The Illustrated Spygate Scandal - Part VII
The first political coup in American history
See Part I to start at the beginning.
The Story So Far (Part I through Part VI):
What began in July 2014 as a routine congressional request for Hillary Clinton's State Department emails had by May 2016 evolved into a corruption scheme unparalleled in American history, revealing a surveillance state turned against the American people by their own government. Despite overwhelming evidence that Clinton had compromised the nation's most sensitive classified information on her private server—including Special Access Program intelligence that China had successfully hacked—the FBI investigation became a protection racket orchestrated by officials like Andrew McCabe, whose wife received $700,000 from Clinton associates while he issued "stand down" orders on any investigation into Clinton.
As Hillary’s associates deleted thousands of subpoenaed emails, FBI Director Comey drafted Clinton's exoneration statement before even interviewing her, while agents Peter Strzok and Lisa Page made sure Clinton received an "HQ Special" - a free pass for the politically powerful. When NSA Director Mike Rogers discovered rampant illegal FISA surveillance abuse targeting American citizens and shut down contractor access to raw intelligence, the Obama administration needed a new way to spy on their political opponents. So they leveraged foreign assets like Stefan Halper and manufactured evidence through Fusion GPS as pretexts to justify surveillance.
By May 2016, with Trump's poll numbers rising and the terrifying possibility of his victory exposing their crimes, the intelligence community escalated: they manufactured Russian narratives and used media leaks to justify surveillance operations that would ensure Clinton's victory and eradicate Trump's presidency before it could begin.
May 27, 2016
Donald Trump's offhand joke during a Florida press conference—"Russia, if you're listening, I hope you're able to find the 30,000 emails that are missing"—sent FBI officials into a frenzy of manufactured outrage. What Trump intended as sarcasm about Clinton's destroyed evidence became, in the hands of intelligence operatives, proof of treasonous collusion.
"He's openly asking Russia to hack American citizens," Lisa Page texted Peter Strzok within minutes of Trump's comment.
"Perfect," Strzok replied. "This gives us everything we need for the narrative."
What they were really celebrating was Trump's unwitting provision of a soundbite that could be used to justify surveillance operations already underway. The joke would be replayed endlessly as evidence of conspiracy, transforming political commentary into criminal predicate.
June 4, 2016
Ellen Nakashima's Washington Post report claiming Russians had hacked the DNC was intelligence laundering in its purest form. The story was based entirely on anonymous sources from the same intelligence community that was conducting surveillance operations against Trump, creating a circular validation system where secret operations justified their own existence through media reports.
"How do we know the Russians did it?" a Post editor asked Nakashima.
"The sources are very confident," she replied, unaware that her "sources" were the same officials manufacturing the evidence they were leaking to her.
The article established the Russian hacking narrative that would dominate political discourse for years, despite the FBI never being allowed to examine the DNC servers to verify the claims. Media reports had replaced forensic evidence as the foundation of American intelligence assessments.
June 7, 2016
Carter Page's invitation to the Oxford symposium was the kind of obvious intelligence trap that made experienced security professionals laugh. The invitation came through an Oxford doctoral candidate at Stefan Halper's direction, targeting Page specifically because of his previous academic background and Russian business connections.
"Why is some professor I've never heard of so interested in having me speak at this conference?" Page wondered as he reviewed the invitation.
What Page didn't realize was that he wasn't being invited to speak—he was being invited to be surveilled. The symposium was an intelligence operation designed to create the foreign contacts that would later justify FISA surveillance warrants against him and, through him, the entire Trump campaign.
June 9, 2016
President Obama's endorsement of Hillary Clinton immediately after meeting with Bernie Sanders in the White House wasn't just political theater—it was the signal that federal law enforcement agencies could stop pretending to investigate Clinton seriously. The President had officially chosen his successor.
"Well, that settles it," James Comey told his senior staff as they watched Obama's endorsement speech. "No point in pretending this investigation could go anywhere else."
The endorsement was more than political support—it was a directive to the entire federal bureaucracy that Clinton's exoneration was not just preferred but required. Any FBI agent or prosecutor who didn't understand the message would find their career prospects suddenly limited.
June 12, 2016
Julian Assange's warning that Clinton emails would be leaked sent the intelligence community into full crisis mode. If Assange actually possessed Clinton's deleted emails, their entire cover-up operation could collapse within days of her expected exoneration.
"How the hell did he get Clinton's emails?" a CIA official demanded during an emergency briefing.
"Maybe the same way the Chinese did," came the reply. "Her server was about as secure as a public library computer."
The prospect of Clinton's deleted emails becoming public threatened to expose not just her crimes, but the FBI's systematic cover-up of those crimes. Assange had become the most dangerous man in America to the intelligence establishment.
June 10, 2016
CNN's revelation that classified CIA drone program emails had been sent to Clinton's private server—already hacked by multiple foreign intelligence services—should have triggered immediate espionage charges. Instead, the story was buried within hours as intelligence officials coordinated damage control.
"This is worse than Aldrich Ames," a CIA counterintelligence officer told his colleague, referring to the notorious Soviet spy. "At least Ames only gave secrets to one country."
But Clinton's security breaches were being treated as administrative errors rather than criminal acts. The intelligence community was willing to overlook the compromise of their most sensitive operations to protect Clinton's political ambitions.
June 14, 2016
The DNC's public announcement of the hack was carefully timed to support the broader narrative being constructed by the intelligence community. After weeks of private consultations with CrowdStrike, they were ready to publicly blame Russia for an attack that conveniently justified expanded surveillance operations.
"Are we sure about the Russian attribution?" a DNC security officer asked during the announcement planning meeting.
"CrowdStrike is confident," came the reply, though confidence wasn't the same as evidence.
The public announcement created political pressure for federal law enforcement to investigate Russian activities, providing perfect cover for surveillance operations against Trump associates that were already underway.
June 15, 2016
Three separate events on the same day revealed the coordinated nature of the intelligence operation against Trump.
Christopher Steele's was hired by Clinton's campaign through Fusion GPS
An anonymous hacker tagged "Guccifer 2.0" claimed DNC hack responsibility
Peter Strzok changed the FBI’s Clinton charges from "grossly negligent" to "extremely careless", basically de-criminalizing her rogue email server
"The timing is too perfect," an NSA analyst noted as he reviewed the day's intel reports. "This is coordinated."
Steele's hiring gave Clinton's campaign direct access to foreign intelligence services, while Guccifer 2.0's emergence provided additional Russian narrative support, and Strzok's editing ensured Clinton would avoid criminal charges despite overwhelming evidence of guilt.
June 24, 2016
Glenn Simpson's arrangement for Christopher Steele to send the first dossier reports via courier from the UK represented the operational security of professional intelligence work. The dossier wasn't opposition research—it was manufactured intelligence designed to justify surveillance operations.
"This needs to look authentic," Simpson told Steele during their encrypted communication. "Something that would convince a FISA judge."
What they were creating wasn't intelligence—it was a set of fables designed to look like intelligence. The dossier's claims were unprovable and unfalsifiable, perfect for justifying surveillance while remaining immune to verification.
June 27, 2016
Attorney General Loretta Lynch's "chance" meeting with Bill Clinton on the Phoenix airport tarmac was the kind of coincidence that only happened when powerful people needed to coordinate their stories. The A.G.’s private conversation with the husband of her investigative target nuked any pretense of prosecutorial independence.
"This is really bad optics," an FBI agent told his colleague as news of the meeting broke.
"It's not about optics," came the reply. "It's about orders."
July 1, 2016
Lisa Page's text to Peter Strzok revealing that Attorney General Lynch was "aware of the plan to exonerate Clinton no matter what investigation may show" was the smoking gun that proved the entire investigation was theater. The highest law enforcement official in America had predetermined the outcome before the evidence was fully collected.
The text message later exposed what everyone in the FBI already knew: the Clinton investigation was a performance. In fact it was everything but law enforcement.
A dramatization of real events. Based upon The Timeline of Treason. Part I below.














