Lawsuit Claims Mueller Blocked Probes Into Saudi Arabia’s Complicity in 9/11 Attacks


Mueller is crook! He committed crimes gotten away with due to his FBI affiliation and I’m certain the Dems knew this when Mueller set him as the figure head of the Trump Witch Hunt! Prosecute him!

JRH 9/10/19

Your generosity is always appreciated: 

Please Support NCCR

Support this Blog HERE. Or support by getting in 

the Coffee from home business – OR just buy some healthy coffee.

Bombshell Report: The DNC Was Not Hacked by the Russians


Seth Rich Leaked 2 Wikileaks-- Shot & Killed

Another nail in the coffin of the Mueller Investigation trying to frame President Trump for working with the Russians to win Election 2016. Dems are lying AGAIN.

 

This should reawaken the rumors that murdered Seth Rich stole the DNC files to expose Dem corruption. Here are some past titles from SlantRight 2.0 on Seth Rich exposing Crooked Hillary/Dem corruption:

 

 

 

 

JRH 2/18/19 (Edited 12/18/19 1:18 PM}

Your generosity is always appreciated:

Please Support NCCR

*********************

Bombshell Report: The DNC Was Not Hacked by the Russians

 

Crooked Hillary (blurred) & John Podesta 

Crooked Hillary (blurred) & John Podesta

 

Author: Nwo Report (gronos)

February 17, 2019

NWO Report

 

The DNC emails published by Wikileaks in 2016 were not obtained via a Russian hack, cyber-security and intelligence experts William Binney and Larry Johnson claim.

 

According to forensic evidence, the files taken from the DNC between 23 and 25 May 2016, were copied onto a file storage device.

 

Thegatewaypundit.com reports: If the Russians actually had conducted an internet based hack of the DNC computer network then the evidence of such an attack would have been collected and stored by the National Security Agency.

 

The technical systems to accomplish this task have been in place since 2002. The NSA had an opportunity to make it clear that there was irrefutable proof of Russian meddling, particularly with regard to the DNC hack, when it signed on to the January 2017 “Intelligence Community Assessment,” regarding Russian interference in the 2016 Presidential election:

 

“We also assess Putin and the Russian Government aspired to help President-elect Trump’s election chances when possible by discrediting Secretary Clinton and publicly contrasting her unfavorably to him. All three agencies agree with this judgment. CIA and FBI have high confidence in this judgment; NSA has moderate confidence.”

 

The phrase, “moderate confidence” is intelligence speak for “we have no hard evidence.” Thanks to the leaks by Edward Snowden, we know with certainty that the NSA had the capability to examine and analyze the DNC emails. NSA routinely “vacuumed up” email traffic transiting the U.S. using robust collection systems (whether or not anyone in the NSA chose to look for this data is another question). If those emails had been hijacked over the internet then NSA also would have been able to track the electronic path they traveled over the internet. This kind of data would allow the NSA to declare without reservation or caveat that the Russians were guilty. The NSA could admit to such a fact in an unclassified assessment without compromising sources and methods. Instead, the NSA only claimed to have moderate confidence in the judgement regarding Russian meddling. If the NSA had hard intelligence to support the judgement the conclusion would have been stated as “full confidence.”

 

We believe that Special Counsel Robert Mueller faces major embarrassment if he decides to pursue the indictment he filed–which accuses 12 Russian GRU military personnel and an entity identified as, Guccifer 2.0, for the DNC hack—because the available forensic evidence indicates the emails were copied onto a storage device.

 

According to a DOJ press release on the indictment of the Russians, Mueller declares that the emails were obtained via a “spearphishing” attack:

 

“In 2016, officials in Unit 26165 began spearphishing volunteers and employees of the presidential campaign of Hillary Clinton, including the campaign’s chairman. Through that process, officials in this unit were able to steal the usernames and passwords for numerous individuals and use those credentials to steal email content and hack into other computers. They also were able to hack into the computer networks of the Democratic Congressional Campaign Committee (DCCC) and the Democratic National Committee (DNC) through these spearphishing techniques to steal emails and documents, covertly monitor the computer activity of dozens of employees, and implant hundreds of files of malicious computer code to steal passwords and maintain access to these networks.

 

The officials in Unit 26165 coordinated with officials in Unit 74455 to plan the release of the stolen documents for the purpose of interfering with the 2016 presidential election. Defendants registered the domain DCLeaks.com and later staged the release of thousands of stolen emails and documents through that website. On the website, defendants claimed to be “American hacktivists” and used Facebook accounts with fictitious names and Twitter accounts to promote the website. After public accusations that the Russian government was behind the hacking of DNC and DCCC computers, defendants created the fictitious persona Guccifer 2.0. On the evening of June 15, 2016 between 4:19PM and 4:56PM, defendants used their Moscow-based server to search for a series of English words and phrases that later appeared in Guccifer 2.0’s first blog post falsely claiming to be a lone Romanian hacker responsible for the hacks in the hopes of undermining the allegations of Russian involvement.”

 

Notwithstanding the DOJ press release, an examination of the Wikileaks DNC files do not support the claim that the emails were obtained via spearphishing. Instead, the evidence clearly shows that the emails posted on the Wikileaks site were copied onto an electronic media, such as a CD-ROM or thumb drive before they were posted at Wikileaks. The emails posted on Wikileaks were saved using the File Allocation Table (aka FAT) computer file system architecture.

 

An examination of the Wikileaks DNC files shows they were created on 23, 25 and 26 May respectively. The fact that they appear in a FAT system format indicates the data was transferred to a storage device, such as a thumb drive.

 

How do we know? The truth lies in the “last modified” time stamps on the Wikileaks files. Every single one of these time stamps end in even numbers. If you are not familiar with the FAT file system, you need to understand that when a date is stored under this system the data rounds the time to the nearest even numbered second.

 

We have examined 500 DNC email files stored on Wikileaks and all 500 files end in an even number—2, 4, 6, 8 or 0. If a system other than FAT had been used, there would have been an equal probability of the time stamp ending with an odd number. But that is not the case with the data stored on the Wikileaks site. All end with an even number.

 

The DNC emails are in 3 batches (times are GMT).

 

Date Count Min Time Max Time FAT Min Id Max Id

 

2016-05-23 10520 02:12:38 02:45:42 x 3800 14319

2016-05-25 11936 05:21:30 06:04:36 x 1 22456

2016-08-26 13357 14:11:36 20:06:04 x 22457 44053

 

The random probability that FAT was not used is 1 chance in 2 to the 500th power or approximately 1 chance in 10 to the 150th power – in other words, an infinitely high order.

 

This data alone does not prove that the emails were copied at the DNC headquarters. But it does show that the data/emails posted by Wikileaks did go through a storage device, like a thumb drive, before Wikileaks posted the emails on the World Wide Web.

 

This fact alone is enough to raise reasonable doubts about Mueller’s indictment accusing 12 Russian soldiers as the culprits for the leak of the DNC emails to Wikileaks. A savvy defense attorney will argue, and rightly so, that someone copied the DNC files to a storage device (E.g., USB thumb drive) and transferred that to Wikileaks.

 

We also tested the hypothesis that Wikileaks could have manipulated the files to produce the FAT result by comparing the DNC email files with the Podesta emails (aka Larter file) that was released on 21 September 2016. The FAT file format is NOT present in the Podesta files. If Wikileaks employed a standard protocol for handling data/emails received from unknown sources we should expect the File structure of the DNC emails to match the file structure of the Podesta emails. The evidence shows otherwise.

 

There is further compelling technical evidence that undermines the claim that the DNC emails were downloaded over the internet as a result of a spearphishing attack. Bill Binney, a former Technical Director of the National Security Agency, along with other former intelligence community experts, examined emails posted by Guccifer 2.0 and discovered that those emails could not have been downloaded over the internet as a result of a spearphishing attack. It is a simple matter of mathematics and physics.

 

Shortly after Wikileaks announced it had the DNC emails, Guccifer 2.0 emerged on the public stage, claiming that “he” hacked the DNC and that he had the DNC emails. Guccifer 2.0 began in late June 2016 to publish documents as proof that “he” had hacked from the DNC.

 

Taking Guccifer 2.0 at face value—i.e., that his documents were obtained via an internet attack—Bill Binney conducted a forensic examination of the metadata contained in the posted documents based on internet connection speeds in the United States. This analysis showed that the highest transfer rate was 49.1 megabytes per second, which is much faster than possible from a remote online connection. The 49.1 megabytes speed coincides with the download rate for a thumb drive.

 

Binney, assisted by other colleagues with technical expertise, extended the examination and ran various tests forensic from the Netherlands, Albania, Belgrade and the UK. The fastest rate obtained — from a data center in New Jersey to a data center in the UK–was 12 megabytes per second, which is less than a fourth of the rate necessary to transfer the data, as it was listed from Guccifer 2.

 

The findings from the examination of the Guccifer 2.0 data and the Wikileaks data does not prove who copied the information to a thumb drive, but it does provide and empirical alternative explanation that undermines the Special Counsel’s claim that the DNC was hacked. According to the forensic evidence for the Guccifer 2.0 data, the DNC emails were not taken by an internet spearphishing attack. The data breach was local. It was copied from the network.

 

There is other circumstantial evidence that buttresses the conclusion that the data breach was a local effort that copied data.

 

First there is the Top Secret information leaked by Edward Snowden. If the DNC emails had been hacked via spearphishing (as alleged by Mueller) then the data would have been captured by the NSA by means of the Upstream program (Fairview, Stormbrew, Blarney, Oakstar) and the forensic evidence would not modify times – the data would be presented as sent.

 

Second, we have the public reporting on the DNC and Crowdstrike, which provide a bizarre timeline for the alleged Russian hacking.

 

It was 29 April 2016, when the DNC claims it became aware its servers had been penetrated (see https://medium.com/homefront-rising/dumbstruck-how-crowdstrike-conned-america-on-the-hack-of-the-dnc-ecfa522ff44f). No claim yet about who was responsible.

 

According to CrowdStrike founder, Dimitri Alperovitch, his company first detected the Russians mucking around inside the DNC server on 6 May 2016. A CrowdStrike intelligence analyst reportedly told Alperovitch that:

 

“Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike’s experts believed was affiliated with the FSB, Russia’s answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.”

 

And what did CrowdStrike do about this? Nothing. According to Michael Isikoff, CrowdStrike claimed their inactivity was a deliberate plan to avoid alerting the Russians that they had been “discovered.” This is nonsense. If a security company detected a thief breaking into a house and stealing its contents, what sane company would counsel the client to do nothing in order to avoid alerting the thief? Utter nonsense.

 

We know from examining the Wikileaks data that the last message copied from the DNC network is dated Wed, 25 May 2016 08:48:35. No DNC emails were taken and released to Wikileaks after that date.

 

CrowdStrike waited until 10 June 2016 to take concrete steps to clean up the DNC network. Alperovitch told Esquire’s Vicky Ward that:

 

“Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office.”

 

Why does a cyber security company wait 45 days after allegedly uncovering a massive Russian attack on the DNC server to take concrete steps to safeguard the integrity of the information held on the server? This makes no sense.

 

A more plausible explanation is that it was discovered that emails had been downloaded from the server and copied onto a device like a thumb drive. But the culprit had not yet been identified. We know one thing for certain—CrowdStrike did not take steps to shutdown and repair the DNC network until 18 days after the last email was copied from the server.

 

The final curiosity is that the DNC never provided the FBI access to its servers in order for qualified FBI technicians to conduct a thorough forensic examination. If this had been a genuine internet hack, it would be very easy for the NSA to identify when the information was taken and the route it moved after being hacked from the server. The NSA had the technical collection systems in place to enable analysts to know the date and time of the messages. But that has not been done.

 

Taken together, these disparate data points combine to paint a picture that exonerates alleged Russian hackers and implicates persons within our law enforcement and intelligence community taking part in a campaign of misinformation, deceit and incompetence. It is not a pretty picture.

____________________

This Blog Editor utilized spellcheck on the NWO Report post.

 

Published by Nwo Report

Once dismissed by cynics as a “conspiracy theory the New World Order is rapidly becoming a reality. We look at its origins, how it operates and how it affects the lives of everyone. View all posts by Nwo Report

 

© 2019 NWO REPORT

 

About NWO Report

 

This website will shake the very foundation of everything you believe about the world and we prove every statement we make.  It may sound crazy but we prove every claim we make.

 

Once dismissed by cynics as a “conspiracy theory the New World Order is rapidly becoming a reality. We look at its origins, how it operates and how it affects the lives of everyone.

 

This website serves one purpose – to prove with undeniable proof that there is a group of extremely rich “power mongers” who want to rule the world in a slave state that makes the most extreme horror movie seem pale by comparison.  They call their plan the New World Order.  We want to “Wake Up” as many good people as possible to try to put an end to this insanity.  As crazy as this sounds everything on this website is confirmed by multiple mainstream press news reports, reputable encyclopedic references or websites of those making the claims.

 

© 2009-2018 Nworeport.me is a Murray Enterprise Company.

 

Nwo Report

Bombshell report by intelligence experts reveals DNC was not hacked by the RussiansThe DNC emails published by Wikileaks in 2016 were not obtained via a Russian hack, cyber-security and intelligence experts William Binney and Larry Johnson claim.

According to forensic evidence, the files taken from the DNC between 23 and 25 May 2016, were copied onto a file storage device.

Thegatewaypundit.com reports: If the Russians actually had conducted an internet based hack of the DNC computer network then the evidence of such an attack would have been collected and stored by the National Security Agency.

The technical systems to accomplish this task have been in place since 2002. The NSA had an opportunity to make it clear that there was irrefutable proof of Russian meddling, particularly with regard to the DNC hack, when it signed on to the January 2017 “Intelligence Community Assessment,” regarding Russian interference in the 2016 Presidential election:

“We also assess Putin and the Russian Government aspired to help…

View original post 1,981 more words

Clinton Whistleblowers: Thursday’s Public Hearing to Reveal “Explosive” Information


It’s been about two years (give or take) since Crooked Hillary and Slick Willie evidence began to be exposed to the public. A lack of smoking gun dot connections, a coverup-minded Obama Administration and a colluding Mainstream Media (MSM) have protected the Clintons for quite some time.

 

So, I wait with baited breath in hope this Sara Carter article will prove true that a hearing before the House Oversight and Government Reform Committee are deserving recipients of criminal Justice.

 

JRH 12/13/18

So readers, I’ve been using a seven year old laptop to fulfill the old blogging habit. My lovely wife sprang for a Christmas upgrade. I’m a relatively small-time blogger but with a consistently growing readership despite some token censorship from the liberal-oriented blog and social platforms. Still looking to defray the Christmas costs.  

Whatever my readers can chip in will be appreciated: https://www.paypal.me/johnrhouk

Please Support NCCR

*********************

Clinton Whistleblowers: Thursday’s Public Hearing to Reveal “Explosive” Information

 

By Sara Carter
December 12, 2018 | 3:31 PM EST

SaraCarter.com

 

Crooked Hillary

 

A trove of documents on the Clinton Foundation alleging possible pay for play and tax evasion have been turned over to the FBI and IRS by several investigative whistleblowers, who will be testifying in an open hearing before the House Oversight and Government Reform Committee Thursday, according to the committee and lawmakers.

 

Roughly 6,000 documents that are expected to reveal the nearly two-year investigation by the whistleblowers with a private firm called MDA Analytics LLC, which allegedly turned over the documents more than a year and a half ago to the IRS, according to John Solomon, who first published the report last week in The Hill

 

The whistleblowers are former federal criminal investigators, who allege that the Clinton Foundation was “engaged in illegal activities and may be liable for millions of dollars in delinquent taxes and penalties,” according to Solomon.

 

The Department of Justice and the FBI’s Little Rock, Ark. field office, which is believed to be investigating the foundation, have allegedly obtained the documentation from the whistleblowers as well, according to lawmakers who’ve spoken with the whistleblowers.

 

Clinton Foundation officials could not be immediately reached for comment.

 

However, a former whistleblower, who has spoken with agents from the Little Rock FBI field office last year and worked for years as an undercover informant collecting information on Russia’s nuclear energy industry for the bureau, noted his enormous frustration with the DOJ and FBI. He describes as a two-tiered justice system that failed to actively investigate the information he provided years ago on the Clinton Foundation and Russia’s dangerous meddling with the U.S. nuclear industry and energy industry during the Obama administration.

 

William D. Campbell’s story was first published by this reporter in 2017. He turned over more than 5,000 documents and detailed daily briefs to the bureau when he served as a confidential informant reporting on Russia’s nuclear giant Rosatom. Campbell worked as an energy consultant, gaining the trust of Russians and providing significant insight into Russia’s strategic plans to gain global dominance in the uranium industry. He reported on Russian’s intentions to build a closer relationship with Obama administration officials, to include then-Secretary of State Hillary Clinton, as reported. The documents he turned over to the DOJ, which were reviewed by this news site, showed Campbell had also provided highly sensitive information both related to the uranium case, as well as other intelligence matters, since 2006.

 

Special Counsel Robert Mueller was the director of the FBI at the time Campbell was a confidential informant and according to Campbell, the information was briefed to Mueller by his FBI handlers.

 

Rep. Mark Meadows

 

“(Mueller) received the documents, copies of which I still have, over a period of years and ignored a national security threat to the United States because of his political preference,” said Campbell, who said he is frustrated that the investigation into the Clinton Foundation and the other information he provided was apparently ignored years ago.

 

“These men were in charge of transport of nuclear materials (inside the United States) while committing criminal activity here in the United States and signing major US utility contracts,” said Campbell, referring to the information he provided the FBI on the American company Transportation Logistics International, also known as TLI, was the primary transport company for Russian enriched uranium sold to the United States.

 

“One teacup of what they were transporting both domestically and abroad could close down Wall Street or Washington,” Campbell warned. “(Mueller) ignored and delayed their arrests over years while I was risking my life undercover and interacting with these (Vladimir) Putin appointees both here in the United States and overseas.”

 

But Rep. Mark Meadows, chairman of the Freedom Caucus and member of the committee, said this time it will be different. He noted that the investigation is apparently ongoing with the FBI and DOJ and believes the information being delivered for Thursday’s hearing to be ‘explosive’ in nature and may help connect the dots.

 

Meadow’s told Fox New’s Martha MaCallum Tuesday, “the American people, they want to bring some closure, not just a few sound bites, here or there, so we’re going to be having a hearing this week, not only covering over some of those 6,000 pages that you’re talking about, but hearing directly from three whistleblowers that have actually spent the majority of the last two years investigating this.”

 

Meadows, who’s also on President Donald Trump’s short-list to replace Chief of Staff Gen. John Kelly, noted that some “allegations (whistleblowers) make are quite explosive.”

 

“We just look at the contributions. Now everybody’s focused on the contributions for the Clinton Foundation and what has happened just in the last year,” he said. “But if you look at it, it had a very strong rise, the minute she was selected as secretary of state. It dipped down when she was no longer there.”

 

“And then rose again, when she decided to run for president. So there are all kinds of allegations of pay-to-play and that kind of thing,” Meadows added.

 

VIDEO: GOP launches new effort to expose Clinton Foundation

 

[Posted by Fox News

Published on Dec 10, 2018]

__________________

Sara A. Carter is a national and international award winning investigative reporter whose stories have ranged from national security, terrorism, immigration and front line coverage of the wars in Afghanistan and Iraq.

 

© 2018 Sara A. Carter | All Rights Reserved.

 

Judicial Watch Sues DOJ for Records of Investigations into the Awan Brothers, Congressional Democrat IT Scandal


Unless the FBI rank and file begin contacting Congress (Probably the Senate since blind voters gave the House to the Dems) and blowing the whistle on what is apparent FBI leadership corruption and coverups to protect Dems & Obamanites, I will begin to consider the rank and file to be just as corrupt.

 

AND YES, fired/resigned former AG Jeff Sessions is part of this problem for failing in DOJ transparency of which the FBI is supposed to answer. So when hear Dems, many Republicans and definitely the Mainstream Media (including Fox News) tell you Sessions you a raw deal; those people are liars or idiots for being deceived.

 

Judicial Watch smells yet another FBI coverup to protect Dems. In this case Rep. Debbie Wasserman Shultz in relation to (Pakistani) Awan family members acting as IT specialists working for the Dems: Abid, Imran, Jamal and Hina R. Alvi.

 

JRH 11/9/18

In this current state of media censorship & defunding, consider chipping in a few bucks for enjoying this Blog.

Please Support NCCR

********************

Judicial Watch Sues DOJ for Records of Investigations into the Awan Brothers, Congressional Democrat IT Scandal

 

JW Press Room

NOVEMBER 08, 2018

Judicial Watch

 

(Washington, DC) Judicial Watch announced today that it filed a Freedom of Information Act (FOIA) lawsuit against the Justice Department for all records of communications relating to the investigation into former Democratic information technology (IT) staffers Abid Awan, Imran Awan, Jamal Awan and Hina R. Alvi (Judicial Watch v. U.S. Department of Justice (No. 1:18-cv-02563)).

 

Imran Awan and his family were banned from the House computer network in February 2017 after the House’s top law enforcement officer wrote that Imran is “an ongoing and serious risk to the House of Representatives, possibly threatening the integrity of our information systems,” and that a server containing evidence had gone “missing.” The inspector general said server logs showed “unauthorized access” and procurement records were falsified.

 

Imran Awan was Democratic Rep. Debbie Wasserman Schultz’s top information technology aide. Most lawmakers fired Awan in February, but Wasserman Schultz kept him on until he was arrested in July, trying to board a flight for Pakistan.

 

Imran Awan was allowed a plea deal. He pleaded guilty to federal bank fraud but prosecutors found no evidence that Awan “violated federal law with respect to the House computer systems.”

 

The Judicial Watch lawsuit was filed after the FBI failed to respond adequately to two FOIA requests.

 

The FBI claimed it could neither confirm nor deny records related to the first request, filed on May 26, 2017, seeking:

 

  • All records related to any investigations or preliminary investigations involving former congressional IT support staffers Abid Awan, Imran Awan, Jamal Awan, and Hina R. Alvi. As part of this request, searches should of records [sic] should include, but not be limited to, the FBI automated indices, its older manual indices, and its Electronic Surveillance (ELSUR) Data Management System (EDMS), as well as cross-referenced files.

 

  • All records of communication sent to or from FBI employees, officials or contractors involving the subjects in bullet item 1.

 

The timeframe for the requested records is May 2015 to the present.

 

Further, the FBI claimed that records related to a July 3, 2018, FOIA request were located in an investigative file and exempt from disclosure. That request sought:

 

  • All records related to any investigations or preliminary investigations involving former congressional IT support staffers Abid Awan, Imran Awan, Jamal Awan, Hina R. Alvi and Rao Abbas. As part of this request, searches of records should include, but not be limited to, the FBI automated indices, its older manual indices, and its Electronic Surveillance (ELSUR) Data Management System (EDMS), as well as cross-referenced files.

 

  • All records of communications, including but not limited to emails (whether on .gov or non-.gov email accounts), text messages, instant chats or messages on the Lync system, sent to or from FBI employees, officials or contractors involving the Awan brothers, Ms. Alvi and Mr. Abbas. Records of communications searched should include but not be limited to those between FBI officials, employees and contractors and officials with the Capitol Police, the Office of the Inspector General of the House, and the Office of the Chief Administrative Officer of the House.

 

“It’s time for the full truth to come out about the House Democrat IT scandal, especially with impending change of power in the House,” said Judicial Watch President Tom Fitton. “There is hope that the new leadership at the DOJ will bring transparency to this case, as well as many pending FOIA investigations.”

 

On October 11, 2017, Judicial Watch President, Tom Fitton participated in a discussion between House members and experts regarding the Wasserman Schultz/Awan Brothers/IT scandal. During this discussion, Fitton stated:

 

“Frankly when it comes to crimes with a political component, I fear the Justice Department is going to fear to tread. And because of the political nature of what went on (with the Awan family) they’re not going to push the House … and I fear that the Justice Department will be fearful of raising these issues with the House for fear of embarrassing the leadership of both parties … and that’s something we need to push the Justice Department on. That they don’t under-charge or under-investigate this for fear of the consequences that will happen if they push further and find something that no one wants to find, which is a national security threat at our breast here in the House.”

 

On June 7, 2018, President Donald Trump tweeted, “Our Justice Department must not let Awan & Debbie Wasserman Schultz off the hook. The Democrat I.T. scandal is a key to much of the corruption we see today. They want to make a “plea deal” to hide what is on their Server. Where is Server? Really bad!”

_______________________

© 2018 Judicial Watch, Inc. 

 

Judicial Watch is a 501(c)(3) nonprofit organization. Contributions are received from individuals, foundations, and corporations and are tax-deductible to the extent allowed by law.

 

425 Third Street SW, Suite 800
Washington, DC 20024
888-593-8442

 

Support Judicial Watch

 

State Department Made Deal with Hillary Clinton to Keep Call Log, Schedules Secret


Judicial Watch, thanks to FOIA requests, has released documents that goes further to the FBI, DOJ and surprise – the State Department; are covering up Crooked Hillary crimes. If my thought is correct, Obama Administration collusion must have been involved in covering for their then hoped for 2016 Crooked Hillary election victory.

 

JRH 12/14/17

Please Support NCCR

***********************

Judicial Watch: State Department Made Deal with Hillary Clinton to Keep Call Log, Schedules Secret

 

JW Press Release – FOR IMMEDIATE RELEASE

December 14, 2017

Judicial Watch

 

(Washington, DC) – Judicial Watch today released new U.S. Department of State documents showing former Secretary Hillary Clinton and her then-Deputy Chief of Staff Huma Abedin were permitted to remove electronic and physical records under a claim they were “personal” materials and “unclassified, non-record materials,” including files of Clinton’s calls and schedules, which were not to be made public. The documents show the Obama State Department records would not be “released to the general public under FOIA.”

The new records also show that Huma Abedin was allowed to take five boxes of “physical files” out of the State Department that include records described as “Muslim Engagement Documents.”

Judicial Watch obtained the reports about the records from a Freedom of Information Act (FOIA) request for:

 

Any and all DS-1904 (Authorization for the Removal of Personal Papers and Non-Record Materials) forms completed by, or on behalf of, any of the following individuals:

 

Former Secretary Hillary Clinton

 

Former Chief of Staff Cheryl Mills

 

Former Deputy Chief of Staff Huma Abedin

 

Former Deputy Chief of Staff Jacob Sullivan

 

The documents include a list of official and personal calls and schedules that Clinton removed, which carry a special notation that the documents were not to be made public records. The notation is on an addendum to a DS-1904 signed by Clarence N. Finney Jr., then-director of the Office of Correspondence and Records, who was the reviewing officer. (Judicial Watch has a pending request for the deposition of Finney in separate litigation concerning Clinton emails and the Benghazi terrorist attack.):

 

NOTE: The Secretary’s call log, grid and schedules are not classified, however, they would not be released to the general public under FOIA. They are being released to the Secretary with this understanding. (Emphasis in original)

 

***

 

Electronic copy of “daily files” – which are word versions of public documents and non-records: speeches/press statements/photos from the website, a non-record copy of the schedule, a non record copy of the call log, press clips, and agenda of daily activities

 

Electronic copy of a log of calls the Secretary made since 2004, it is a non-record, since her official calls are logged elsewhere (official schedule and official call log)

 

Electronic copy of the Secretary’s “call grid” which is a running list of calls she wants to make (both personal and official)

 

16 boxes: Personal Schedules (1993 thru 2008-prior to the Secretary’s tenure at the Department of State.

 

29 boxes: Miscellaneous Public Schedules during her tenure as FLOTUS and Senator-prior to the Secretary’s tenure at the Department of State

 

1 box: Personal Reimbursable receipts (6/25/2009 thru 1/14/2013)

 

1 box: Personal Photos

 

1 box: Personal schedule (2009-2013)

 

The originals of some Clinton documents were retained, such as the call logs and schedules. For other records, including material that predates Clinton’s tenure, there is no indication that a copy was made. The most significant of these are her personal correspondence and gift binders, which could reflect Clinton Foundation and Clinton Global Initiative ties.

Through its previous investigations Judicial Watch made public numerous examples of Clinton’s schedule being broadcast via email through her unsecure, non-government server (for example, see here, herehere and here.)

The records uncovered by Judicial Watch also contain a list of materials removed by Clinton accumulated by Robert Russo, Clinton’s then-special assistant, including PDFs of Clinton’s “correspondence in response to gifts … thank you and acknowledgements,” as well as other records.

The documents indicate that Clinton removed a physical file of “the log of the Secretary’s gifts with pictures of gifts.”

The receipt of gifts by federal employees in the Executive Branch is regulated:

 

A “prohibited source” [of gifts] under the regulations is one who seeks official action from the employee’s agency; one who does business or seeks to do business with the agency; one whose activities are regulated by the employee’s agency; one whose interests may be substantially affected by the performance or nonperformance of the employee’s official duties; or an organization a majority of whose members fit any of the above categories.

 

A gift is given “because of” the employee’s official position if it would not have been offered “had the employee not held the status, authority or duties associated with his Federal position.”  Gifts that are “motivated by a family relationship or personal friendship” may therefore be accepted without limitation.

 

“We already know the Obama State Department let Hillary Clinton steal and then delete her government emails, which included classified information. But these new records show that was only part of the scandal. These new documents show the Obama State Department had a deal with Hillary Clinton to hide her calls logs and schedules, which would be contrary to FOIA and other laws,” said Judicial Watch President Tom Fitton. “When are the American people going to get an honest investigation of the Clinton crimes?”

_____________________

Judicial Watch is a 501(c)(3) nonprofit organization. Contributions are received from individuals, foundations, and corporations and are tax-deductible to the extent allowed by law.


judicialwatch.org

 

About Judicial Watch

 

Judicial Watch, Inc., a conservative, non-partisan educational foundation, promotes transparency, accountability and integrity in government, politics and the law. Through its educational endeavors, Judicial Watch advocates high standards of ethics and morality in our nation’s public life and seeks to ensure that political and judicial officials do not abuse the powers entrusted to them by the American people. Judicial Watch fulfills its educational mission through litigation, investigations, and public outreach.

 

The motto of Judicial Watch is “Because no one is above the law”. To this end, Judicial Watch uses the open records or freedom of information laws and other tools to investigate and uncover misconduct by government officials and litigation to hold to account politicians and public officials who engage in corrupt activities.

 

Litigation and the civil discovery process not only uncover information for the education of the American people on anti-corruption issues, but can also provide a basis for civil authorities to criminally prosecute corrupt officials. Judicial Watch seeks to ensure high ethical standards in the judiciary through monitoring activities and the use of the judicial ethics process to hold judges to account.

 

Judicial Watch’s investigation, legal, and judicial activities provide the basis for READ THE REST

 

Judicial Watch Weekly Update 2-26-16


Hillary- No inappropiate Relations Server

America owes a debt of gratitude to Judicial Watch for staying on the Dems and Hillary Clinton for underhanded activities and coverups. In an email update from JW dated February 26, Hillary is exposed as a duplicitous liar with her nefarious minion Huma Abedin. Although I’m less interested the last article in the email exposes the anti-Christian attitudes in the U.S. Air Force Academy via the hypocrisy of allowing a witchcraft religion to practice yet shuts down Christianity.

 

JRH 2/27/16

Please Support NCCR

*************************

Judicial Watch Weekly Update

Sent: February 26, 2016 4:55 PM

Sent by Tom Fitton

 

This Week’s Headlines

 

 

  • Federal Court Grants Judicial Watch Discovery on Clinton Email Issue

 

 

 

  • History Comes Full Circle as Judicial Watch Releases New Document in Whitewater Criminal Corruption Case against Hillary Clinton

 

 

 

  • Air Force Academy Celebrates Witchcraft and Voodoo While Demeaning Christianity

 

 

Federal Court Grants Judicial Watch Discovery on Clinton Email Issue

 

Your Judicial Watch has achieved another remarkable breakthrough in our tireless efforts to get to the bottom of the Clinton email scandal. Earlier this week, U.S. District Court Judge Emmet G. Sullivan granted Judicial Watch’s motion for discovery into whether the State Department and former Secretary of State Hillary Clinton deliberately thwarted the Freedom of Information Act (FOIA) for six years. The developments come in a Judicial Watch FOIA lawsuit that seeks records about the controversial employment status of Huma Abedin, former Deputy Chief of Staff to Clinton. The lawsuit was reopened because of revelations about Clinton’s separate email records.

 

Judge Sullivan initially announced his ruling from the bench during a hearing this week and, over the objections of the State Department, authorized Judicial Watch to submit a plan for “narrowly-tailored discovery.” Judge Sullivan is also considering whether to order the State Department to subpoena all the emails on the clinton.com email system.

 

I issued the following statement on behalf of JW in response to the ruling:

 

Judge Sullivan’s ruling granting Judicial Watch’s request for discovery is a major victory for the public’s right to know the truth about Hillary Clinton’s email system. The court-ordered discovery will help determine why the State Department and Mrs. Clinton, even despite receiving numerous FOIA requests, kept the record system secret for years. Our proposed discovery, which will require court approval, will include testimony of current and former officials of the State Department. While Mrs. Clinton’s testimony may not be required initially, it may happen that her testimony is necessary for the court to resolve the legal issues about her unprecedented email practices.

 

The full transcript of the historic court hearing can be found here. I encourage you review the transcript to see how Judge Sullivan approached the issue. Here’s a taste:

 

Here you have Mrs. Clinton and Abedin and their private counsel deciding, after neither Mrs. Clinton nor Ms. Abedin were government employees, what e-mails are federal records, and what e-mails are not. It just boggles the mind that the State Department allowed this circumstance to arise in the first place. It’s just very, very, very troubling. And I think that whatever opinion the Court writes, the first sentence will be: This is a very troubling case, for a host of reasons.

 

Rather than accept graciously the court’s ruling, Hillary Clinton instead attacked Judicial Watch this morning as “right wing.” She made the comments during a MSNBC interview. She endorsed the nasty comments of her spokesman on CNN and elsewhere in response the court ruling.

 

Hillary Clinton is clearly upset that Judicial Watch has once again stymied her email cover-up. We won’t be deterred by Mrs. Clinton’s attacks. (You can check our recent interview with the Wall Street Journal here for a reality check on what this all means.)

 

Shortly after April 15, Judicial Watch discovery will commence into the Clinton email system. This is a major achievement and I can’t say enough about all my JW colleagues who secured this court victory. And I can’t say enough about the generous financial support of our Judicial Watch members who make our work possible. Thank you!

 

History Comes Full Circle as Judicial Watch Releases New Document in Whitewater Criminal Corruption Case against Hillary Clinton

 

Hillary Clinton’s current legal predicaments caused by her email misconduct may be a surprise to some Americans. But it isn’t surprising to Judicial Watch.

 

This week we released an unprecedented accounting of the evidence that would have been used at a criminal trial against Hillary Clinton in the Whitewater case. The April 1998 memo by the Office of Independent Counsel, titled “HRC Order of Proof,” includes the names of 121 witnesses, discussions of evidence, and aspects of grand jury testimony to be used at trial, forming a virtual road map to the sweeping criminal case against the Whitewater conspirators.

 

Prosecutors ultimately decided not to indict Mrs. Clinton, calculating that they could not win the complicated, largely circumstantial case against such a high-profile figure. But while the general outline of the case is known, the “Order of Proof” is definitive and highly detailed, nailing down a number of disputed issues. Among them:

 

  • The cover-up of Clinton financial misdeeds in Arkansas began in earnest on a specific date: March 7, 1992.

 

  • Documents from the Rose Law Firm-Mrs. Clinton’s former empl the firm’s “parking lot that night,” demonstrating that Mrs. Clinton and oyer at the center of the growing scandal-were passed to a campaign aide inher Rose Law Firm Partners-Webster Hubbell and Vincent Foster-were early participants in the cover-up.

 

 

  • Media coverage of the Clintons led to renewed interest by the Resolution Trust Corp. in the corrupt bank at the center of the story, Madison Guaranty Savings & Loan. Madison was “already on the list of S&Ls to be revisited,” having been the subject of earlier probes and a prior criminal case.

 

  • Tulsa-based senior Resolution Trust Corp. investigator Jean Lewis-later the subject of a vituperative campaign of personal destruction by the Clinton side-was dispatched “by her local supervisor and someone in Washington to go to Little Rock to determine if Whitewater had caused [Madison] a loss.”

 

  • Lewis visited Little Rock in April 1992, and drew up Criminal Referral C-0004, which was sent “directly to the Little Rock U.S. Attorney and Little Rock FBI on 9/1/92.”

 

  • U.S. Attorney Paula Casey-a Clinton associate-and the Little Rock FBI office agreed to hold the criminal referral “in abeyance until after the election.” Meanwhile, the FBI and RTC investigations moved forward. Nine more RTC criminal referrals involving Madison-related schemes were drawn up.

 

  • A Justice Department probe was underway on July 20, 1993, when search warrants were obtained in Little Rock for Whitewater-related investigations. That night in Washington, Vincent Foster, the former Rose Law Firm partner serving as both the Clintons’ personal lawyer and White House deputy counsel, committed suicide.

 

  • Two senior Justice Department officials-David Margolis and Philip Heymann-are on the “Order of Proof” witness list. In the immediate aftermath of Foster’s death, Margolis and Heymann received White House Counsel Bernard Nussbaum’s consent to search Foster’s office. Then Nussbaum “reneged.”

 

  • Heymann-the Deputy Attorney General of the United States-was “[v]ery upset over the matter” and “[a]sked Bernie what he was trying to hide.

 

  • Numerous witnesses would testify they saw documents being removed from Foster’s office, including papers that resembled the Rose Law Firm billing records-under subpoena at that time and nowhere to be found.

 

Micah Morrison, our chief investigative reporter, first reported on this document in the Daily Caller.

 

This is an important and timely document. It shows that there was significant evidence against Mrs. Clinton in Whitewater. The parallels with the email scandal-the stonewalling of document production, the ‘missing’ documents, the lies and evasions-are striking.

 

The new document follows on the heels of JW’s release last month of 246 pages of previously undisclosed Office of Independent Counsel (OIC) internal memos on criminal charges against Hillary Clinton in the Whitewater investigation.

 

Then, a few weeks ago, JW reporter Morrison provided even more details on the case, based upon a newly obtained confidential document. The document included a description of the case against Mrs. Clinton “in the legal terms of an indictment.”

 

This detailed memo adds considerably to our understanding of Mrs. Clinton’s unethical-and likely criminal-past. The wealth of material uncovered by Judicial Watch in recent months strongly suggests that if she weren’t First Lady at the time, she would have been successfully prosecuted in federal court. We also proved that an actual draft indictment of Mrs. Clinton is being held by the National Archives, a document the agency refuses to turn over in response to our Freedom of Information Act requests. Our battle to get that document is now in federal court, so stay tuned for more.

 

Air Force Academy Celebrates Witchcraft and Voodoo While Demeaning Christianity

 

There’s something seriously amiss in the United States Air Force Academy. We received documents from the Air Force Academy revealing that in 2014 and 2015, the Academy used its “Chapel Tithes and Offering Fund” to pay for cadets to participate in worship services featuring witchcraft, “Faery Magick,” and voodoo. The records reveal that the Air Force Academy paid to send cadets to a Wiccan festival in Denver in May 2014 and a Denver Witches Ball in October of the same year.

 

The Tithes and Offering Fund, though funded by “free-will donations,” is also defined as “an instrumentality of the United States Government.” So, yes, all taxpayers have an interest in this issue.

 

According to a promotional brochure obtained by Judicial Watch, a group called “Spiritual Programs in Religious Education” hosted events at the Air Force Academy Cadet Chapel Falcon Circle on the Academy campus. The Academy website describes Falcon Circle as “The worship area [for]… an umbrella of traditions that includes Wicca, Paganism and Druidism.”

 

The Air Force Academy documents were unearthed thanks to our intrepid investigators, who filed an October 8, 2015, Freedom of Information Act (FOIA) request for:

 

Any and all records regarding, concerning or relating to “Earth-based” worship service events occurring at the [Air Force Academy] campus in the 2013/14 academic years, including but not limited to, programs, hand-outs, proposals, agreements, contracts, invoices, budget documents, and related materials.

 

The response included an invoice from a vendor called “Living Earth,” indicating that in March 28, 2014, the Academy was billed $260 for “worship-supplies-fellowship” for activities described as a “Festival.” According to a purchase request, the $260 to pay Living Earth was drawn from the Academy’s Church Tithes and Offerings Fund under the accounting class “Wiccan.”

 

Chapel Tithes and Offering Funds were used to pay for registration and meals for two cadets to attend the May 10-11, 2014, Earth Centered Beltania festival.” According to the Living Earth website, the Beltania Festival is “a retreat and festival for all who follow Earth-honoring religion or spiritual path.” At the festival, attendees are encouraged to “dance with ecstasy around the maypole,” “drum with the heartbeat of Mother Earth,” and “conjure Springtime within nature and yourself.”

 

The documents also contained an October 24, 2014, purchase request for $120 for the Academy to send four cadets to the “23rd Annual Denver Witches Ball.” The ball was held at a masonic temple in Denver, and the four attendees were described in the purchase request as “Earth Centered/Pagan Cadets.”

 

The Air Force Academy documents also included an October 22, 2014, email from the DFGL [Distinctive Faith Group Leader] at the Air Force Academy to an Academy official who apparently had asked for copies of any advertisements for earth-based worship services in order to fulfill the Judicial Watch FOIA request. In the email, the Distinctive Faith Group Leader strongly argued that he/she had “not used any kind of advertising” to promote the pagan/wiccan/voodoo ceremonies in which Academy cadets participated.

 

Despite the group leader’s claim that the Earth-Centered Services “does NOT proselytize,” the material from the Academy FOIA office included a promotional brochure from the Spiritual Programs in Religious Education group with which the group leader acknowledged he works. According to the Spiritual Programs in Religious Education brochure, the organization encourages festival participants to engage in “Earth Centered paths,” including:

 

  • Wicca

 

  • Witchcraft

 

  • Faery Magick

 

  • Druidism

 

  • Heathenism

 

  • Native American traditions

 

  • Voodoo

 

  • African Orishas

 

  • Goddess Spirituality

 

Compare and contrast these revelations with the Air Force Academy’s hostile approach to traditional Christianity. In 2013, the Air Force Academy made “so help me God” optional to its cadet oath. Since 2014, the Air Force has allowed airmen to omit “so help me God” from enlistment oaths. Our friends at the Family Research Council have been keeping a record of incidents of hostility to traditional religion within the armed services: “Unfortunately, pressures to impose a secular, anti-religious culture on our nation’s military services have intensified tremendously during the Obama Administration. This pressure exists across the armed services, but it has become extremely acute in the United States Air Force.”

 

The Air Force Academy leadership is attacking traditional Christian beliefs, but will fund witchcraft and “faery magick”? These records show the misplaced priorities in the Air Force and why traditional Christians increasingly feel unwelcome in the Air Force Academy.

 

This is a deeply troubling situation and your JW will keep on top of it.

 

Until next week…

 

Tom Fitton

President

________________________

MAKE A DONATION to Judicial Watch

 

JUDICIALWATCH.ORG

 

425 3rd St, SW Suite 800

Washington, D.C. 20024

About Judicial Watch

 

Judicial Watch, Inc., a conservative, non-partisan educational foundation, promotes transparency, accountability and integrity in government, politics and the law. Through its educational endeavors, Judicial Watch advocates high standards of ethics and morality in our nation’s public life and seeks to ensure that political and judicial officials do not abuse the powers entrusted to them by the American people. Judicial Watch fulfills its educational mission through litigation, investigations, and public outreach.

 

The motto of Judicial Watch is “Because no one is above the law”. To this end, Judicial Watch uses the open records or freedom of information laws and other tools to investigate and uncover misconduct by government officials and litigation to hold to account politicians and public officials who engage in corrupt activities.

 

Litigation and the civil discovery process not only uncover information for the education of the American people on anti-corruption issues, but can also provide a basis for civil authorities to criminally prosecute corrupt officials. Judicial Watch seeks to ensure high ethical standards in the judiciary through monitoring activities and the use of the judicial ethics process to hold judges to account.

 

Judicial Watch’s investigation, legal, and judicial activities provide READ THE REST