Firebrand - Matt Gaetz


Episode 34 LIVE: Laptop From Hell (feat. Vish Burra) – Firebrand with Matt Gaetz


Summary

Why did the FBI release one of the most notorious Russian cyber criminals? Why did they release him? And what did they get in exchange for releasing him? Special Agent in Charge of the Joint Improving Cyber Command and Director of the National Security Agency, James J.J. Cole, answers these questions and much more in this special episode of the Daily Caller's new podcast, The Swamp Dweller. The Swamp Thing is a new segment on the Swamp Thing, hosted by Rep. Matt Gaetz (R-GAETZ), where he talks about the swamp, the deep state, and everything else going on in Washington. Join us as we discuss the swamp and everything that goes on in it, including the latest on Hillary Clinton, the DNC, and the Democratic National Committee, and much, much more! Subscribe and comment to stay up to date on all things Swamp Thing! Subscribe to Swamp Thing and let us know what you thought of this episode and the rest of our other Swamp Thing episodes! You can also join our FB group Swamp Thing: and use the hashtag Swamp Thing on to help spread the word! about Swamp Thing on social media! and if you like Swamp Thing. and want to support Swamp Thing? we are looking for more Swamp Thing content? Subscribe, share, and tell us what Swamp Thing you think of Swamp Thing stuff? we'll be giving out some great Swamp Thing material in the next episode! Thank you! If you like it, tag us in the comments section! ! tag or so we can spread it around the Swamp . and spread it everywhere else! Thanks for listening and spreading it everywhere! Love ya! Timestamps thank you, bye bye! Cheers, bye Bye Bye, bye, bye - Tim! Your continued support, your continued support is much appreciated! - Your support is so much appreciated, your support is greatly appreciated! - Timestar - Molly, Caitlyn, Ralden, Sarah, R. - M.A. & R.S. . . . - R.J., R. M. & Sarah, M. ( ) - K. (A. ( ) . . ( ) - J. ( ), & Sarah ( ) ? , , and R. ( ).


Transcript

00:00:00.000 Thank you.
00:04:59.000 Matt Gaetz was one of the very few members in the entire Congress who bothered to stand up against permanent Washington on behalf of his constituents.
00:05:06.000 Matt Gaetz right now, he's a problem in the Democratic Party.
00:05:09.000 He could cause a lot of hiccups in passing the laws.
00:05:12.000 So we're going to keep running the stories to keep hurting him.
00:05:16.000 If you stand for the flag and kneel in prayer, if you want to build America up and not burn her to the ground, then welcome, my fellow patriots!
00:05:25.000 You are in the right place!
00:05:26.000 This is the movement for you!
00:05:28.000 You ever watch this guy on television?
00:05:31.000 It's like a machine.
00:05:32.000 Matt Gaetz.
00:05:33.000 I'm a canceled man in some corners of the internet.
00:05:37.000 Many days I'm a marked man in Congress, a wanted man by the deep state.
00:05:41.000 They aren't really coming for me.
00:05:43.000 They're coming for you.
00:05:45.000 I'm just in the way.
00:05:51.000 Welcome.
00:05:53.000 It's the biggest story in the world right now.
00:05:56.000 Hunter Biden's laptop submitted to the Congress, submitted to the Judiciary Committee, and everybody's wondering how did we get the laptop?
00:06:04.000 What was the chain of custody?
00:06:05.000 And I've got the guy right here who brought the laptop to me, and he's going to walk through all that information and answer all of your questions.
00:06:14.000 We've got major updates regarding Hillary Clinton, the DNC, the fines they've had to pay, new toys from the FBI, how they're potentially using them.
00:06:25.000 But first, I thought everybody would want to know that the Biden administration has recently released one of the worst Russian cyber criminals that we knew about.
00:06:37.000 One of the very worst.
00:06:38.000 And you have to wonder, like, what did we get for that, releasing a Russian cyber criminal right now?
00:06:43.000 I mean, everything you hear out of the Biden administration is how tough they are on Russia, how they're exposing Russia.
00:06:49.000 And so what would it be that would cause them to release Alexei Berkov?
00:06:54.000 Alexei Berkov.
00:06:55.000 Now, here are the key points on this particular cyber criminal that the Russians got back.
00:06:59.000 In 2019, the Trump administration secured his extradition to the United States.
00:07:06.000 He was pursued for years on hacking charges, identity theft, wire fraud, computer intrusion, money laundering.
00:07:13.000 He had a website called Card Planet that sold credit card and debit card information, 20 million in fraud purchases.
00:07:21.000 And then in August 2021, the Biden administration released him from federal custody.
00:07:27.000 Our good friend, the leading Republican on the Judiciary Committee, Jim Jordan, asked the FBI Cyber Chief about this decision from the Biden Administration.
00:07:36.000 Take a listen.
00:07:38.000 Why did the Biden Administration release Burkoff?
00:07:42.000 Sir, Mr. Burkoff was investigated by the U.S. Secret Service, not by the FBI. I don't know specifics.
00:07:50.000 What I do know is that there was no swap or concession, and it's my understanding that his release...
00:07:56.000 We didn't get anything for it?
00:07:58.000 Sir, to the best of my knowledge, there were no swap or concessions.
00:08:02.000 Why do you think we...
00:08:03.000 I mean, you've said Russia, your statements today, formidable foe, foremost adversary, and the threat is current.
00:08:09.000 Mr. Burkoff has been described as an asset of supreme importance, one of the most connected, skilled, malicious hackers ever apprehended by U.S. authorities, and you don't know why we let him go?
00:08:19.000 Sir, it's the Department of Justice question.
00:08:21.000 But you're the Director of Cyber at the FBI and the Department of Justice.
00:08:25.000 It's part of the Department of Justice, right?
00:08:26.000 Sir, yes sir it is, but obviously we're our own agency.
00:08:29.000 I read your bio, and other than the degree from Michigan, it's pretty impressive.
00:08:34.000 You've worked at the FBI for like 20 years, right?
00:08:37.000 You've held all kinds of positions, you're the Director of Cyber, and you can't tell me why we let the most notorious Russian hacker go, and you don't know what we got for it?
00:08:47.000 No sir.
00:08:48.000 Were you consulted?
00:08:49.000 It's not an FBI investigation.
00:08:51.000 But you're the cyber man.
00:08:52.000 Mr. Gates just talked about it.
00:08:54.000 You're the key guy.
00:08:55.000 You're the guy the administration sent here today to talk about cyber in light of the fact that last week President Biden said the threat from Russia is imminent.
00:09:03.000 You've confirmed that today.
00:09:04.000 You said it is current.
00:09:05.000 It's as we speak.
00:09:06.000 And you can't answer if it was a good idea or not, whether you were consulted?
00:09:09.000 Sir, I don't actually...
00:09:11.000 No, to your question, I was not consulted.
00:09:14.000 Not consulted.
00:09:14.000 Okay.
00:09:15.000 Do you think it was a good idea?
00:09:17.000 Sir, I'm not in a position to comment on that.
00:09:21.000 You always know when the FBI or DOJ or any other element of the national security apparatus say, not my department, not my purview, that there is something going on.
00:09:32.000 There is something shady.
00:09:33.000 And here you actually had the FBI cyber chief, who was not consulted on this, saying, oh, well, that's a Secret Service investigation.
00:09:40.000 How could I possibly answer this question?
00:09:42.000 Here's the real issue.
00:09:44.000 Like, did the Biden administration send this guy to the Judiciary Committee explicitly because he didn't know?
00:09:50.000 Because he couldn't answer these questions?
00:09:52.000 See, the American people deserve robust oversight.
00:09:55.000 It's the oversight that I think should embody every committee when Republicans take control of the Congress following the next election.
00:10:02.000 But here you see how they're going to try to evade, send people who are ignorant.
00:10:07.000 Send people who, maybe purposefully, maybe otherwise, are deprived of the facts.
00:10:13.000 And we can't let the American people be deprived of those facts any longer.
00:10:17.000 Now, he talks about the fact that there's no swap.
00:10:20.000 I'm not aware of any swap for this Alexei Burkoff guy.
00:10:24.000 Let me posit one hypothetical.
00:10:28.000 We are so desperate for an Iran deal right now because Joe Biden knows that these crushing gas prices are going to result in a wipeout for Democrats in the midterms.
00:10:39.000 So they're so desperate to lower oil and gas prices, and they've posted up the way they have vis-a-vis Russia, that they've now backed themselves into a corner where they have to do a deal with Iran.
00:10:51.000 They're dying to do the Iran nuclear deal.
00:10:54.000 That very deal that floods Iran with money to be able to not just continue their nuclear program, which they definitely still would, but also to engage in other malign influence not just throughout the Middle East but even here in the Western Hemisphere, especially in South America.
00:11:12.000 While posting up on Russia over Ukraine, the Biden administration is giving the Russians their hacker back so that they can potentially get favorable treatment from Russia to try to back Iran into a nuclear deal because of those poor foreign policy choices.
00:11:27.000 That is how Americans are at risk from these decisions.
00:11:31.000 It is not just that we have a person who you saw Andy Biggs yesterday call a degenerating human in the Oval Office.
00:11:39.000 It's that the decision-making process is Puts our financial system at risk, our critical infrastructure at risk, our businesses.
00:11:47.000 Everything that Americans hold dear is endangered by the cacophony of strategic failures from the Biden administration giving back Alexei Burkoff, undeniably one of those failures.
00:12:01.000 There is also breaking news regarding the 2016 election.
00:12:05.000 Imagine that.
00:12:06.000 Hillary Clinton's problems with fines and other issues, but really what I thought was quite telling about the spying and the lying came from my colleague Dan Bishop in the House Judiciary Committee.
00:12:18.000 So we're all very well aware We've got these Durham indictments that specifically go into the methods that the DNC and the Hillary Clinton campaign used to engage in illegal spying.
00:12:32.000 Remember, while they were accusing Donald Trump of being an agent of the Russian government, just take a listen from Dan Bishop to what they were up to.
00:12:40.000 Director Vornham, has the FBI taken new steps since 2017 to ensure that private government contractors do not abuse access to sensitive U.S. government data stores for self-serving purposes, including political purposes?
00:12:59.000 Sir, I'm not familiar with the background of your question.
00:13:02.000 Well, the DOJ claims in court that Rodney Jaffe, a.k.a.
00:13:08.000 Tech Executive One, exploited sensitive DNS data reflecting internet traffic to and from Trump Tower, to and from Donald Trump's personal residential apartment building, and the Executive Office of the President.
00:13:21.000 He allegedly affiliated with Clinton campaign officials including Michael Sussman, who had been a cyber lawyer at the DOJ, And tech researchers at Georgia Tech to fabricate plausible-sounding but false allegations about connections between Trump and a Russian bank before the election in 2016 and then after the election about the use of a Russian-made phone.
00:13:43.000 Both of these were scams.
00:13:45.000 Mr. Sussman fed them to the FBI at the highest levels while concealing his political motives.
00:13:51.000 So that's the background.
00:13:52.000 And the question is, has the FBI taken new steps since 2017 to see that These awesome stores of sensitive data that US has are not being exploited for political purposes by private contractors.
00:14:06.000 Sir, I mean, compliance is obviously important to us and, you know, just taking a little bit broader view, we've obviously taken a lot of reform steps over the past couple years.
00:14:17.000 Many of them have been in the public, whether it's FISA, WUD, 702. So, I can't speak specifically to your question, I don't know the answer, but the Bureau has taken a lot of reform steps through that time period that all have been discussed in public forums such as this and in the media.
00:14:32.000 You mentioned FISA, Woods, 702. So I think you're talking about the Woods file abuse in the FISA applications.
00:14:38.000 I don't think I'm asking about that.
00:14:40.000 Can you think of any reforms that have been taken specifically to see to it that this kind of private contractor abuse of these data stores can't happen?
00:14:48.000 Sir, not at this moment.
00:14:49.000 I cannot.
00:14:51.000 What are the cybersecurity implications of a private company being able to intercept Internet traffic to and from the White House?
00:14:58.000 Sir, I'm not here to talk about those matters.
00:15:01.000 Look, you've said what you're here not to talk about.
00:15:03.000 A member of Congress asking you for something within your knowledge is a question you're bound to answer, sir.
00:15:09.000 Do you know what the cybersecurity implications are of data being intercepted into and out of the White House?
00:15:15.000 Do I know what the cybersecurity implications are?
00:15:20.000 If you're asking me if I know what the policy is, that backs up when we can and cannot.
00:15:25.000 That's not what I'm asking you.
00:15:26.000 I'm asking you what the implications are, the national security implications of intercepting data in and out of the White House and a private company having access to that.
00:15:35.000 Yes, in general terms, yes.
00:15:37.000 There are exposures from that, wouldn't you agree?
00:15:39.000 Yes, sir.
00:15:41.000 This article from the Wall Street Journal entitled, Durham Probe Reveals Government Access to Unregulated Data Streams, February 26, 2022. Have you seen that article?
00:15:51.000 No, sir, I have not.
00:15:52.000 It relates that the latest developments in the high-profile criminal probe by Special Counsel John Durham show the extent to which the world's internet traffic is being monitored by a coterie of network researchers and security experts inside and outside of government.
00:16:09.000 There are concerns, obviously, about the privacy implications of private cybersecurity companies being able to tap into the web traffic and then give that data to government at any particular level without warrants or court orders.
00:16:21.000 In what ways does the FBI rely on this kind of data in their investigations?
00:16:28.000 Sir, as I said earlier today, when you look at private sector broadly defined, but when you look at private sector a little bit more narrowly defined about who provides infrastructure for networks, servers, computers, etc., those network providers obviously see a lot of traffic.
00:16:46.000 They see my personal traffic.
00:16:47.000 They see your personal traffic on a very routine basis.
00:16:50.000 We have subpoena processes that we go through.
00:16:54.000 To request that information when it's relevant to an investigation.
00:16:58.000 So that is how we interact with those companies on a routine basis from an investigative perspective.
00:17:04.000 Well, my time's about to expire.
00:17:05.000 What this article relates is that a lot of that information can be accessed without warrant.
00:17:09.000 And that's exactly the problem I'm talking about.
00:17:11.000 You've spoken two times to the priority given to the FBI at the highest level to the imperative of protecting the rights of Americans, particularly First Amendment rights, Fourth Amendment rights.
00:17:20.000 And I'm looking for some indication that those are more than empty words, more than just a platitude.
00:17:25.000 I'm stunned that, above all the things we've talked about today, that you can't even speak to an abuse that is out in public based on allegations of the Department of Justice involving the use of cyber data.
00:17:39.000 Is there anything that you can offer to the American people to improve their confidence that the FBI is indeed protecting their rights beyond just platitudes?
00:17:47.000 The time is expired.
00:17:48.000 The witness may answer the question.
00:17:50.000 Sir, you're very familiar with the legal process that we have to go through to obtain information from any number of companies or even from victims in certain cases.
00:18:00.000 That is our baseline protocol of how we do business.
00:18:03.000 I'm unfamiliar with the article, so I cannot speak to what it actually says in there.
00:18:08.000 Mr. Chairman, I ask unanimous consent to submit, for the record, the article from the Wall Street Journal entitled, Durham Probe Reveals Government Access to Unregulated Data Streams.
00:18:20.000 We're back live here in my house office in the Longworth office building.
00:18:25.000 That was withering questioning from Congressman Dan Bishop of North Carolina.
00:18:29.000 And it showed that these people were so hell-bent to get Trump that they were actually willing to jeopardize other critical data, other critical infrastructure, things that our country has to keep secure.
00:18:41.000 But see, none of that mattered to them.
00:18:43.000 They want to piously tell you that this is all about protecting our country.
00:18:48.000 That's why they had to go after Trump.
00:18:49.000 Trump was some great threat to the country.
00:18:51.000 But now that we're getting the indictments, now that we're getting the information, we see that they were willing to endanger everyone just to appeal to their desire for power.
00:19:03.000 It's a very sickening thing.
00:19:04.000 And speaking of sickening, Hillary Rodham Clinton, the DMC, back in the news paying $118,000 in fines for lying about what they were doing all over the place to curate lies about President Trump.
00:19:22.000 Take a listen.
00:19:24.000 The Federal Election Commission is now fining Hillary Clinton and the Democrat National Committee over the way it paid a firm to produce the notorious Steele dossier.
00:19:34.000 The Clinton campaign has been fined $8,000 and the DNC slapped with a $105,000 penalty after a 2016 letter revealed that they violated campaign finance rules.
00:19:47.000 The FEC says both parties failed to properly report payments for opposition research and the production of the dossier, instead labeling the payments legal services.
00:19:56.000 Former President Trump now asking, where do I get my reputation back?
00:20:02.000 I'm joined back here in the Longworth office building by Vish Burra, and Vish is going to get into the Hunter Biden laptop.
00:20:10.000 Some prior segments we've done on the show regarding what was going to happen, how these events were going to unfold.
00:20:16.000 It was all very predictable, very predicted by this guy.
00:20:20.000 But before we get into the laptop, the chain of custody questions that everyone in America is asking, you're a New York man.
00:20:27.000 Hillary Clinton, I guess, is a New York woman, certainly not an Arkansas woman.
00:20:32.000 I mean, what do you make, Vish, of this dynamic where when people like George Papadopoulos are accused of lying, they go to jail?
00:20:41.000 You know, when people like Mike Flynn are accused of lying, and I don't even think he did.
00:20:46.000 You see a life destroyed.
00:20:48.000 You see a career tarnished.
00:20:50.000 But when Hillary Clinton and the DNC, they didn't lie on some innocuous matter.
00:20:56.000 They lied about how they were characterizing the private intelligence network that they had set up to go and bamboozle the media and the government and Nellie Orr and Bruce Orr at the DOJ. And you know what?
00:21:10.000 Just pull out the checkbook, write a check, $118,000.
00:21:14.000 Your reaction.
00:21:15.000 Well, I think it's very important to take the signal out of all these actions that were taken by the FEC. The idea here is not necessarily to even be punitive directly to the parties involved.
00:21:30.000 These are signals to the apparatus that would get involved in the future.
00:21:34.000 If you go and work for Donald Trump and help him in any sort of way, we're going to bring down the House in how we penalize you and how we go after you.
00:21:45.000 Now, if you help Hillary and the DNC break the law, just make sure you have a checkbook ready.
00:21:50.000 Yeah, so if you purposefully jeopardize our data, like Congressman Dan Bishop demonstrated, if you purposefully go and hire a private intelligence network, hire the wife of a senior DOJ official to shuttle your nonsense through DOJ leaks to the New York Times and whoever else, if you do all that stuff, The consequences of fine.
00:22:14.000 And then, you know, look at the people who on January 6th showed up with no intent to break any laws or do any violence to anyone, but because barricades were taken down, they get booby-trapped in the Capitol.
00:22:25.000 And we still do have Americans as a consequence of January 6th who have been convicted of no crime.
00:22:31.000 But that are held behind bars.
00:22:33.000 Deprived of their rights.
00:22:35.000 And that's the whole idea.
00:22:37.000 But you think that's on purpose.
00:22:39.000 You think that all of this is a coordinated effort to say that if you are kind of on the populist right of the political spectrum, the entire apparatus will be weaponized against you.
00:22:49.000 And even when you get busted doing the will of the regime, being a shill for the Clintons, hey, nothing, 100,000 and change can't solve.
00:22:59.000 It's all about setting the example.
00:23:01.000 This is the example when you work for a populist president, and then this is the example when you work for the regime-approved candidate.
00:23:10.000 When the punitive measures are dropped, this is the disparity, and they are signaling that openly so that the apparatus and apparatchiks around here know that for the future so they can feel comfortable doing these things in the future.
00:23:23.000 It's infuriating, but honestly, Vish, I've got to tell you, I was surprised the FEC even did it.
00:23:28.000 I mean, how low do our expectations have to be that when you're like, oh, my goodness, Hillary Clinton and the DNC had to pay a $118,000 fine, you're actually glad that at least it's documented that we were telling the truth and that they were lying.
00:23:42.000 I mean, when I said that it wasn't Trump colluding with the Russian Federation, it was the Clinton campaign shuttling and nurturing and fostering these lies with their own lying distribution network.
00:23:55.000 I mean, people said that I should put a tinfoil hat on.
00:23:58.000 That should be removed from the Judiciary Committee.
00:24:00.000 And at least now, even though the punishment isn't there, the fact pattern is there.
00:24:04.000 And the question is, when Republicans get power back, are we going to be able to bring sufficient accountability?
00:24:10.000 I'm here with Vish Burra.
00:24:11.000 You're the Executive Secretary of the New York Young Republican Club.
00:24:14.000 You're very active on matters of policy.
00:24:17.000 You think about these things a lot.
00:24:19.000 What's your confidence level that Republicans will be able to administer accountability for the facts that we are seeing come out now?
00:24:26.000 Well, I would hope that the Republicans, when they take back control, that they would pursue these matters of accountability, especially amongst our investigative agencies, where we want to believe that when they are taking actions against folks, that those actions are backed up with integrity and logic and facts.
00:24:46.000 We have lost faith in that many times over.
00:24:50.000 Can we just think about the juxtaposition of the Steele dossier story compared to the Hunter Biden laptop story?
00:24:58.000 The Steele dossier story was sprung out of...
00:25:04.000 A BuzzFeed report.
00:25:05.000 And think about that when the Hunter Biden laptop story was sprung out of the New York Post.
00:25:11.000 The New York Post is a 200-year-old newspaper started by Alexander Hamilton.
00:25:16.000 Oh, that's right-wing propaganda.
00:25:19.000 Blah, blah, blah.
00:25:19.000 Can't trust that.
00:25:20.000 51 intelligence officials come say that's baloney.
00:25:24.000 But the BuzzFeed article that reports the pee tapes, that gets media to carry its water all across the landscape and for years.
00:25:32.000 And special counsel, all sorts of stuff was set up and justified based on this.
00:25:37.000 And it's just the American people can see it.
00:25:41.000 Well, what you're describing is that it's not a fair fight.
00:25:44.000 No.
00:25:44.000 That when they get lies, those lies get wrapped up and packaged up as truth, and that when we have the truth, that gets suppressed, deplatformed, and siloed away from the national conversation that we have about these important things.
00:26:00.000 Right.
00:26:01.000 I filed legislation to strip those 51 people who made false claims about the Hunter Biden laptop of their security clearances.
00:26:09.000 It's called the Spook Who Cried Wolf Act.
00:26:11.000 You can look it up.
00:26:12.000 You can check out our co-sponsors.
00:26:14.000 I'm particularly glad that we got Congresswoman Marjorie Taylor Greene with us on that legislation as well, in addition to a number of members of the House Judiciary Committee.
00:26:22.000 I'm joined here by Vish Burra, former investigative journalist at The War Room Podcast, producer there, used to direct this show, Firebrand, Former member of our congressional staff and Vish Burra plays a key role in this entire laptop saga.
00:26:38.000 We're going to get to that, but I want to give you all the background.
00:26:40.000 I want to make sure you understand what went down this week in the House Judiciary Committee that set up the biggest story in the world.
00:26:48.000 Take a listen.
00:26:50.000 At the risk of making some enemies on this committee, I'll draw a comparison between the FBI's role in the cyber ecosystem and an event I attended 30 years ago yesterday When Duke beat Kentucky in the 1992 NCAA Men's Eastern Regional Final.
00:27:04.000 Sometimes we're Grant Hill throwing the pass, and sometimes we're Christian Laettner taking the shot.
00:27:09.000 Having said that, for the FBI to continue supporting our partners and executing successful operations ourselves, we need your support, even the Kentucky and North Carolina fans amongst you.
00:27:21.000 As one of our key oversight committees and allies, your backing is crucial for our continued growth of authorities and resources.
00:27:29.000 So where is it?
00:27:31.000 The laptop.
00:27:36.000 Sir, I'm not here to talk about the laptop.
00:27:39.000 I'm here to talk about the FBI cyber program.
00:27:41.000 You are the assistant director of FBI cyber.
00:27:44.000 I want to know where Hunter Biden's laptop is.
00:27:47.000 Where is it?
00:27:48.000 Sir, I don't know that answer.
00:27:50.000 That is astonishing to me.
00:27:51.000 Has FBI cyber assessed whether or not Hunter Biden's laptop could be a point of vulnerability, allowing America's enemies to hurt our country?
00:28:01.000 Sir, the FBI cyber program is based off of what's codified in Title 18, or Title 18, Section 1030, a code which talks about computer intrusions, right, using nefarious intent...
00:28:14.000 Well, you've talked about passwords here.
00:28:16.000 I mean, Hunter Biden's password on his laptop was Hunter02.
00:28:20.000 He drops it off at a repair store.
00:28:22.000 I'm holding the receipt from Max Computer Repair, where in December 2019, they turned over this laptop to the FBI. And what now you're telling me right here is that as the Assistant Director of FBI Cyber, you don't know where this is after it was turned over to you three years ago.
00:28:41.000 Yes, sir.
00:28:42.000 That's an accurate statement.
00:28:44.000 How are Americans supposed to trust that you can protect us from the next colonial pipeline if it seems that you can't locate a laptop that was given to you three years ago from the first family, potentially creating vulnerabilities for our country?
00:28:58.000 Sir, it's not in the purview of my investigative responsibilities.
00:29:02.000 But that is shocking that you wouldn't, as the Assistant Director of Cyber, know whether or not there are international business deals, kickbacks, shakedowns.
00:29:13.000 That are on this laptop that would make the first family suspect to some sort of compromise.
00:29:19.000 Mr. Assistant Director, have you assessed whether or not the first family is compromised as a result of the Hunter Biden laptop?
00:29:26.000 Sir, as a representative of the FBI cyber program, it is not in the realm of my responsibilities to deal with the questions that you're asking me.
00:29:34.000 Has anyone at FBI cyber been asked to make assessments whether or not the laptop creates a point of vulnerability?
00:29:42.000 Sir, we have multiple lines of investigative responsibility in the FBI. They're all available in public source.
00:29:49.000 I would think you'd know this one.
00:29:50.000 I mean, I would think that if the president's son, who does international business deals, referencing the now president with the Chinese, with Ukrainians, I mean, have you assessed whether or not the Hunter Biden laptop gives Russia the ability to harm our country?
00:30:06.000 Sir, again, We can do this back and forth for the next couple of minutes.
00:30:12.000 I don't have any information about the Hunter Biden laptop or the...
00:30:16.000 But should you?
00:30:17.000 I mean, you're the assistant director of FBI Cyber.
00:30:20.000 By the block and line chart?
00:30:22.000 No, sir, I should not.
00:30:23.000 Who should we put in that chair to ask questions about this laptop that FBI has had for three years?
00:30:29.000 Sir, I'm not in a position to make a recommendation.
00:30:33.000 So you don't have it.
00:30:34.000 You don't know who has it.
00:30:36.000 You don't know where it is.
00:30:37.000 You're the assistant director.
00:30:38.000 You talked about whether or not you were the Grant Hill or the Christian Leighton.
00:30:42.000 It sounds like you're the Chris Webber trying to call a timeout when you don't have one.
00:30:47.000 So, who is it?
00:30:48.000 Do you even know who has it?
00:30:50.000 Do you know who we should put in that chair to ask these questions to?
00:30:53.000 No sir, I don't know who has it.
00:30:56.000 Well, could you find out and tell us?
00:30:58.000 You're gonna have to give us briefings thanks to Mr. Lew and Mr. Massey's question about whether or not the FBI was taking a five million dollar test drive on the Pegasus system that was being used to target People in politics, people in government, people in the media, people in American life.
00:31:12.000 So will you commit to give us a briefing as the Assistant Director of FBI Cyber as to where the laptop is, whether or not it's a point of vulnerability, whether or not the American people should wonder whether or not the first family is compromised?
00:31:25.000 Sir, I'd be happy to take your request back to our office.
00:31:29.000 Gosh, I mean, will you advocate for that briefing?
00:31:33.000 As in, you will?
00:31:34.000 I will be happy to take your request back to the FBI headquarters.
00:31:38.000 Well, do you believe that that is a briefing that the Congress Is worthy of having, I guess.
00:31:45.000 Sir, I'm not going to answer that question.
00:31:47.000 I'm here to talk.
00:31:49.000 The invitation says, oversight of the FBI's cyber division.
00:31:55.000 It does not say anything.
00:31:57.000 Well, right, but I mean, this is a cyber asset.
00:32:00.000 This is a point of vulnerability.
00:32:01.000 If there are passwords, if there are business deals, if there are References to things that could harm our country.
00:32:08.000 Like, you can't even sit here right now and say that you know that there's not a point of vulnerability.
00:32:13.000 Maybe there are other crimes, maybe there are tax issues or whatever.
00:32:16.000 But as it relates to, I mean, is the first family sufficient cyber infrastructure to protect?
00:32:22.000 You don't even know if they're compromised.
00:32:24.000 Tell you what, Mr. Chairman, I seek unanimous consent to enter into the record of this committee the contents of Hunter Biden's laptop, which I'm in possession of.
00:32:36.000 I'm not...
00:32:37.000 There's no objection to that.
00:32:43.000 I've never had some.
00:32:56.000 They will object pending further investigation.
00:32:59.000 What's the basis of that objection?
00:33:02.000 It's the unanimous consent request, and I object pending.
00:33:05.000 I have a subsequent question.
00:33:06.000 Mr. Chairman, I seek unanimous consent to enter into the record the receipt...
00:33:09.000 It may very well be entered into the record after we look at it further.
00:33:16.000 Mr. Chairman, I have a subsequent unanimous consent.
00:33:20.000 Oh, I'm sorry.
00:33:22.000 Mr. Chairman, I seek unanimous consent to enter into the record the receipt from the Department of Justice...
00:33:25.000 Mr. Chairman, this is Ms. Deming.
00:33:27.000 Am I next?
00:33:28.000 Without objection, Gentleman is recognized.
00:33:33.000 Thank you, Mr. Chairman.
00:33:34.000 After a consultation with majority staff, I seek unanimous consent to enter into the record of this committee content from, files from, and copies from the Hunter Biden laptop.
00:33:44.000 Without objection.
00:33:45.000 Thank you.
00:33:46.000 Yield back.
00:33:48.000 There it was.
00:33:49.000 And everybody started asking how in the world Hunter Biden's laptop contents on a disk drive ended up in the House Judiciary Committee and now has ended up as part of the permanent record of Congress.
00:34:02.000 So we're going to get into what happens next with the laptop, how its contents are going to be Probably utilized in other congressional hearings.
00:34:11.000 But first, Vish, take us from that laptop getting dropped off by Hunter Biden to its contents showing up in the House Judiciary Committee.
00:34:20.000 I would love to tell this story.
00:34:22.000 So April of 2019. Hunter Biden goes into John McIsaac's laptop repair shop and hands him the laptop and says, hey, I need this fixed.
00:34:34.000 From there, John Paul McIsaac says, yes, I can fix it, but it will take me two weeks.
00:34:41.000 So leave it with me and I'll fix it.
00:34:43.000 Hunter says, okay.
00:34:45.000 Now, once John Paul McIsaac says, okay, I'll fix it, He hands Hunter a form.
00:34:51.000 And this is standard practice in Delaware.
00:34:54.000 And I think it's actually legally described in Delaware.
00:34:59.000 but standard practice in this industry where the laptop repair shop owner will take the laptop and repair it, And then once he tries to return it to the owner and seeks payment for the services, if that laptop repair shop owner tries to get paid and after 90 days doesn't hear back or doesn't get a response for the repair property, if that laptop repair shop owner tries to get paid and after 90 days doesn't hear back or doesn't
00:35:32.000 So the ownership of the laptop actually changes according to Delaware law based on non-payment by Hunter Biden for the repairs and based on the duration of time between when that was dropped off and ultimately was in the ownership legally of McIsaac.
00:35:53.000 Right.
00:35:53.000 And if it wasn't the legal statute, there was a written, a form that Hunter filled out at the spot right there.
00:36:02.000 Oh, okay.
00:36:02.000 Okay.
00:36:02.000 So it may have been a function of his agreement to engage in that repair.
00:36:06.000 Right.
00:36:06.000 Exactly.
00:36:07.000 Got it.
00:36:07.000 There was documentation on that.
00:36:09.000 So once that happens...
00:36:12.000 Now the laptop legally belongs to McIsaac.
00:36:14.000 After 90 days, Hunter doesn't return.
00:36:16.000 He doesn't return the calls, doesn't pay for it.
00:36:19.000 It becomes McIsaac's.
00:36:21.000 Now, fast forward a few months later, impeachment one buzz starts.
00:36:25.000 And that is when McIsaac starts hearing on the news about impeachment one, Hunter Biden, Ukraine, Burisma.
00:36:32.000 That's when he remembered, oh, wait, I do have a Hunter Biden laptop.
00:36:37.000 Or something like that.
00:36:38.000 Let me just go log in.
00:36:39.000 So, until the Democrats kicked the hornet's nest with this phony Ukraine impeachment, I mean, this laptop was just collecting dust in a repair shop.
00:36:50.000 Exactly.
00:36:51.000 And probably never would have been opened.
00:36:53.000 Exactly.
00:36:53.000 But because McIsaac Is starting to hear this stuff as if it is like current, real, actionable news.
00:37:00.000 Biggest story in the world, right?
00:37:01.000 If you remember at that time, the impeachment one was the biggest story in the world.
00:37:06.000 We had Adam Schiff down there leaking out every day.
00:37:08.000 Oh, there was some new damning thing.
00:37:10.000 Exactly.
00:37:11.000 All right, so he goes and gets into it.
00:37:13.000 And so he goes and gets into it, sees salacious pictures, bank stuff, Burisma documents, all that.
00:37:19.000 And he says, oh...
00:37:21.000 I am pretty sure this is pertinent to whatever's going on on my TV. It ain't exactly like Burisma's Coca-Cola.
00:37:29.000 Exactly, right.
00:37:30.000 So that's when he says, okay, you know what, I'm going to turn this over to the proper authorities.
00:37:36.000 And he then decides he's going to turn it over to the FBI. So he doesn't go to the press?
00:37:43.000 No, he doesn't go to the press.
00:37:44.000 This was not about partisanship or anything like that.
00:37:47.000 He's just trying to do the right thing.
00:37:49.000 And he's seeing that there might be trouble in the country around something called Burisma and a Hunter Biden or whatever here.
00:37:56.000 If this laptop can clear up some things, that's it.
00:37:59.000 When does McIsaac give the laptop to the FBI? In December 2019 is when...
00:38:05.000 And that's what generates the receipt that people just saw in the House Judiciary Committee.
00:38:09.000 Correct.
00:38:09.000 And he gives them the original laptop, the one that he took from Hunter.
00:38:13.000 But it's very important here.
00:38:15.000 The faith in our institutions was already so detrimental at that time that John McIsaac isn't even sure if he turns over this laptop that it's going to be okay.
00:38:27.000 So he makes a few copies.
00:38:30.000 Disc images of that laptop.
00:38:31.000 Brilliant.
00:38:31.000 By the way, if McIsaac doesn't make those copies, we might still be hearing what you heard at the beginning of that question series, you know, hear no evil, see no evil, speak no evil.
00:38:41.000 Exactly.
00:38:42.000 But this guy, pretty smart.
00:38:44.000 Right.
00:38:45.000 He just, some suspicion, some doubt, he says, let me make a few copies.
00:38:52.000 So in December 2019, he turns over the original, has the receipt that you held up during the committee hearing, and the FBI takes it, doesn't hear back from them again.
00:39:04.000 And then he's still seeing the buzz going on, and not only that, he's seeing Rudy's getting slammed in the media over this Ukraine stuff, and Burisma stuff, and Hunter stuff.
00:39:15.000 Doesn't hear any words.
00:39:17.000 Finally, he gets fed up.
00:39:18.000 He says, well, if nobody's going to do anything about this and Rudy's still taking flack and all sorts of other stuff...
00:39:23.000 You know what?
00:39:24.000 I'm going to turn over a copy of this to Rudy himself.
00:39:28.000 And that is when John Paul McIsaac reaches out to Rudy's lawyer Rob Costello, hands it over to Rob Costello, one of the copies, gives the proper documentation as well, the chain of custody documentation from Hunter, from the FBI, everything, turns it over to Robert Costello, gives the consent to use it as they see fit.
00:39:50.000 Costello gives it to Rudy.
00:39:52.000 Then Rudy comes and seeks out Steve Bannon because Rudy's a great legal mind but doesn't really understand the environment of the Chinese companies and the Chinese players and a lot of these other characters that pop up on the laptop.
00:40:05.000 So he goes to Steve Bannon, who's doing the War Room at the time, and I'm the producer there for Steve.
00:40:12.000 The founding producer.
00:40:14.000 One of the founding producers.
00:40:16.000 One of the founding producers of War Room Pandemic.
00:40:20.000 Quick shout out, War Room started on impeachment.
00:40:23.000 The impeachment once.
00:40:25.000 So that all flowed in and now...
00:40:27.000 So as part of the war room journalism, talk to me about how you and Bannon get a hold of this thing.
00:40:33.000 So we get a hold of it in conjunction with Rudy, and Steve hands me the laptop and says, I need you to go through this thing, make it your best friend, know where everything is.
00:40:48.000 I start going through it.
00:40:49.000 I find a bunch of things, and we're working with Steve and Rudy.
00:40:53.000 So you were essentially Bannon and Giuliani's Indian tech guy.
00:40:59.000 It's not essentially, it's literally that.
00:41:02.000 That's exactly, I was their IT guy.
00:41:04.000 And so we're going through all this stuff, and then I learned how to make a copy there in that process.
00:41:11.000 And once I learned how to make the copies, then I started making copies for whoever was asking, and that knowledge stuck with me to this day.
00:41:18.000 So you guys weren't trying to hold this information close?
00:41:21.000 No, no.
00:41:21.000 You were trying at this point in time to proliferate the information.
00:41:25.000 To disseminate the information.
00:41:26.000 What kind of reaction did you get from the media?
00:41:29.000 Well...
00:41:30.000 Biggest story in the world.
00:41:32.000 Clear chain of custody.
00:41:33.000 So, I mean, I don't think I need to really explain it, but just to go over, it was immediately, you know, nuked by Twitter, where you couldn't even share the story through DMs, right?
00:41:44.000 You couldn't share...
00:41:45.000 The distribution was limited on Facebook.
00:41:48.000 You know, eventually, then the deep state comes out, and you have these intelligence officials saying it's Russian disinformation.
00:41:55.000 Then the media takes that...
00:41:57.000 And runs air cover saying, it's Russian disinformation.
00:41:59.000 We can't cover it.
00:42:00.000 We can't talk about it.
00:42:04.000 You'd think it was Russian disinformation.
00:42:05.000 They could at least find it.
00:42:07.000 Right.
00:42:08.000 What a joke.
00:42:10.000 Now I have copies.
00:42:13.000 I make copies for other people.
00:42:16.000 After I left the war room, I still have my own copy.
00:42:19.000 And that's when I came and worked for you over the last year.
00:42:24.000 And then I got a phone call last week saying, this guy's coming in and we're going to need a copy.
00:42:30.000 And that's when I made the copy, my copy.
00:42:33.000 I made one for you, handed it.
00:42:35.000 Actually, I handed that copy to your LD, Isabella, who then handed it over to you.
00:42:41.000 And then in the committee, that's what you held up.
00:42:44.000 And that's how it ended up in that committee meeting.
00:42:47.000 There's the chain of custody.
00:42:49.000 The most suppressed information in the world.
00:42:53.000 Every powerful entity that we warned you about in the first episode of Firebrand.
00:42:58.000 Big government, big media, big tech.
00:43:00.000 All working together to deprive you of the truth.
00:43:04.000 To be the arbiters of the truth themselves, and then you get McIsaac, to Giuliani, to Bannon, to Burra, to Gates, to now all of America.
00:43:16.000 But you know, Vish, when you were working in this congressional office, you kind of called this.
00:43:22.000 I mean, we went through some of the features of the laptop substantively that really concerned us.
00:43:29.000 So if you're interested in some of the specific deals on the laptop that gave Vish concern as he was going through this, you can go back and watch the episode of Firebrand called The Hunter Files.
00:43:41.000 But when it comes to what you're now seeing today in the media as a reaction to our work earlier this week, this is what Vish told you was going to happen.
00:43:52.000 Have we heard the last of Hunter Biden?
00:43:54.000 Absolutely not.
00:43:55.000 So what I will say is that I am probably still the only person on this side of America that could competently make a copy of this thing.
00:44:05.000 And I've distributed over 40 copies to multiple outlets that have Their interest has peaked after, you know, Joe Biden has won.
00:44:14.000 He's firmly in place.
00:44:15.000 And now people are looking for ways to make their own bones now, now that, you know, they don't have to worry about being the pariah.
00:44:22.000 And so the interest level has gone up in the Hunter Biden laptop since.
00:44:27.000 And I believe you will start seeing more mainstream outlets verifying this thing and coming out and saying that, you know, this thing is real and these are things that have to be addressed.
00:44:39.000 You know, as being from New York, I kind of see, like, what is happening with Biden could also sort of harken back to what happened with Cuomo, where at the right time he kind of needed to get rid of the guy, and that these stories would now be deployed to get somebody else in place.
00:44:57.000 Ah, so they could be tools waiting in the wings.
00:45:02.000 Waiting in the wings indeed.
00:45:05.000 Now you see a couple things happening in the mainstream media.
00:45:09.000 First, they're doing exactly what you predicted, and they're starting to walk back the challenges on authenticity.
00:45:17.000 Well, yeah.
00:45:18.000 Well, look, I saw this cover four months ago, but I think that now would seem like the right time.
00:45:26.000 I totally believe that the actions you took to enter it into the congressional record...
00:45:31.000 Definitely raised the temperature up on the necessity to do what they did, which is verify or authenticate the laptop through mainstream sources.
00:45:42.000 But I also think that there's a lot of malaise through the country right now about Joe Biden and his poll numbers are the lowest in his presidency right now.
00:45:53.000 And so I think that all these things...
00:45:55.000 The confluence of all these events now have led to this laptop being verified.
00:46:02.000 Wait a second.
00:46:04.000 Is it your statement that you believe that these things are coming to fruition now because there's a coordinated effort to take Joe Biden out?
00:46:14.000 Absolutely.
00:46:15.000 Absolutely.
00:46:15.000 And I believe that it's one of the shows that they might need to deploy today.
00:46:19.000 Before the midterms to maybe save a few seats.
00:46:22.000 I totally disagree with you.
00:46:23.000 Okay.
00:46:24.000 I believe that they are gaslighting their own protection of Joe and Hunter Biden.
00:46:29.000 I don't think there's anybody at the DOJ or FBI thinking they're going to make their career out of convicting Hunter Biden of anything, short of like some little slap on the wrist to sort of inoculate him, right?
00:46:42.000 Like a vaccine one.
00:46:43.000 Yeah, but that's what I think.
00:46:45.000 I mean, I think that also, if you look closely at the Washington Post, the Washington Post did two stories.
00:46:50.000 One of them was a story just about how they authenticated the laptop.
00:46:54.000 And in that story, they tried to sow a lot of discord and confusion by saying that we can only authenticate some stuff.
00:47:02.000 Can't authenticate the other stuff and what I think this is is an attempt to control the landing of how this case goes and basically make sure that whatever is prosecuted is whatever stories that they're okay with having prosecuted.
00:47:21.000 Like a planned release.
00:47:23.000 Like a planned release.
00:47:24.000 You're controlling the crash landing.
00:47:27.000 In Florida, Lake Okeechobee sometimes gets so many pollutants in it that the people around there decide to release some water because the environment can absorb and clean those pollutants.
00:47:38.000 You're describing the Lake Okeechobee factor politically through the DOJ and FBI as it relates to the Bidens.
00:47:43.000 Yes, and I think also one of the ultimate— Well, that's not then to get him, right?
00:47:47.000 No.
00:47:48.000 Because the whole goal of that would be to preserve the Biden regime with just some low-level maybe charges or investigations of the Biden crime family, when if you really go back and look at the Hunter Files episode that we did previously, you're going to see gambling deals, deals with the Chinese— you're going to see gambling deals, deals with the Chinese— You're going to see all kinds of stuff that I think rises way beyond what you're hearing about on mainstream media right now.
00:48:12.000 Honestly, I also think that this play that you're seeing now is an attempt to...
00:48:18.000 I think that at the end of this, Hunter Biden will be pardoned by Joe Biden.
00:48:24.000 I think that's what this is, is to get it into the mainstream.
00:48:27.000 I don't think it ever gets that far.
00:48:29.000 I think that part of what they're setting up to not charge Hunter is this notion that, oh, you saw it in, I think, the Washington Post.
00:48:35.000 Oh, the people who had this laptop before, the things they did would jeopardize any utilization of that evidence.
00:48:43.000 What's your reaction?
00:48:44.000 Why am I the one looking at your evidence?
00:48:47.000 It should be the best investigators in the FBI. And they had it first!
00:48:50.000 And they had it!
00:48:51.000 December 2019!
00:48:52.000 Why am I looking at it?
00:48:54.000 And why is anybody before, in my circles, looking at it?
00:48:59.000 The FBI had it.
00:49:01.000 It was turned over in good faith to do the right thing.
00:49:04.000 And nobody did anything.
00:49:07.000 Let this man run for president.
00:49:09.000 You know, and then want to say, oh, well, you know, after 20, we started this investigation in 2018, but then it fell off.
00:49:17.000 But then all recently, it's picked up steam, you know?
00:49:20.000 I think the only reason that this is picking up any steam is because we introduced those contents into the congressional record, and their authenticity is not going to be challenged.
00:49:30.000 It wasn't challenged, by the way.
00:49:32.000 Eric Swalwell, Jerry Nadler, David Cicilline, Val Demings, Hank Johnson, none of these Democrats you know from the House Judiciary Committee even objected to me putting Hunter Biden's laptop into the congressional record.
00:49:44.000 It went in under a unanimous consent of the Judiciary Committee.
00:49:48.000 So we will not hear questions about the authenticity or viability.
00:49:53.000 Now the sole question is what criminal conduct, what disqualifying conduct, What points of vulnerability are exposed as we see the contents of this laptop?
00:50:04.000 Now, the number one question I get is, how'd you get this laptop?
00:50:08.000 How'd it get there?
00:50:09.000 The number two question I get is, so what next?
00:50:12.000 When can the great sleuths that are out there watching this program and really just advancing the cause of transparency throughout the country going to be able to look at this data, analyze it, When are we going to be able to have the information from this laptop available to ask questions in every committee, really?
00:50:31.000 It's hard to think of a committee in Congress that wouldn't benefit off of probing potentially corrupt connections that go directly to the first family, directly to the White House.
00:50:43.000 Here's the answer.
00:50:44.000 Right now, our office is working with IT professionals to get the PDFs done, to get the files perfected, and the House Judiciary Committee has an obligation to produce a report based on that hearing that we've been going over in today's episode with the FBI Cyber Chief.
00:51:01.000 Now, they're not exactly limited on when they have to produce that report.
00:51:05.000 But I will say this.
00:51:06.000 I have to give some credit to the majority staff on the House Judiciary Committee in all of the workings that we've been just undertaking over the course of this week with our office and their offices.
00:51:20.000 They are working with us to ensure so far That this is information that the public has access to.
00:51:27.000 So if that changes, if there's any funny business, I'm going to come on this show.
00:51:31.000 We're going to talk about it live.
00:51:33.000 But so far, it is my expectation that in the coming days, maybe weeks, all of America is going to have access to this.
00:51:40.000 And you know what?
00:51:41.000 You tried to give them access to it Many, many months ago.
00:51:44.000 Yeah.
00:51:45.000 You were producing copies.
00:51:46.000 Exactly.
00:51:47.000 Sending them out.
00:51:47.000 Well, how did I know?
00:51:48.000 That called shot.
00:51:49.000 That's not just because Vish has a crystal ball.
00:51:52.000 It's because I was the one who made the copy that ended up in the hands of Tom Hamburger over at the Washington Post.
00:52:01.000 So that copy that he has that he used to verify and the Washington Post used to authenticate the laptop is the same copy that you just entered into the congressional record.
00:52:13.000 It's the same thing.
00:52:15.000 Oh, but democracy dies in darkness, right?
00:52:18.000 Yeah, well, if the democracy is in the Washington Post's hands, maybe.
00:52:22.000 But thank God we have brave patriots like you on the Hill who are ready to put your name to your action and say, I'm going to put this in the congressional record.
00:52:32.000 I appreciate that.
00:52:33.000 You're a brave patriot, too, for playing your role in this from an investigative journalism standpoint, from your service on our congressional staff, and certainly your efforts this week to get this information before the American people.
00:52:45.000 And information is indeed the new domain of intelligence collection, warfare, so much of the conflict that we see.
00:52:55.000 And so for a moment, just imagine a computer program that can hack into your phone Requiring a single click on your end.
00:53:04.000 It's called a zero click exploit.
00:53:06.000 All they need is your number and they're in.
00:53:09.000 Undetectable.
00:53:10.000 And it self-destructs remotely.
00:53:13.000 This is not science fiction.
00:53:15.000 It's Pegasus.
00:53:17.000 Pegasus is the name of a Trojan horse spyware program created by the Israeli cybercrime company NSO Group.
00:53:26.000 And as of 2022, Pegasus was capable of reading texts, tracking calls, collecting passwords, location tracking.
00:53:34.000 Accessing, targeting a device's microphone and camera, and harvesting information from apps, WhatsApp, Signal, even peer-to-peer.
00:53:43.000 Essentially, once they're in, they have total control of your phone.
00:53:47.000 And getting in no longer even requires human error or even human action by the target.
00:53:53.000 This would be the end of phishing exploits.
00:53:56.000 Well, thank goodness this technology wasn't just like created by our greatest ally, Israel, right?
00:54:04.000 Not so fast.
00:54:05.000 NSO Group has sold this technology to countless state actors and even local police forces all over the world, from Mexico to Saudi Arabia.
00:54:15.000 And recently, it has been confirmed that our own FBI paid $5 million for the Pegasus software.
00:54:23.000 It's even likely that Mexican drug cartels are using Pegasus through their corrupt collusions with Mexican government officials.
00:54:31.000 And these are just the customers that we know about.
00:54:34.000 There's probably non-state actors too.
00:54:37.000 It's safe to say that Pegasus isn't being sold responsibly.
00:54:40.000 It's certainly not being used responsibly.
00:54:43.000 And now Israel won't sell the tech to Ukraine because they don't want to piss off the Russians, but they'll send it to a narco state on our southern border.
00:54:52.000 It's just beyond irresponsible.
00:54:54.000 So what does it mean for us?
00:54:55.000 Here's what Edward Snowden had to say.
00:55:00.000 What needs to happen now?
00:55:02.000 We have to stop this.
00:55:04.000 Inaction is no longer an option.
00:55:07.000 If you don't do anything to stop the sale of this technology, it's not just going to be 50,000 targets, it's going to be 50 million targets, and it's going to happen much more quickly than any of us expect.
00:55:21.000 The way we do that is to halt the trade around this technology.
00:55:26.000 It doesn't matter who you are.
00:55:28.000 It doesn't matter what you do.
00:55:29.000 Your position isn't going to protect you.
00:55:31.000 If you're a minister or prime minister, guess what?
00:55:33.000 You're on the list.
00:55:34.000 You're Supreme Court Justice.
00:55:35.000 You're on the list.
00:55:36.000 If you're an ordinary person, guess what?
00:55:38.000 You're on the list, too.
00:55:40.000 All you have to do is come to the attention of somebody with the money to pay any one of these companies for the tools to break into your phone.
00:55:51.000 We know right off the bat that unfortunately we can't trust our own intelligence agencies.
00:55:57.000 The FBI, NSA, CIA, ATF, and DEA have just a piss-poor track record when it comes to protecting individual liberties and respecting the Fourth Amendment that's supposed to bind them.
00:56:09.000 They don't think so all the time.
00:56:11.000 We know how the FBI spied on the Trump administration before and during the Trump presidency.
00:56:15.000 We know about the robust surveillance state that the FBI has to entrap poor boomers who entered the Capitol grounds on January 6th.
00:56:24.000 Was Pegasus involved in that?
00:56:26.000 We don't know.
00:56:27.000 We know the FBI had it.
00:56:29.000 Paid $5 million.
00:56:30.000 And we can't really say for certain how the FBI has used this technology.
00:56:35.000 But we know our allies and adversaries have used it.
00:56:40.000 According to the Pegasus Project, which is an investigative initiative by Amnesty International, Forbidden Stories, and dozens of other news organizations, authoritarian governments have been using it, and we know, to surveil and kill anyone who doesn't fall in line.
00:56:55.000 As many as 14 heads of state, countless government officials, journalists, they've all been targets of Pegasus.
00:57:03.000 There is no way to tell how many.
00:57:06.000 We do now suspect that targets of Pegasus did include Jamal Khashoggi.
00:57:12.000 He was assassinated and killed.
00:57:15.000 But we're just getting started.
00:57:17.000 Like, was Hunter Biden a target of Pegasus?
00:57:20.000 How could he not have been?
00:57:22.000 Was I? But we are going to get these answers.
00:57:27.000 Allies spy on allies, sometimes more than they spy on enemies.
00:57:31.000 This is a well-known fact.
00:57:34.000 Israel spies on the United States more than you might think.
00:57:39.000 And of course, Israel is not an enemy.
00:57:41.000 They're our friend.
00:57:42.000 But the question remains, how many journalists, politicians, lobbyists, how many of them are impacted by this Pegasus software?
00:57:53.000 And does it impact our foreign policy?
00:57:56.000 Blackmail can be a very powerful tool.
00:57:59.000 Was Hunter Biden the target of foreign intelligence?
00:58:01.000 We've seen the contents now of the hard drive.
00:58:04.000 Who had access to it before we did?
00:58:06.000 If a family member or a politician is compromised, don't you think we should know?
00:58:12.000 How many Americans have been targeted by foreign intelligence agencies, or our own intelligence agencies for that matter?
00:58:18.000 To get these answers, I'm glad that we've got Thomas Massey asking some of the tough questions.
00:58:25.000 Here's that clip from the House Judiciary Committee.
00:58:29.000 Are you aware of a piece of software named Pegasus?
00:58:33.000 It's provided by NSO Group, Israeli Software Company.
00:58:38.000 Yes, sir.
00:58:39.000 Does the FBI use this program?
00:58:41.000 It looks like they had a license to it for five million dollars.
00:58:46.000 So, the FBI has not and did not ever use the NSO products operationally or in any investigation.
00:58:54.000 We did buy a limited license for testing and evaluation.
00:58:58.000 Those limited licenses are part of our normal exploratory process to understand what other technologies are out there.
00:59:07.000 But again, we have never purchased it for use operationally or in an ongoing investigation.
00:59:13.000 So your division hasn't used this spyware domestically?
00:59:17.000 No, sir.
00:59:18.000 Have you detected the use of this software domestically?
00:59:23.000 Sir, there's reporting in the media about Apple filing a lawsuit against NSO, and there's a lot of information in that article.
00:59:32.000 I can't comment further on your question truly due to classification, but if that is of interest to you, we could consider a background briefing.
00:59:41.000 Does the FBI itself exploit the SS7 flaw to access cell phone contents?
00:59:49.000 Sir, I'm not in a position to answer that question.
00:59:51.000 I don't know the answer.
00:59:53.000 Previously, Congressmember Massey asked you about a briefing.
00:59:58.000 I just want to make sure, will you commit to a bipartisan briefing classified on Pegasus and the NSO group and the SS7 issue?
01:00:06.000 Sir, yes, and if I can expand.
01:00:09.000 I mean, it's very important for me personally as a representative for the cyber program at the FBI to keep that as an open invitation in both directions between all of you and me, and from me to all of you, that whatever information that you would want access to, we would try to facilitate that.
01:00:28.000 Just think about that.
01:00:29.000 When Ted Lieu, not someone I quote often, asked the question of the FBI cyber chief whether or not federal law enforcement was breaking into people's phones, the answer was, gosh, he just doesn't know.
01:00:43.000 We're going to get these answers.
01:00:45.000 The briefing that Congressman Massey and Congressman Ted Lieu just referenced is going to happen, and I'm going to have updates regarding legislation, changes in authorities that we might be taking following that briefing on Pegasus.
01:00:59.000 Vish, thanks so much for joining me today on Firebrand Live.
01:01:02.000 We're here in the Capitol.
01:01:03.000 We're bringing the news.