same three elderly leaders – Oli, Sher Bahadur Deuba and Pushpa Kamal Dahal – who have effectively taken up the post of prime minister on a rotating basis. Between them, they have led the country on 12 separate occasions. While yesterday’s protests may have been triggered by the government’s ban on dozens of social media sites last week, it was built on years of frustration and anger at politicians who are widely viewed as corrupt and self-serving.
By 4pm the main roads into the heart of the city were packed with protesters, many on motorbikes, chanting, shouting and waving the Nepali flag, in defiance of a government curfew. Many more lined the streets, filming the moment and taking selfies, sensing that history was being made.
Much of the anger was directed at Oli, with handwritten signs scrawled on walls and T-shirts calling for him to be killed. “He killed our youth. He should be dead,” said one.
The focus of the crowds was Singha Durbar, the complex of government ministries, which was then breached and much of it set on fire. One group drove a police van out of the main gate, carrying dozens of triumphant protesters on its roof. Three young men scaled the ornate entrance gate to wave the national flag. On the ground below, a group belted out the national anthem. A small number of soldiers stood by but did little to intervene. There was no sign of the police.
As thick, acrid smoke belched out across the streets and over the city, some protesters emerged from the burning buildings carrying reams of paper, office chairs and computer monitors.
“This is a revolution. This is the end of the corruption. It’s our turn now,” said Sujan Dahal, a young Nepali celebrating the downfall of the prime minister in Kathmandu on Tuesday. “The government was so corrupt. They used that money to improve their own lives, but there has been no change in the lives of normal people.”
By the end of the day, the scale of destruction had shocked many Nepalis, amid a sense that the movement has been sabotaged by groups seemingly bent on retribution and violence.
“I’m feeling bad. This is not good for us,” said a young man, who did not want to give his name. Along with government ministries and residences, dozens of other properties have been set on fire across the city, including a luxury hotel and a prestigious private school.
Throughout the day, groups of protesters had formed human chains around some sites to protect them, including the entrance to an army camp. “We are protecting the army. We are not against the army. We are against the government. The corruption. They are trying to shut our voices by stopping social media. Today we won. It is our victory. Oli has resigned,” said Sajad Ansari, 20.
By Wednesday morning, the administrative heart of Kathmandu looked like the aftermath of a missile attack. Burnt-out buildings stood smouldering in the light rain. The charred shells of cars and motorbikes lay strewn across the streets. Plumes of dark smoke still rose over the city.
The city is now in a state of almost complete lockdown, with soldiers stationed at major junctions enforcing a strict curfew. It is unclear what shape a future government might take.
It is a sentiment shared by Saurav even as he recovers from his injuries but, like many, he remains optimistic. “If the power is in the right hands, of course Nepal will develop,” he said. “Our young generation are very capable. We don’t seek for our own greed. We think about the good of the nation.”
*Name has been changed
Friday, September 12, 2025
On the Trans-Furry Community...
In Lacanian psychoanalysis, the ego is the self that experiences reality, while the superego is a cruel, imperative voice commanding enjoyment, or jouissance—a painful pleasure beyond simple joy. Unlike Freudian ethics, Lacan's superego doesn't just forbid but actively compels the subject to enjoy, creating a twisted sense of guilt from which no enjoyment is ultimately derived, as any attempted fulfillment of the command leads to more pain and an impossible pursuit of unattainable pleasure...
...unattainable before the furry costume, attainable after donning the furry suit. The ego retires, and the furry persona can be unleashed. The personae's now ego-suspended disbelief achieved.
Gender Identity Disorder (GID: aka - Gender Dysphoria) is related to Dissociative Identity Disorder (DID).
The difference from Google AI: Dissociative Identity Disorder (DID), formerly multiple personality disorder, involves distinct identities that take control of a person's behavior, accompanied by amnesia, while Gender Dysphoria (GD) is the distress a person experiences from the incongruence between their internal sense of gender and their sex assigned at birth. A key difference is that DID is a global identity disturbance with involuntary shifts and amnesia, whereas GD is a specific distress related to gender identity and often leads to a desire for medical transition. It's important to note that GD is not a personality disorder, though some people with DID may also experience or present with symptoms of GD.
GD can be the pleasure (surplus jouissance) of an actor playing a role as opposed to a schizophrenic fracturing of the Ego It's a function of how deep the rabbit hole one goes:
From Google AI:
SchizophreniaDissociative Identity Disorder
- Characterized by positive (e.g., hallucinations, delusions), negative (e.g., flat affect, withdrawal), and cognitive (e.g., disorganized thinking) symptoms.
- Typically develops in late adolescence or early adulthood.
- Delusions are often bizarre and persecutory, while hallucinations can be auditory, visual, or other sensory experiences.
- Treatment involves antipsychotic medications, therapy, and psychosocial interventions.
- Characterized by the presence of two or more distinct identities or personality states that alternate and take control of the individual's behavior.
- Often arises from severe childhood trauma or abuse.
- Individuals may experience amnesia, depersonalization, and a sense of detachment from their own body and emotions.
- Treatment involves therapy, such as trauma-focused therapy, to integrate the different identities and develop coping mechanisms
Co-occurrenceIt's important to note that schizophrenia and DID can sometimes co-occur in the same individual. This is known as "schizoaffective disorder."ConclusionSchizophrenia and dissociative identity disorder are distinct mental health conditions with different symptoms, origins, and treatments. It's crucial to seek professional help if you or someone you know is experiencing symptoms of either condition.
Josephine, or The Mouse Folk
"Our intelligence cannot wall itself up alive, like a pupa in a chrysalis. It must at any cost keep on speaking terms with the universe that engendered it"- William James
Thursday, September 11, 2025
The Woke Guilt-Pride Saga Continues.... Do White Lives Matter (even if they're AfD)?
“There is no such thing as collective guilt or collective innocence; guilt and innocence make sense only if applied to individuals.”–Hannah Arendt, "Personal Responsibility Under Dictatorship"
Tuesday, September 9, 2025
The UnConstitutional J6 Surveillance - FBI Parallel Construction Run Amok!
Sundance, "Full Spectrum Surveillance Lies Behind the J6 Committee Motive to Delete all Investigative Material"🚨 BREAKING: Special Counsel Ed Martin has dropped a bombshell, announcing a full-scale investigation into the actions of the January 6th Committee for the deliberate destruction and tampering of evidence and the issuance of illegitimate pardons signed by an autopen. pic.twitter.com/qPWEJwb2UF
— TRUMP ARMY (@TRUMP_ARMY_) September 8, 2025
There’s a reason why the J6 Committee deleted the records of their activity, an angle missed by most. When you understand what they hid and why they did it, you then understand why current Speaker of The House Mike Johnson will not go near the subject.
The J6 Committee used interfaces with the NSA database and pre-existing portals with aligned DHS Social Media databases (including Twitter, see prior “Twitter Files”), as research and evidence gathering mechanisms for their investigations.
The J6 targets were identified through a collaboration between the legislative research group and the FBI. [That’s unlawful by the way – but that’s another matter]. The FBI contracted Palantir to identify the targets using facial recognition software and private sector databases.
Once identified, the targets were then searched in the NSA database for a fulsome context of identity. All subsequent electronic metadata of the targets was retrieved and utilized in prosecution; however, no one ever discovered this was the collaborative method. That has not come out yet.
Ultimately, the J6 Committee hiding and deleting their files and operational techniques was due to several issues. They really didn’t have a choice given the unknowns of an incoming republican majority.
First, the collaboration with the FBI is unconstitutional. Legislative officers are not law enforcement officers. There is a separation of powers issue.
Second, ultimately – and most consequentially – all of the participants did not want the American public aware of the mass surveillance techniques that were carried out as part of the ’round up.’
Wait to see what the next NSA compliance audit looks like. Remember, these reports are more than a year behind the activity they highlight.
This is where a complete mental reset is needed.
The modern application of the fifty-year-old concept around FISA as a constitutional mechanism to search the private papers (data) of American citizens, is a fraud, a complete ruse.
The Foreign Intelligence Surveillance Act, FISA, represents the method used by the intelligence apparatus of the FBI to conduct surveillance. It was purposefully designed, as a method to avoid the problems with 4th amendment protections. However, the modern application of the FISA justification has no lawful basis.
♦CONTEXT – Beginning in/around 2012, after the Dept of Justice National Security Division was created by President Barack Obama and Attorney General Eric Holder, the use of FISA warrants were extended to include electronic searches of captured information held within the National Security Agency (NSA). This was the database into which former NSA employee Edward Snowden was creating the search engine software.
The capturing of information was relatively new; technology was still being developed. Rapid scale-ups of archives and data processing was underway. Various iterations of the search tools and processes were being tested and deployed.
Prior to 2010/2012 we were mostly talking about emails, phone calls and text messages. However, as more and more technology was deployed, the interfaces expanded. Today, almost every electronic interface is captured/stored within either the NSA database, or a private sector database with connections to the NSA search portals.
Arguably, all of the underlying data captures were unconstitutional, and when the captures were originally discovered there was some intense conversations about fourth amendment protections and Americans privacy. To set aside the concerns and justify the existence of electronic search measures, the American government justified existence via the FISA court process, which extended to cover the new capabilities.
Currently, almost every American interfaces electronically with some system that captures their data. In the private sector that data is then assembled, attributed and used for consumer product micro-targeting, i.e., all data is commercially monetized.
Local and state governments also interface with the federal government database. As a consequence, all data eventually flows to the NSA capture points where searches of the total assembly are possible.
As noted in various explanations of government collaboration with social media, DHS has access to the various databases which house information inside the private sector. The lines between govt and private sector data captures are nonexistent as both public information and private information databases can be searched through the same network.
This is the baseline to understand the scope of data collection.
The important part to understand is all of the data collected is searchable. Then you move on to ‘how’ can the data be searched.
The ‘how’ is where FISA comes into the picture as the justifiable mechanism that permits the federal government to search the database.
The existence of the database is no longer argued. The govt has now moved beyond justifying the existence of the stored data, and now the only point of contention is ‘how’ and ‘when’ the government may exploit it.
This is where the DOJ-NSD, FBI, U.S. Intelligence Community, Congress and even the Judicial Branch claim the FISA laws protect the unlawful exploitation of the search capability. However, did you know there is not a single example of a FISA search application to the FISA Court that has ever passed Inspector General review.
Prior to President Trump’s authorization of the OIG in 2017, no one was ever permitted to review, check or audit the government submissions to the FISA Court. From the moment the DOJ National Security Division was created to permit the enhanced search review, not a single oversight mechanism was ever in place.
Factually, in the timeline of FISA use not a single oversight mechanism was ever in place. The entire process, and think of searching the database as a process, was/is based on the ‘honor system’. That explains why it was so easy to weaponize by Obama/Holder.
As soon as President Trump permitted the Office of Inspector General to start looking at filled out FISA applications, and justified FISA search documents created by users who were searching through the database, what they discovered was a non-existent accountability system.
After the DOJ Office of Inspector General (OIG), Michael Horowitz, presented his December 2019 findings of the FISA application used against U.S person Carter Page, the gross deficiencies and intentional fraud were so extensive the IG said he was going to review a sample of FISA applications to identify if the fraud and abuse was widespread.
The OIG began reviewing FISA applications from eight field offices (the proverbial “rank and file”). The OIG selected 29 FISA applications from those field offices over the period of October 2014 to September 2019.
Additionally, every field office and the DOJ-NSD generate internal “Accuracy Reviews”, or self-checks on FISA applications; so, the OIG inspected 42 of the accuracy review FISA files to determine if they were compliant.
The results were so bad the IG produced an interim memorandum to the DOJ and FBI [pdf link here]. Within the 17-page-memo the IG notified Attorney General Bill Barr and FBI Director Chris Wray that all of the claimed FISA processes, in every field office, are grossly deficient, and in most cases, there is zero compliance with FISA standards.
The IG memorandum was presented before the Inspector General even looked at the specifics of the non-compliance.
Below is the report/memorandum. Additionally, I am summarizing the stunning top-lines identified by the IG memo:The ‘Woods File’ is the mandatory FBI evidence file that contains the documentary proof to verify all statements against U.S. persons that are contained in the FISA application. Remember, this is a secret court, the FISA applications result in secret Title-1 surveillance and wiretaps against U.S. persons outside the fourth amendment.
- The IG reviewed 29 FISA applications, surveillance warrants, used against U.S. persons.
- The 29 FISA applications were from eight different field offices.
- The FISA applications were from Oct/2014 through Sept/2019.
- All of the FISA applications reviewed were approved by the FISA court.
♦ Within the 29 FISA applications reviewed, four were completely missing the Woods File. Meaning there was zero supportive evidence for any of the FBI claims against U.S. persons underpinning the FISA application. [ie. The FBI just made stuff up]Keep in mind, all of these applications/justifications to engage title-1 surveillance against suspects, were approved by the FISA court. How is this possible, unless the FISA Court is intentionally just a false front for a nonexistent process.
♦ Of the remaining 25 FISA applications, 100% of them, all of them, were materially deficient on the woods file requirement; and the average number of deficiencies per file was 20. Meaning an average of twenty direct statements against the target, supporting the purpose of the FISA application, sworn by the FBI affiant, were unsubstantiated. [The low was 5, the high was 63, the average per file was 20]
♦ Half of the FISA applications reviewed used Confidential Human Sources (CHS’s). The memo outlines that “many” of applications containing CHS claims had no supportive documentation attesting to the dependability of the CHS.
♦ Two of the 25 FISA applications reviewed had renewals; meaning the FISA applications were renewed to extended surveillance, wiretaps, etc. beyond the initial 90-days. None of the renewals had any re-verification. Both FISAs that used renewals were not compliant.
That’s my position now. There is no FISA process in place at all. It’s as if there’s a traffic light at an intersection, but the power is turned off. What good is the traffic light, other than to say there’s a traffic light at this intersection.
But wait… it gets worse.
The DOJ and FBI have an internal self-check mechanism. The DOJ National Security Division (DOJ-NSD) chief counsel, and the chief counsel for every FBI field office are required to conduct an “Accuracy Review” of selected FISA applications.
One review per FBI field office (25 to 30 field offices), which are also sent to DOJ-NSD (main justice) for general counsel inspection.
Keep in mind, these “accuracy reviews” are known in advance, so the FBI has all the time in the world to select the best FISA file for review.
Additionally, I surmise the OIG wanted to inspect the “accuracy review” FISA’s because they would show the best light on the overall system itself. The OIG was looking for the best, most compliant, product to report on.
However, when the OIG inspected 42 of these Accuracy Reviews, the IG identified that only three of them had accurately assembled documents (Woods File) supporting the application. The error rate within the files self-checked was over 93%.
So the best FBI files are selected to undergo the FBI and DOJ-NSD accuracy review. The accuracy review takes place by FBI legal counsel and DOJ-NSD legal counsel. However, the IG finds that only three FBI applications in the accuracy reviews were compliant.
The error rate in the files undertaken by the internal accuracy review was over 93% (3 compliant out of 42 reviewed). These were the FISA submissions with the greatest possibility of being accurate.
This is the baseline to understand what comes next.
Summary: The justification of FISA or FISA (702) as a mechanism to protect the American people from illegal searches of the NSA database IS A FRAUD. The searching of the NSA database not only continues but has factually expanded through today. There are no established limits on search use, only false claims that are fed to the public for popular consumption.
The DOJ and FBI are aware of this. The OIG is aware of this. The Intelligence Community is aware of this. The NSA is aware of this. The FISA Court is aware of this. The Supreme Court, which oversees the FISA Court, is aware of this. The Legislative Branch is aware of this.
We have the evidence and receipts.
More soon…
But hey, the J6 Conspirators were "terrorists" dontcha know? Cosplay demonstrations by the American people after a Fedsurrection purposely instigated to cover up a Parliamentary Coup and debate over slates of State Electors is "terrorizing" to a Deep State intent on maintaining "continuity of Government (aka - UniParty in Charge). They needed the resources of the entire National Security State to make their unconstitutional legal cases through parallel construction and keep themselves safe from having their "authority" questioned afterwards.