Sundance names names — Who’s ‘They’?

…There are various “they’s” within the system. One set of ‘they’s” are the multinationals and billionaire donors who control the levers of power behind the Potemkin village we call Washington DC. George Carlin called them ‘the big club.

’The other set of ‘they’s” that few people talk about, are the operatives who work as the guards for the system. This is where the United States intelligence community, various opaque government agencies, and federal intelligence contractors come into play. I have met the participants.

The guards are paid to run domestic surveillance operations that are then funneled into the U.S. Justice System for official targeting operations conducted by the DOJ and FBI. These are tradecraft agents within quasi government agencies, most federal contract agencies, that target politicians and influential people with the specific intent on gaining leverage, blackmail, information etc, for use by those who retain and protect the system.

You could call these the “seven ways to Sunday crowd” as defined by Senate Majority Leader Chuck Schumer. Or you could call these people the “FBI contractors” who have access to the NSA database as part of their operational mission to conduct surveillance and create the files that ultimately end up with the “seven ways to Sunday crowd.”

It matters not what you call them, these men and women conduct targeting operations against U.S. citizens and U.S. businesses.  They also create the files that are used by political operatives like Dan Jones.  That’s why $50,000,000.00 was/is needed for the Trump operation.

All of the puppets, players and politicians within the Potemkin village are under this network of surveillance, and at any time they can be targeted by a host of tradecraft operations to ensnare them.

If you start digging into the actual corruption, schemes or a specific granular episode that highlights risk to the DC operation, you end up like former CBS news investigative reporter Sharyl Attkisson, with “TSCI” material in a hidden file within your computer for the FBI to randomly find.

Former DAG Rod Rosenstein and FBI official Shawn Henry ran that specific operation against Attkisson.  Shawn Henry went on to work for Crowdstrike in their “proactive and incident response services” division.  That’s the intel security company that investigated the DNC “hack” and told the FBI it was Russians who did it…. at least that’s the claim from the FBI who never investigated the “hack”, a claim later denied by Crowdstrike.   See how that works?

Yesterday you might have read that 40 intelligence and law enforcement “confidential human sources” were in the J6 Proud Boy’s operation at the DC capitol.  That’s another example of the “they’s” that function as contractors to the system within the larger intelligence apparatus.  It all falls under the Director of National Intelligence and Dept of Homeland Security (DHS).

Another example of the “they’s” in the system are the FBI and various “Intelligence Community” officials and contractors you see exposed in the Twitter files.  Essentially embeds in the Big Tech social media system.  It sure makes datamining operations easier when the federally contracted ‘miners’ are inside the communication platforms, able to review all the private discussions and report that information back to the DHS central command. 


Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s