Deep State must renew Executive Order No. 13708 by Sep. 30, 2017 to continue funding the rogue NSA, IBM, C.I.A. “Internet of Things” spy state
(Sep. 14, 2017)—Roger Stone, President Trump’s former campaign manager, New York Times best seller, and Infowars contributor, indicated several days ago that President Trump has serious troubles. He reinforced this same alert 24 hours later. He said that multiple White House sources have told him that President Trump may be being drugged gradually with psychotropic drugs in preparation for an imminent Deep State takeover.
Such drugging of a President would not be a new tactic for the rogue C.I.A. which is widely known to use such mind control drugs for “regime change” around the world. See previous post; Google: “CIA mind control drugs”.
End of September 30, 2017 is a Deep State drop dead date
September 30, 2017 is a critical date looming for the Deep State shadow government. The executive orders which have given them the dubious legal authority they have secretly awarded to themselves must be renewed. It appears they are willing to depose President Trump and/or destroy the country to get those renewals.
The facts are now well-established that the Deep State confiscated the invention of social networking from Columbus innovator Leader Technologies. Then, they reconfigured Leader’s invention into a rogue global spying and profit-making apparatus that is violating our Fourth Amendment privacy rights of every American, our Fifth Amendment property rights, our Second Amendment right to bear arms, and our First Amendment rights to free speech.
Leader proved in federal court that Facebook, for example, relies on Leader’s invention for 100% of its revenue. The rest of the social networking world also relies on Leader’s invention for essentially 100% of their revenues as well. Such a theft of technology is unprecedented.Bookmark: #miller-act | https://tinyurl.com/y8ugeoro
This lawless spy network was created from executive orders reaching back to Bill Clinton in 1993. These orders give the President sole authority to authorize, fund and control the C.I.A., NSA and any of the other 15 intelligence agencies through his National Security Staff (NSS).
This operation is funded by an intertwined cluster of open-ended (and therefore indecipherable) Executive Branch budgets. Presidents Clinton, Bush and Obama secretly operated a vast military-industrial infrastructure largely without Congressional or Judicial oversight.
President Dwight D. Eisenhower warned us about this “military-industrial complex” in his Jan. 17, 1961 farewell address.
We believe that the Deep State’s extensive activity to destroy President Trump is now focused on creating a pretext to take over the White House, or at least suspend lawmaking, by Sep. 30, 2017.
This order gives the White House near dictatorial control over the Internet. In Deep State’s mind, without getting that control back, they will lose the information war, and thus their dream of a UN-controlled “new world order.”
Deep State’s Control: The Executive Orders that empower the Deep State
Among these greater and lesser orders, two are seminal:
- Executive Order 13130. (Jul. 14, 1999). National Infrastructure Assurance Council. Bill Clinton. Federal Register, Vol. 64, No. 137, Jul. 14, 1999. GPO.
- Executive Order 13228. (Oct. 08, 2001). Establishing the Office of Homeland Security and the Homeland Security Council. George Bush. Federal Register, Weekly Compilation of Presidential Documents Vol. 37, Iss. 41, October 15, 2001. GPO.
These two orders form a continuity of orders that extend NIAC operations from 1999 to the present day, and their current authority was extended and is governed by EO 13708 (Sep. 30, 2015).
NIAC forms the basis for the dubious “public-private” partnerships which secretly bind the commercial and intelligence technology worlds. It is the embodiment of the military-industrial complex that President Dwight D. Eisenhower warned us about.
In short, the NIAC benefits of universal government spying:
- Spy access to all user data via universal encryption backdoor key to all hardware, software and firmware. See also Zetter, K. (Sep. 24, 2013). How a Crypto “Backdoor” Pitted the Tech World Against the NSA. Wired; AFI (Nov. 25, 2015). Dell and Lenovo (IBM) ship computers with spy state backdoors; AFI (Nov. 06, 2015). Complicit encryption geeks enable the American spy state.
- Blackmail data to control politicians, the media and public opinion. See Theodore L. Gunderson. (May 12, 2005). VIDEO & TRANSCRIPT, FBI Senior Special Agent In Charge (ret.) (Dallas, Los Angeles, Memphis) presentation on Illuminati, Satanism, Pedophilia, CIA, FBI, Intelligence Deep State shadow government collusion (“people in our government ... a rogue outfit” . . . “who orchestrate terrorist acts in order to get Congress to pass Bills like the Patriot Act, and that many of those votes are procured through blackmail through sex and drugs”).
- Commercial Off The Shelf (COTS) commercial technology platforms to spy on America’s and the world’s population. See Drain the Swamp Poster.
- Pay-to-play insider financial information as bribes. See Timeline.
NIAC commercial “public” partner benefits received (the benefits of this crony capitalism):
- Government contracts
- Regulatory favoritism
- Banking favoritism
- Financing favoritism
- Unfettered access to user data for profit-making
- Judicial protection
- Pay-to-plan financial information as bribes
For example, on Feb. 09, 2016 Barack Obama signed Executive Order 13718 in which he actually used the commercial name for this NIAC takeover of the Internet, “The Internet of Things.” See previous post.
See previous post for IBM's historic role in C.I.A. mind control development using Nazi scientists after World War II.
New! Sep. 18, 2017Bookmark: #cia-whistleblower-kevin-shipp-infowars | https://tinyurl.com/y772c45a
See previous Kevin Shipp post with the Shipp Deep State and Shadow Government slides extracted..
The time is now for real American citizens to storm the gates and shine a light directly on White House globalists who: (1) we did not elect, (2) who rely on massive frauds to sustain their power and that of their friends, and (3) who appear to have turned on their boss, the President we did elect.
* * *
Notices: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself. Photos used are for educational purposes only and were obtained from public sources. No claims whatsoever are made to any photo.
Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to firstname.lastname@example.org and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.