TheLastRefuge Profile picture
Sep 29, 2020 20 tweets 5 min read Read on X
1. Do not overlook the importance of this Deep State two-step admission by IG Michael Horowitz.

He is calling out FBI Director Chris Wray big time !!

oig.justice.gov/reports/manage…
2. On its face the OIG release outlines a review and finding, actually a warning, by Horowitz’s office about FBI contractor access to “a certain national security database.”
3. The release is titled: “Management Advisory: Notification of Concerns Identified in the Federal Bureau of Investigation’s Contract Administration of a Certain Classified National Security Program”.

oig.justice.gov/reports/manage…
4. On the surface of the current release the OIG is noting concerns and a warning shared with the FBI about ongoing contractor access to the NSA database; thus, a “classified national security program” becomes defined.

It's the bulk metadata NSA database.
5. However, in the background of this current release it appears the OIG is using this public notification as a CYA of sorts. Meaning the OIG is saying publicly they have advised the FBI of “concerns” with this database being abused.
6. Indeed, we know the OIG was reviewing FBI contractor access to the NSA database as a result of both FISA judge Rosemary Collyer and FISA judge James Boasberg reports.
7. It was little discussed on January 19, 2019, when the OIG revealed “Misconduct by Two Current Senior FBI Officials and One Retired FBI Official While Providing Oversight on an FBI Contract.”

oig.justice.gov/reports/2019/f…
8. As specifically, and in my opinion *intentionally* noted by the OIG, the FBI used their intelligence authority to “classify” their response to IG Horowitz warning; and now Horowitz is informing the public of that opaque FBI approach.
9. Essentially, this can be looked at as Horowitz calling out the FBI for hiding information, yet the IG is using carefully worded public information to do so.
10. The FBI hid their response to the IG warning behind the cloud of “classification”, leaving the IG with no alternative except to say the classified response (March 2020) has to be accepted as the final FBI response to the IG warning.
11. Horowitz: […] "The classification marking of the working draft report ... have contributed to the delays in finalizing this review."
12. Horowitz: "So that we can begin the process of resolving issues that we identified during the review ... we have determined that it would be in the OIG’s and the FBI’s interests to conclude our review by treating the OIG’s working draft report ... as a management advisory."
13. Horowitz: "Further, based on the oral and written feedback previously provided by the FBI on the working draft report, we consider the 11 recommendations contained within the working draft report to be final and their status “resolved.”
14. The IG is then saying to the FBI you have 90 days to tell us what you did to address the contractor access abuses.

The OIG is covering his ass, and telling us why.

oig.justice.gov/reports/manage…
15. Keep in mind this contractor access to the bulk NSA metadata is a big deal. All of the FISA audits in the past six years have pointed out FBI contractors abuse their access to the database and unlawfully extract information without following fourth amendment protections.
16. The scale of the abuse is actually stunning; and now the OIG has reviewed the same FBI process and found the same issues uncorrected.

The FBI is attempting to retain an unlawful process.
17. The valid purpose of the NSA database has been exploited to: (1) gain opposition research on political entities; AND (2) the NSA database is being exploited to retrieve information useful for financial gains (insider information).
18. The FBI contractors inside the network are in the business of selling information which they obtain from their access to the NSA database.

Horowitz and FISC says it needs to stop.
Wray says notsomuch.
19. Everyone inside the system is compromised by the extracted data. We can only imagine the blackmail material floating around DC in the hands of those who weaponize it and refuse to relinquish power.

FUBAR !
20. This database is the source, the root source, of all things currently happening in/around politics.

Whoever controls it, controls EVERYTHING !

/END

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with TheLastRefuge

TheLastRefuge Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @TheLastRefuge2

Sep 3
It’s not just them. Really think about it, shift the paradigm, and OMG 😳 it all makes sense.

What the FBI does, and what the FBI doesn’t do. Use this reference and every single example reconciles, like a fuzzy picture that suddenly becomes clear
19 days for the FBI to arrive in Benghazi, Libya. This explains why…
Operation Crossfire Hurricane. This explains why…
Read 13 tweets
Jul 9
1) The people who installed the current occupant of the White House; that's the people who control the "presidency" of Joe Biden; have this to say about their intent to block any effort seeking to stop the process they used. Image
2) The people in control of the presidency, are doing this, and other things, to ensure the continuation of what they call "rule of law" and "our democracy": Image
3) This is literally what "their democracy" looks like.

[For those unaware, this was what was once called "the people's house" in popular representative parlance.] Image
Read 5 tweets
Jul 3
1) Here it comes: Joe Gotta Go....

You ready? Image
2) A play-by-play perspective of a Democratic Convention showdown.... Image
3) Clyburn heads to the White House for a meeting with Biden. He lays it all out – Biden needs to step down! Feeling the pressure, Biden announces he’s not running for re-election, leaving his supporters stunned and betrayed. Image
Read 14 tweets
Jun 20
1. After Eric Holder left the Obama administration as Attorney General, he was hired by the State of California to defend against the Trump administration in early January 2017.
2. When Eric Holder left the Obama administration, his firm was contracted by California during a process of linking the motor vehicle registration files to the Secretary of State voter registration system. 

Holder was advising on part of a technology system being constructed to bridge the DMV and SoS offices.  You might know this as a “Motor/Voter” process.  However, former AG Eric Holder had a very specific function in the construction of this technology bridge.

cbsnews.com/sacramento/new…
3. The process of adding voters to the registration rolls when they receive or update their driver’s license was seen as an opportunity to expand the voter rolls.  Making the voter rolls as big as possible is the key to the utilization of mass mail-out balloting.
Read 13 tweets
Apr 10
1) Let me bring FU type clarity to the "reasonable reforms" argument.

I have talked to everyone in DC about this. They are idiots. Not making mistakes, just plain allowing the IC to tell them nonsense. So, let me be clear.
2) Office of Inspector General Michael Horowitz testified April 27, 2023, more than 3.4 million search queries into the NSA database took place between Dec. 1st, 2020 and Nov. 30th, 2021, by government officials and/or contractors working on behalf of the federal government.
3) These search queries were based on authorizations related to the Foreign Intelligence Surveillance Act (FISA) and 702 search authorization.

oig.justice.gov/news/testimony…
Read 18 tweets
Mar 25
1) There are two general flaws in this type of analysis.

While likely accurate that ISIS did not originate the planning of the attack. Two elements stand out that appear to point away from Galloway's supposition.
2) First, the suspects are alive. Meaning, there was no mop up operation behind them to remove the fingerprints of operational control.

Example (mop up): They didn't jump in the car after the attack and have the car explode with them in it. Essentially eliminating the trail. Image
3) The absence of the clean-up (could have been anything - not just my example) implies the people who organized the attackers wanted the attackers to be captured.... and therefore, talk about their prior instructions.
Image
Image
Read 5 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(