AFI Custom Search

To ensure you are reading the latest post, click the logo above.
SEARCH by topic, keyword or phrase. Type in Custom Search box
Use this Custom Search toole.g. "IBM Eclipse Foundation" or "racketeering"

Friday, April 28, 2017

C.I.A. SECRECY AGREEMENT IS UNCONSTITUTIONAL DEEP STATE BUREAUCRATIC SLAVERY

The C.I.A. learned “lawfare” from the Soviets and now use it against us
C.I.A. Lawyers and judges use legal power to reward friends and punish enemies
More than 4.8 million Americans are forced to waive the Bill of Rights to work for the government
Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Apr. 28, 2017, Updated: May 02, 2017 | PDF
Deep State to Trump: We got your back.
Fig. 1: The Deep State's tool for sedition is the C.I.A. Secrecy Agreement. Government employees sign away ALL of their Constitutional rights. Therefore, Deep State lawyers and judges for the C.I.A., NSA, FBI, Department of State, Department of Justice, Department of Defense, NOAA and the National Weather Service have instituted a modern form of slavery. They intimidate employees and politicians into silence through blackmail data gathered from illegal mass surveillance of email and the social Internet.
Photo: Branco. Liberty Alliance.
Racketeers are people who make money from a pattern of illegal activities.

(Apr. 28, 2017)—The Soviet KGB disinformation department devised “lawfare” (Be patient: This URL links to a timeline that may take time to load) as an offensive political weapon against the West. The laws of the target country are used to bury them in uncreative and time wasting lawsuits, lawyers and legal expense. The techniques of lawfare are now being used by the United Nations, rogue C.I.A. shadow government, and globalists like George Soros.

Insurrection by lawyer

Saul Alinsky, the communist community organizer who advised the Clintons and Obama, wrote in Rules for Radicals: “Rule Four: Make the enemy live up to its own book of rules. If the rule is that every letter gets a reply, send 30,000 letters. You can kill them with this because no one can possibly obey all of their own rules.”

Likewise, the Deep State is engaged in lawfare against the American people.

Many large, multinational law firms are Constitutional rogues. Ironically, many of them advertise as experts in ethics and constitutional law. Beneath this ruse it is clear that they study those subjects in order to subvert them. They are the $1,000 per hour “hired liars” for their globalist corporate clients. Mega law firms should be banned. The number of partners in a law firm should be limited. They have ruined our judicial system with their cronyism and secrecy. The U.S. Constitution is for everyone else, not for them.

Where are the whistleblowers?

On Aug. 05, 2016, Kevin Shipp, a decorated C.I.A. agent turned whistleblower and author of FROM THE COMPANY OF SHADOWS (2013), spoke on the subject of “Where are the whistleblowers?”

He opened his talk by saying:

“But the higher I got up in the Agency, the more I began to see illegal, unconstitutional, sometimes criminal activity that the Agency, and some other sectors of the shadow government, I call it, were doing things that were illegal and unconstitutional.”

“When the US government violates the Constitution, they are committing multiple felonies based on the foundation of our government.”

Shipp continued,

“So, as a federal agent I had to swear an oath to the Constitution, to defend the Constitution and our country against enemies foreign and domestic. The problem was there were some that were domestic. And, there were some that happened to be in our own government.”

Shipp: Wake up call. It’s almost too late.

“It is almost too late to stop what is now a post constitutional government. The People are no longer ruling in our country. The government in a tyrannical form is not ruling people by subversion, force and fear.”

Shipp zeroed in on the “secrecy agreement” or “nondisclosure agreement” as the primary weapon used by the government against potential whistleblowers. He went on to describe his moral decision to resist the intimidation, follow the truth, and follow his oath to preserve, protect and defend the Constitution as his higher, righteous calling.

The C.I.a. Secrecy Agreement Weapon: Form SF312 Classified Information Nondisclosure Agreement

C.I.A. uses threats and Intimidation to muzzle citizens from holding their government accountable

Shipp said all intelligence employees and contractors must sign Form SF312 Classified Information Nondisclosure Agreement. (Sometimes called the “Secrecy Agreement.”)

On the surface, it is a simple two-page agreement.

However, those two pages directly incorporate 1,242 pages of nested laws, directives, orders and regulations to which the person is committing! Do you think anybody has read those pages?

We just did. We actually compiled those pages below. Here are the laws, orders and regulations referred to directly in the C.I.A. Secrecy Agreement:

  1. Executive Order 12356, later became 13526 (18 pgs.). National Security Information. This order binds the following laws, orders and regulations INSIDE it:
    1. 5 USC 552. Public information; agency rules, opinions, records, and proceedings (29 pgs.)
    2. USC Title 44. Public Printing and Documents (317 pgs.)
    3. 42 U.S.C. §§ 2011-2021, 2022-2286i, 2296a-2297h-13. Atomic Energy Act of 1954 (543 pgs.)
  2. 18 USC 641. Public money, property or records (2 pgs.)
  3. 18 USC 793. Gathering, transmitting or losing defense information (3 pgs.)
  4. 18 USC 794. Gathering or delivering defense information to aid foreign government (3 pgs.)
  5. 18 USC 798. Disclosure of classified information (3 pgs.)
  6. 18 USC 952. Diplomatic codes and correspondence (1 pg.)
  7. 18 USC 1924. Unauthorized removal and retention of classified documents or material (1 pg.)
  8. 50 USC 783. Communication of classified information by Government officer or employee (2 pgs.)
  9. 50 USC 421-426. Protection of certain national security information (4 pgs.)
  10.  5 USC 7211. Employees' right to petition Congress (1 pg.)
  11. 10 USC 1034. Protected communications; prohibition of retaliatory personnel actions (4 pgs.)
  12. 10 USC 1054. Defense of certain suits arising out of legal malpractice (1pg.)
  13. 5 USC 2302. Prohibited personnel practices (8 pgs.)
  14. 5 USC App. Inspector General Act of 1978. U.S. Federal Register (57 pgs.)
  15. 50 USC 403. Director of National Intelligence (3 pgs.)
  16. Central Intelligence Agency Act of 1949. (6 pgs.)
  17. 32 CFR 2001. Classified National Security Information, Final Rule (in 70 pgs. Fed. Reg.)
  18. Classified Information SF312 Briefing Pamphlet (65 pgs.)

The total number became not two, but 1,242 pages!

In this environment judges rule by fiat. Perhaps he decides in one case to be decent. But then, when a globalist crony is in the docket, she rules for her crooked friends. It’s pure lawyer street rule. We the People are not even in their equation.

Nobody can follow these nested laws

Our calculation of 1,242 pages above does not incorporate the additional pages incorporated within those 1,242 pages of nested regulations. For example, one page counted above contains 26 embedded references to other regulations:

10 USC 1054. Defense of certain suits arising out of legal malpractice (1 pg.), contains 26 pages of nested laws:

  1. 28 USC 1346. United States as defendant (5pages)
  2. 28 USC 2672. Administrative adjustment of claim (2 pgs.)
  3. 32 USC 316. Details of members of Army National Guard for rifle instruction of civilians (1 pg.)
  4. 32 USC 502. Required drills and field exercises (3 pgs.)
  5. 32 USC 503. Participation in field exercises (3 pgs.)
  6. 32 USC 504. National Guard schools and small arms competition (1 pg.)
  7. 32 USC 505. Army and Air Force schools and field exercises (2 pgs.)
  8. 28 USC 2677. Compromise (1 pg.)
  9. 28 USC 2680. Exceptions (3 pgs.)

5 USC 2302 (8 pgs.) contains much more than 275 pages of nested laws. Note, two sections are completely open-ended references to "any other provision of law designated that the Director of the Office of Personnel Management designates:" That makes no sense. An applicant is being required to follow the future thoughts of the Director. This scam gives new meaning to the idea of illegal contract fine print.

  1. 42 U.S.C. 2000e–16. The Civil Rights Act of 1964 (10 pgs.)
  2. 29 U.S.C. 621. The Age Discrimination in Employment Act of 1967 (22 pgs.)
  3. 29 U.S.C. 201. The Fair Labor Standards Act of 1938 (54 pgs.)
  4. 29 U.S.C. 791. The Rehabilitation Act of 1973 (2 pgs.)
  5. Unspecified law: Sections 2108, 3305 (b), 3309, 3310, 3311, 3312, 3313, 3314, 3315, 3316, 3317 (b), 3318, 3320, 3351, 3352, 3363, 3501, 3502 (b), 3504, and 4303 (e) and (with respect to a preference eligible referred to in section 7511 (a)(1)(B)) subchapter II of chapter 75 and section 7701 (at least 21 pgs.)
  6. 10 U.S.C. 943. Organization and employees (2 pgs.)
  7. 10 U.S.C. 1784. Employment opportunities for military spouses (2 pgs.)
  8. Section 1308(b) of the Alaska National Interest Lands Conservation Act (1 pg.)
  9. The Foreign Service Act of 1980, Section 301(c) of (159 pgs.)
  10. 38 USC 106 (f). Certain service deemed to be active service (3 pgs.)
  11. 38 USC 7281 (e). Employees (2 pgs.)
  12. 38 USC 7802 (5). Duties of Secretary with respect to Service (2 pgs.)
  13. 39 USC 1005 (a). Applicability of laws relating to Federal employees (3 pgs.)
  14. Open-ended: Any other provision of law that the Director of the Office of Personnel Management designates in regulations as being a veterans’ preference requirement for the purposes of this subsection (N pgs.)
  15. Open-ended: Any regulation prescribed under subsection (b) or (c) of section 1302 and any other regulation that implements a provision of law referred to in any of the preceding subparagraphs (N pgs.)
Bookmark: #cia-secrecy-intimidation

Absurdities buried in the C.I.A. Secrecy Agreement

Buried deep inside the second layer of links in the C.I.A. Secrecy Agreement is 39 USC 1005 (a). Applicability of laws relating to Federal employees (3 pgs.).

For Postal Service employees, the term below subjects the agreement to UNSPECIFIED (open ended) "procedures established by the Postal Service."

"Applicability of laws relating to Federal employees (a)(1) Except as otherwise provided in this subsection, the provisions of chapter 75 of title 5 (Adverse Actions) shall apply to officers and employees of the Postal Service except to the extent of any inconsistency with (B) procedures established by the Postal Service and approved by the Civil Service Commission."

Therefore, if the C.I.A. decides to persecute a Postal Service employee, they merely need to have the Postal Service implement an "exception" to be applied only to their targeted employee. Such corrupt lawyering is an example of how the rogue C.I.A. maintains its power and intimidates whisteblowers.

Unless the C.I.A. officer overseeing the Secrecy Agreement specifically pointed this out to a prospective Postal Service employee, then this ommission would nullify for fraud the Secrecy Agreement signed by Postal Service employees pursuant to the Restatement (Second) of Contracts (1981) cited at the end of this post.

In addition, the "Statute of Frauds" would also nullify the contract also since such open-ended terms, as just illustrated, must be spelled out specifically so that the applicant knows exactly the objective terms and conditions to which he or she is committing before the contract can be enforced.

Some pages will have more, others fewer nested pages. So, for the purposes of this example, we will use a conservative factor of 13 as the average number of nested regulations per page.

If this 13:1 ratio holds, that would increase the total number of pages referenced in the secrecy agreement from:

Nested layers of regulations (pages):

  1. 1,242
  2. 16,146
  3. 209,898
  4. 2,7 million
  5. 35.5 million
  6. 461.1 million, then
  7. 6  billion

“Law nesting” empowers only crooked Deep State judges and attorneys

C.I.A. Secrecy Agreement contains probably infinite nested links

Clearly, this lawfare nesting of regulations inside of regulations ad infinitum is designed to destroy our Constitution as moral standard.

Whenever judges want to rule against something to support their globalist handlers—no matter whether legal precedent constrains them or not—they’ll just rummage through these nestings until they find something to justify ruling for their globalist handlers anyway. Then, if that decision is challenged, they'll deny appeals using the now meaningless excuse of "judicial discretion."

Bookmark: #leonard-p-stark-lawfare
Leonard P. Stark
Fig. 4—LAWFARE Judge Leonard P. Stark,
Obama's last minute replacement judge in Leader v. Facebook. Played a bogus "judicial discretion" privilege to protect Facebook, in whose financial interests he was substantially invested. He was also recommended to Obama for appointment by Facebook's attorney, Cooley Godward LLP.

For example, in the Leader v. Facebook patent infringement battle, Obama's one-month-before-trial replacement Magistrate Judge Leonard P. Stark engaged in lawfare. He cited an 1898 criminal law to support his negation of Leader Technologies' victory over Facebook that proved on 11 of 11 claims that the engine running Facebook is Leader's invention. Stark ignored well-established patent law precedent. Wantonly, he excused his misconduct, saying "There is nothing impermissible* about such an analysis" in dredging up the 1898 criminal law that has NEVER been used in a patent case in the history of our Republic . . . until Judge Stark (still a Magistrate Judge at the time) overrode many decades of precedent and gave himself permission to do what was "not impermissible." This decision appears to have been the Obama/Clinton/Soros/globalist quid pro quo for his appointment right after the trial. This illustrates how subtly and under-handedly Deep State shadow government corruption has crept in to American jurisprudence.

* STARK: "There is nothing impermissible" plays a bogus "judicial discretion" excuse. He is essentially saying: "I am a federal judge and I can interpret the law anyway I please." The fact was that nothing in law or precedent justified his opinion other than his profligate abuse of his judicial discretion for his globalist handlers. On appeal, each additional judge had a clone of Stark's financial and relationship conflicts of interest. They were all invested heavily in Facebook financial interests and attorney relationships. Chief Justice Roberts was even an admitted mentor to Facebook's attorney. See Leader Technologies' Petition for Writ of Certiorari to the U.S. Supreme Court.

If permitted to do that long enough, these globalist lawfare judges create new precedent out of thin air.

“Post Constitutional Form of Government”

This, we believe, is what Mr. Shipp refers to when he said we are in a “post constitutional” form of government. The rule of law has been replaced by judicial fiat where the highest bidder in the judge’s chambers rules.

Bookmark: #deep-state-social-networking-theft

AFI researchers are now familiar with this Deep State modus operandi. These are the same lawyers who wrote the deceptive 1,500+ user license agreements for Google, Facebook, Instagram, What’s App, Yahoo, Microsoft, etc. where users are fooled into giving up all their privacy rights and property in exchange for free stuff. The illustration below stopped at eight link layers deep into the unintelligible legal nesting.

Unconstitutional Gov't fraud and misrepresentation amounting to slavery
Facebook, FacebookMail, Instagram, LinkedIn, What'sApp, Google, Gmail, YouTube, Hotmail, WindowsLive, Skype, Yahoo, YahooMail, Flickr, Tumblr, Twitter, Apple, AppleTalk, PalTalk, SnapChat, IBM Websphere, Sharepoint, Lotus Notes, etc. all deploy a rogue C.I.A.-inspired end user license agreement drafted by the IBM Eclipse Foundation starting in late 2001. You give up all your information and Constitutional privacy and property rights.

(Rogue C.I.A.) social networking end user licenses all use the same nesting of terms charade employed in the C.I.A. Secrecy Agreement. The original name was the Common Public License Version 0.5 provided to Eclipse Foundation members on Aug. 29, 2002. The source code provided carried fraudulent IBM copyright claims (TIMELINE ENTRY) over the inventions of Leader Technologies, Dr. Lakshmi Arunachalam and others.
Facebook and Google 800+ page end user license agreements with nested links running on ad infinitum

Institutional Slavery

Then, as if the lawfare nesting is not harmful enough, these lawyers then have their government employees, numbering over 4.8 million people according to Agent Kevin Shipp, sign their life to the Agency, essentially engaging in institutional slavery:

6. I understand that the United States Government may seek any remedy available to it to enforce this Agreement including, but not limited to, application for a court order prohibiting disclosure of information in breach of this Agreement.

Both sides lie in Section 12: Built in fraud

12.  I have read this Agreement carefully and my questions, if any, have been answered. I acknowledge that the briefing officer has made available to me the Executive Order and statutes referenced in this agreement and its implementing regulation (32 CFR Part 2001 , section 2001 .80(d)(2) ) so that I may read them at this time, if I so choose.

SIGNATURE

This Secrecy Agreement is clearly the binding element of the Deep State shadow government.

“4.8 million Americans (and those are just the ones we know of) hold government security clearances” and are bound by and threatened by the secrecy agreement to stay silent” Now the figure is a lot bigger than that, but that’s a lot of people, and their families, and everybody that they’re connected to. Do you think they’re going to speak up if it means total destruction? Probably not.

Common sense says that the briefing officer did not provide 6 billion seventh layer of nested documents at the signing of the Secrecy Agreement.

But, since: (1) the C.I.A. officer misrepresented himself or herself by not providing the 6 billion nested regulation pages (or 35 million in the fifth layer; or even the 16,146 in the second layer), and (2) the applicant did not review those 6 billion pages of regulations; both sides lied and committed fraud.

Given this fundamental fraud, the law says the Secrecy Agreements are fundamentally null, void and unenforceable, since they were entered into under false pretenses.

Restatement (Second) of Contracts (1981) (numerous provisions regarding lack of good faith, fraudulent inducement, misrepresentation, threat, duress, when contract is voidable, retraint on competition, interference, recklessness, negligence, unenforceable by public policy, incl. Sec. 164 (p. 23): "If a party's manifestation of assent is induced by either a fraudulent or a material misrepresentation by the other party upon which the recipient is justified in relying, the contract is voidable by the recipient."

Conclusion

In conclusion, the C.I.A. Secrecy Agreement is a total fraud that has undermined the Republic.

The solution is to wipe the slate clean of this fraudulent tool of globalist Deep State shadow government threats and intimidation that has harmed so many people, and has made America less secure—the polar opposite of its stated aim. The Secrecy Agreement is clearly the shadow government's central organizing tool.

Then, use simple, straightforward, unnested, common sense law.

While we are at it, let’s move our government agencies out of Washington, D.C. around the country, to more down-to-earth places with traditional values like North Platte, Nebraska, where the lawyers will have to do real work again instead of ruin our Republic.

* * *

Notice: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself. Photos used are for educational purposes only and were obtained from public sources. No claims whatsoever are made to any photo. Fair Use is relied upon.

Comment

Click "N comments:" on the line just below this instruction to view comment on this post. On about Dec. 05, 2016, Google began blocking comments to this blog. However, if you email your comment to a secure email website we have established at:: afi@leader.com we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.

Friday, April 21, 2017

THE CLINTON C.I.A. RACKETEERING CHRONICLES

Pretext "false flags" like fabricated stories of genocide are used to discredit opposition, hide the truth and consolidate globalist power
Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Apr. 21, 2017, Updated Apr. 26, 2017 | PDF
The Clinton C.I.A. Racketeering Chronicles
Fig. 1: Bill Clinton, George Bush & Barack Obama colluded to give American sovereignty over to globalists who are committing sedition against the U.S. Constitutional and running an illegal, rogue C.I.A.
Photo: Media City Groove.
A Racketeer is someone who makes money from a pattern of illegal activities.

(Apr. 21, 2017)—President Bill Clinton labeled the tragic conflicts in Rwanda (1994) and Kosovo (1998) as genocidal rage. What are the odds of one U.S. president encountering not one but two "genocides" in very small countries within four years? What changed to trigger such sudden furor? Who paid for it? Who organized it? What was the end game?

With the benefit of hindsight, a rogue C.I.A. aligned with globalist corporations appears to have been the secret power fomenting these acts of violence. It appears that in classical spy misdirection, the over one million victims of Rwanda and Kosovo were made out to be the causes. This false narrative was supported by a complicit mainstream media.

On May 12, 2005 FBI Special Agent In Charge Ted L. Gunderson said "people in our government . . . a rogue outfit" inside the C.I.A. is behind all the acts of terror since Bill and Hillary Clinton came to power in 1993. (Editors' Note: Many links in this post, like this one, are bookmarks in a detailed TIMELINE and bibliography. Once clicked, please be patient for it to load and go automatically to the timeline entry)

Gunderson, a former station chief in Memphis, Dallas and Los Angeles and candidate for FBI Director in 1979, called them a "covert military criminal enterprise, government enterprise, primarily by US military intelligence, that is operating full throttle and everybody [in the FBI and Justice Department] refuses to investigate it."

Clinton's racketeering for Deep State globalism

In the two days before George Bush became President, Bill Clinton made some telling moves that can only be understood now.

Clinton pardoned his former C.I.A. spy chief John M. Deutch for mishandling classified information and likely much more. Deutch was C.I.A. director when it appears the scheme to form a Deep State shadow government global Internet-based surveillance system was hatched.

Notably, Deutch's daughter-in-law, Marne L. Levine, worked for Larry Summers as Treasury Secretary (1993-2001), Harvard (2002-2004), National Economic Council (2008), and now at Instagram (2014-current) where she is chief operating officer. Summers had popped up as Instagram's sole director just before Instagram sold to Facebook for $1 billion. Summers' former student, Gmail founder and chief of staff at the Treasury Department, Sheryl K. Sandberg, brokered the Instagram deal as Facebook chief operating officer. The collusion is evident. Summers and Sandberg were colleagues with Russian oligarchs Yuri Milner and Alisher Usmanov. Milner and Usmanov were also Goldman Sachs partners in Moscow.

These seemingly unconnected events now show, in hindsight, that the C.I.A., Google, Facebook and those with whom they collude have been part of a globalist takeover plan for decades. It certainly proves they planned long ago to control the Internet, email and social networking.

For the record, along with C.I.A. Deutch, Clinton also pardoned his fugitive financier buddy Marc Rich who was living in Switzerland to escape extradition to the US. for tax evasion.

Then, in a weird twist, Clinton appointed Microsoft’s CEO Bill Gates and his national security spy attorney, James P. Chandler, to the National Infrastructure Assurance/Advisory Council (NIAC). Why would the outgoing President take such a proactive step when the next president could easily cancel the order?

The theft of the social networking invention

At the time of his NIAC appointment, James P. Chandler was also the patent attorney for Columbus OH innovator Michael McKibben and Leader Technologies. Leader had engaged him in early 2000 to protect and patent their new invention: social networking. Chandler became a Leader director as well.

In the mid 1990's, McKibben had rebuilt AT&T's email system, AT&T Access Plus 3.0, in time for the launch of Windows 95 by Bill Gates. (Secretly, Gates & AT&T had temporarily fallen out on how Microsoft was going to control Internet email and browser protocols, opening the door for McKibben's team.)

McKibben then founded Leader Technologies to innovate an entirely new approach for Internet collaboration. McKibben had seen that legacy "groupware" software platforms offered by IBM, AT&T and Microsoft (i.e., Microsoft Exchange, Lotus Notes, Novel Groupwise and IBM Websphere) would fundamentally fail to scale to the transaction volume needed by the emerging Internet. In fact, McKibben and his team successfully revived and dramatically enhanced the AT&T Email system after the AT&T Lotus/IBM Network Notes and cc:Mail offerings failed to work as advertised. AT&T sales promotion (Nov. 28, 1995): "We've enhanced it so much it's out of this world."

Unknown to Leader, Chandler was already colluding with IBM, AT&T, Microsoft, the Clintons, C.I.A., NSA, FBI, Eric Holder, David Kappos, the Bushes, Larry Summers, Robert Mueller and John Podesta, among many, and stole Leader's invention to fix the technology shortcomings of their shadow government—in the name of "national security" of course. Leader's investors had risked over $10 million dollars and Leader's engineers had created over 750,000 lines of source code. This invention, stripped of its personal security and privacy programs, is the engine that drives the rogue CIA-controlled "social" Internet today in a diabolical public-private racketeering scheme of global proportions.

During this time, Mark Zuckerberg was a junior in high school. Zuckerberg's now well-recognized pathological lying would fit the profile needed by the C.I.A. MKUltra mind control program. Zuckerberg's all-too-perfect Harvard narrative was quickly promoted by Fortune magazine's David Kirkpatrick in The Facebook Effect, and Hollywood in The Social Network. The Zuckerberg phoenix-like Harvard dorm story emerged: (1) after Clintonista C.I.A. agent Larry Summers was appointed president of Harvard, (2) C.I.A. agent Marne L. Levine became his chief of staff, (3) Summers and Levine fended off four other competing Harvard facebooks (Ceglia, Winklevosses, Greenspan, Harvard admin) until Leader Technologies' invention was debugged (Oct. 28, 2003), and (4) the warrantless surveillance of Americans was initiated by Project Stellar Wind. In addition, certain unsolved New York "Craigslist killer" abductions and the disappearance of Jessica Taylor on Long Island keep coming into view given the shadow government's preference for using sex, drugs, pedophilia and murder to blackmail and control targets. What is known from sworn testimony is that Zuckerberg favored Craigslist for arranging dates and advertising his programming services back then. Craigslist is how he first met Paul Ceglia and others. See FBI Special Agent In Charge Ted L. Gunderson.

New, Apr. 25, 2017: Clearly, Congress, the Justice Department or local law enforcement in Long Island needs to impound Zuckerberg's 28 stonewalled computer devices from Harvard (2003-2004) before they are destroyed by his attorneys, McManis Faulkner LLP and Gibson Dunn LLP, who have had custody of them and have lied to and misled multiple federal and state courts about this important evidence. It might include instant message (AOL IM) discussions of poison ivy, unmarked burlap sacks, an apartment on top of a Chinese restaurant, a Ute car handy for hauling, or not. See also AFI. (Mar. 26, 2017). "House Intelligence Committee: Impound Zuckerberg's 28 computers and prove real Russian meddling."... Russians working with the Clintons long before the 2016 election.

1st Clue: Both Presidents Bush and Obama extended and enhanced the NIAC's powers with more than 23 additional executive orders. This became a technology platform that is parallel to the NSA's, but used without regard to the Constitution. This duplicity is confirmed by William Binney, the NSA's chief architect, pushed out on Oct. 31, 2001.

2nd Clue: This occurred just eight months before 9/11 and the Patriot Act. Remember, FBI Special Agent In Charge Ted L. Gunderson said 9/11 was a rogue C.I.A. false flag pretext designed to push the country into approving the Patriot Act that Gunderson said "takes away many of our constitutional rights and civil liberties."

Indeed, Clinton had formed NIAC by Executive Order 13130 on July 14, 1999. Nine weeks later on Sep. 29, 1999, Clinton ordered the C.I.A. to form a private venture capital company called In-Q-Tel. Two weeks later, on Nov. 12, 1999, Clinton and Summers abolished Glass-Steagall banking controls that ushered in the era of "too big to fail" banks, like Citigroup. Citibank then torched mortgage lending controls, thus making the 2008 crash inevitable. More collusion is evident.

The list of founding trustees for C.I.A. In-Q-Tel is telling. They are all prominent in the military-industrial complex that President Dwight D. Eisenhower warned about in his Jan. 17, 1961 farewell address:

Telecredit, Inc., Lockheed, Xerox, Columbia University, Goldman Sachs, Marsh & McLennan Capital, Inc., Technovations, Inc., Global Technology Partners, U.S. Defense Dept., Lucent, Yurie Systems, AT&T, Teligent,Inc., Lockheed Missile & Space Systems, C.I.A. Added to these companies are NIAC "advisors" including Lockheed Martin, BellSouth, Symantec, Microsoft, Cisco, Mellon Financial, IBM (ISS), and Pfizer.

These companies all benefitted from the rogue C.I.A.'s installation of strongman Paul Kagame in Rwanda. In exchange for his Central African dictatorship, Kagame has guaranteed them mining access to petroleum, uranium and rare earth minerals used to manufacture products for the computer, mobile phone, TV, defense and high tech industries, as well as bribery and money laundering, including gold, diamonds, coltan, niobium, cobalt and copper in Central Africa.

All of these military-industrial complex companies were beneficiaries of the so-called “Rwanda Genocide” in 1994.

Rwanda

On May 17, 2001, former NSA analyst and Africa specialist, Wayne Madsen, told a Congressional Hearing that the tragic slaughter of one million Rwandans in 1994 was not based on Hutu versus Tutsi tribal hatred run amok.

The genocide narrative had been widely reported by globalists, including Presidents Clinton, Bush, Obama, many in Congress, Wikipedia and the Hollywood film Hotel Rwanda.

Aerial view of the processing plant at the Tenke Fungurume in 2015. (Image courtesy of Freeport-McMoRan Copper & Gold).
Fig. 2—Aerial view of the processing plant at the Tenke Fungurume in 2015 (Congo). Photo: Freeport-McMoRan Copper & Gold.

Rather, Madsen says the Rwandan massacre was a globalist and rogue C.I.A. “false flag” pretext to: (1) depopulate Rwanda and (2) consolidate control of uranium and petroleum as well as rare earth mineral mining of gold, diamonds, coltan, niobium, cobalt and copper in Central Africa.

Madsen and other investigators provide substantial evidence that the Rwandan genocide narrative fails even the most cursory analysis. For example, Wikipedia reinforces the mainstream narrative that 70-80% of all Tutsi Rwandans, representing 800,000 people, were murdered by supposed machete-wielding Hutu killers.

That would put the Tutsi population at 1.1 million. However, only 596,000 Tutsis lived in Rwanda according to the Center for Research on Globalization. Therefore, the globalist narrative is off by almost half. According to eyewitnesses, some mass graves labeled as Tutsi contained just as many Hutu victims.

Tragically, the mass murders in Rwanda were a pretext for the globalist rogue C.I.A. to put Tutsi strongman Paul Kagame into power at any cost to human life.

At the time of the October 1990 invasion of Rwanda, Paul Kagame was being trained by the globalist rogue C.I.A. at the Pentagon's General Staff and Command College at Fort Leavenworth, in Kansas (USA). Kagame returned and led the four year war that resulted in the deaths of perhaps several hundred thousand Hutu people between October 1990 and April 1994 alone. From Keith Harmon Snow. (Apr. 05, 2012). Pentagon Produces Satellite Photos Of 1994 Rwanda Genocide, p. 4. Conscious Being Alliance.
Fig. 3—Rwandan Paul Kagame (right). At the time of the October 1990 invasion of Rwanda, Paul Kagame was being trained by the globalist rogue C.I.A. at the Pentagon's General Staff and Command College at Fort Leavenworth, in Kansas (USA). Kagame returned and led the four year war that resulted in the deaths of perhaps several hundred thousand Hutu people between October 1990 and April 1994 alone. From Keith Harmon Snow. (Apr. 05, 2012). Pentagon Produces Satellite Photos Of 1994 Rwanda Genocide, p. 4. Conscious Being Alliance.

The rogue C.I.A.’s high technology partners manufacture products and services vital to building a global C.I.A. spy surveillance system that parallels the NSA, but is not subject to the U.S. Constitution. These companies include Sony, Microsoft, Dell, Ericsson, Hewlett-Packard, IBM, Nokia, Intel, Lucent, Lockheed Martin, Boeing and Motorola.

Paul Kagame is a regular guest of Bill & Hillary Clinton, The Clinton Foundation and the World Economic Forum. See “The Global Elite’s Favorite Strongman,” The New York Times, Sep. 07, 2013.

The Clintons' Rwandan racketeering pattern is evident:

  1. Target the resource that you want to control
  2. Recruit beneficiaries to this scheme as accomplices
  3. Infiltrate both the resource holder and his enemies
  4. Concoct a bad acts pretext to seize control of the resource (sex, drugs, genocide, intolerance, hate, Islamophobia, sexism, homophobia, racism, fake news, The Russians!, whatever works)
  5. Record your accomplices performing the bad acts to guarantee they don't expose you later
  6. Plant the bad acts evidence
  7. Pre-write the media narrative
  8. Send your mainstream media accomplices the narrative
  9. Proliferate your fake narrative among your mainstream media accomplices
  10. Accuse your resource target of your fabricated pretext bad acts
  11. Press the pretext in the media until you become the holder of the resource
  12. Or, abandon your pretext if you are exposed or achieve your objective. (e.g., The Russians! pretext was dropped overnight when President Trump bombed Syria)

Kosovo

Stopping genocide was the pretext in Rwanda, we believe.

That worked so well for Clinton that he repeated the playbook in Kosovo.

For the general public at the time, we were told that seething ethnic Serbian-Albian hatred led to "ethnic cleansing!" and "genocide!" in Kosovo. Who could question that story? Most Americans don’t even know where Kosovo is.

Like the rampaging Hutu-Tutsi Rwanda hatred narrative, Serbs and Albanians were characterized as equally seething in Kosovo.

Really? The narrative quickly falls apart upon further investigation.

Kosovo Refugees
Fig. 4—Kosovo Refugees.

Why Kosovo? What was the end game?

Only hindsight answers this question: Why Kosovo? Why destabilize Serbia whose Orthodox Christian majority has co-existed with Ottoman Muslims for over 400 years?

Kosovo is a primary migration path for Middle Eastern refugees moving into Europe. Prior to the C.I.A. / NATO intervention in Kosovo, the Balkan borders were guarded by the Serbian government in Bucharest where the predominant religion is Serbian Orthodox Christianity.

The way in, Main European migration routes, Detection of illegal border crossings, Jan.-Jul. 2015. The Economist
Fig. 5—The way in. Main European migration routes. Detections of illegal border crossings. Jan.-Jul. 2015. The Economist. Graphic: The Economist.

Serbian Orthodox Christian Church believers reach back to 1st century Apostolic times. Several bishops from the area now called Serbia participated in the First Council of Nicaea (325) where the Nicene Creed was drafted and the Canon of our modern Bible was first compiled. In the history of the Second Millenium, the Serbian Church has thrived despite 400 years of Ottoman Muslim domination (ca. 1459-1879) and 39 years under the Nazis, then Communists (ca. 1941-1980).

Given the choice, Serbian Christians were certain to resist being overrun by the forced migration of Islamists from the Middle East created by ISIS—now proved to be a creation of Hillary Clinton and Barack Obama. Who can fault them for thinking that 400 years of Muslim Ottoman domination was enough? But of course, few in the West knew this history of Ottoman Islamic subjugation of an anciently historic Christian region.

Evidently, the globalists decided that Serbian Orthodox Christians in Kosovo needed to be demonized and Kosovo’s ethnic Albanian Muslim minority given the territory. The Islamist KLA (Kosovo Liberation Army) fighters, including mercenaries from Syria, Yemen, Afghanistan and Saudi Arabia, destroyed 155 Serbian Orthodox Christian churches and monasteries during the conflict, some dating to the 12th century. These are more inconvenient facts proving that the allegations of supposed Serbian genocide were faked.

The amount of human energy, emotion and scholarship that has been consumed to disprove the Clintons' "genocide!" lie is tragic. That time and human creativity could have been so much better spent uplifting humankind rather than having to defend against these devils. Give a devil power and what do you get? Clinton & Co.

As observed earlier, the Clintons learned from Rwanda that genocide sells to an American public that is more concerned about Tom Brady's deflated football and endless titillation from 256-max character text messages.

In seminal testimony to Congress on Feb. 02, 1999, C.I.A. Director George J. Tenet fanned the flames of this narrative when he claimed that the Serbian Army (Christians) had massacred 45 “innocent civilians” in Račak, Kosovo (Muslims).

President Clinton and the mainstream media immediately seized on this story, labeled it genocidal rage, and Račak became the pretext for NATO intervention.

Staged Racak genocidal rage and faked photos

Račak, Kosovo
Fig. 6—Račak, Kosovo.

However, investigative journalists for Accuracy in Media discovered that the Račak genocide story was a hoax. They proved that the photos used to justify the NATO intervention were fake. The supposed Račak massacre never happened.

In truth, the French newspaper Le Figaro journalist Christophe Chatelet was in Račak the day of a battle between Serb and KLA forces, just hours after the Serbian forces withdrew.

Chatelet saw nothing notable to an experienced journalist. He saw one dead and four wounded—the casualties of a gun battle between two armies. The next day he returned with colleague Renaud Girards to an international media circus with 45 civilian bodies staged in the streets and farmhouses. He saw perhaps a dozen or more bodies thrown into a ditch that weren't there the day before. And, he did not see the commensurate spent bullet shell casings that one would expect at the scene of a mass murder of civilians at close range (Clinton's speech:"sprayed with bullets"). Nevertheless, newly-minted talk of Serbian Army genocide was repeated in unison by the KLA fighters who had returned after the battle. Clearly, Račak was chosen as Clinton's pretext for NATO/U.N. intervention.

President Clinton jumped on the fabricated genocide narrative and painted a horrifying picture of Serbian (Christian) atrocities against the KLA (Islamists), saying:

"We've seen innocent people taken from their homes, forced to kneel in the dirt and sprayed with bullets; Kosovar men dragged from their families, fathers and sons together, lined up and shot in cold blood. This is not war in the traditional sense. It is an attack by tanks and artillery on a largely defenseless people whose leaders have already agreed to peace." Clinton declared, "Ending this tragedy is a moral imperative."

The New York Times chimed in, saying:

"Some of the dead were found with their eyes gouged out or heads smashed in, and one man lay decapitated in the courtyard of his compound. The victims included one young woman and a 12-year-old boy. Many were older men, including one who was 70." It added that "many had been shot at close range" and that villagers said that "the Serbian forces had rounded up the men, driven them up the hill and shot them." Amb. William Walker, head of the Kosovo Verification Mission, had called this an "unspeakable atrocity" and "a crime against humanity."

Notice the Extreme Emotion Baiting by President Clinton and The New York Times—"forced to kneel in the dirt" "sprayed with bullets" "dragged from their families" "lined up and shot in cold blood" "defenseless" "eyes gouged out" "heads smashed in" "decapitated" "13-year old" "older men, one 70" "shot at close range" "rounded up" "unspeakable atrocity" "crime against humanity"

These are mass media emotion triggers developed and tested by the C.I.A.'s MKUltra mass mind-control program. These smear techniques were used succesfully by Hillary Clinton against Donald Trump. Fortunately, not used well enough. Perhaps America's lethargic public is finally waking up?

When Le Figaro's Christophe Chatelet was asked how he could explain how his report the previous evening of one dead could have ballooned to 45 bodies strewn all over the village and talk of genocide. He said, "I can't solve that mystery."

Despite the Le Figaro journalists confirming that Račak was a hoax, members of Congress quickly fell in line behind the Islamist KLA (Kosovo Liberation Army). They even compared the KLA to America’s 1776 colonist “freedom fighters.” No one seemed to care that many of the KLA fighters were imported from Yemen, Syria, Afghanistan and Saudi Arabia.

“genocide!” a pretext that has worked ... no more

The “genocide” narrative has worked. Rwanda and Central Africa are today controlled by a C.I.A.-installed strongman. Central Africa's rare earth minerals and blood diamonds flow freely to America's rogue C.I.A. and its high technology military-industrial complex. Rwandans mourn their dead souls.

An Islamist-controlled Kosovo has allowed the free flow of Syrian immigrants into Western Europe. Kosovars mourn their dead souls.

Clearly, accusations of genocide are easily sold as pretexts to a sleeping, undiscerning public. What was not fake was the tragic murder of over a millions of Rwandans and Kosavars. Did the parents of these globalists not teach them that mortality and judgment for our deeds before God comes to us all?

Bill Clinton oversaw two “genocides” in small countries during his eight years in office. Both pretexts saw minorities aligned with the globalist rogue C.I.A. come to power.

In true Saul Alinsky form (accuse your opponent with what you are doing), the victims in Rwanda and Kosovo were called the butchers.

What is different now?

  • The Clintons are out of power
  • George Soros no longer runs the U.S. State Department
  • The Clinton Foundation is exposed
  • The Deep State shadow government has been exposed
  • A rogue C.I.A. is exposed
  • The British have voted to leave the European Union
  • Donald Trump is President
  • Populism over globalism is exploding worldwide

Defeat the Globalists

Justice for their victims

The rogue C.I.A. globalist shadow government is currently in control of global Internet “Big Data” and is spying on all of us.

Bill Clinton, George Bush and Barack Obama enabled a C.I.A.-run shadow government to be established that controls our technology led by IBM, Microsoft, Google, AT&T, Cisco, Yahoo, Oracle, EMC, Dell, Lenovo, Symantec, Juniper and Facebook, among others.

This rogue C.I.A. technocracy is running the Internet and must be dismantled.

"The Internet of Things" Silicon chips have rogue C.I.A. backdoor keys burned on them

WikiLeaks, Shadow Brokers and others have shown us that the current Internet is fundamentally compromised down to the electronic chip level and must be scrapped.

No amount of adjustment can fix a silicon chip with a backdoor encryption key burned onto the circuitry. That chip must be thrown away.

This is the devilish level to which the rogue C.I.A. has stooped to accomplish its technocratic takeover. They appear hell bent on robbing our property, privacy and well-being to control us forever.

We need a digital Manhattan Project to fix the Internet. Now.

* * *

Notice: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself. Photos used are for educational purposes only and were obtained from public sources. No claims whatsoever are made to any photo. Fair Use is relied upon.

Comment

Click "N comments:" on the line just below this instruction to view comment on this post. On about Dec. 05, 2016, Google began blocking comments to this blog. However, if you email your comment to a secure email website we have established at:: afi@leader.com we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.

Tuesday, April 4, 2017

WIKILEAKS VAULT 7 HAS CREATED AN EPIC LIABILITY CRISIS FOR CORPORATE DIRECTORS

Vault 7 proves that corporate directors cannot protect their assets from the rogue C.I.A. & name brand technology colluders as required by the Business Judgment Rule
Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Apr. 04, 2017, Updated Apr. 16, 2017, Christ is Risen! Indeed He is Risen! Happy Passover | PDF

Contributor: Michael T. McKibben, Chairman & Founder, Leader Technologies, Inc. the real inventor of social networking

WikiLeaks Vault 7 has created an epic liability crisis for corporate directors
Fig. 1: A rogue C.I.A. colluded with name brand technology companies to steal key Internet inventions from real inventors. They criminally pronounced those thefts, like Michael McKibben's social networking invention and Dr. Lakshmi Arunachalam's web applications, as "open source." Then, these rogues launched "social media" which lured unsuspecting users with free services that quietly sacrificed user privacy to Deep State spies and their "Big Data" "Internet of Things" commercial partners. These "new world order" globalists are working to destroy the American Republic and subvert it to the will of godless, un-elected, multi-national corporations and their warmongering bankers.
Graphic: AFI.
LIABILITY NOTICE, Apr. 03, 2017: Subsequent to WikiLeaks Vault 7, corporate directors have a duty to notify their shareholders and customers that all their company’s data, including all customer data, has been compromised by a rogue C.I.A. and its complicit commercial technology suppliers.
Bookmark: #symantec-cia-collusion
New! Apr. 14 2017 (Good Friday):
—Symantec lies to users about its C.I.A. collusion & secret backdoor keys
John W. Thompson
Fig. 2—John W. Thompson
Microsoft Chairman (2014-present), Symantec CEO (1999-2009), IBM (1971-1999), Hillary Clinton globalist inner circle (2009), The IBM Eclipse Foundation (2001-present), Clinton Foundation (Bill speech sponsor)
On Mar. 08, 2017, Symantec, the cyber security company, issued a deceptively worded press release on its official blog claiming that none of its products were compromised by the release of WikiLeaks Vault 7.

In now familiar meaningless double talk, Symantec claimed "to date we see no evidence" and "we are carefully reviewing the documents" to see where they might better serve customers.

Like its other rogue C.I.A. collaborators IBM, Microsoft and Cisco, Symantec failed to disclose that it has been embedding a universal NSA / C.I.A. backdoor encryption key into ALL of its "security" products.

National Institute of Standards and Technology (NIST) DRBG Validation List | PDF version proves that Symantec has been embedding the NSA/C.I.A.'s backdoor encryption key into its products since at least Apr. 20, 2011.
Hillary Clinton
Fig. 3— Hillary Clinton
We even have the names of the Symantec engineers who are embedding the C.I.A./NSA backdoor keys are:
John Bordwine (john_bordwine@symantec.com), Rose_Quijano (Rose_Quijano-Nguyen@symantec.com),
Bill Zhao (Bill_Zhao@symantec.com), David Finkelstein (fips140@pgp.com), and Vincent Moscaritolo (fips140@pgp.com).

Symantec's former CEO John W. Thompson was employed by proven rogue C.I.A. collaborators IBM (1971-1999), Symantec (1999-2009) and became chairman of Microsoft (2014-present).

On Dec. 29, 2009, Hillary Clinton listed John W. Thompson among her globalist inner circle with Cisco, Yahoo, Ebay, Microsoft, Ford Foundation, FCC, Apple, Twitter, Google, Carlos Slim (The New York Times), and Harvard. The circle of rogue C.I.A. actors who hijacked America's Constitutional right to privacy is now tightening.
Bookmark: #microsofts-cia-racketeering
New! Apr. 11 2017:
—Microsoft's C.I.A. racketeering
William H. Gates
Fig. 4— Bill Gates
Microsoft, Clinton Foundation, NIAC, rogue C.I.A. Agent, The IBM Eclipse Foundation
In response to WikiLeaks Vault 7 Grasshopper release of Microsoft malware payloads, Microsoft used a user group named "MS Power User" to plant misleading information about its collusion with the C.I.A. This information was quoted widely by the mainstream media. WikiLeaks Vault 7 shows that a rogue C.I.A. has rendered the entire Microsoft Windows family of products unreliable for many years.

Oddly, rather than just interview Microsoft spokespersons, the release quoted controversial far off New Zealander Kim Dotcom, and a far off BBC quote of an unnamed Microsoft official instead! It implied that WikiLeaks documents themselves "appear to confirm" that "Microsoft was not cooperating directly with the 3 letter agency." This is a false and deceptive statement, perhaps criminally so. The release then admitted major zero-day security holes identified by WikiLeaks.
Security Week Computer Security Analyst
J. Oquendo, Jun. 20, 2012:

"CIA, NSA and Microsoft created a completely separate operating system somewhere in the Beltway. Microsoft decided to give the agencies the specific code to make the rogue changes ... So many people are blurring the lines with technology and politics it is scary."
With nonsensical misdirection, the release cited WikiLeaks—who they are trying to debunk—to support the idea that Microsoft is not cooperating with the C.I.A.! However, in this misdirection, they essentially admitted at least indirect cooperation. Such "indirect cooperation" with the C.I.A. is racketeering with third parties. This racketeering allows the C.I.A.-run Deep State shadow government to communicate and spy on everyone with impunity.

The racketeering admission notwithstanding, we also know from the National Institute of Standards and Technology (NIST) DRBG Validation List (DRBG Validiation List. PDF version) that Microsoft products are registered 194 times as containing a universal NSA/C.I.A. encryption backdoor key which unlocks EVERYTHING on Windows anyway. We also know that on Jan. 18, 2001, Microsoft's Bill Gates and Leader Technologies' patent attorney James P. Chandler, were appointed by President Bill Clinton to the National Infrastructure Assurance Council (NIAC)—NEW, Apr. 4, 2017: two days before Clinton left office, clearly showing that Bush & Co. carried on Clinton's rogue C.I.A. plans at the White House, with James P. Chandler's direction (advisor to Microsoft and IBM, among their many military-industrial complex cronies of both the political "left" and "right"). Clearly, greed and powermongering make strange bedfellows. NIAC provides the digital systems to the rogue C.I.A. Deep State shadow government. See Stellar Wind timeline entry.

NEW, Apr. 15, 2017:Encryption engineers who submitted Microsoft NIST DRBG entries are: Tim Myers (FIPS@microsoft.com), Kevin Michelizzi (kevin.michelizzi@microsoft.com), and Chien-Her Chin (chien-her.chin@microsoft.com).

AFI conclusion: Microsoft participates in organized crime with the rogue C.I.A. Deep State, we think, as confirmed by Security Week analysts.
Bookmark: #cisco-just-lied
New! Apr. 10 2017:
—CISCO just lied
On Feb. 17, 2011, President Obama toasted their deception of the American public and the world with 13 members of the IBM Eclipse Foundation NSA Spy State Cartel in Silicon Valley. Conspirators pictured are Barack Obama (U.S. President), Mark Zuckerberg (Facebook CEO), Steve Jobs (Apple CEO), Steve Westly (Westly Group Partner), John Doerr (Kleiner Perkins Partner), Ann Doerr (John Doerr Spouse), Eric Schmidt (Google CEO), Art Levinson (Genentech Chairman), John Chambers (Cisco CEO), Larry Ellison (Oracle CEO), Reed Hastings (Netflix CEO), John Hennessy (Stanford Univ. President), Carol Bartz (Yahoo CEO) and Dick Costolo (Twitter CEO).
Fig. 5—John T. Chambers, CEO, Cisco; Clinton Foundation, NIAC, IBM Eclipse Foundation. See Feb. 17, 2011 TIMELINE entry. See also Fig. 11 below.

Cisco Systems claimed on Mar. 21, 2017 that they had just "spotted" a critical "bug" that allows the NSA to exploit 318 of its switches. This is a boldface lie clearly intended to deceive customers. The truth is, Cisco willingly embedded "bugs" over a decade ago (we believe as early as 2001) at the request of the NSA/C.I.A. They even registered the backdoor encryption "bug" at the National Institute of Standards & Technology (NIST) DRBG Validiation List. PDF version. (Download and repost these HTML and PDF versions for safekeeping. It is proof positive of this rogue C.I.A. collusion with Silicon Valley. The source NIST web page/table has been deleted from their site. Imagine our shock.)

NEW, Apr. 15, 2017: Encryption engineers who submitted Cisco NIST DRBG entries are: Palani Karuppan (pchetty@cisco.com), Muukund Chikerali (mukundck@cisco.com), Global Certification Team (certteam@cisco.com), Sonu Shankar (sonshank@cisco.com), M.K. Whitlock (mwhitloc@cisco.com), Jennifer Gilbert (jtgilber@cisco.com), Ashit Vora (asvora@cisco.com). See also Thomas E. Noonan, IBM, NIAC, JouleX (John D. Podesta, Vladimir Putin, Anatoly Chubais, Rusnano), Cisco.

Cisco is a core member of rogue C.I.A. front organizations including The IBM Eclipse Foundation, the National Infrastructure Assurance/Advisory Council (NIAC), as well as The Clinton Foundation. (Thanks to an AFI researcher for this important heads up!)

ORIGINAL POST

Michael T. McKibben
Fig. 6—Michael T. McKibben, Chairman & Founder, Leader Technologies, Inc., Columbus, Ohio, true inventor of social networking, including U.S. Patent No. 7,139,761. Proved in federal court that Facebook infringes his patent on 11 of 11 claims. After the trial, the judges protected Facebook without disclosing they ALL held Facebook financial interests and had deep relationships with Facebook's attorneys White & Case, Cooley Godward and Gibson Dunn.

(Apr. 04, 2017) This weekend my brother and I toured the Mound Science & Energy Museum in our hometown of Miamisburg, Ohio. Growing up, we had no idea that this huge Department of Energy site with 16-foot thick below-ground blast walls was one of a very few DOE facilities for the research, development, and production of nuclear weapons components. The Lab also produced nuclear power sources for deep space and lunar missions, including the Voyager 1 Interstellar Mission.

We also had no idea that our Miamisburg school mates were the children of over 300 of the world’s top chemists and physicists who were moved secretly to Miamisburg, Ohio after World War II. Our father was an Army veteran on one of the first troop ships to occupy the Japanese Imperial Naval Academy. He was a civil engineer with Maxon Construction Company, the engineering firm that built the Miamisburg facility. He had witnessed firsthand the blistering devastation of Hiroshima and Nagasaki and wrote home describing it.

The Mound DOE Lab was a critical part of the “Manhattan Project” which was America’s all-out effort to develop a nuclear weapon before the Germans, Japanese, Italians or Russians.

America needs a new Manhattan Project to restore digital integrity

I have been asked numerous times about WikiLeaks Vault 7: What is disclosed? How damaging is the information? Do you think Julian Assange is a patriot or a villain?

For the longest time I reserved judgment on Mr. Assange. The spy business is a game of shadows. Everyone lies for a living. Therefore, whatever we read in the media is all too often disinformation. The citizens of the old Soviet Union used to joke about the reliability of their official news sources: “We are experts at reading between the lines.”

It appears we have reached that point in America. In fact, our situation is much worse.

The difference between the old Soviet media and American mainstream media today is profound. At least in the Soviet Union, nobody believed the Communist Party newspaper PRAVDA. But in America today, well-known C.I.A.-financed mind control virtue signaling via the mainstream media (CNN, NBC, MSNBC, CBS, ABC, CNBC, The New York Times, The Washington Post, even some at Fox) is being used successfully on many fronts including elections, values, finance, education, race, climate, healthcare, gun control and culture. Indeed, these outlets prove that the average unsuspecting American is gullible and easily manipulated, even when their previously trusted news sources are working against their interests.

America’s founders envisioned a Free Press that would hold the powerful accountable. However, when those media organizations are themselves funded by the very governments, spy agencies, big banks and corporations that they are supposed to watch, then they fall silent. Worse, they produce fake news to further deceive us and support their overseers.

Jesus Christ the Good Shepherd
Fig. 8—Jesus Christ the Good Shepherd.

Jesus Christ was asked how to discern false prophets—how to tell the difference between a sheep and a ravenous wolf dressed like a sheep. He said:

“You will know them by their fruits. Grapes are not gathered from thorn bushes nor figs from thistles, are they?” Matthew 7:16.

Using Christ’s guidance, I’d say Julian Assange is a patriot. (1) He has revealed to us that the Clinton, Bush and Obama governments have been leading a global organized crime syndicate of Deep State bureaucrats and corporate cronies. (2) He carefully avoids harming individual intelligence agents in the field. (3) He curates his information thoroughly. And, (4) to my knowledge, has never published anything but facts.

Therefore, as a journalist, Julian Assange is producing wonderful fruit. He is doing his job! The fact that the C.I.A. lost control of the Vault 7 data is certainly not Julian Assange’s doing.

Regardless of one’s opinion of Julian Assange and WikiLeaks, Vault 7 is out there and must now be addressed. One cannot now pretend that Vault 7 is not published.

It reveals several glaring truths:

  • The Clinton, Bush and Obama governments have been spying on us without a warrant, which was declared illegal by the Second Circuit Court of Appeals in 2015. Despite that ruling, the unscrupulous lawyers of the Deep State shadow government ignored it and kept the program going “under different authorities.”
  • Our government is allied with a group of un-elected crony capitalists who are exploiting our private information to further consolidate their wealth, power and eugenicide within world populations. What God loves, they hate.
New! Apr. 08, 2017: FBI superstar said many in Congress are "set up and framed through sex & drugs"  by a "rogue" C.I.A. criminal enterprise operating inside our government

This problem can only be fixed by a digital Manhattan Project where our best and brightest patriots—technologists who have not sold out to the Deep State—are brought together to fix the problems that these rogues have created, before the forces of evil triumph.

Digital C.I.A. rogues have exposed corporate directors to massive liability risks never before seen

  1. Corporate directors have a fiduciary duty to protect the assets of their company.

    Director Duties of the Business Judgment Rule: good faith, loyalty, and due care.

  2. Corporate directors must certify to their shareholders that reasonable measures have been taken to maximize the value of the company assets, especially against hostile takeovers. The rogue C.I.A.’s theft of corporate data is, in effect, a hostile takeover of the company assets.

    Revlon Rule: The legal requirement that a company’s board of directors make a reasonable effort to obtain the highest value for a company when a hostile takeover is imminent. Revlon, Inc. v MacAndrews & Forbes Holdings, Inc.

  3. Corporate directors are legally liable, both civilly and criminally, if they make fraudulent certifications to shareholders and customers.

WikiLeaks Vault 7 has revealed that a rogue group within the C.I.A. has hijacked the hardware, software and firmware of the Internet, and thus, ALL of the data that flows through it.

Vault 7, and related releases, proves unequivocally that many of the technology companies that we trusted (1) are not only compromised by this rogue C.I.A., but (2) they are a part of it. Worse, many of these companies were actually started by the rogue C.I.A. through its “public-private” venture capital arm In-Q-Tel formed by President Bill Clinton and Larry Summers on Sep. 29, 1999.

The evidence now shows that the companies colluding with Deep State shadow government bureaucrats include In-Q-Tel, National Venture Capital Association (NVCA), IBM, Microsoft, Oracle, SAP, Facebook, Google, Instagram, What's App, Groupon, Zynga, AT&T, Verizon, Qualcomm, EMC, Dell, LinkedIn, Intel, AMD, Micron Technology, Cisco, Xerox, Boeing, VK, Gmail, Mail.ru, Lenovo, Goldman Sachs, Morgan Stanley, JPMorgan Chase, Greylock, Kleiner Perkins, Gibson Dunn, Cooley Godward, Orrick Herrington, Perkins Coie, Skadden Arps, Fenwick & West, Chandler Law Firm, Williams & Connelly, Latham Watkins, Accel Partners, IDG Capital (China), Tsinghua University, Barclays, Deutsche Bank, HSBC, Vanguard, Fidelity, T. Rowe Price, The Washington Post, The New York Times, Lockheed Martin, Raytheon, EMC, Dell, HP, Twitter, Apple, Amazon and Netflix.  See The IBM Eclipse Foundation; see also President Obama's Silicon Valley dinner guests (Feb. 17, 2011) and his Technology CEO Council (Mar. 02, 2015).

Bookmark: #fig-10
On Mar. 02, 2015, President Obama met with chief beneficiaries of the stolen Eclipse Foundation code:IBM, Xerox, Dell, Micron, Qualcomm and EMC. Given the timing of this meeting―a week after the radical “Net Neutrality” changes to Internet regulation by the FCC—the real agenda of this group was most likely to discuss progress on their common agenda—the IBM et al “The Internet of Things” takeover of global digital infrastructure
Fig. 10—On Mar. 02, 2015, President Obama and Valerie Jarrett met with chief beneficiaries of the stolen Eclipse Foundation code: Ursula M. Burns (Xerox), Michael Dell (Dell), Dermot Mark Durcan (Micron Technology), Steven M. Mollenkopf (Qualcomm), Virginia M. Rometty (IBM) and Joseph M. Tucci (EMC). Given the timing of this meeting―a week after the radical “Net Neutrality” changes to Internet regulation by the FCC—the real agenda of this group was most likely to discuss progress on their common agenda—the IBM et al “The Internet of Things” Deep State shadow government takeover of global digital infrastructure.
Photo: IBM.
Bookmark: #fig-11
On Mar. 02, 2015, President Obama met with chief beneficiaries of the stolen Eclipse Foundation code:IBM, Xerox, Dell, Micron, Qualcomm and EMC. Given the timing of this meeting―a week after the radical “Net Neutrality” changes to Internet regulation by the FCC—the real agenda of this group was most likely to discuss progress on their common agenda—the IBM et al “The Internet of Things” takeover of global digital infrastructure
Fig. 11—On Feb. 17, 2011, President Obama toasted their deception of the American public and the world with 13 members of the IBM Eclipse Foundation NSA Deep State shadow government in Silicon Valley. Conspirators pictured are Barack Obama (U.S. President), Mark Zuckerberg (Facebook CEO), Steve Jobs (Apple CEO), Steve Westly (Westly Group Partner), John Doerr (Kleiner Perkins Partner), Ann Doerr (John Doerr Spouse), Eric Schmidt (Google CEO), Art Levinson (Genentech Chairman), John Chambers (Cisco CEO), Larry Ellison (Oracle CEO), Reed Hastings (Netflix CEO), John Hennessy (Stanford Univ. President), Carol Bartz (Yahoo CEO) and Dick Costolo (Twitter CEO).
Photo: FinanceTwitter.com

The government’s own documents have hidden these relationships in plain sight at the Department of Homeland Security via the National Infrastructure Advisory Council (NIAC) and the National Institute of Standards (NIST) Dual_EC_DRBG encryption algorithm (backdoor) registry first proposed by John Podesta and Bill Clinton at the Third CPSR Cryptography and Privacy Conference (1993).

Setting aside the evident collusion, this article focuses on the director liability implicit in the WikiLeaks Vault 7 revelations.

Vault 7 shows that the C.I.A. can effortlessly bypass firewalls, security and encryption and seize anyone’s data from any kind of computing device whether that data is stored or being uploaded or downloaded. 

This compromise applies to databases, web servers, mainframes, files, documents, presentations, tweets, instant messages, texts, social posts, photos, medical records, love letters, arrest records, property records, pharmacy purchases, banking information, tax information, location, purchases, financial transactions, laptops, mobile phones, servers, routers, switches, cell towers, satellites, TVs, radios, toasters, refrigerators, automobiles, trucks, navigation devices . . . anything digital. In short, any device that is connected to the internet, or not, is able to be hijacked at will.

Ironically, they do this in plain sight, calling it “The Internet of Things.

RESULT: Director liability has just skyrocketed off the charts

Corporate Director Liability skyrockets after WikiLeaks Vault 7

Vault 7 shows us that the C.I.A. has used its various custom malware tools to gain access to all your corporate data assets. The fact that the C.I.A. lost control of its malware means one must assume that those tools are also in the hands of predators, terrorists and competitors.

By teaming up secretly with “Big Data” technology vendors, this rogue C.I.A. group and the vendors share our data to oppress us into compliance through ignorance.

We are ignorant no longer.

Therefore, corporate directors cannot stick their heads in the sand and pretend that they do not know about this total breach of trust by the providers of our digital networks.

In conclusion, corporate directors can no longer certify that their corporate digital assets are secure from thieves, competitors and predators.

LIABILITY NOTICE, Apr. 03, 2017: Subsequent to WikiLeaks Vault 7, corporate directors have a duty to notify their shareholders and customers that all their company’s data, including all customer data, has been compromised by a rogue C.I.A. and its complicit commercial technology suppliers.

Congress needs to stop sitting on this destruction of our Republic and get these scoundrels locked up.

Deep State Rogues Poster: HTML | PDF

Deep State Collusion Timeline: HTML | PDF

* * *

Notice: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself. Photos used are for educational purposes only and were obtained from public sources. No claims whatsoever are made to any photo. Fair Use is relied upon.

Comment

Click "N comments:" on the line just below this instruction to view comment on this post. On about Dec. 05, 2016, Google began blocking comments to this blog. However, if you email your comment to a secure email website we have established at:: afi@leader.com we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.