Deep State Dirt: FBI Ran Secret Surveillance on Kash Patel, Tried to Cover Their Tracks

Journalist John Solomon said newly uncovered information suggests the FBI maintained hidden investigative files targeting individuals close to President Donald Trump during the tenure of former FBI Director Christopher Wray, raising concerns about potential civil liberties violations.

Solomon made the remarks during a discussion with commentator Benny Johnson, where the two examined reports that certain politically sensitive investigations were placed into restricted systems rather than the FBI’s standard case management database.

Johnson opened the conversation by questioning reports that FBI Director Kash Patel did not initially have access to the records.

“Line in the lead here, John, that is the most alarming to me is that Kash Patel doesn’t have access to these files, or that they have been scattered to the wind,” Johnson said.

Solomon responded by explaining how certain investigations were handled differently from normal FBI cases.

“So in these politically sensitive investigations where we now know they were targeting people close to the president, lawyers, like people around the president, were lawyers advising him, advisors, movie makers, journalists,” Solomon said.

Keep reading

TikTok Says Privacy Makes Users Less Safe

Over the past five years, the largest social platforms settled on a clear position about private messaging. Lock it down. Facebook turned on end-to-end encryption. Instagram and Messenger did the same. X joined the club. Yes, metadata is still an issue and the protocols used matter; but, generally speaking, the move was toward more privacy of actual messages.

TikTok looked at that trend and made a different choice. Then it scheduled a briefing in London with the BBC to explain the reasoning.

The explanation was safety.

In the UK, TikTok belongs to ByteDance, a Chinese technology company that operates under Beijing’s jurisdiction. China maintains strict limits on end-to-end encryption inside its borders. TikTok, after its own review of the issue, reached the same policy outcome for its messaging system.

Alan Woodward, a cybersecurity professor at Surrey University, raised that point directly. The company’s “Chinese influence might be behind the decision,” he said, adding that end-to-end encryption is “largely banned in China.”

TikTok declined to engage with that suggestion, of course. The remark hung in the air. However, it’s worth adding that the US operation of TikTok has made no indication that it is moving towards private messaging standards either.

End-to-end encryption is simple in theory. Only the people in a conversation can read the messages. The platform running the service cannot access the content. Governments cannot request it. Engineers inside the company cannot view it.

TikTok’s system operates in a different way. Messages on the platform remain readable to the company. Employees can access them under defined circumstances. Law enforcement agencies can request them through legal channels.

TikTok argues that readable messages allow the company to identify harmful activity.

The debate turns on a basic technical fact. “We can read your messages to catch predators,” and “we can read your messages” describe the same system.

Keep reading

They Track Every Dollar You Move. They Ignored $378 Million of Epstein’s.

Try to wire $15,000 to a foreign bank account sometime.

You’ll be asked to fill out compliance forms explaining the purpose of the transfer. Your bank’s compliance department will review the transaction. A Currency Transaction Report will be filed with the Financial Crimes Enforcement Network. And depending on the bank, you may receive a follow-up phone call asking you to further justify why you’re moving your own money.

Try to open a bank account overseas and it gets even more fun. Under the Foreign Account Tax Compliance Act, or FATCA, every foreign bank on Earth is required to report American account holders to the Internal Revenue Service. The paperwork burden is so heavy that thousands of foreign banks have simply stopped accepting American clients altogether.

Deposit $10,000 in cash and the government automatically files a report. Split it into two deposits of $5,000 to avoid that report and you’ve committed a federal crime called “structuring” — punishable by up to five years in prison.

This is the financial surveillance infrastructure that every American lives under. It was built over decades, starting with the Bank Secrecy Act in 1970 and expanded massively by the Patriot Act after 9/11. We are told it exists to catch money laundering, drug trafficking, terrorism financing, and financial crimes.

Yet over twelve years, Jeffrey Epstein moved $378 million across 270 wire transfers without a single flag.

Bank of New York Mellon — one of the oldest and largest financial institutions in America — processed every one of them. At least 18 were round-dollar $1 million wires in 2007 alone — textbook structuring.

The bank’s own compliance review could not identify a legitimate business purpose for any of the 270 transactions. And no Suspicious Activity Report was filed until 2019 — only after Epstein had been arrested on federal sex trafficking charges.

More than a decade passed between when the transactions occurred and when regulators were notified.

This wasn’t an isolated case, either. Both JPMorgan Chase and Deutsche Bank settled lawsuits related to their Epstein banking relationships. The pattern was identical: process the money, ignore the red flags, settle quietly later.

But while the banks were asleep, another arm of the government was not.

Keep reading

Hacked Tehran Traffic Cameras Fed Israeli Intelligence Before Strike On Khamenei 

Years before the air strike that killed Ayatollah Ali Khamenei, Israeli intelligence had been quietly mapping the daily rhythms of Tehran. According to reporting by the Financial Times (paywalled), nearly all of the Iranian capital’s traffic cameras had been hacked years earlier, their footage encrypted and transmitted to Israeli servers. One camera angle near Pasteur Street, close to Khamenei’s compound, allowed analysts to observe the routines of bodyguards and drivers: where they parked, when they arrived and whom they escorted. That data was fed into complex algorithms that built what intelligence officials call a “pattern of life,” detailed profiles including addresses, work schedules and, crucially, which senior officials were being protected and transported. The surveillance stream was one of hundreds feeding Israel’s intelligence system, which combines signals interception from Unit 8200, human assets recruited by the Mossad and large-scale data analysis by military intelligence.

When US and Israeli intelligence determined that Khamenei would attend a Saturday morning meeting at his compound, the opportunity was judged unusually favorable. Two people familiar with the operation told the FT that US intelligence provided confirmation from a human source that the meeting was proceeding as planned, a level of certainty required for a target of such magnitude. Israeli aircraft, reportedly airborne for hours, fired as many as 30 precision munitions. The strike was carried out in daylight, which the Israeli military said created tactical surprise despite heightened Iranian alertness. The Financial Times reports that the assassination was a political decision as much as a technological feat. Even during last year’s 12-day war, when Israeli strikes killed more than a dozen Iranian nuclear scientists and senior military officials and disabled air defences through cyber operations and drones, Israel did not attempt to kill Khamenei.

The capability to do so, however, had been built over decades. Former Mossad official Sima Shine told the FT that Israel’s strategic focus on Iran dates back to a 2001 directive from then-prime minister Ariel Sharon instructing intelligence chief Meir Dagan to make the Islamic Republic the priority target. What distinguishes the latest operation, according to the FT, is the scale of automation. Target tracking that once required painstaking visual confirmation has increasingly been handled by algorithm-driven systems parsing billions of data points. One person familiar with the process described it as an “assembly line with a single product: targets.”

Keep reading

‘My own employees … had downloaded software on my phone’: Kristi Noem claims Elon Musk helped expose spyware inside DHS

Though the Department of Homeland Security has achieved some success in deporting illegal aliens, it has always been met with resistance — both on the street and in the department itself.

In an interview with podcaster Patrick Bet-David this week, DHS Secretary Kristi Noem revealed the depth of some of the problems her department has been facing and the people who have helped her fight the alleged corruption.

“You wouldn’t even believe what I’ve found since I’ve been in this department,” Secretary of Homeland Security Kristi Noem said on the “PBD Podcast” this week.

“I just found the other day a whole room on this campus that was a secret SCIF — secure facility — that had files nobody knew existed. So we just happened to have an employee walk by a door and wonder what it was and started asking questions. We went in there. There was individuals working there that had secret files that nobody knew about on some of these most controversial topics.”

Keep reading

Dems Silent After New Revelations About Jack Smith’s Spying Ops On Political Enemies

The people who cheered on Jack Smith’s corrupt investigations into Donald Trump and his allies are suddenly silent after a bombshell report detailing the Biden FBI’s politically-charged spying ops.

Reuters this week reported the Democrat-led FBI subpoenaed records of phone calls made by current FBI Director Kash Patel and Susie Wiles, Trump’s campaign manager who now serves as his White House chief of Staff, in 2022 and 2023 when they were private citizens. Two anonymous FBI officials told the publication that the agency “recorded a phone call between Wiles and her attorney” in 2023. 

Patel told Reuters that the clandestine, taxpayer-funded operation “extended into Wiles’ time as Trump’s co-campaign manager.” 

Special Counsel Jack’s Smith’s “indiscriminate” election case against Trump, as Senate Judiciary Committee Chairman Chuck Grassley has described it, was drenched in partisan politics and constitutional transgressions, not the least of which is that Smith acted without without lawful authority. U.S. District Judge Aileen Cannon ruled in July 2024 that Smith’s appointment was unlawful. 

Smith, appointed in 2022 by Democrat hatchet man, Attorney General Merrick Garland, was charged with investigating Trump on allegations that the president schemed to “overturn” the results of the rigged 2020 election in which Democrat Joe Biden claimed victory. The antecedent of that probe was “Arctic Frost,” the Biden FBI’s vendetta investigation targeting Republicans in Trump’s orbit, The Federalist’s Margot Cleveland has reported.

Patel called the latest revelations of the agency’s wider spying operations “outrageous and deeply alarming.” He told Reuters in a statement that previous FBI leadership used “flimsy pretexts” and buried the process in “prohibited case files designed to evade all oversight.” 

Keep reading

Kristi Noem: Deep State Officials Bugged My Phone, Computer

Deep State activists within the Department of Homeland Security secretly bugged the phones and computers used by top political appointees, agency chief Kristi Noem told the PBD Podcast.

Elon Musk’s deputies “helped me identify [the Deep State allies who] downloaded software on my phone and my laptop to spy on me, to record our meetings,” Noem said on February 26, adding:

They had done that to several of the politicals, and so we ended up bringing in [outside tech] people … [and we] didn’t have those technology experts here in the department looking at all of our laptops and our phones and recognizing that kind of software.

“I always believed when people talked about the deep state before that it existed: I never would have dreamed that it was as bad as it is,” she said. “I’m still every day trying to dig out people who don’t love America, not just [those] who work at this department, but also work throughout the federal government.”

Keep reading

China’s ‘Magic Weapon’ Reaches Deep Into America and the West

In 2023, the FBI arrested two Chinese-Americans, Lu Jianwang and Chen Jinping, for operating a Chinese police station in Manhattan. Chen pleaded guilty and faces up to five years in prison for acting as a Chinese agent, while Lu, who has connections to Chinese authorities, pleaded not guilty and is awaiting trial. He faces 20 years for obstruction of justice.

According to the Department of Justice (DoJ), the police station was established to monitor and intimidate Chinese dissidents in the U.S. What is concerning, however, is that this is not an isolated case of serious infiltration. Nor is such activity limited to the U.S. alone. Safeguard Defenders, a Madrid-based NGO, has identified 102 Chinese police stations in 53 countries.

The audacity of operating police stations in other countries highlights how far China is willing to go to silence critics as it seeks global dominance in economic, military, and cultural fields. This ability was not built overnight. Its foundation was laid by Mao Zedong himself with the creation of the United Front Work Department (United Front), one of the Chinese Communist Party’s (CCP) “three magic weapons,” alongside armed struggle and party building. The front reports directly to the CCP’s central committee.

According to Cheryl Yu, a China expert and fellow of the Jamestown Foundation, Mao described the United Front’s work as “unifying our real friends to attack our real enemies.” Deng Xiaoping expanded that to a more aggressive approach: “unifying those who can be unified, neutralizing those who can be neutralized, and dividing those in the enemy camp who can be divided.” Current CCP supreme leader Xi Jinping has used it for the “Great Rejuvenation” of China.

Yu’s detailed report states that the first mention of the United Front working abroad appears in a 1985 document. Another document lists five overseas tasks: increasing people’s love for the motherland and the party; promoting Chinese culture; encouraging Chinese abroad to support their country’s development; promoting unification with Taiwan; and creating a positive international environment for the CCP.

Over decades of “assiduously cultivating” overseas Chinese groups, the CCP has turned those seemingly harmless goals into a global network of influence—groups and individuals it can mobilize to promote its interests. Yu’s report states there are over 2,000 such groups in the U.S., U.K., Canada, and Germany; the worldwide number could reach “tens of thousands.”

Keep reading

The Household Items That Spy On You

I’m sure a lot of you saw the Ring Super Bowl commercial where they showed how Amazon’s Ring cameras surveil entire neighborhoods through a feature called Search Party. The feature allows users to upload an image of something and then all of the Ring cameras in its proximity comb through their own footage to see if that thing passed in front of them. The ad used the example of a user using Search Party to find a missing dog.

Critical observers were quick to point out that this could easily be used to spy on everyone, but it’s not just Ring that’s spying on you. Here are some common consumer items that you might not have realized are watching you right now.

Your TV. Modern TVs have something in the terms of service called Automatic Content Recognition, which basically means that your TV records everything you play on it, whether it’s Netflix, Youtube, video games or even something you watched by connecting your laptop. And disconnecting your TV from the internet doesn’t stop this. Just last month, major TV manufacturers were sued in Texas for screenshotting users’ TVs every 500 milliseconds.

Your car. New cars monitor everything from your location, how fast you drive, how hard you brake, but also things like your race, weight, health, taste in music, sexual activity and trade union membership. The HALT Drunk Driving Act mandates that by 2026, all new cars have to have a mechanism that automatically turns a car off if it deems someone unfit to drive.

Your router. Xfinity recently announced its Wifi motion feature which monitors the signal strength between the router and its connected devices like printers, phones or game consoles. If someone walks between the router and the device, the router will be able to see the signal being disrupted, effectively turning it into a motion tracker. Several ISPs are rolling out similar features and marketing them as home security tools.

Smart watches. Smart watches can be used to track your personal health like counting calories or monitoring your heart rate but that information can just as easily be used to create a detailed map of your life. It reveals when you eat, when you sleep, when you’re nervous, when you’re lying, where you were, if you were on drugs, etc. Smart watch data has already been used as evidence in criminal cases.

AI assistants. Tech companies are in a race to give their AI chat bots the power to execute real world tasks like sending emails, creating to-do lists, shopping, or planning vacations. The only catch is if you want it to shop, you have to give it your credit card information. If you want it to clean up your desktop, you have to give it access to your hard drive. AI assistant Clawdbot went viral after naive users installed it only to have their assistants taken over by hackers.

Keep reading

The Israeli Government Installed and Maintained Security System at Epstein Apartment

The Israeli government installed security equipment and controlled access to a Manhattan apartment building managed by convicted sex offender Jeffrey Epstein, according to a set of emails recently released by the Department of Justice. The equipment was installed starting in early 2016 at 301 E. 66th Street—the residence where former Israeli Prime Minister Ehud Barak frequently stayed for stretches at a time.

The security operation at “Ehud’s apartment” was in place for at least two years, emails from the DOJ disclosure show, with officials from the Israeli permanent mission to the United Nations corresponding regularly with Epstein’s staff regarding security. The apartment was technically owned by a company connected to Epstein’s brother, Mark Epstein, but was effectively controlled by Jeffrey Epstein. Units in the building were frequently loaned out to Epstein’s contacts and used to house underage models.

Rafi Shlomo, then-director of protective service at the Israeli mission to the United Nations in New York and head of Barak’s security, corresponded with Epstein employees to arrange meetings to discuss security and coordinate installation of specialized surveillance equipment at the 66th Street residence. Shlomo personally controlled access to the apartment for guests and even conducted background checks on cleaners and Epstein’s employees.

Under Israeli law, former prime ministers and other high ranking officials typically receive security services after they leave office. According to the emails, Epstein personally approved the installation of the equipment and authorized meetings between his staff and Israeli security officials.

Ehud Barak and the Israeli mission to the United Nations did not respond to requests for comment.

Keep reading