Deep State Coup (attempt), Collusion, & Confusion

Sundance of the Conservative Treehouse continues to uncover so many aspects of the Deep State “CONspiracy” to derail &/or unseat President Trump.  Please see his detailed & well-researched post for details.

♦Sequence. Unbeknownst to the FBI (per testimony from Lisa Page), CIA Director John Brennan was briefing the Gang of Eight [Aug 11th => Sept 6th (2016)] on the Steele Dossier. Brennan was also placing the briefing in Obama’s PDB, and the targets of the dossier, now inside the PDB, were unmasked by Susan Rice.

So the question now becomes: In addition to candidate Donald Trump, who were the targets within the Obama PDB material (placed by Brennan and unmasked by Rice)?

Well, in hindsight, we now know the answer:”

Per the included image, hopefully shown below:

  • George Papadopoulos
  • Carter Page
  • Paul Manafort
  • General Michael Flynn


via Backtracking Lies Worsening – REMINDER: The FBI Counterintelligence Operation into Donald Trump *DID NOT* Start After Comey Firing….


Here are a couple of comments from the article that give much food for thought:

  1. LafnH20 says:


    Through the PDB..



    Stated differently…

    Like a Crime Boss…
    He sanctioned ALL ILLEGAL Activities.

    He Allowed them.
    Encouraged them.
    Used them for his benefit against Political and Ideological Enemies.

    He Weaponized The Presidency!!!
    The PDB was allowed to be accessed by so many individuals the “Expectation” of NATIONAL Security was eviscerated.

    He Could well have Enabled The Enemy!!
    Via Espionage…

    Espionage is the crime of spying on the federal government and/or transferring state secrets on behalf of a foreign country. If the other country is an enemy, espionage may be treason, which involves aiding an enemy. The term applies particularly to the act of collecting military, industrial, and political data about one nation for the benefit of another.

    Was Russia… using Espionage..
    To influence a Presidential Election?

    Was Obama… using/allowing/knowingly benefiting from acts of Espionage to try to influence a Presidential Election?

    “If that Bastard wins…
    We ALL Hang from nooses!!”

    H. Clinton

    Why would she say that?

    A crime so serious that it is punishable by means of death by hanging???

    She felt so strongly… The need to Win the Presidency “At Any Cost”…

    She Feared HANGING??


    She LOST!!!

    What was so serious?

    Imho, You Will Find The Answer in The PDB.

    It’s out there…
    30 some people.. had access.

    Did I say FISA?


    Literally 1000’s… Possibly Tens of 1000’s of people could be effected.
    Possibly… Many Many Many MORE!!

    “The President has put in place an organization with the kind of database that no one has ever seen before in life. That’s going to be very, very powerful. That database will have information about everything on every individual on ways that it’s never been done before and whoever runs for President on the Democratic ticket has to deal with that. They’re going to go down with that database and the concerns of those people because they can’t get around it. And he’s [President Obama] been very smart. It’s very powerful what he’s leaving in place.”

    – Maxine Waters


    • czarowniczy says:

      Look no further than the NSA’s Utah Center, the culmination of decades of work. Obama was at the helm when the national metadata capture program was realized but he had as much of a hand in its creation as Al Gore did the internet.
      The breadth and depth and future expansion and use of the data those dark areas of government have and will have will render any and everyone in the US buck nekked to government prying, the algorithms will sort through it sifting, twisting and selectively interpreting it at will.
      I’d posted on the programs long ago here and data on the government’s use of intercept programs. Carnivore, Omnivore, Echelon, Prism and stuff still under classification and NDA control, there is a trail of intercept programs going back decades. In truth, there isn’t much we could have done or can do, many programs operate in a quasi-legal area of ‘we’re just gathering data’ or ‘we’re gathering it without the ability to determine the owners’ IDs’ or ‘we’re not operationally using it. Plus there’s the question of have the gatherers used the data to compromise those who’d interfere with their abilities to gather it – ala J. Edgar Hoover?

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s