AFI Custom Search

To ensure you are reading the latest post, click the logo above.
SEARCH by topic, keyword or phrase. Type in Custom Search box
Use this Custom Search toole.g. "IBM Eclipse Foundation" or "racketeering"

Friday, October 12, 2018


Creators of this digital dystopia: Hillary’s Acxiom and ENTRUST, FTC, SES, Silicon Valley, In-Q-Tel, Highlands Group, IBM Eclipse Foundation

A persecuted Chinese minority is Hillary's beta testing guinea pig

On Oct. 01, 2018, Hillary’s Acxiom transferred America’s “dark profile” personal data to China where Acxiom also controls China's digital keys via ENTRUST

Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Oct. 12, 2018, Oct. 20, 2018 | PDF |
AFI. (Oct. 12, 2018). Chinese social credit digital prison was created in America by Hillary. Americans for Innovation.
Fig. 1—The Chinese government has already deployed a "social credit score" system in the Xinjiang Uyghur Autonomous Region (XUAR) (21.8 million people—more than Florida). On Oct. 10, 2018, the U.S. Congress published findings that China has "expanded collection of biometric data, growing surveillance networks, and continued development of the social credit system. Reports show that social and political management of the Chinese people was aided by smart technology and advances in artificial intelligence (AI) in new ways this past year, including efforts to create 'a pervasive system of algorithmic surveillance.'" The digital dragnet includes low-paid "convenience police stations" laid out in a 500 meter grid across whole cities to preemptively arrest people with low social credit scores.

On Sep. 21, 2018, Google-Alphabet's Eric Schmidt sang the praises of Chinese business while he lied that such totalitarian restrictions on the Chinese Internet would not occur for a decade. They are here now, and Google-Alphabet-Schmidt rogue C.I.A.) is helping the Chinese government repress its people.

H. Rept. 115-NN. (Oct. 10, 2018). Congressional-Executive Commission on China, Annual Report, 2018. 115th Congress, 2nd Session. Congressional-Executive Commission on China. GPO.

Photos & Graphics: Unknown..
Are we witnessing in the social credit score the implementation of "The Mark of the Beast?"

—“It also forced all people, great and small, rich and poor, free and slave, to receive a mark on their right hands or on their foreheads, so that they could not buy or sell unless they had the mark, which is the name of the beast or the number of its name. This calls for wisdom.”
The Book of Revelations 13: 16-18

See Fig. 8 below"The BEAST is here. What is your SM number?"

(Oct. 12, 2018)—Most Americans know about a FICO score. It measures consumer credit risk. It is named after the Fair, Isaac and Company data analytics firm based in San Jose, CA. It scores a person’s ability to pay back loans. The higher your score, the easier it is to get a loan on better terms. The lower your score, the more difficult it becomes.

Social networking has created new opportunities for data brokers to collect more kinds of data on you. Vulture lawyers now hover over this new space. In 2001, they re-wrote end user license agreements to lure unsuspecting Internet users into giving away their personally identifiable data in return for free stuff. The typical uniformed user response is "I don't have anything to hide" as the data brokers rub their hands together fiendishly.

Bookmark: #prison-planet |
Learn how Prison Planet operates
Fig. 2Gabriel, McKibben. (Oct. 10, 2018). Learn how Prison Planet operates - your freedom depends on it. American Intelligence Media, Americans for Innovation. | (Raw *.mp4 video file).
American Intelligence Media, Americans for Innovation.
Bookmark: #china-social-credit-score |
Exposing China's (Hillary's) Dystopian Dictatorship
Fig. 3Foreign Correspondent. (Sep. 18, 2018). Exposing China's Digital Dystopian Dictatorship. Australia Broadcasting Corporation. | (Raw *.mp4 video file).
Source: Australia Broadcasing Corporation.

Social End User Licenses: Immoral abuses of the Bill of Rights

For example, the current Google Terms of Service, under “Your Content in our Services, ” paragraph one says “You retain ownership of any intellectual property rights that you hold in that content. In short, what belongs to you stays yours.” So far so good.

But now, the legal sleight of hand follows in the very next sentence:

“When you upload, submit, store, send or receive content to or through our Services, you give Google (and those we work with) a worldwide license to use, host, store, reproduce, modify, create derivative works (such as those resulting from translations, adaptations or other changes we make so that your content works better with our Services), communicate, publish, publicly perform, publicly display and distribute such content.” [Sucker]
Eric Schmidt
Eric Schmidt, CEO, Google / Alphabet, DoD, rogue C.I.A.; gave Barack Obama White House and Hillary 2016 $1.5 billion to create the U.S. Digital Service (Apr. 15, 2014), aka "The Eric Scmidt Project (Cheryl Mills email)" (WikiLeaks) to attempt interference in the 2016 Presidential election.

Google-Alphabet giveth, and Google-Alphabet taketh away.

This is proof positive that freedom loving peoples cannot allow spies, lawyers, bankers, accountants and programmers to control our social discourse.

This is proof that these people, in whom we invested our trust, are criminals and not worthy of that trust.

Abuse of the U.S. Constitution started this slide into totalitarianism

This abuse of the Fourth and Fifth Amendment (rights to privacy and property) has its legal genesis in the Highlands Group, Sir Geoffrey E. Pattie and the Queen’s Privy Council,  IBM [rogue C.I.A.] Eclipse Foundation,  Obama’s eventual Patent Office director and former IBMer David J. Kappos, and law professor James P. Chandler, III who promoted an “IBM Common Public License 0.5” draft. This occurred at the same time that these criminals began giving away to Silicon Valley the social networking invention on (Aug. 29, 2002) that Chandler had stolen from his client—innovator Leader Technologies, Columbus, Ohio. Other innovators, like Dr. Lakshmi Aranachalam (Menlo Park, CA) and Joannes Van Der Meer (Amersfoort, Netherlands), were equally abused.

Obama's Big Data “Datapalooza”—Feasting on The Seven Deadly Sins

With the advent of social networking data, data brokers starting in 2004 after IBM EclipseCon 2004 (Feb. 2-5, 2004), became like wild dogs feasting on red meat. The rush to feed on the new social data was a literal stampede of immorality. By 2007, everyone was jumping on board and the rogue C.I.A. was loving it. Note: Facebook launched during this conference. They did not resist the temptation to engage in the seven deadly sins (i.e., pride, greed, lust, envy, gluttony, wrath and sloth) to exploit these new kinds of data on social interactions suddenly available to them.

James P. Chandler, III
James P. Chandler, III, chief legal advisor to the SES, IBM Deep State shadow governments under Bill Clinton, George Bush, Barack Obama; former treacherous trade secrets and patent attorney for Leader Technologies, inventor of social networking, from whom Chandler stole then weaponized the invention. See Crimeline.

In an unguarded moment, George Washington University law professor James P. Chandler, III told Leader’s lead inventor and CEO, Michael McKibben (his client), that he believed if a person could invent something, he or she should invent that thing—no matter the moral consequences. He said he believed that the law (lawyers) would eventually catch up to the bad consequences.

McKibben says he pushed back, saying that lack of respect for the image of God reflected in a fellow human being (Gen. 1:27) should be a natural check on an inventor, especially for computer systems where the average person cannot see the bits and bytes. McKibben observed that unchecked technological changes would overwhelm the plodding legal process unless technologists themselves practiced moral restraint.

Hindsight proves that Chandler's argument was self-serving since his conspirators at IBM were busy stripping out the privacy and security controls in McKibben social networking invention that Chandler had fed to them off of Leader's storyboards. . . all in the name of national security and counterterrorism, of course.

By stripping out the privacy and security controls in McKibben’s version of social networking, the data broker rogues have had their way with your personal data.

Techno-Fascist Siren Song: “Privacy is for old people”

NO, privacy is the right of citizens IN A CONSTITUTIONAL REPUBLIC

Reid Hoffman
Reid Hoffman (PayPal, C.I.A., LinkedIn, Facebook, WhatsApp, Instagram): "Privacy is for old people."

To promote the death of privacy, Silicon Valley bad boy Reid Hoffman (Reid Hoffman (PayPal, C.I.A., LinkedIn, Facebook, WhatsApp, Instagram) famously said at a 2010 World Economic Forum seminar that “privacy is for old people.” This was certainly a self-serving Siren Song by one of the world’s most heinous privacy abusers.

On Mar. 09, 2012, President Obama hired Silicon Valley trickster Todd Y. Park as his White House chief technology officer. Park promoted “Datapalooza” across all key agencies of the Executive Branch to “unlock” that data they keep.

Todd Y. Park
Todd Y. Park, Obama and Hillary's Silicon Valley "Big Data" technology shill

In sophomoric rah rah Datapalooza cheerleader gatherings, Park released massive amounts of “Big Data” to his Silicon Valley venture capital cronies in all sorts of fields including healthcare, weather, space, housing, environment, food, agriculture, disease, commerce, financing, banking, geology, census, law, transportation, disasters, oceans, forests, aid, education, science, research, money, shipping, communications, fish & wildlife, recreation, safety, intelligence, policing, insurance, labor, border protection, patents, copyrights, trademarks, animal life, rail, trucking, automobiles and manufacturing

Hillary Clinton
Hillary Clinton

Park disclosed no conflict with his Silicon Valley handlers. As a reward, Obama even let Park take his healthcare data company, Castlight Health, public while Park worked at the White House! That is so illegal. It violates our most basic conflict of interest laws prohibiting a public figure from trading on his public position for private gain. Equally illegal, Obama loaned Park to the Hillary for President 2016 campaign to coordinate the highly illegal collaboration between Facebook and Eric Schmidt's U.S. Digital Service run out of the White House.

Hillary’s Datapalooza

Jerry C. Jones
Jerry C. Jones, Hillary's Rose Law Firm 19-yr. partner, director and officer of ENTRUST (encryption keys, incl. FBI), Acxiom (exploitive Big Data) based in Little Rock, Arkansas.

One of the key beneficiaries of Park’s datapalooza has been Jerry C. Jones, a 19-year law partner with Hillary Clinton in the Rose Law Firm, Little Rock. See Acxiom insider trading report.

As of Oct. 1, 2018 (just eleven days ago), Acxiom moved to Shanghai, China and changed its name to "Live Ramp," but not to worry, Acxiom still holds 100% controlling interest in 27 subsidiaries in the US, Netherlands, China, Australia, Brazil, Germany, UK, France, Poland, New Zealand, Singapore, Cayman Islands and Mauritius. In addition, Acxiom has had 48 contracts with the U.S. government (GSA, State Department, Veterans Affairs).

Acxiom customers include most U.S. social and telecommunications providers including AT&T, Comcast, Cisco, Adobe, Comscore, Dish, Facebook, Foursquare, HP, Gay Network, IBM, Microsoft, Pandora, Pinterest, Spotify, Tivo and Yahoo! These companies are also all IBM Eclipse Foundation members. Every one of these companies is dependent on ENTRUST certification directly, or through a sublicensor. ENTRUST even licenses digital keys to the Government of China Financial Certification Authority, the People's Bank of China, Entrust China Aerospace New World.

Did Acxiom/ENTRUST take America’s data with them to China? Evidently YES (although it was probably already there, but us We The People saps did not get the memo).

Bookmark: #china-ses-entrust-acxiom |
Hillary / SES / ENTRUST / ACXIOM control of encryption keys globally
Acxiom Holdings, Inc. ACXM Co. No. 733269. (Compiled Sep. 21, 2018). Insider Trading Ownership Reports. SEC Edgar.
Fig. 4—ENTRUST 10-K. (1998-2009). Disclosed Material Relationships for Customers, Partners, Directors, Officers, Dependents, Subsidiaries, compiled Sep. 13, 2018. U.S. SEC Edgar. (Raw. *.xlsx spreadsheet file). See also AFI. (Sep. 16, 2018). Hillary Clinton controls 50,000 FBI encryption keys proves Mueller's Russia witch hunt is treasonous. Americans for Innovation.
Graphic: SEC Edgar.

Why China?

Xi Jinping
Xi Jinping, General Secretary of the Communist Party of China, President of the People's Republic of China, and Chairman of the Central Military Commission.

Why China? Because China's leader Xi Jinping has already implemented a “Social Credit System” that has combined much more than financial data to create detailed profiles on its citizens. Commentator Douglas Gabriel from American Intelligence Media calls them "digital boxes."

On May 01, 2013, Obama’s Federal Trade Commissioner Anita Ramirez—a long-time member of the Senior Executive Service (SES, Plum Book 2016, p. 178)—gave the green light for Acxiom (the largest data broker she studied) to build a Social Credit System in the U.S. without consequence. She published “an in depth study of nine data brokers” titled “Data Brokers - A Call for Transparency and Accountability.”

Edith Ramirez
Edith Ramirez, former Commissioner of Federal Trade Commission (FTC), Senior Executive Service (SES) member.

They reported that an unnamed company (probably Acxiom) was keeping track of over 2,000 types of information on you. With this level of detail they are actually able to accurately predict your thoughts. See "Illustrative List of Data Elements and Segments" (FTC/SES Ramirez, p. 97).

Ramirez's conclusions were maddening. After calling for transparency and accountability, and decrying the scope and secrecy of the data collection, she admitted that “in the nearly two decades since the Commission first began to examine data brokers, little progress has been made to improve transparency and choice.” She then called for nothing more than “ongoing dialogue.” (READ: Do nothing, thus allowing the data brokers to abuse their uses of the intimate details of every American's life and well-being.

Indeed, Ramirez "pulled a Comey" on the public. She laid out the sins of the data brokers, just like Comey outlined Hillary Clinton’s private server sins, then she essentially exonerated Hillary and Acxiom by taking no regulatory action. In short, Ramirez gave the data brokers the go ahead to continue their abuses.

Now we know why our government is so flaccid. Too many of our regulators and members of Congress are beneficiaries of this Datapalooza. Most of them are deeply invested in illegal stock tips (insider trading) that they have received from these wrongdoers. They are beneficiaries of this immorality.

Many of the people that we have entrusted with governing us are abusing us instead. It is past time for We The People to seize the reigns of control of our government. We have that right and duty. The fact is, we may never have had the freedoms we think we have, given the way our banking system has been manipulated by the British City of London following the American Revolution.

But now, perhaps we can finally establish a working version of governance that our Founders envisioned.

Alibaba, Ant Financial and Alipay

Jack Ma Yun
Jack Ma Yun, alleged founder (1999) and CEO of Alibaba; second largest Alibaba shareholder; director of Alibaba Partnership

The largest Chinese mobile payment platform supporting this dystopian digital surveillance and social credits is Ant Financial. Ant is a subsidiary of the megalopoly Alibaba—a creation of American, British and European banks, the usual suspects: Goldman Sachs, JP Morgan Chase, Wells Fargo, Deutsche Bank, HSBC, Barclays, Citibank and Credit Suisse.

Bookmark: #alibaba-globalist-principals |
Alibaba (NYSE: BABA globalist directors & officers
Alibaba Group Holding Ltd, Form 20-F, BABA, CIK 0001577552. (Jul. 27, 2018). Annual Report, pp. 173-178. U.S. SEC Edgar.
Fig. 5—Alibaba Group Holding Ltd, Form 20-F, BABA, CIK 0001577552. (Jul. 27, 2018). Annual Report, pp. 173-178. U.S. SEC Edgar.
Graphic: SEC Edgar.

Ant Financial, as an Alibaba subsidiary, recently received a $14 billion investment from Silicon Valley, including Warburg Pincus, Carlyle Group, Sequoia Capital, Wharton Alumni Angels and IDG Capital (Accel Partners, James W. Breyer, John P. Breyer, Facebook).

Bookmark: #ant-financial-tyranny |
Ant Financial (Alibaba China) global digital hegemony / tyranny
Ant Financial. (Accessed Jun. 14, 2016). Corporate Vision. Alibaba China.
Fig. 6—Ant Financial. (Accessed Jun. 14, 2016). Corporate Vision. p. 5. Alibaba China.
Graphic: SEC Edgar.
Breyer's son, James W. Breyer, is chairman of Accel Partners LLP, former chairman of Facebook, and Facebook's 2nd largest shareholder. Breyer became chairman of the National Venture Capital Association (NVCA) on May 13, 2004, just as the confiscation of Leader Technologies' invention by IBM's Eclipse Foundation was gaining steam.
Fig. 7—James W. Breyer's father, John P. Breyer, dropped off the radar screen twenty years ago after he founded Computer World. He moved to China, organized IDG Capital Partners (China) and IDG-Accel (China) and has been secretly coaching his son James at Accel Partners LLP ever since. Pundits believe that John Breyer, along with his fellow Hungarian refugees, George Soros and Andy Grove, has been patiently steering the global technology world toward their New World Order agenda. They have evidently chosen to drive this bus from China. Hence James' exclamation that he is "Super bullish on China."

On paper, Alibaba is about 30% owned by Softbank which is dominated by the usual Deep State shadow government SES suspects like Vanguard, Wells Fargo, Fidelity, Sequoia, Carlyle, IDG, Accel Partners, James W. Breyer, John P. Breyer, Kleiner Perkins, etc.

Breyer (2005): Secret "Win-in-China" Hong Kong company incorporated (HSBC Swiss Leaks)

On Mar. 02, 2005, Accel Partners' managing partner, James W. Breyer, secretly incorporated "Win-in-China as first revealed in the HSBC Swiss Bank Leaks. Breyer was appointed chairman of the National Venture Capital Association (NVCA) on May 13, 2004, just as the confiscation of Leader Technologies' invention by IBM's Eclipse Foundation was gaining steam.

Also on paper, the Chinese government has 51% control of Alibaba, but this recent $14 billion Silicon Valley investment in Ant Financial aka Alipay—the major moneymaker—gives the Silicon Valley banks effective control of the companies and their profits. In short, they give this control to Hillary Clinton via Acxiom and ENTRUST. These convolutions are used to confuse everyone (that's how they have hidden their treachery), but we now see through these banker shell games.

[Return to this article. We will be adding more financial documents to show these convoluted corporate conspiracies.]

On Oct. 1, 2018, Hillary Clinton's Acxiom / ENTRUST companies officially moved to China.

On paper, Alibaba, Ant Financial and Alipay are majority Chinese owned. But, in reality, American banks and European hangers on like Deutsche Bank, Credit Suisse, HSBC and Barclays, run the show.

This constellation of facts proves that American money from Wall Street and Silicon Valley is enabling China's dictator Xi Jinping to pursue massive abuses of human rights, as we speak.

As observed earlier, it is past time for American citizens to retake control of our lawless bureaucrats and their accomplices—before the social credit score system is fully implemented on our shores.

Bookmark: #what-is-your-social-score |
What is your [Chinese] social credit score?
Fig. 8Gabriel, McKibben. (Oct. 17, 2018). The BEAST is here. What is your SM number? American Intelligence Media, Americans for Innovation. | (Raw *.mp4 video file).
Source: Australia Broadcasing Corporation.
Bookmark: #alibaba-globalist-platform |
Alibaba and the Globalist Thieves
Fig. 9Gabriel, McKibben. (Oct. 19, 2018). Trump could end it all in a BLINK - Alibaba and the Globalist Thieves. American Intelligence Media, Americans for Innovation. | (Raw *.mp4 video file).
Source: American Intelligence Media, Americans for Innovation..
Bookmark: #miller-act-msm-big-tech-takedown |
The Miller Act Notice turns the tables on Big Tech and MSM hegemony founded on theft
Fig. 10—Share in article form here (includes a copy of the actual Miller Act Notice: Caller ‘Bob’ Calls A.J. Show and Tells Story of Leader Technologies and Theft of Social Media | (Raw *.mp4 video file).
Source: American Intelligence Media, A.J. Show

Call to action:

We must protect the vote. Now. We cannot allow these criminals to hijack any more elections. Free and fair elections are the property of the citizens in this Republic, not the government. We have gone to sleep. Now that we are awake, we must take action across this country in the coming weeks to protect the 2018 midterm elections.

We must ensure an unbroken bipartisan chain of custody. That should be your rallying cry. This will essentially eliminate the imminent danger from rigged electronic voting machines. Back to the future: (1) Paper ballots, (2) Inked thumbs, and (3) Unbroken bipartisan chain of custody! It is really that simple.

In addition, God-fearing citizens of the United States and the world must call upon President Trump and loyal American leaders to defund the feeder systems used by these SES corruptocrats.

Ask President Trump to write the check to Leader Technologies for their Miller Act Notice so they can help implement new technologies that respect Constitutional privacy and property and help implement a truly Free Press.

Mr. President: Defund these Criminals and Fund The Miller Act Notice

Mr. President, please pull the plug on these corruptocrats and their illegal funding streams. Since they are all based on fake values, no real services will be affected.

In addition, write the Miller Act Notice check to Leader Technologies for 18 years of unpaid use of their revolutionary social networking invention—which these Privy Council criminals (Sir Geoffrey E. Pattie and Lord Mark Malloch-Brown) have hijacked with the Senior Executive Service (SES) to takedown the American Republic.  This will generate new cash streams to free up our economy from the globalist stranglehold.  This will also empower Leader Technologies and other actually creative people in America to fix our foundering ship of state.  See Leader Technologies files trillion dollar bond lien on the U.S. Government.

One Miller Act Notice check starts the ball rolling, Mr. President.

In addition, Leader shareholders have proposed a win-win solution to the collapse of the American Free Press, as well a large new revenue source without raising taxes. Leader principals are willing to funnel these payments back into establishing a truly Free Press. See Leader proposes trillion dollar fed revenue while lowering taxes.

* * *

Return to return to the beginning of this post.

Saturday, September 15, 2018


With these encryption keys, nothing in our digital lives is off limits to the Clinton's and their conspirators

President Trump’s new executive order can be sabotaged with these keys; alternatively, he can use the order to prosecute these criminals

Many foreign powers have conspired with the SES and their Queen’s Privy Council overlords since before 1993

Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Sep. 16, 2018, Updated Oct. 01, 2018 | PDF |
Hillary-Mueller FBI encryption Treason
AFI. (Sep. 16, 2018). Hillary Clinton controls 50,000 FBI encryption keys proves Mueller's Russia witch hunt is treasonous. Americans for Innovation.
Fig. 1—Hillary Clinton has all of our encryption keys, including the FBI's. "Encryption keys" is a general reference to several encryption functions hijacked by Hillary and her surrogate ENTRUST. They include hash functions (used to indicate whether the contents have been altered in transit), PKI public/private key infrastructure, SSL (secure socket layer), TLS (transport layer security), the Dual_EC_DRBG NSA algorithm (Dual Eliptical Curve Deterministic Random Bit Generator) and certificate authorities. The convoluted structure managed by the gutless agency chief information officer "Federal Common Policy" group says it has "hundreds" of certificate authorities, but this is a material lie. They have ceded "Root" authority (the basis of the X.509-based public key infrastructure) to key companies like ENTRUST INC, including the ability to sublicense their authority to third parties who in turn manage entire other networks (cross-certificates, subordinate certificates, Bridge certificate authorities) in a Gordian knot of incestuous commercial relationships clearly designed to fool the public to hide their devilish criminality. All roads lead back to Hillary and the Rose Law Firm.
Click here to read a list of just some of the "more than 2000 organizations in 60 different countries" for which Hillary has backdoor encrytion keys. Source: ENTRUST 10-K Annual Reports (1998-2009). SEC Edgar. Annual reports from 1998 to 2009 and selected other filings.

1999 | 2000 | 2001 | 2002 | 8-K. FBI Contract Press Release (Oct. 29, 2003) | Jones' Stock Options (Dec. 05, 2003) | 2003 | Co. Overview (2003) | Jones' Signature (Dec. 23, 2003) | Jones' Bio (Mar. 15, 2004) | 2005 | 2006 | 2007 | 2008 | 2009 | 2009A | Relationships (1998-2009)

AFI (Nov. 06, 2015). Complicit encryption geeks enable the American spy state. Americans for Innovation.

AFI (Nov. 25, 2015). Dell and Lenovo (IBM) ship computers with spy state backdoors. Americans for Innovation. | (Raw *.mp4 video file—use if the YouTube version is censored).
Graphic: The Judiciary Report.
Deciphering Hillary's encryption Keys that have kept her one step ahead of the sheriff

SPECIAL NOTICE: This post is a work in progress. You are encouraged to return to pick up additional evidence as it is added. Indictable evidence continues to pour in for use by prosecutors, alternative media, Treasury, U.S. Marshalls and military tribunals. These criminals have relied on the fact that encryption, cryptography and cryptanalysis is a field of esoteric mathematics for which the average person has little interest. Hopefully, that will now change.

Cryptography—the use of codes and ciphers to protect secrets—began thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper.

In a simple form, simply scrambling the letters in a word is a basic form of cryptography. HELLO might become OLHEL or LEHLO. In more sophisticated approaches, look up tables contain readable words in the first column and a replacement word in the second. The resulting message looks like jibberish until the look up table is used by the recipient. The public key infrastructure and certificate authorities discussed in this post are simply more scrambled forms of encryption.

The earliest example known was from an Egyptian scribe about 1900 BC. Assyrian merchants used a form of encryption called intaglio in 1500 BC. Hebrew scribes wrote a copy of the Book of Jeremiah in a substitution cipher in 605 BC. In 487 BC the Greeks used a "skytale" to encrypt important messages. Julius Caesar (100-44 BC) encrypted government communications. Abu ' Abd al-Rahman al-Khalil ibn Ahmad ibn Amr ibn Tammam al Farahidi al-Zadi al Yahmadi wrote a book on cryptography in 725-790 AD. Thomas Jefferson invented a wheel cipher. Tellingly, a design in 1976 by IBM based on "the Lucifer cipher" is now used and called "triple-DES" (the Triple Data Encryption Algorithm).

When the German Enigma Machine was cracked in World War II, the Allies could read ALL German communications from that point forward. In the same way, Hillary's access to the PKI, Dual_EC_DRBG algorithm and Certificate Authorities gives her access to The Internet of Things' version of the Enigma Machine break, which was considered by western Supreme Allied Commander Dwight D. Eisenhower to have been "decisive" to the Allied victory. See History of Encryption.

(Sep. 16, 2018)—Imagine that your identity is stolen suddenly.

Your healthcare, education, police, employment and bank records are all altered overnight to make you look like an embezzler. Imagine you are jolted awake the following morning by the police bashing in your door to arrest you. Imagine that the local TV is already carrying news of your arrest using a drunken party photo of you off your phone.

Imagine further that you are Hillary Clinton. You need for 55,000 Clinton Foundation emails on FBI director James Comey computer to disappear. Poof. They’re wiped without a trace.

Imagine still further that you are Lord Mark Malloch-Brown from the Queen’s Privy Council. You need to erase the U.S. Department of Treasury’s new evidence of foreign meddling embedded in your Smartmatic voting machines. Your bunk buddy George Soros makes a call to Hillary. Poof. This evidence is digitally wiped, without a trace.

This cannot happen in America you say? Think again.

Since these people have full backdoor access to any computer or phone on the Internet, can they ever be caught? Yes, once we realize how they do it. That method has just been discovered.

Bookmark: #jones-options |
Jerry C. Jones’ signature accepting his first issuance of 4,000 ENTRUST, INC (ENTU) director stock options. Entrust Inc, ENTU, Form 3. (Dec. 05, 2003). SEC Edgar.
Fig. 2—Jerry C. Jones, Rose Law Firm, first ENTRUST, INC. (ENTU) director stock option award issued in secret on Dec. 05, 2003.

Truth is, Hillary Clinton literally has access to every computer on the Internet through a company named ENTRUST. Her 19-year Rose Law Firm partner Jerry C. Jones directs the company (now ostensibly run by a Silicon Valley dude named Orlando Bravo and his private equity firm Thoma Bravo, LLC), and has done since Dec. 2003. Entrust issues the encryption keys for most major governments and companies in the world.

Bookmark: #hillary-jones-acxiom |

Where did Hillary send Jerry C. Jones after she took control of ENTRUST? Acxiom (Little Rock, AR)—a carbon copy of Cambridge Analytica & SCL Limited (Sir Geoffrey E. Pattie)

The Securities & Exchange Commission records reveals that at the same time Jerry C. Jones secretly became a director of ENTRUST, Inc., he also became a director of Acxiom Corp—a data analytics firm that appears to be a carbon copy of Cambridge Analytica and SCL Limited in the UK owned by the Queen's Privy Counsellor in charge of mass surveillance, Sir Geoffrey E. Pattie. See for yourself. Here is a PDF of the SEC filings. Here is an Excel spreadsheet showing the bevy of me-too beta-males and females who feed off of the Clintons and the SES in Little Rock, Arkansas.

Acxiom Holdings, Inc. ACXM Co. No. 733269. (Compiled Sep. 21, 2018). Insider Trading Ownership Reports. SEC Edgar.
Graphic: SEC Edgar.
Bookmark: #hillary-entrust |
Hillary has all your encryption keys
Fig. 4McKibben, Gabriel. (Sep. 13, 2018). Trump's September Surprise is a Doozy. American Intelligence Media, Americans for Innovation. | (Raw *.mp4 video file).).
Video: American Intelligence Media, Americans for Innovation.
Bookmark: #hillary-prison-planet |
Hillary's prison planet unlocked
Fig. 5McKibben, Gabriel. (Sep. 17, 2018). Hillary's PRISON PLANET Unlocked. American Intelligence Media, Americans for Innovation. | (Raw *.mp4 video file).
Video: American Intelligence Media, Americans for Innovation.
Bookmark: #acxiom-moving-to-china |
New! Oct. 1, 2018: Acxiom moving to China—spooked U.S. employees—We are at war with China

Fig. 6Douglas Gabriel, Michael McKibben. (Sep. 28, 2018). We are at war with China. American Intelligence Media, Americans for Innovation. | (Raw *.mp4 video file). See also Staff. (Sep. 28, 2018). ACXIOM (owned by C.I.A.-led Blackrock, controlled by Hillary) moving “data onboarding” operation from Little Rock, AR to China. Patriots4Truth.

Video: American Intelligence Media, Americans for Innovation.
Bookmark: #acxiom-china-distraction |
New! Oct. 1, 2018: While we were distracted. . .
Fig. 7Staff. (Sep. 29, 2018). While We Were Distracted. Headlines With A Voice.. | (Raw *.mp4 video file).
Video: Headlines With A Voice.

What is an encryption key why is this discovery so devastating to the Deep State shadow government?

Put simply, encryption keys are used on both the sender’s and receiver’s computers to send data. It takes two keys to make a connection to send or receive data. The Clinton Administration created “trusted Certificate Authorities (CA)” to check with to make sure that the two keys are the real sender and receiver. If your keys are not approved by the CA, your connection will be blocked. In the hands of tyrannical globalists like Hillary Clinton, Barack Obama, George Soros, Eric Schmidt and Robert Mueller, this will be the new censorship on the Internet.

Bookmark: #what-are-encryption-keys |
What are encryption keys?
AFI. (Sep. 14, 2018). Hillary Clinton controls 50,000 FBI encryption keys proves Mueller's Russia witch hunt is treasonous. Americans for Innovation.
Fig. 8—Put simply, it takes two keys to establish an Internet connection—the sender's and the recipient's. Those two keys are combined to encrypt your data stream, then decrypt it once it has been received.

Encryption scrambles the contents of your messages then files and unscrambles them once they reach their intended destinations using digital keys managed by encryption engineers.

For example, the phrase “your cancer treatment program” would be encrypted with a digital key and travel through the Internet as “Qij\aq6NB5Lf@;kndFq7CN{Q{." So, even if it was intercepted it could not be read. The theory is that this knowledge of your medical condition would remain confidential between you and your doctor. Not so for Hillary, she would see you have cancer and could use that information for blackmail, extortion or murder, whatever worked for her.

Graphic: Oracle.

These CA’s make a big deal in their propaganda that you can “trust” them not to use or spoof your identity to get access to data that you and they are not authorized to have. That is a boldface lie. No wonder these people have the countenances of criminals. They are, and they know it.

Suppose you are the CA who issues keys to the FBI. Suppose you want to see the evidence being gathered against you in an investigation.

All you have to do is “borrow” the FBI key from Hillary or ENTRUST. Then you can connect to the target FBI computer using a bogus key created for you by ENTRUST, and voile! You then have two “trusted” keys so the FBI computers let you in. There are technical nuances to this description, but basically, you can do what you want with these keys. Don't let trollers try to baffle you with techno-jargon to throw your dogs off the scent. Lucifer (literally, IBM Triple-DES) is in these encryption details.

Hillary Clinton has this level of access to practically all data on the planet, including the FBI, NSA, Departments of State, Commerce, Energy, Treasury, GSA, Patent Office, Post Office, NIST, as well as numerous foreign government and commercial entities. See ENTRUST 10-K Annual Reports (1998-2009). SEC Edgar.

Now that we finally know how the Clinton's stay one step ahead of the sheriff, we can now stop them.

More hard proof that Hillary Clinton is a digital monster

In this post, we will prove without a doubt how Hillary Clinton cleverly wormed her way into full access and control for 50,000 FBI encryption keys.

They are likely managing this empire from Obama’s Google-constructed U.S. Digital Service bunker three blocks from the White House manned by Valerie Jarrett and Eric Holder.

We admit that these findings sound more like Grisham fiction. But the evidence is a pesky thing. The evidence is now pouring out.

The evidence provided is “judicially recognizable” and indictable, we believe

“Notoriously public” information, like the U.S. Securities & Exchange Commission filings that we cite, is evidence that requires no further verification to be used in litigation, hence the adjective “notoriously.” This means that the information is so publicly noteworthy that further proof of validity is unnecessary. For example, John F. Kennedy was assassinated in 1963. That is a notoriously public fact and no proof is needed.

Notoriously public facts, like SEC filings, are “judicially recognizable” and can be accepted as truthful since the submitter attests to the SEC that they are true. It is criminal fraud to lie intentionally in SEC filings.

TIMELINE: Bill & Hillary Clinton began orchestrating unfettered access to the FBI’s encryption keys in 1993

On Jun. 07, 1993, the new Clinton Administration convened the “Third CPSR Cryptography and Privacy Conference (CPSR - Computer Professionals For Social Responsibility).”

The conference was held two days before an important Jun. 09, 1993 House hearing on "encryption and telecommunications network security." The conference gathered over 106 attendees representing government, politics, commerce, manufacturing, industry, media, technology, telecommunications, healthcare, banking, education, faith and accounting. That’s plenty of arm-twisting, even for Washington, D.C.

The meeting sponsor was globalist advocate Carnegie Endowment for International Peace.

The hosts included:

James P. Chandler, III

(1) James P. Chandler, III,  George Washington University intellectual property and national security law professor, and later patent attorney for social networking inventor Leader Technologies, Inc. (Jan. 2000);

John D. Podesta

2) John D. Podesta, chief of staff and campaign manager to Bill Clinton, Barack Obama and Hillary Clinton; and

Stephen D. Crocker

(3) Stephen D. Crocker, founding member of the illegal public-private conspiracy group Highland’s Forum/Group (Feb. 1995), then Barack Obama’s director of ICANN (Internet Corporation for Assigned Names and Numbers) who ceded control to the UN on Oct. 01, 2016—one month before Donald J. Trump was elected president.

Hillary hid the 1993 encryption meeting attendee list

The information about this meeting was hidden on Hillary’s private email server. It was unearthed by corruption watchdog Judicial Watch after they pressed the State Department in court to release the document.

Bookmark: #clinton-fbi-encryption-scam-begins |
The encryption key set up
AFI. (Sep. 14, 2018). Hillary Clinton controls 50,000 FBI encryption keys proves Mueller's Russia witch hunt is treasonous. Americans for Innovation.
Fig. 9—1993 Clinton encryption conference to give the FBI backdoor keys to the Internet.

James P. Chandler, III, John D. Podesta. (Jun. 07, 1993). Third CPSR Cryptography and Privacy Conference, included Stephen D. Crocker, John D. Podesta, James P. Chandler, III, Ann Harkins, Ken Mendelson (Stroz Friedberg), Juan Osuna, Cathy Russell, Steven Wolff, IBM, HP, AT&T. FOIA No. 9403963. U.S. Dept. of State. Note: This PDF file contains a spreadsheet of the attendees (click on the paper clip inside the PDF).
Graphic: Judicial Watch.

In 1993-1994, more than 20 people close to or investigating Clinton corruption died under suspicious circumstances.

Theft & Weaponization of U.S. inventions

In Feb. 1995, the Highlands Forum/Group was formed. It was and is a highly illegal private “public-private” meeting sponsored by the Department of Defense Net Assessment group run by Senior Executive Service (SES) members Richard P. O'Neill and Andrew W. Marshall. See also AFI. (Nov. 22, 2017). The Weaponization of Social Media Should Concern Us All. Americans for Innovation.

The no-notes meetings involve no-bid crony insiders from the military, intelligence, banking, technology, telecom, transportation, defense, venture capital, media an academia to discuss the weaponization of new inventions stolen by DARPA (Defense Advanced Research Projects Agency).

On Apr. 17, 1995, Clinton signed Executive Order 12958 titled "Classified National Security."

This order consolidated control of classification procedures to just seven people: (1) Secretary of State, (2) Secretary of Defense, (3) Attorney General, (4) C.I.A. Director, (5) U.S. Archivist, (6) National Security Director and (7) the President.

A most dubious provision said that any U.S. security classification that contradicted another country's laws or treaty rendered it of no effect. In other words, if Obama wanted to release a classified document, all he had to do was call up Justin Trudeau in Canada and ask him to pass a law saying America’s XYZ classified information was harmful to beavers on the northern slopes. That would nullify the U.S. classification and give Obama the excuse to release it. Clearly, it was a precursor to Obama’s foreign trade entanglements in the Trans-Pacific Partnership (TPP) that President Trump killed, thankfully.

On Apr. 19, 1995, the Alfred P. Murrah Federal Building in downtown Oklahoma City, was bombed by Timothy McVeigh and Terry Nichols—just two days after Bill Clinton formed a secret White House intelligence operation via Executive Order 12958 cited above.

This bombing created more excuses for mass surveillance against Americans. Notably,  Clinton body guard Alan G. Whicher was killed in this weapons grade-energy blast that could not have been caused by a fertilizer bomb, as were led to believe by MSM. Retired FBI superstar Theodore L. Gunderson, a short-list candidate to be FBI director, revealed that psychiatrist Dr. Jolly West, one of the founders of the C.I.A. MKUltra mind control program, paid a visit to McVeigh before the trial. Gunderson said he believed that McVeigh was a brainwashed MKUltra drone.

On Jul. 12, 1995, IBM and Lotus merged. Lotus Notes became the Deep State’s groupware platform of choice for establishing a global mass surveillance spy grid. PKI (Public Key Infrastructure) encryption standards were selected to build into IBM/Lotus/Microsoft/Novell/Red Hat software, hardware and firmware.

Laws changed to prepare for the Patriot Act abolishment of the Bill of Rights

Between 1995-1999, a series of national security laws, executive orders (EOs) and presidential policy directives (PPDs) were written for Clinton by James P. Chandler, III, his national security and intellectual property advisor.

Magically, the laws that Chandler drafted passed nearly unanimously. (Note: Whenever that occurs, all of Congress has been bought off or fooled en masse before the vote. Remember: Clinton had likely already had access to the FBI encryption keys by this time. Therefore, he had amassed plenty of blackmail and extortion information on every influential member of Congress.)

On Feb. 28, 1996, FBI Director Louis Freeh self-consciously deferred to James P. Chandler, III in his testimony on economic espionage, revealing that Chandler controlled FBI security policy for Clinton.  Freeh was clearly the puppet and Chandler the puppet master.

Bookmark: #chandler-fbi-freeh-clinton-mueller-congress-mass-surveillance-scam |
James P. Chandler, III has driven the FBI encryption key scam for the Clintons
S. Hrg. 104-499 (Feb. 28, 1998). Economic Espionage Act Hearing, testimony of FBI Director Louis Freeh acknowledging James P. Chandler, PDF p. 16. U.S. Senate.
Fig. 10—S. Hrg. 104-499 (Feb. 28, 1998). Economic Espionage Act Hearing, testimony of FBI Director Louis Freeh acknowledging James P. Chandler. U.S. Senate.

Professor James P. Chandler biography, National Intellectual Property, p. 6; Chandler admission and notorious Washington, D.C. knowledge among Chandler associates in the National Intellectual Property Law Institute.
Citation: U.S. Senate Judiciary Committee.

On Oct. 11, 1996, Congress passed three Clinton-Chandler laws that were used to further gut Congressional oversight over security and privacy. It enabled the FBI to increase mass surveillance, then lie about it.

The Economic Espionage Act, 18 U.S. Code § 1831;

The Federal Trade Secrets Act, 18 U.S.C. § 1836; and

The False Statements Accountability Act of 1996, 18 U.S.C. § 1001.

Hindsight shows that the names for these laws were a cruel, unlawful, immoral, devilish deceit and had the opposite of the intentions of the rogue C.I.A., Clinton's, Chandler, Mueller, Comey, etc. to fuel economic espionage, theft of trade secrets and lying to Congress, courts, the President and We the People.

On Feb. 12, 1997, Chandler incorporated Eurotech, Ltd. to hire former Soviet scientists and engineers to build embedded encryption spy backdoors inside all computer hardware, firmware and software in Italy. The key Eurotech players were/are Microsoft, IBM, Intel, Cisco, Oracle and Wind River, among others. JPMorgan Chase’s John McNeil Wilkie helped expand the company, as did Fenwick & West LLP (another Leader Technologies patent attorney and Silicon Valley C.I.A. co-conspirator).

On Oct. 23, 1997, The Clinton Foundation was formed.

Mar. 5, 1998—Jul. 11, 1999, Clinton and Gen. Wesley Clark prosecuted the Kosovo fraud based on a so-called “Račak genocide massacre” false flag. French journalists have proved that Račak was completely staged. However, it did succeed in cajoling Congress to approve U.N. intervention (led by Gen. Wesley K. Clark), and it succeeded in disabling Orthodox Christian resistance to the planned jihadi migration wave now occurring.

On Aug. 06, 1998, Robert S. Mueller, III's law firm Hale & Dorr (now Wilmer Hale) helped file "The Internet of Things" patents for Hewlett-Packard’s Richard C. Walker that described a global surveillance grid that even monitors and controls individual body functions and describes human beings as "wet-ware." The invention also contains an accounting and taxing capability to manage "certificate authorities" to control Public Key Infrastructure (PKI) encryption, tax the Internet and control "wet-ware" access.

Bookmark: #walker-patent |
Click image to enlargeU.S. Patent No. 6,965,816, Fig. 21.
Bookmark: #hillary-qrs-11-crashes-planes |
Click image to enlargeU.S. Patent No. 6,965,816, Fig. 1.
Fig. 12–U.S. Patent No. 6,965,816, Fig. 1.AFI. (Jan. 11, 2018). Meet The Person Who Can Remotely Crash Planes And Can Your Mind. Americans for Innovation.
Bookmark: #hillary-entrust-pki |
Click image to enlargeHillary Clinton and the Rose Law Firm control the Federal Common Policy Group for issuing Internet browsing permissions
Fig. 13–Hillary Clinton has controlled ENTRUST INC ever since his 19-year Rose Law Firm partner Jerry C. Jones was secretly slipped onto the Board of ENTRUST INC. in Dec. 2003, just after thge IBM Eclipse Foundation received the debugged version of Leader Technologies' social networking engineering source code from Leader's patent lawyer James P. Chandler, III, who was secretly working with IBM and the rogue C.I.A. to build a new mass surveillance system based on social networking. See Federal PKI Graph.

On Aug. 18, 1998, Entrust Technologies, Inc. went public after being started as a spin-off of Nortel Networks (Canada) to manage and distribute Public Key Infrastructure (PKI) Certificate Authorities—the encryption keys for the Internet. Their customers include important military, banking, healthcare and government entities in the U.S., U.K., Australia, Canada, Sweden, Denmark, France, Italy, Spain and China.

Bookmark: #entrust-1998-prospectus |
Click image to enlargeU.S. Patent No. 6,965,816, Fig. 1.
Fig. 14–Prospectus Form 424B1. (Aug. 18, 1998). Entrust Technologies, Inc., formerly Entrust Technologies, Inc., PDF p. 49. SEC Edgar/NASDAQ.

On Oct. 14, 1998, SI International, LLC, later renamed SERCO SERVICES, Inc., was allowed to form with Lockheed Martin and Senior Executive Service (SES) executives associated with the treasonous Highlands Group (Feb. 1995). Lockheed Martin runs the Queen's "Golden Share" company British Nuclear Fuels Limited with SERCO.

On Dec. 20, 1998, globalist psychopath George Soros admitted to having been a Hungarian Jewish Nazi collaborator without remorse for betraying his own Jewish brothers and sisters.

On Mar. 09, 1999, Clinton's Vice President Al Gore took credit for founding the Internet, laughably.

On Jul. 01, 1999, Clinton Attorney General Janet Reno created a new "Office of Special Counsel" inside the Department of Justice after the Special Counsel law was not re-authorized by Congress. This dubious Department of Justice policy (not a law) is now being used to justify the Mueller witch hunt.

On Jul. 02, 1999, Clinton appointed Larry H. Summers Treasury Secretary. The next day, on Jul. 03, 1999, Summers appointed Sheryl K. Sandberg as chief of staff. Sandberg later started Gmail in Jan. 20, 2001, and then became Facebook chief operating officer on Mar. 14, 2008.

Summers' former Treasury staffer (1993-2001), Marne L. Levine (Deutch) became Summers' chief of staff starting at Harvard on Jul. 02, 2001 where she oversaw the C.I.A.'s MKUltra establishment of the 19-year old Mark Zuckerberg as their Facebook cardboard cut out. Then, she became product vice president at AOL on Apr. 06, 2009. Then, she became Summers' chief of staff for the National Economic Council on Jan. 21, 2009. Then, she became Obama's Special Assistant to the President for Economic Policy on Jun. 24, 2010. Then, she attended an exclusive dinner with Hillary and Sandberg on Mar. 27, 2012. Then, she became chief operating officer of Instagram on Oct. 07, 2014. Truly magical.

White House rogue intelligence NOC (Network Operating Center): National Infrastructure Assurance Council

On Jul. 14, 1999, the Clinton White House set up a spy skunk works that has run rogue intelligence operations called the “National Infrastructure Assurance Council (NIAC)” On Jan. 18, 2001, Clinton appointed James P. Chandler, III and Bill Gates, Microsoft, as directors on NIAC the day before he left office and the same day he pardoned his former CIA director John M. Deutch (Marne L. Levin-Deutch's father in law) and fraudster Marc Rich.

On Sep. 16, 1999, Clinton announced "relaxed" encryption rules in a flurry of press releases and letters to Congress, which were most assuredly drafted by national security advisor James P. Chandler, III. This action effectively gutted normal engineering security practices. It had the effect of enabling unfettered foreign and domestic access to U.S. classified data.

On Sep. 29, 1999, Bill Clinton established In-Q-Tel Silicon Valley cardboard cutouts for the C.I.A. to be able to raise private venture capital funds to build its rogue operations. It is illegal for a government agencies to invest in private companies.

Bookmark: #in-q-tel-formed-by-cia |
Click image to enlargeOn Sep. 29, 1999, the Central Intelligence Agency (C.I.A.) formed In-Q-Tel and hired it first CEO, Gilman Louie. See the book: In-Q-Tel: A New Partnership Between the CIA and the Private Sector.
Fig. 15–On Sep. 29, 1999, Clinton C.I.A. institutionalized crony capitalism and the digital take over of America by a Shadow Government, on this day, by forming a "private" venture capital company named In-Q-Tel (Intel with a Q) to create a private funding and control vehicle for the rogue C.I.A.

On Nov. 12, 1999, Bill Clinton and Larry Summers abolished Glass-Steagall banking controls, enabling the banks to fund In-Q-Tel “private” companies.

On Nov. 17, 1999, Agilent Technologies went public using Robert S. Mueller’s III’s law firm Hale and Dorr (renamed Wilmer Hale). Agilent  Technologies was tasked with building the digital infrastructure for “The Internet of Things” global mass surveillance of everything using the Richard C. Walker HP/Agilent patents for monitoring all human beings called “wet-ware” in the patents.

On Jun. 08, 2000, Clinton espionage attorney James P. Chandler, III, participated in seminal Leader invention design meetings as Leader’s newly-appointed patent attorney. He was fully briefed on Leader’s social networking innovations at this meeting (see photo below) without disclosing his Deep State shadow government conflicts of interest and treachery.

Bookmark: #chandler-learned-leader-innovations-jun-08-2000 |
Leader Technologies Miller Act Notice for Federal Works Projects 40 USC Sec. 3131 et seq. timeline
Fig. 16—On Jun. 08, 2000, JAMES P. CHANDLER, IIII, BILL CLINTON SPY MASTER first learned about Leader/McKibben's social networking designs in early 2000. By this meeting on Jun. 8, 2000 he was studying every detail. Chandler is pictured here seated in the white shirt against the wall on the right side of this photo with his legal assistant Kelley E. Clements to the viewer's right. Co-inventor Michael McKibben and Jeffrey Lamb are picture standing in the back left of the photo. Photo: Leader Technologies, Inc.

On Jun. 20, 2000, Sir Geoffrey E. Pattie was awarded the ISSA Silver Star Award in Washington, D.C.  Pattie is the primary spy director for the Queen’s Privy Council and founder of SCL Ltd. and Cambridge Analytica—two C.I.A. MKUltra mind control and brain washing operations in the UK.

On Aug. 25, 2000, F. Gary Davis, Acting Director of the U.S. Office of Government Ethics, issued a tortured 13-page "advisory" that dramatically muddied the waters on mutual fund investing disclosure. Davis left government service soon thereafter. This opinion opened the door to massive nondisclosure fraud by politicians, SES and federal bureaucrats.

In 2001, NSA Director Michael V. Hayden recommended expansion of the NSA's Senior Executive Service (SES) programs.

On Apr. 15, 2001, C.I.A. whistleblower Susan Lindauer warned American senior intelligence leadership that "I first learned of the 9/11 Conspiracy from my CIA handler, Dr. Richard Fuisz, in mid-April, 2001." She was imprisoned for a year without due process to shut her up as the first casualty of The Patriot Act.

In Jul. 2001, Department of Justice John C. Yoo was hired into the Office of Legal Counsel (OLC) and gave legal opinion cover for a proposed NSA project “Stellar Wind” for mass surveillance of American citizens.

On Sep. 04, 2001, Robert S. Mueller, III was sworn in as FBI Director by President George W. Bush, just 10 days before 9/11.

On Sep. 11, 2001, World Trade Center, Pentagon and Shanksville “terror” attacks were timed simultaneously with DoD NORAD war games and a stand down order.

On Oct. 04, 2001, President Bush approves operation “Stellar Wind” mass surveillance on American citizens.

On Oct. 16, 2001, President Bush signed Executive Order 13231 "Critical Infrastructure Protection in the Information Age" forming the "National Infrastructure Advisory Council (NIAC)." The order used the same NIAC acronym used by Clinton as the excuse for setting up a mass surveillance networking operating center run out of the White House.

On Oct. 26, 2001, President Bush signed The Patriot Act that has essentially destroyed the Bill of Rights. Just look at the flies that gathered to watch the signing.

Bookmark: #patriot-act-signed |
On Oct. 26, 2001, a 132-page, seemingly ready-made USA PATRIOT Act was approved by an Act of Congress that was signed into law by President George W. Bush on October 26, 2001. With its ten-letter abbreviation (USA PATRIOT) expanded, the full title is "Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001."
Fig. 17—On Oct. 26, 2001, a 132-page, seemingly ready-made USA PATRIOT Act was approved by an Act of Congress that was signed into law by President George W. Bush on October 26, 2001. With its ten-letter abbreviation (USA PATRIOT) expanded, the full title is "Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001."

On Oct 31, 2001, NSA whistleblower and former chief architect William E. Binney resigned the NSA saying the agency had "gone rogue."

On Nov. 29, 2001, IBM intellectual property attorneys James P. Chandler, III and David J. Kappos used a $40 million IBM “donation” to start the IBM Eclipse Foundation which has been the exclusive distributor of Leader Technologies’ social networking innovations.

On Aug. 29, 2002, IBM Eclipse Foundation distributed Version 2.0.1 that included all of Leader Technologies' social networking innovations.

On Sep. 18, 2002, career IBMer Thomas E. Noonan (Internet Security Systems, Inc.) was appointed to the National Infrastructure Assurance Council (NIAC) by George W. Bush, surely recommended by James P. Chandler, and he remains a member of the Council to this day. In 2003, Noonan became a partner to ENTRUST INC. Public Key Infrastructure (PKI) controlled by Hillary Clinton.

On Dec. 04, 2002, the entire Silicon Valley military-industrial complex began joining the IBM Eclipse Foundation to receive Leader Technologies' social networking invention source code, all of which IBM criminally claimed copyright, and then criminally declared "open source." They admitted a "single company [Leader Technologies]" for their code.

Bookmark: #ibm-eclipse-distributes-stolen-leader-social-networking-invention |
Fig. 18—On Dec. 04, 2002, Eclipse released Version 1.0.1. The development effort set as its priority to change the Leader SWING design to SWT to conform to IBM preferences. They disclosed everything except Leader’s name in the statement: "Eclipse 2.0 was based primarily on contributions of a single company [Leader Technologies, Inc.]."

On Oct. 29, 2003, ENTRUST INC was awarded the contract to supply all 50,000 encryption keys for the Federal Bureau of Investigation (FBI).

Bookmark: #fbi-entrust-conspiracy |
ENTRUST INC, ENTU, Form 8-K. (Oct. 29, 2003). Entrust Announces Third Quarter-Financial Results and Targets Breakeven for Year-end 2003. Accessed Sep. 08, 2018. SEC Edgar. (Despite losses, highlights new contracts with Northrup Grumman, FBI, UK Customs & Excise, Research in Motion Blackberry, Thomas Noonan, Acxiom Corp., California State Senate Counsel, KPMG).
Fig. 19—ENTRUST INC, ENTU, Form 8-K. (Oct. 29, 2003). Entrust Announces Third Quarter-Financial Results and Targets Breakeven for Year-end 2003. Accessed Sep. 08, 2018. SEC Edgar. (Despite losses, highlights new contracts with Northrup Grumman, FBI, UK Customs & Excise, Research in Motion Blackberry, Thomas Noonan, Acxiom Corp., California State Senate Counsel, KPMG).

On Dec. 04, 2003, ENTRUST INC elected Jerry C. Jones as a "Class I" director to replace retiring Gen. Wesley K. Clark. Jones is a 19-year Hillary Clinton partner at the Rose Law Firm, Little Rock, Arkansas. With the appointment of Jones, FBI Director Robert S. Mueller, III had an ethical duty to disclose to the public that his approval of ENTRUST INC to manage 50,000 FBI encryption keys enabled his political mentor Hillary Clinton to have full access to the entire FBI operation.

Bookmark: #fbi-entrust-mueller-jones-hillary-conspirators |
Hillary Clinton Jerry C. Jones Gen. Wesley K. Clark Robert S. Mueller, III
Bookmark: #jones-secretly-elected-entrust-director |
ENTRUST, INC., 10-K. (Dec. 23, 2003). Annual Report, first appearance of new director Jerry C. Jones. SEC Edgar.
Fig. 20ENTRUST, INC., 10-K. (Dec. 23, 2003). Annual Report, first appearance of new director Jerry C. Jones, PDF page 33. SEC Edgar.
Bookmark: #jones-bio-first-published-by-entrust |
ENTRUST, INC., 10-K. (Mar. 15, 2004). Annual Report, first appearance of Jerry C. Jones biography disclosing 19-year partner of Hillary Clinton in the Rose Law Firm, Little Rock, AR. SEC Edgar.
Fig. 21ENTRUST, INC., 10-K. (Mar. 15, 2004). Annual Report, first appearance of Jerry C. Jones biography disclosing 19-year partner of Hillary Clinton in the Rose Law Firm, Little Rock, AR. SEC Edgar.

On Sep. 09, 2008, the IBM Eclipse Foundation boasted 191 members [Silicon Valley allies of the fascist Senior Executive Service (SES)] , including Microsoft, AT&T, Verizon, Facebook, Google, YouTube, SAP, Cisco, Oracle, HP, Samsung, Motorola, Nokia, Sony, JPMorgan Chase, Goldman Sachs and Tsinghua University (Beijing, China). Most if not all of these companies are ENTRUST INC (or sublicenser) clients, and probably all of them embed the NSA Dual_EC_DRBG encryption backdoor key algorithm in their hardware, software and firmware. See AFI (Nov. 06, 2015). Complicit encryption geeks enable the American spy state. Americans for Innovation.

Bookmark: #ibm-eclipse-membership-sep-17-2008 |
On Sep. 09, 2008, the IBM Eclipse Foundation boasted 191 members, including Facebook underwriter JPMorgan Chase.
Fig. 22—IBM Eclipse Foundation Members, page 1, prepared as of Sep. 09, 2008 and reported to the Board of Directors on Sep. 17, 2008. Click here for image of page 2.

See The Eclipse Foundation (Sep. 09, 2008). Membership Logos [Board minutes]; See also The Eclipse Foundation(Sep. 17, 2008). The Members of Eclipse, Minutes of the Eclipse Board Meeting, Sep. 17, 2008; AFI. (Jan. 15, 2015). IBM plots digital control with federal judges; steals inventions, p. 6.

On Mar. 11, 2009, ENTRUST INC. issued its last 10-K annual report before selling its operation to Orlando Bravo and his Thoma Bravo, LLC private equity firm in San Francisco, CA. They disclosed that they had "more than 2,000 customers in 60 different countries."

Bookmark: #entrust-relationships |
ENTRUST, INC., 10-K. (Mar. 15, 2004). Annual Report, first appearance of Jerry C. Jones biography disclosing 19-year partner of Hillary Clinton in the Rose Law Firm, Little Rock, AR. SEC Edgar.
Fig. 23ENTRUST 10-K. (1998-2009). Disclosed Material Relationships for Customers, Partners, Directors, Officers, Dependents, Subsidiaries, compiled Sep. 13, 2018. SEC Edgar. (Raw. *.xlsx spreadsheet file).

ENTRUST INC. SEC Filings Timeline:

1999 | 2000 | 2001 | 2002 | 8-K. FBI Contract Press Release (Oct. 29, 2003) | Jones' Stock Options (Dec. 05, 2003) | 2003 | Co. Overview (2003) | Jones' Signature (Dec. 23, 2003) | Jones' Bio (Mar. 15, 2004) | 2005 | 2006 | 2007 | 2008 | 2009 | 2009A | Relationships (1998-2009)

On Jul. 16, 2009, ENTRUST, INC. proposed to shareholders to sell to Orlando Bravo and his Thoma Bravo, LLC private equity firm in San Francisco, CA., which occurred on Aug. 07, 2009.


Conclusion #1: Robert S. Mueller, III had an affirmative duty to disclose his approval of the contract for ENTRUST to manage the FBI's 50,000 encryption keys in late 2003. The FBI itself has been scandalously compromised to Hillary Clinton and the Rose Law Firm ever since.

Conclusion #2: ENTRUST's planetary control of the encryption keys for "over 2000 customers in 60 different countries" means that any matter handled by their customers at the FBI, Department of State, NSA, Treasury, etc. is the fruit of a poisonous tree—tainted by Clinton corruption.

Conclusion #3: President Trump has enough evidence here to seize and prosecute the leaders of every government agency that has involved that agency, or induced other agencies to work with ENTRUST, without disclosing their total compromise to Hillary Clinton and her crime syndicate.

Clearly, Hillary Clinton's director surrogate at ENTRUST, INC., Jerry C. Jones (2003-2009), steered the development of the company's control over encryption keys for the maximum benefit of his Clinton overlords.

At a bare minimum, Mueller and the FBI leadership has had an ethical duty ever since Jerry C. Jones became an ENTRUST director to disclose his direct conflict of interest and compromise of FBI operations by Hillary Clinton, his mentor.

* * *

Return to return to the beginning of this post.