Everything’s Just a Lame Online Diversion These Days, Including the ‘New Deep Throat’

In the Watergate era, “Deep Throat” was supposedly a government insider who met Bob Woodward in a parking garage and moodily smoked cigarettes while wearing a trench coat. The fact that Woodward himself was a government spook recently transferred from Naval Intelligence to the Washington Post newsroom led many to assume “Deep Throat” was a group of CIA bigshots nervous about the Nixon Administration turning the nation into a dictatorship, or something. Anyway, Nixon finally gave up for the sake of the country and everybody won Academy Awards for “All the President’s Men” and Henry Kissinger is still at large.

Today, there are no brave reporters or editors at the Washington Post who would even think about trying to take down an administration, and the only Post guy really hammering away at the White House is an online guy, Dan Froomkin, and there is no brave Congress to impeach everybody, so people just bitch about it online. So obviously, the new Deep Throat is just some anonymous commenter on a blog.

The libtard blogs are all worked up about the mysterious “new Deep Throat” whistleblower who is revealing dark secrets of the NSA/NSC/OVP/DoJ domestic spying scandal that should’ve already seen everybody impeached and locked in a dungeon forever but nothing happens because the Democrat-controlled Congress is toothless and lame. He or She writes really long comments that seem pretty insidery and detailed, and he asks a lot of loaded, knowing questions that we can all recognize from the X-Files.

The comments can be found on TPM Muckraker, which hammers away at this stuff every day. The “name” field is blank and the commenter doesn’t make any claims about working for this or that agency. The strange postings start with “STUDY MUELLER’S HESITATION” and then hint at all manner of weird things we would probably totally understand if we regularly followed the story, which we don’t, because it doesn’t involve adult diapers and torturing dogs and such. Yet.

Related video

Anyway, here are a few examples of the Mystery Commenter’s acronym-filled yet terrifying posts. You can read ‘em all over here at TPM Muckraker, too.

* Question becomes: What certification has the AG made on things that not even the Gang of 8 was told about; and how was the NSC (not NSA) involved with the oversight of this, outside FISA-Gang of 8 review?
* “National security” could mean: “Maintaining morale” or “maintaining confidence”: That could mean providing false information to the public; or, based on data mining, issuing public news releases to justify public support for illegal activity; or maintain confidence in something that was an illegal contract. This would involve capture through NSA of meta-language; then stripping out identifying information;; then transferring that data to a firm like Flieshman Hilliard which would examine it, and issue public news releases on various government “public oversight” and “media messaging issues”: Smith Act issues in re domestic propaganda: Possibly a “public service” announcement to maintain loyalty in non-sense. Something for AT&T to discuss.
* Recall, it’s CIA that was sharing info with the EU on the rendition; and Plame was retaliated against by OVP: and the OVP blocking the archivist audit. Addington knew about the European Detention centers.Not getting info on the naval-based detention centers.
* Listen closely to the pauses, spacing, and hemming and hawing. Mueller is dancing around something that — it appears — President and AG have said falls “outside” the FISA-coverage: This might be a Canadian-Australian-NZ-UK data transfer program: Whereby non-US interception methods are used, but the data is forwarded to the NSA through non-direct US means.
* An “NSA/NSC” supporting function/unit does not necessarily mean intelligence gathering or intercepts. NSA-NSC-related units can be assigned anywhere; and their intelligence gathering is not isolated to electronic methods. It could involve civilian contractors assigned to commercial entities not obviously connected with the US government; and not obviously involved with verification of Signals intelligence. The personnel may or may not have any idea that they are assigned to a group that relies on NSA-collect information or that they are involved with verifying information the NSA/NSC has an interest.
* Review the destruction logs of the CIFA; and determine who was supposed to keep the logs related to these classified documents.
* Determine which signalling systems, monitoring, and other intelligence gathering the JTTF are using; and where this information is sent. Ultimately, it winds up somewhere: Which contractors, NSC staffers have access to these reports.
* How often are these units employed to provoke innocent civilians to respond to abuse?
* To what extent are these domestic units used to harass civilians based on a “hunch”?
* Would these units put the children of minors at risk to entrap a suspected target?
* Gonzalez assessment after talking to Goodling about door mats for the Hoover Building?
* DoD is allowed to do things overseas, and contractors have been assigned — working for those overseas entities — in the US.
* Also, they like the idea people are focusing on the wrong surveillance, wrong time period: The confusion means they can blame Congress for “not asking the right questions.”
* KNOW THE NATURE OF US GOVERNMENT LEGAL COUNSEL AND WHAT THEY ARE CAPABLE OF DOING.
* These are issues of international criminal law with one large defense pool: American legal counsel inside DoJ, OVP, DoD, and outside counsel.
* The clues are emerging; the issue is whether people want to see them, then dig. The answer are not hidden, they are not as deep as you might think. One thing surfacing in one area, sheds light on what else is happening in other areas. Take the larger perspective.
* See 3, then revisit 2, then 1; then reconsider 7, then link with 8; then reconsider 10.
* 3. Consider: RNC offices were attacked in the run up to the 2006 elections.
4. Compare the following
A. Location of attacks on RNC offices before the election;
B. Point spread of RNC going into the election in those districts.
* Which DoJ Small Business Contract personnel were involved with the computer/IT/SW updates related to the DOJ-RNC file transfer systems; [See 2]
* Google [ PART 266 AUDITS OF STATE AND LOCAL GOVERNMENTS, INSTITUTIONS OF HIGHER EDUCATION, AND OTHER NONPROFIT INSTITUTIONS ]
* Don’t miss the point: Congress is allowed to set up dummy entities not to waste money, but to create _bait_ that the President is _required_ to engage, target, and put under surveillance. The Presidents’ problem is that he doesn’t know which of the companies are real; or which ones are bait that are direct reporting units to the Congressional staffers.
* Those people are linked with specific offices, budgets, computers. It’s all been stored, secure, and even if they destroy the records, they have no idea what other things are happening. This has been done using methods the NSA cannot detect. There are Trojan horses inside the NSA systems, WH computers, and other things: They are not viruses, but they are discrete information packages that are organized in unique ways. They’re either there, as they’re supposed to be; or they’ve been destroyed.
* The problem they have is that they didn’t realize what was happening _while_ it happened. Again, this isn’t just in the WH, but all over the place. and not just in the President’s office, but OSC, DoJ, EOP, OVP, NSA, NSC, and Congress.
* They have no control over the baseline data which has been captured, and remains secure outside their control. They’re being led to believe the data — including all backups — has been totally destroyed. Now they realize they have a problem.
* But it’s worse than they imagined. CIA transferred data to the EU: This is connected with the NSA intercepts of the war crimes; confirming the timing of the notifications to the White House; and explaining the timelines of the destruction actions. Add in the Libby and Abramoff investigations and destruction, and the President has another problem: Too many discrete events that the RNC is responding to; and too many holes that are only linked with concerns about discrete events.
* Disclosed Verizon E-mail Addresses Link To NSA, FISA Intermediaries [Disclosures mean Verizon cannot hide e-mails from Grand Jury]
* Recall, one of the problems has been the missing RNC e-mails. There’s an answer to the missing holes. Inside the Maine PUC file for the Verizon, are their e-mail addresses for their internal e-mails. These were not supposed to have been disclosed; but one of the counsel’s memoranda lists an e-mail for the internal system. To make a long story short, once you index the e-mails for the Verizon internal e-mail system, you can then use open source information to cross-index with the outside NSA-FISA intermediaries: One of them is AMDOCS. Within the Verizon e-mail is also open disclosure of the Verizon General Counsel request for and receipt of information related to specific legal questions related to various litigation issues of interest to the FISA-NSA surveillance.
* In the MCA language was specific language authorizing US govt funds to defend US personnel before any tribunal. It appears someone in DoJ OLC worked with the WH-EOP-OVP to insert this language into the MCA. They appear to be concerned.
* The “other programs” could be things far too scary to contemplate. Recall, this President is linked with war crimes: It means nothing for him to set up camps, and make people disappear. “all for the cause. . .”
* Put the burden on the President: Prove those internment camps you’ve built aren’t being used; and that the prisoners aren’t out “exercising” when the Auditors arrive.
* Go to page 56 of 58: This is the funny part: Look at the e-mails: That is a unique Verizon internal e-mail format that can be cross indexed within the RNC and WH e-mail systems to get some hits; as well as with DoJ, DoD, NSA, and outside legal counsel. This is the third party data transfer system we’ve been talking about. . . someone said it was “impossible” — sorry, there it is. That e-mail is linked with an IP number; which is then cross indexed with various US government computers in other databases. Ooops! Funny, weren’t those DOJ Staff supposed to be processing warrants not using their computers for unofficial things?
* The format also includes the CITY where the Particular verizon emloyee is assigned. YOu’ll have to review how the employee transfers related to changes or no changes in designations.
* Scroll to the end, page 58: You’ll see a name: The Verizon GC name listed is “Arena”, the one who isn’t the primary Verizon GC: Here’s your first connection with the FISA: “Arena” is a former DoJ Type; and has been linked with the intermediaries; and his name is linked with the same AT&T-conference attendees in re NSA-JTTF-FISA intermediaries for processing warrants. Play with the phone numbers in the DC Madam list. Just for fun.

Snow: Mueller Didn’t Mean What He Obviously Meant on TSP [TMP Muckraker]
Blogosphere’s “Deepthroat” Emerges [Daily Kos]

Related

About the author

A writer and editor of this website from 2006 to early 2012, Ken Layne is occassionally seen on Twitter and writes small books and is already haunting you from beyond (your) grave.

View all articles by Ken Layne

Hola wonkerados.

To improve site performance, we did a thing. It could be up to three minutes before your comment appears. DON'T KEEP RETRYING, OKAY?

Also, if you are a new commenter, your comment may never appear. This is probably because we hate you.