AFI Custom Search

SEARCH by topic, keyword or phrase. Type in Custom Search box
Use this Custom Search toole.g. "IBM Eclipse Foundation" or "racketeering"

Friday, September 29, 2017

LEADER PROPOSES TRILLION DOLLAR FED REVENUE WHILE LOWERING TAXES

User fee on social networking will generate $300+ billion a year to fund major initiatives

Surcharge on social networking will pay for 17 years of free use by government and commerce

Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Sep. 29, 2017, Updated Oct. 18, 2017 | PDF | https://tinyurl.com/y93xj4qz
RAFI. (Sep. 29, 2017). Leader proposes trillion dollar revenue while lowering taxes. Americans for Innovation.
Fig. 1 – Leader Technologies' shareholders propose phenomenal solution to federal revenue challenges. The entire government and commercial world has had the free use of social networking for 17 years. Now it is time to acknowledge that the invention had a creator who has never been paid for their innovations. They themselves propose a way to get themselves paid while raising hundreds of billions of dollars in new revenue to fund government programs.
Photo: The National Sentinel.
Bookmark: #social-media-weaponized-by-cia | https://tinyurl.com/y7hbrvf3
Citizens Warning! Oct. 18, 2017
Social media has been weaponized by the Deep State rogue C.I.A. / FBI / NSA
The rogue C.I.A./FBI/NSA stole and weaponized social media to "fundamentally transform" America into a crony capitalist vassal state of an unelected, self-annointed combine of politicians, bureaucrats, bankers, corporate elitists, judges, lawyers, satanists, spies and pedophiles. American Intelligence Media (AIM) lays it all out in a bombshell new article and video. AIM explains why the theft of Leader Technologies' social networking invention must be STOPPED NOW!

The so-called Equifax "hack" of half (we think 100%) of America's IRS and banking information was an obvious scam and cover story. Isn't it odd that there has been no MSM coverage of the alleged victims of Las Vegas? Where are the funerals? Why did the Las Vegas police chief and FBI refuse to answer questions in the last news conference? Why was the event timeline changing with each press conference? Were the "victims" actually DHS crisis simulation actors who are still very much alive? Isn't it magical how Harvey Weinstein suddenly dominates the headlines? Was the rogue C.I.A. attempting to push Congress for gun control legislation using the Las Vegas excuse—just like they triggered The Patriot Act destruction of the Bill of Rights after 9/11?

Source: Anonymous Patriots. (Oct. 16, 2017). Lock Down On Prison Planet Almost Complete. American Intelligence Media.

Click here for: HTML | PDF | YouTube | Raw Video.

(Sep. 29, 2017)—Perhaps Columbus OH Leader shareholder Phil Q. Williams says it best:

“When I completed projects in the steel business, I expected to get paid.”

Williams continued, “I have not been paid for Leader’s invention of social networking that was created using my investment. We now know that the government has stolen our invention, and used it for 17 years FOR FREE. The rest of Leader’s investors want paid. It’s that simple.”

In 2013, Williams sold his six steel fabrication companies and retired. Many of his projects are well known from crash fences at Nascar and Indy tracks to oil, gas and fiber optic transports of all kinds. A tall, no nonsense kind of guy, Williams played both baseball and basketball for Ohio University in the 1960’s.

Leader shareholders are filing “Tier II” Miller Act Notices

All across America, the shareholders of Leader Technologies are demanding that the U.S. government pay them for their social networking inventions.

We asked Michael McKibben, the founder and lead inventor for Leader Technologies, Inc., how many shareholders Leader has. McKibben said, “We are a private company, but it is many hundreds of people and entities spread out across the country.”

On Jul. 24, 2017, Leader Technologies, Inc. and founder Michael T. McKibben sent a Tier I Miller Act Notice to  the White House. A “Tier I” request allows unpaid subcontractors to get paid.

Bookmark: #miller-act | https://tinyurl.com/y6vobqb2
Leader Technologies, Inc. / Michael T. McKibben Miller Act Notice
Fig. 2—Miller Act Notice of Leader Technologies and inventor Michael McKibben filed at the White House on July 23, 2017. They demand full compensation for the federal government's wholesale theft of their social networking inventions thru a broad, “free” distribution to its military-industrial spying and profit-making insiders. The government used the freshly-minted IBM Eclipse Foundation formed with a $40 million IBM “donation" just four (4) weeks after The Patriot Act was signed into law.
See previous post AFI. (Jul. 24, 2017). Leader Technologies files trillion dollar bond lien on the U.S. government. Americans for Innovation. See also Miller Act Notice.

A “Tier II” Miller Act Notice allows unpaid subcontractors of subcontractors to federal projects to also get paid. Leader’s shareholders supplied financial resources used to help McKibben and Leader invent social networking in the late 1990’s—while Mark Zuckerberg was just leaving junior high school.

Leader proposes a win-win revenue solution to President Trump

Leader invented social networking—a technology that has changed the world.

Michael McKibben, the real inventor, says we haven’t seen the best of social networking yet. He is quick to point out that “What you see now is a bastardized form of our invention.”

“What we invented honors and protects personal privacy and property. What the thieves have done is the opposite—they have twisted our designs 180 degrees to complete disrespect for privacy and property.”

“Just read their user license agreements. It says that the providers [the rogue C.I.A. and NSA crony commercial collaborators] own all your data, not you! That is so ungodly and disrespectful to our fellow human beings.”

Founder John Adams on property and privacy

McKibben said, “Remarkably, Founder John Adams, a key drafter of the Massachusetts and U.S. Constitutions, said that respect for privacy and property must be considered sacred in order for the Constitutional principles to work.”

“The Deep State shadow government is trying to destroy John Adam’s principle. At every turn they are showing disdain for The Bill of Rights. For example, patents are being systematically stolen from real inventors. Censorship is replacing free speech. Agricultural lands are being shut down by over regulation. Small businesses are shutting down over massive healthcare cost increases. Theft of personal information is replacing privacy. Regulatory confiscation is replacing personal property. Election rigging is replacing the sacred, secret ballot.”

“President Trump can take a big step toward helping fix this mess with the stroke of his pen by funding our Miller Act claim.”

17 years of FREE use is over

In their cover letter to President Trump, Leader shareholders propose a powerful solution to the 17 years of property theft by the federal government.

Leader Technologies Tier II Miller Act Notice cover letter to Donald Trump, Sep. 29, 2017, page 1
Fig. 2Cover letter to President Donald Trump from many hundreds of Leader shareholders across America beginning to send Tier II Miller Act Notices to the White House asking the federal government to finally pay them for using their social networking invention for the last 17 year, since 2000 when Clinton national security advisor James P. Chandler, III first learned of Leader's innovation. See previous post.

The property principle is simple. The federal government and its Deep State shadow government military-industrial cronies have enjoyed FREE use of Leader Technologies' social networking invention for 17 years. That history needs to be compensated. Then going forward, Leader must be paid a license fee for the ongoing benefits received from the use of their invention.

Leader proposes a universal surcharge on social networking

Leader proposes a compromise of $40 billion for the last 17 years of use. The market value of that history is valued at $3 trillion.

Then, Leader proposes a $Y per user per month surcharge comprised of two parts: (1) an $N per user per month “Consumer Use Fee” for the government's benefit, and (2) a $2 per user per month “Leader Innovation Surcharge” to pay Leader for the ongoing use of its inventions.

By comparison, computer users pay anywhere from $2.00–$5.00 per month for anti-virus software. So, Leader's request is very reasonable value-wise.

Consumer Use Fee—$277+ billion/yr.

So for example, if the government charged $3 per user per month for a Consumer Use Fee, the total revenue generated from these surcharges would be $5.00 per user per month (Consumer Use Fee + Leader Innovation Surcharge).

TechCrunch recently said that 30 apps a month on average are used per person. There are 7.7 billion people on the planet with potential access to social apps. If 3 billion people have access to social networking, that would represent 90 billion apps per month.

Using 7.7 billion user-licenses as a benchmark, the government in this example would receive $23.1 billion per month or $277 billion per year in Consumer Use Fees.

These Consumer Use Fees could fund the wall, subsidize a high risk healthcare pool, and other such social priorities—all without relying on income tax.

Leader Innovation Surcharge—$185 billion/yr.

At the same time, using the same 7.7 billion user-licenses example, Leader shareholders can finally be paid $2/user/month or $185 billion per year for the ongoing use of their important inventions.

This is a remarkable Win-Win-Win proposal. President Trump can lower taxes and use this Consumer Use Fee to kick start many of his stalled social programs.

Energize thousands of high-paying jobs

Leader will finally be able to build what will become one of the larger companies in Ohio. They’ll be able to employ thousands in high-paying technology jobs and contribute hundreds of billions of dollars into the Ohio and national economies.

Who loses in this proposal?

Only enemies of the American Republic lose in this proposal.

Readers are encouraged to send this post and the Leader Tier II Miller Act Notice by its shareholders to your elected representatives. They need to support the Rule of Law and show respect for real inventors and their risk-taking shareholders. Otherwise, they support the hijack of our Republic in their silence.

 

* * *

Notices: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself. Photos used are for educational purposes only and were obtained from public sources. No claims whatsoever are made to any photo.

Comment

Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to amer4innov@gmail.com and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.

Thursday, September 14, 2017

DEEP STATE SHADOW GOVERNMENT IS GETTING DESPERATE

Deep State must renew Executive Order No. 13708 by Sep. 30, 2017 (***three days expired***) to continue funding the rogue NSA, IBM, C.I.A. “Internet of Things” spy state

Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Sep. 14, 2017, Updated Oct. 03, 2017 | PDF | https://tinyurl.com/y8urv294
Deep State Shadow Government Is Getting Desperate.
Fig. 1 – Globalist General H.R. McMaster & President DonalD Trump at McMaster's appointment as National security Advisor. McMaster is a disciple of George Soros and the Deep State shadow government. He despises President Trump's America First priority. The Deep State shadow government has a hard stop requirement for the President to renew Executive Order No. 13708 by Sep. 30, 2017. This executive order perpetuates a string of executive orders that have authorized the warrantless surveillance of Americans since 9/11 and the passage of the Patriot Act. These orders have sacrificed fundamental civil liberties and established the NSA / C.I.A. surveillance state.
Photo: Breitbart.
Bookmark: #social-networks-now-spies | https://tinyurl.com/yac39vzs
Breaking! Oct. 03, 2017
social networking companies are C.I.A./NSA rogue spies too

GOVERNMENT SPYING ALERT: As of this update, the National Infrastructure Assurance Council (NIAC) at the U. S. Department of Homeland Security has failed to notify the public that their charter to operate expired on Sep. 30, 2017. Curiously, this order was not posted on the NIAC website under "NIAC Authorities" like the ones for 2013 and before are.

BREAKING: We just learned from an AFI reader that President Trump did renew the NIAC over the weekend and was just posted on the White House website. The renewal was in a list of 34 renewals from remodeling the White House to HIV/AIDS. The Deep State shadow goverment evidently screwed us again. Mr. Trump needs to be briefed about the threat to our civil liberties posed by the continued NIAC rogue operations. The dubious legitimacy of the rogue C.I.A. spy state continues, sadly.


Executive Order 13708, NIAC expiration, Sep. 30, 2017
Technology companies across the board (e.g., IBM, Apple, Google, YouTube, Twitter, Facebook, Palantir (Peter Thiel), AT&T, Microsoft, Skype, Yahoo, Verizon, Oracle, WhatsApp, Instagram, Pinterest, Symantec, Juniper Networks, Goldman Sachs, HP, Dell, Lenovo, you name it) have just had their dubious "public-private partnership" authorization continued. The main executive order authority for the "National Infrastructure Advisory Council" was just renewed by President Trump, unfortunately. NIAC is nothing short of a Clintonista, fascist, crony-capitalist, monopolistic military-industrial complex insider deal making cabal since 1999 . . . in the name of national security and counter terrorism, of course. President Eisenhower warned about this corruption in 1961,

The greater scandal:
[Editorial: Despite the $1 trillion a year that these anti-terror experts spend, the shooter(s) in the tragic Las Vegas mass murder of concert-goers were able to amass at last count 42 sophisticated weapons and munitions without being detected by our bloated spy agencies. This should tell us that "antiterrorism" has been nothing but a cruel hoax ("false flag") by the Deep State shadow government to scare citizens into giving up their civil liberties. (For example, we learned just yesterday from whisteblowers that FEMA was conducting a simulated school shooting drill just 18 miles from Sandy Hook on Dec. 14, 2012. Just coincidence?). We must realize that their real motive is, and always has been, to take down the American Republic and replace it with a New World Order globalism run by unelected banks, corporations and bureaucrats.]

ORIGINAL POST

(Sep. 14, 2017)Roger Stone, President Trump’s former campaign manager, New York Times best seller, and Infowars contributor, indicated several days ago that President Trump has serious troubles. He reinforced this same alert 24 hours later. He said that multiple White House sources have told him that President Trump may be being drugged gradually with psychotropic drugs in preparation for an imminent Deep State takeover.

Such drugging of a President would not be a new tactic for the rogue C.I.A. which is widely known to use such mind control drugs for “regime change” around the world. See previous post; Google: “CIA mind control drugs”.

The American Republic is under attack by rogue C.I.A. Deep State operatives who are actively working to nullify the 2016 election.

End of September 30, 2017 is a Deep State drop dead date

September 30, 2017 is a critical date looming for the Deep State shadow government. The executive orders which have given them the dubious legal authority they have secretly awarded to themselves must be renewed. It appears they are willing to depose President Trump and/or destroy the country to get those renewals.

The facts are now well-established that the Deep State confiscated the invention of social networking from Columbus innovator Leader Technologies. Then, they reconfigured Leader’s invention into a rogue global spying and profit-making apparatus that is violating our Fourth Amendment privacy rights of every American, our Fifth Amendment property rights, our Second Amendment right to bear arms, and our First Amendment rights to free speech.

Leader proved in federal court that Facebook, for example, relies on Leader’s invention for 100% of its revenue. The rest of the social networking world also relies on Leader’s invention for essentially 100% of their revenues as well. Such a theft of technology is unprecedented.

Bookmark: #miller-act | https://tinyurl.com/y8ugeoro
Leader Technologies, Inc. / Michael T. McKibben Miller Act Notice
Fig. 2—Miller Act Notice of Leader Technologies and inventor Michael McKibben filed at the White House on Jul. 23, 2017. They demand full compensation for the federal government's wholesale theft of their social networking inventions thru a broad, “free” distribution to its military-industrial spying and profit-making insiders using the freshly-minted IBM Eclipse Foundation formed with a $40 million IBM “donation" just four (4) weeks after The Patriot Act was signed into law.
See previous post AFI. (Jul. 24, 2017). Leader Technologies files trillion dollar bond lien on the U.S. government. Americans for Innovation. See also Miller Act Notice.

This lawless spy network was created from executive orders reaching back to Bill Clinton in 1993. These orders give the President sole authority to authorize, fund and control the C.I.A., NSA and any of the other 15 intelligence agencies through his National Security Staff (NSS).

This operation is funded by an intertwined cluster of open-ended (and therefore indecipherable) Executive Branch budgets. Presidents Clinton, Bush and Obama secretly operated a vast military-industrial infrastructure largely without Congressional or Judicial oversight.

President Dwight D. Eisenhower warned us about this “military-industrial complex” in his Jan. 17, 1961 farewell address.

We believe that the Deep State’s extensive activity to destroy President Trump is now focused on creating a pretext to take over the White House, or at least suspend lawmaking, by Sep. 30, 2017.

Sep. 30 , 2017 is the date that Executive Order 13708 expires.

This order gives the White House near dictatorial control over the Internet. In Deep State’s mind, without getting that control back, they will lose the information war, and thus their dream of a UN-controlled “new world order.”

Deep State’s Control: The Executive Orders that empower the Deep State

Among these greater and lesser orders, two are seminal:

These two orders form a continuity of orders (EO 13130 Jul. 14, 1999, EO13228/31 Oct. 08/16, 2001, EO13286 Feb. 28, 2003, EO 13385 Sep. 29, 2005, EO13446 Sep, 28, 2007, EO13511 Sep. 29, 2009, EO 13585 Sep. 2011, EO1352 Sep. 30, 2013.) Not included is EO 13708 Sep. 30, 2015 (expired Sep. 30, 2017) that extend NIAC operations from 1999 to the present day, and their current authority was extended and is governed by EO 13708 (Sep. 30, 2015).

Executive Order 13708 terminates on Sep. 30, 2017, unless is is renewed by the President (or his replacement).

NIAC forms the basis for the dubious “public-private” partnerships which secretly bind the commercial and intelligence technology worlds. It is the embodiment of the military-industrial complex that President Dwight D. Eisenhower warned us about.

In short, the NIAC benefits of universal government spying:

  • Spy access to all user data via universal encryption backdoor key to all hardware, software and firmware. See also Zetter, K. (Sep. 24, 2013). How a Crypto “Backdoor” Pitted the Tech World Against the NSA. Wired; AFI (Nov. 25, 2015). Dell and Lenovo (IBM) ship computers with spy state backdoors; AFI (Nov. 06, 2015). Complicit encryption geeks enable the American spy state.

  • Blackmail data to control politicians, the media and public opinion. See Theodore L. Gunderson. (May 12, 2005). VIDEO & TRANSCRIPT, FBI Senior Special Agent In Charge (ret.) (Dallas, Los Angeles, Memphis) presentation on Illuminati, Satanism, Pedophilia, CIA, FBI, Intelligence Deep State shadow government collusion (“people in our government ... a rogue outfit” . . . “who orchestrate terrorist acts in order to get Congress to pass Bills like the Patriot Act, and that many of those votes are procured through blackmail through sex and drugs”).

  • Commercial Off The Shelf (COTS) commercial technology platforms to spy on America’s and the world’s population. See Drain the Swamp Poster.

  • Pay-to-play insider financial information as bribes. See Timeline.

NIAC commercial “public” partner benefits received (the benefits of this crony capitalism):

  • Government contracts
  • Regulatory favoritism
  • Banking favoritism
  • Financing favoritism
  • Unfettered access to user data for profit-making
  • Judicial protection
  • Pay-to-plan financial information as bribes

For example, on Feb. 09, 2016 Barack Obama signed Executive Order 13718 in which he actually used the commercial name for this NIAC takeover of the Internet, “The Internet of Things.” See previous post.

Barack Obama Executive Order 13718, Feb, 9, 2016, Sec 3(a)(ii)
Fig. 3Barack Obama Executive Order 13718, Feb. 09, 2016, Commission on Enhancing National Cybersecurity (CENC). Obama identified IBM “The Internet of Things” market initiative and is attempting to codify its stability and adaptability. Obama failed to disclose that IBM's claim to the enabling social networking technologies is fraudulent, having been stolen from Columbus, Ohio innovator Leader Technologies, Inc. via the IBM Eclipse Foundation and Leader's attorney James P. Chandler, who was also an attorney for IBM.

See
previous post for IBM's historic role in C.I.A. mind control development using Nazi scientists after World War II.

New! Sep. 18, 2017

Bookmark: #cia-whistleblower-kevin-shipp-infowars | https://tinyurl.com/y772c45a
https://youtu.be/XHbrOg092GA | Raw *.mp4 video file
Fig. 4 – C.I.A. Whistleblower Kevin Shipp exposes the Shadow Government and how it is manipulated by the Deep State. Shipp calls for a social-civil revolution to restore the U.S. Constitution that has been hijacked by the Deep State and which wholly controls the Shadow Government (bribed and blackmailed Congress, Judiciary and unelected Bureaucracy). Video: GeoEngineeringWatch.org.

See previous Kevin Shipp post with the Shipp Deep State and Shadow Government slides extracted..

The time is now for real American citizens to storm the gates and shine a light directly on White House globalists who: (1) we did not elect, (2) who rely on massive frauds to sustain their power and that of their friends, and (3) who appear to have turned on their boss, the President we did elect.

* * *

Notices: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself. Photos used are for educational purposes only and were obtained from public sources. No claims whatsoever are made to any photo.

Comment

Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to amer4innov@gmail.com and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.

Wednesday, August 23, 2017

DEEP STATE'S JAMES P. CHANDLER STOLE LEADER TECHNOLOGIES INVENTION TO IMPLEMENT C.I.A. MIND CONTROL VIA SOCIAL NETWORKING

The IBM “Internet of Things” really started in 1933 Nazi Germany with massive abuses of privacy, property & genocide

C.I.A. employed hundreds of Nazi scientists in mass mind control research

C.I.A. refined AGITPROP (agitation propaganda) now being used to demonize & undermine President Trump

Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Aug. 24, 2016, Updated Sep. 18, 2017 | PDF | https://tinyurl.com/y8e6j2xu
he C.I.A. and IBM united in 1947 to engage in mind control that is being implemented on social networking technology stolen from Columbus Ohio inventor Leader Technologies
Fig. 1 – The IBM (C.I.A.) "Internet of Things." IBM began supplying Adolf Hitler computers starting in about 1934. Even then, they were promoting the concept of universal spying, using the sales byline "See Everything with Hollerith (IBM) Punch Cards." The Nazi scientists who had refined Hitler's mass mind control systems were hired by the newly-created C.I.A. in 1947 to continue their research after the war. Most people have looked up to IBM as an ethical company, and now we find that IBM's central role today in the warrantless mass surveillance shows that they are carrying forward their immoral WWII practices. It is evident that IBM seeks today to install the same kind of fascist socialist crony capitalism that became so efficient at population control of "unacceptables" in Europe during WWII—for which they were paid handsomely after the war. Their brazen theft in 2000 of Leader Technologies' social networking invention—without regard for Leader's constitutional rights—is yet more evidence of their intention to keep an iron grip on the dataflow of the Internet for use in rogue C.I.A.-inspired mass mind control.
Graphic: AFI.
Bookmark: #he-fights https://tinyurl.com/y96okrz7
Editorial, Sep. 03, 2017: He Fights
This is an important perspective on why the average, non-elitist American supports President Donald J. Trump and strongly rejects MSM (should be renamed C.I.A. Mind Control Media (MCM)) and its breathless, dishonest, Alinsky attempts to prevent their choice for President from doing the job we sent him to Washington to do. Evan Sayet. (Sep. 02, 2017). HE FIGHTS. Townhall. We fight. MSM must be defeated.
Bookmark: #cia-mind-control-whistleblower https://tinyurl.com/cia-social-mind-control
Newly discovered, Sep. 06, 2017: Whistleblower reveals C.I.A.-funded social media mind control program
DARPA C.I.A. mind control program uncovered: BAA 12-03 ASU 12040772.
In 2013, a DARPA (Defense Advanced Research Projects Agency) whistleblower revealed to fellow scientists an active C.I.A. mind control project that targeted Christianity and Islam. The documents were just uncovered by an AFI researcher. The secret government program sought to induce and disrupt religious "narratives" with desired propaganda. This project (lead: Steven R. Corman PhD) entered its implementation Phase III in the run up to the 2016 election. The Arizona State project leaders are experts in
Father of Fake News?
Steven R. Corman, PhD, Arizona State University (ASU). C.I.A. DARPA Mind Control Researcher
Steven R. Corman, PhD, ASU, C.I.A. Mind Control "Narratives" Researcher
social media and received $6.1 million to develop actionable strategies to disrupt "master narratives" (like a person's Christian or Islamic beliefs) in the name of, naturally, controlling extremism. [Editor: The opposite is also true: one learns how to incite extremism also.] The program focused on finding trigger words and phrases that provoked desired emotional responses by using words in lieu of magnetic resonance pulses to the brain—irrespective of the truth or proper context of the information (aka "virtue signalling"). For example, "Crusades" emotionally triggers some Moslems, as does "jihad" for some Christians. Considering the inordinate number of times Hillary Clinton repeated it, an effective Corman-inspired (?) fake news propaganda trigger tied to candidate Donald Trump was evidently "p_ssy" and "(bent wrist) duhhh," among others. See Anonymous. (Jan. 29, 2013). (4.5 MB) Whistleblower Reveals Military Mind Control Project BAA 12-03 ASU 12040772 at Arizona State University—secret DARPA Mind Control Project Revealed. See esp. researcher concerns (including the whistleblower) about possible accusations, page 8: "This project is aimed at creating bad technologies like mind control, a narrative ray gun."

ORIGINAL POST

(Aug. 24, 2017)—America’s founder John Adams said that property and privacy were “inviolable precepts” if we are to be a free people.

America's Founders believed that a free people could not tolerate a government that confiscated personal property and rummaged through personal effects capriciously.

A rogue C.I.A.-controlled federal bureaucracy is currently engaged in AGITPROP (Agitation Propaganda) using invasion of privacy by warrantless surveillance and confiscation of property through regulatory abuse.

AGITPROP uses state-controlled news, arts and entertainment to demonize a target before taking him or her out (e.g., assassination, “car accident,” “suicide,” “plane crash,” coercion, blackmail, regime change, firing, resignation). By the time that happens, the public has become so dumbed down and fatigued by the lies and misinformation that they don’t protect the victim.

Bookmark: #agitprop-failing | https://tinyurl.com/y9twk6ql

Agitprop: failing propaganda weapon? The boy who cried wolf?

AGITPROP has worked. It has numerous successes like 9/11, the Adolf Hitler, Arab Spring, Afghanistan, Bolshevik Revolution, Bundy Standoff, Gulf of Tonkin, Iraq, ISIS, Kosovo, Kristallnacht, Lewinsky Affair, Libya, Oklahoma City Bombing, Ruby Ridge, Rwanda, Sheriff Joe Arpaio, Syria, Vietnam Antiwar protests, Waco, Watergate, World Trade Center. However, now it has devolved further into the abyss with historically illiterate air head accusations like Bolshevik!, Conspiracy Theorist! Dangerous!, David Duke!, Dead!, Demogogue!, Deranged!, Distrubing!, Dying!, Erratic!, Fascist!, Fearmonger!, Fringe!, Garbage!, Groper!, Grotesque!, Homophobe!, KKK!, Lord Voldemort!, Mental!, Monstrous!, Muddled!, Mussolini!, Mysogynist!, Nazi!, Neo-Nazi!, Nut Job!, Pathological!, Putin's Puppet!, Rasict!, Russian Agent!, Scary!, Sexist!, Swindler!, Tax Cheat!, Uncle Tom!, Unfit!, Unhinged!, Vulgar!, What-e-v-e-r Triggers a Snowflake!, White Nationalist!, White Supremecist!, Womanizer!, Wrecking Ball!, Xenophobe!, Astroturfing (fake grassroots comments on blogs) and WHATEVER FOOLS THE UNTHINKING, UNINFORMED AND UNSUSPECTING “MASSES.”

Advertisers and the C.I.A. have known about the effectiveness of immoral “virtue signaling” to trigger the unthinking masses with fabrications for many decades. Given the way these misanthropes have hurled every adjective in the dictionary against President Donald J. Trump, we can only hope and pray that we may finally be seeing the DEATH OF AGITPROP as an effective weapon of propaganda.

Given the lack of an uprising in the general American public to protect their privacy and property from the rogue C.I.A.'s warrantless surveillance and property confiscations through regulatory abuse, we can only conclude that, we are actually no longer a free people as we were in our parents' generation.

Bookmark: #chandler-ibm-wolves | https://tinyurl.com/y9cvzg6j

The question is: Will we wake up before it is too late?

James P. Chandler, III
Fig. 2—James P. Chandler, III. Secret spymaster to Bill Clinton, George Bush and Barack Obama as well as Robert Mueller, Rod Rosenstein, Andrew McCabe, James Comey, Eric Holder, David Kappos, Larry Summers, Hillary Clinton and John Podesta; author of the Economic Espionage Act of 1996 and the Federal Trade Secrets Act; founder of the National Infrastructure Assurance/Advisory Council (NIAC); founder of the IBM Eclipse Foundation; chief outside intellectual property counsel to IBM; patent attorney and director to Leader Technologies.

James P. Chandler & IBM —wolves in sheep’s clothing

Michael McKibben and Leader Technologies—the true inventors of social networking—discovered that their former patent attorney, James P. Chandler, III, and his client IBM are wolves in sheep’s clothing.

McKibben said, “Chandler was recommended to us by Maj. Gen. James E. Freeze (US Army ret.), the former #3 at the NSA. Freeze was our first outside company director in 2000. After meeting Chandler in Washington, D.C., just a few blocks from the White House, we engaged Chandler as our patent lawyer and second outside director. We naturally expected him to honor his Constitutional duty and protect our invention. Sadly, he personally stole it.”

“What was so important about our invention that Chandler sacrificed his integrity and honor to steal it? Now we know. Chandler's world of rogue C.I.A. spies wanted our social networking platform to spy on the planet, while making lots of money for themselves and their friends.”

Bookmark: #social-networks-spy | https://tinyurl.com/y7akezgq

Chandler & IBM use social networking to spy on everyone

“To our horror, we have discovered that Chandler not only stole and distributed our invention through IBM, but they now use it to violate the privacy and property rights of EVERY American,” McKibben explained.

Leader Technologies, Inc. / Michael T. McKibben Miller Act Notice
See previous post AFI. (Jul. 24, 2017). Leader Technologies files trillion dollar bond lien on the U.S. government. Americans for Innovation. See also Miller Act Notice.

Chandler and IBM created several organizations to carry out their subversion under Clinton, Bush Jr. and Obama, including:

  1. National Infrastructure Advisory Council (NIAC) (with a permanent IBM/Cisco/C.I.A. agent—Thomas E. Noonan),
  2. National Security Staff (NSS) / Joint Special Operations Command (JSOC), and
  3. IBM Eclipse Foundation

According to former secretary of defense Robert M. Gates in Duty (2014), the NSS at the White House mushroomed from 50 people under Clinton to 350 under Obama. And yet, even the FBI says not a single terrorist has been caught as a result of all this spying. However, the WikiLeaks Podesta revelations reveal that the Deep State has made extensive use of these spy databases for blackmail and for covering up widespread Satanism, child sex trafficking and pedophilia among these elitists.

See Jenna McLaughlin. (Nov. 17, 2015). “U.S. mass surveillance has no record of thwarting large terror attacks.” The Intercept; See also FBI Special Agent-in-Charge Ted L. Gunderson. (May 12, 2005). CIA, FBI Deep State shadow government operates “a rogue criminal enterprise within the government” to compromise Congress “through sex and drugs” blackmail.

Bookmark: #why-care | https://tinyurl.com/ycaf45xy

Why should you care if the gov't collects all of your personal information?

McKibben continued, “For example, take your personal family photos. Behind the scenes, the social sites run facial recognition programs on everyone in all your photos. Then, they store that “linking relationship” information in your “Dark Profiles.” In other words, even those who are not on Facebook are being secretly catalogued—adults and children alike—just like the Nazis catalogued Jews and other undesirable citizens in Germany on IBM computers. Their fate is infamously known, may God rest their souls.”

According to Edwin Black, author of IBM and the Holocaust: The Strategic Alliance between Nazi Germany and America's Most Powerful Corporation, we now know the numerical categories of each of Hitler’s “unacceptables.”

Bookmark: #ibm-and-the-nazi-holocaust | https://tinyurl.com/y8c82vqo
https://vimeo.com/230756814 | Raw *.mp4 video file
Fig. 2 – IBM sold and maintained leases on the Nazi's Holocaust infrastructure.IBM's service included providing maintenance personnel for their IBM punch card systems at the concentration camps including Auschwitz, Buchenwald and Dachau. IBM forced the Nazis to purchase all their punch cards from IBM directly. The service contracts were not with IBM's German subsidiary, but with IBM New York directly. Remarkably, IBM was paid for these lease contracts after the war. [Editors: Is anyone else besides us thinking hush money?] Click here for an IBM History: 1930s, 1940s. Video: Edwin Black.
Leader Technologies, Inc. / Michael T. McKibben Miller Act Notice

Further References:

S. Hrg. MKUltra. (Aug. 03, 1977). CIA's Program Of Research In Behavioral Modification. Senate Subcommittee on Human Resources. 95th Congress, First Session. Stock No. 052-070-04357-1. GPO.

Karl Sie. (May 13, 2011). Hitler’s Mind Control Experiments and How They Influenced Modern Propaganda. Subversify Viral.

Nazi Disclosures. (Oct. 01, 1999). Implementation of the Nazi War Crimes Disclosure Act. Nazi War Criminal Records Interagency Working Group, October 1999. An Interim Report to Congress. National Archives.

Bookmark: #bernstein-msm-cia | https://tinyurl.com/bernstein-msm-cia
Bill, Hill, Zuck + Carlos (NYT/C.I.A.), Sep. 08, 2014
Bill Clinton and Carlos Slim, Sep. 8, 2014 Mark Zuckerberg and Carlos Slim, Sep. 8, 2014
Source: Mobster Slim is Thief Zuckerberg's new role model? Forbes, Sep. 08, 2014.

New! Aug. 29, 2017: Carl Bernstein. (2007). THE CIA AND THE MEDIA—How America's Most Powerful News Media [MSM] Worked Hand in Glove with the Central Intelligence Agency and Why the Church Committee Covered It Up. CarlBernstein.com. (“the New York Times provided cover for about ten CIA operatives . . . Many signed secrecy agrements . . . some signed employment contracts . . . 'The secrecy agreement was the sort of ritual that got you into the tabernacle. After that you had to play by the rules.' . . . separating the American press corps and government was often indistinguishable . . . journalists were put 'on a string' [of control] . . . at least 200 journalists signed secrecy agreements or employment contracts with the Agency in the past twenty-five years.” Mexican telecom tycoon Carlos Slim—the world's richest man—now owns the New York Times and is the largest single donor to The Clinton Foundation.) Rogue C.I.A. agents? Most assuredly.

“There are no alumni in the CIA. Once a CIA agent, always a CIA agent.” Former FBI Agent-in-Charge (Memphis, Dallas, Los Angeles) Ted L. Gunderson. (Apr. 02, 2005). Open Letter to Barbara Cartwell. Educate Yourself. See also Ted l. Gunderson. AFI Timeline.

Bookmark: #ibm-cia-illegal-dragnet | https://tinyurl.com/y95yposj

IBM and rogue C.I.A. use social media to catalog citizens in ways many times more effective than the Nazis

Once your personal data is collected, spies then use a Raytheon program named RIOT to find more linking relationships across all social platforms, Facebook, Google, YouTube, WhatsApp, Instagram, Yahoo, Hotmail, MSN, Outlook 360, LinkedIn, Gmail, Yahoo Mail, Facebook Mail, Facebook Messenger, AOL, etc. All of that information is stored in your Dark Profile.

Bookmark: #raytheon-riot | https://tinyurl.com/y7a3qlby
https://youtu.be/fIIUVJ6PC1k | Raw *.mp4 video file
Fig. 3 – Raytheon Riot program for warrantless mass surveillance across all social media platforms. Leaked to The Guardian on Nov. 16, 2010.
Bookmark: #leaders-fight-is-republics-fight | https://tinyurl.com/y85d26sh

Leader’s fight is our Republic’s fight

IBM German sales poster c.a., 1934 promoting government mass surveillance. Translation: "See Everything with Hollerith Punch Cards," Address: German Hollerith Machinery Society MBH, Berlin-Lighterfelde, Germany." Remarkably, IBM executives claim they did not know that the Nazis were using their computers to organize mass extermination. This claim is disingenuous since IBM was the SOLE supplier of the punch cards throughout the Third Reich and provided maintenance staff to each LEASED computer, even at the concentrations camps including the Auschwitz, Buchenwald and Dacua extermination camps.
Fig. 4—IBM German sales poster c.a., 1934 promoting government mass surveillance. Translation: "See Everything with Hollerith Punch Cards," Address: German Hollerith Machinery Company MBH, Berlin-Lighterfelde, Germany." Click here for an IBM History: 1930s, 1940s.

McKibben asked, “Is it just a coincidence that the same IBM that catalogued Jews and other politically undesirable segments of the European population in WWII is using social networking to illegally catalog all Americans in 2017?”

“Why are we so blindly revealing all our friends and work connections through Facebook, Google, LinkedIn, Instagram, What's App, etc.? These people are stealing your privacy. Your privacy is much more valuable to you as a citizen in our Republic than your car or belongings.”

This rogue C.I.A. is softening the citizenry up for the kill in my opinion . . . so far we've let them get away with it without consequence.”

“Is it just a coincidence that both Hitler and Hillary Clinton considered the citizens who disagreed with them ‘unacceptable’ i.e., ‘deplorable’ and ‘irredeemable’ and not worthy of respect?”

1937: Adolf Hitler (L) +
IBM Thomas Watson (C)
Thomas J. Watson (middle) head of IBM and president of the International Chamber of Commerce, and members of the ICG's board meet with Adolf Hitler in 1937.
Fig. 5—IBM Executives Lie: Remarkably, IBM executives claim they did not know that the Nazis were using their computers to organize mass extermination. This claim is disingenuous since IBM was the SOLE supplier of the punch cards used throughout the Third Reich. IBM even supplied maintenance staff to each LEASED computer all throughout the war—even at the Auschwitz, Buchenwald and Dacau extermination camps. These death camps had their own IBM punch card codes: Auschwitz 001, Buchenwald 002 and Dacau 003. Although IBM founder Thomas J. Watson returned Hitler's Merit Cross of the German Eagle medal in 1940, that was a mere public relations ploy. IBM continued to service their equipment throughout the war. Evidently Hitler's blood money was too sweet to walk away from.

The truth is that IBM and the C.I.A. profited from (and continue to profit from) the blood of the innocents. See video, Fig. 2.

See Donald W. McCormick, James Curtis Spee. (Dec. 01, 2008). IBM and Germany 1922-1941. Organization Management Journal.

“What are they using this information for? Are they using it for our welfare? The answer is obviously not.

“One principle is certain: The collection and use of this information destroys our Constitutional rights to privacy and property. When our government reaches into our homes, businesses and thoughts and steals whatever it wants, we are not free.“

“Jesus Christ said you will know what's in a person’s heart by observing his or her actions. Therefore, we can see from the greedy, selfish and power mongering actions of these people that their hearts are empty of love for their fellow human beings. Instead, they lie, cheat and steal without remorse. They see us as little more than consuming animals who pollute their air with too much carbon dioxide,” said McKibben.

Bookmark: #agitprop | https://tinyurl.com/y8vpwncc

“AGITPROP” demonizes opponents before taking them down

At the end of WWII, the newly-formed C.I.A. co-opted some 1,600 Nazi scientists, brought them to the U.S. and allowed them to continue their research. Some of them had worked on a Soviet mass mind control technique called AGITPROP (Agitation Propaganda).

AGITPROP stages events with messages reinforced by media, news, films, literature, plays, pamphlets and other art forms to demonize opponents and condition the general population for an eventual crackdown on those opponents.

Kristallnacht (Night of Broken Glass) on Nov. 9-10, 1938 in Germany is a prime example. 7,000 Jewish businesses were confiscated (including the business and home of the family of an AFI editor), and 1,000 synagogues were burned. The German populace was largely silent. Hitler then ratcheted up this persecution that eventually led to 6,000,000 Jews killed in the "Final Solution" extermination camps. The property and privacy of the minority German Jewish population was ignored, along with those of Jehovah's Witnesses, Poles, gypsies, homosexuals, clergy, etc.

Bookmark: #cia-exploits-nazi-mind-control | https://tinyurl.com/yb28xr9m

C.I.A. hired over 330 Nazi Party mind control experts

The Bluebird Report to Congress (1999) revealed that:

“Between 1945 and 1955, 765 scientists, engineers, and technicians were brought to the United States under Overcast, Paperclip, and similar programs. It has been estimated that at least half, and perhaps as many as 80 percent, of the imported specialists were former Nazi Party members.”

The rationale for bringing these scientists to the U.S. was to prevent them from working for the Soviets, Chinese or North Koreans. Some of these people had conducted murderous experiments on human subjects in concentration camps and were prosecuted as war criminals at the Nuremberg Trials. For example, Arthur Rudolph persecuted slave labor in the underground V-2 Nordhausen Concentration Camp in Germany, where thousands of prisoners died.

The CIA started in 1947 and exploited these scientists under various mind control programs including CHATTER, PAPERCLIP, OVERCASE, BLUEBIRD, ARTICHOKE, MKULTRA, MKNAOMI, MKDELTA, MKOFTEN MKCHICKWIT, MKSEARCH and Operation Midnight Climax (yes, even targeting San Francisco brothels!).

Bookmark: #beware-spymasters-bearing-gifts | https://tinyurl.com/ycrne85m

Beware the C.I.A. spymaster promoting a business opportunity

McKibben said, “Even after we met Chandler, we never gave him a full copy of our programming source code, which is the Holy Grail of any program. We had protected it so well that one former U.S. intelligence asset called us a ‘hard target,’ meaning our security was virtually impenetrable.”

“After dragging his feet for several years after promising to bring us business prospects, Chandler suddenly one day brought us what appeared to be a ready-made business opportunity through his friends at Lawrence Livermore National Laboratory (LLNL).”

“They wanted us to test our new social networking technology with LLNL’s perimeter security cameras. The system passed with flying colors and was certified for use with Defense-grade encryption. Shockingly for us, after that our business prospect base just dried up, almost overnight.”

“Hindsight says we should have been wary of Chandler’s LLNL introduction. It was a Deep State set up. Chandler produced a 72-page LLNL license agreement. Tellingly, he wrote himself into the agreement so that he would hold a copy of the source code in a custody agreement for 'legal safekeeping.'

“The LLNL co-signer was Jeffrey Wadsworth, who we had never met, but soon thereafter appointed CEO of the Battelle Memorial Institute and president of the Ohio State Trustees—even though he is British with no Ohio loyalties. Ohio State then teamed up with IBM and John Kasich and moved the Ohio State data center off campus where it became the network hub for the national university equivalent of Common Core called 'Massive Open Online Course.'”

“Source code custody agreements are not uncommon in software. We actually thought we would be more protected since Chandler was our attorney.”

“On June 06, 2002, we provided Chandler with an encrypted CD-ROM containing $10 million worth and 650,000 lines of source code written with 145,000 man-hours of programming.”

On Aug. 29, 2002, eleven weeks later, the IBM Eclipse Foundation distributed our invention to all Eclipse members as Version 2.0.1. They had to wait another year for us to finish debugging that source code, which occurred on Oct. 28, 2003.

Magically, that’s the same night Mark E. Zuckerberg, who AFI researchers now believe to be a C.I.A. asset, hacked the House sites at Harvard to steal student photos and wrote in his online diary, “Let the hacking begin.”

Bookmark: #property-privacy-contract-abuses | https://tinyurl.com/ybwq3jh3

Property, privacy, contract abuses

McKibben says, “Our property was stolen. That property is being used to invade the privacy of billions of human beings on the planet.”

“Our patent contracts have not been honored. How much worse can the federal government’s conduct get? When King George sent soldiers into the homes of Boston arbitrarily and without notice, he provoked an uprising we now call the American Revolution.”

Bookmark: #obama-promoted-nazi-ibm | https://tinyurl.com/y8b5rd5a
Deep State Takeover: Obama actually wrote the IBM “Internet of Things” into executive order No. 13718! Could the crony capitalism be any more evident?
Barack Obama Executive Order 13718, Feb, 9, 2016, Sec 3(a)(ii)
Fig. 6Barack Obama Executive Order 13718, Feb. 09, 2016, Commission on Enhancing National Cybersecurity (CENC). Obama identifies IBM “The Internet of Things” market initiative and is attempting to codify its stability and adaptability. Obama fails to disclose that IBM's claim to the enabling social networking technologies is fraudulent, having been stolen from Columbus, Ohio innovator Leader Technologies, Inc.

Read more at AFI. (Feb. 11, 2016). Obama promotes IBM criminality in latest executive order. Americans For Innovation.

“We appeal to real Americans to come to our aid. We have filed a Miller Act Notice. We have put President Trump’s White House on notice that his predecessors abused our property and we don’t ask or beg, we demand that our government pay us for this theft of our invention property for which the government has even signed multiple patent contracts and has enjoyed the benefits since 2000 without compensation, other than during Katrina.”

“Our claims are actually even stronger. Thanks to corruption watchdogs Judicial Watch and Citizens United, we discovered secret contracts between Hillary Clinton while Secretary of State and Facebook. Starting on Sep. 26, 2009, Hillary used State Department funds to hire Facebook to build election rigging software. Besides interfering in the election process, Hillary obstructed justice since we were suing Facebook at the time.”

“We can show that Barack Obama obstructed justice by raising money and sending propaganda through 'Obama for America' using our invention.”

“We can show that the Patent Office and former IBMer David J. Kappos and Patent Office director obstructed justice by setting up a Facebook page while we pursued our lawsuit with Facebook.”

“All the judges in our Facebook lawsuit held substantial Facebook financial interests in flagrant violation of the Code of Conduct for U.S. Judges to avoid even the appearance of impropriety.”

“There's more, but I'll stop there.”

Bookmark: #property-is-liberty-plus-creativity | https://tinyurl.com/y8kubd3q

Personal property = Liberty + Creativity

McKibben emphasizes, “My property is the use of my God-given liberty to create something of value and own it.”

“My Privacy is the right to enjoy my liberty without unlawful government interference. “

“A patent is a contract between an inventor and the American people.”

“My property right is crystal clear. I entered into contracts with the federal government that resulted in multiple patents. The government loved my inventions so much they stole them right off the design storyboards, even before they were fully functional! In addition, my patent attorney was an agent (albeit a secret spymaster) of the federal government as well. We also had five letters of engagement with him as an attorney.”

Bookmark: #scene-of-the-chandler-crime | https://tinyurl.com/y96bnnng
Leader Technologies Miller Act Notice for Federal Works Projects 40 USC Sec. 3131 et seq. timeline
Fig. 7—JAMES P. CHANDLER, IIII, BILL CLINTON's SPY MASTER, IBM's CHIEF OUTSIDE COUNSEL, first learned about Leader / McKibben's social networking designs in early 2000. By this meeting on Jun. 8, 2000 he was studying every detail. This photo of a design storyboarding session captures the scene of the crime. Chandler is pictured here seated in the white shirt against the wall on the right side of this photo with his legal assistant Kelley E. Clements to the viewer's right. Co-inventor Michael McKibben and Jeffrey Lamb are picture standing in the back left of the photo. Photo: Leader Technologies, Inc.

“In fact, patents are the only property rights actually written into the U.S. Constitution. Article I, Section 8, Clause 8 ('[The Congress shall have power] To promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries.')”

“Clearly the Deep State ignores patent property rights, when it suits them. As a result, the legal sophistry that we have encountered is off the charts corrupt.”

“My shareholders and I have been denied all three of these fundamental Constitutional rights: property, privacy, contract.”

McKibben said, “In our case, the federal government marched in with jack boots and just confiscated our social networking invention ‘for the greater good.’ Those were the very words of my patent attorney James P. Chandler to me once. AND THEN, THEY USED THE INVENTION AGAINST US ALL.

Bookmark: #wouldnt-you-expect-payment | https://tinyurl.com/yam2zg38

If you did the work, wouldn’t you expect payment ???!!!

Ask yourself, if you had spent five years, $10 million and invested 145,000 man-hours into building something, wouldn’t you expect to be paid by anyone who used what you built?

Exactly. Well, so do social networking inventor Michael McKibben and his stockholders in Leader Technologies.

Worse, the federal government is using Leader’s invention as a global spy machine to engage in “Collect it All” warrantless surveillance on everyone.

This theft is wrong on so many levels.

We call upon all real Americans to speak up for Leader’s property rights, as well as the privacy rights of every American—it's that important, for all of us.

Hopefully, the age of CIA-IBM-Deep State mind control is coming to an end.

Taking care of real inventors like Michael McKibben and Leader Technologies is a good first step.

Support the Leader Technologies / Michael McKibben Miller Act Notice. Ask President Trump to take care of these American entrepreneurs like he promises.

* * *

Bookmark: #resources | https://tinyurl.com/ycndh7qd

Resources:

Bookmark: #kevin-shipp-exposes-shadow-government | https://tinyurl.com/ybc9f2o6

C.I.A. Whistleblower Kevin Shipp calls for social-civil revolution against the Shadow Government to restore the Constitution

https://youtu.be/XHbrOg092GA | Raw *.mp4 video file
Fig. 8 – C.I.A. Whistleblower Kevin Shipp exposes the Shadow Government and how it is manipulated by the Deep State. Shipp calls for a social-civil revolution to restore the U.S. Constitution that has been hijacked by the Deep State and which wholly controls the Shadow Government (bribed and blackmailed Congress, Judiciary and unelected Bureaucracy). Video: GeoEngineeringWatch.org.
Bookmark: #kevin-shipp-shadow-government | https://tinyurl.com/y738wbrn
Kevin Shipp: Key elements of the unconstitutional American Shadow Government
Shadow Government Slide: Kevin Shipp. (Aug. 23, 2017). CIA Agent Whistleblower Kevin Shipp Risks All To Expose The Shadow Government. GeoEngineeringWatch.
Fig. 9 – Unconstitutional American Shadow Goverment. C.I.A. Whistleblower Kevin Shipp has taken great risks to reveal the structure of the illegal “shadow government” that operates outside the U.S. Constitution. See VIDEO, Fig. 8. Click here for a PDF of this slide.
Bookmark: #kevin-shipp-deep-state | https://tinyurl.com/y8n6u4dr
Kevin Shipp: Key elements of the American Deep State
Deep State Slide: Kevin Shipp. (Aug. 23, 2017). CIA Agent Whistleblower Kevin Shipp Risks All To Expose The Shadow Government. GeoEngineeringWatch.
Fig. 10 – American Deep State that funds and profits from the Shadow Goverment. C.I.A. Whistleblower Kevin Shipp has taken great risks to reveal the structure of the illegal “shadow government” that operates outside the U.S. Constitution. See VIDEO, Fig. 8. Click here for a PDF of this slide.
Bookmark: #george-soros-nazi | https://tinyurl.com/y7dyumlh

George Soros openly admits  that he betrayed his fellow Jews to the nazis—without remorse!

https://youtu.be/5fqm7CYggLE | Raw *.mp4 video file | AFI Timeline
Fig. 11—George Soros, International criminal, funder of the radical left, and self-confessed NAZI SYMPATHIZER told to Steve Kroft on 60 Minutes on Dec. 20, 1998 that he was a Nazi sympathizer during WWII in Hungary who felt no guilt about turning in his fellow Jews to the Nazis. According to the National Committee for Attending Deportees (DEGOB), between May 15 and July 9, 1944 the over 437,000 people in Hungary were deported by the Nazis (with whom Soros had been collaborating) to the Auschwitz-Birkenau death camps to achieve the demonic Nazi “Final Solution” annihilation of the Jewish race. Video: CBS. Fair Use.
The fact that so-called “liberals” would take money, direction and inspiration from such an evil person as George Soros is a sad commentary on the state of their moral and ethical development as human beings. Soros has made his blood money billions of dollars using mainstream medias to destabilize markets for his profit. He buys and sells stocks depending upon which fake message he wants the MSM to propogate. That is not financial “player” genius, that is just pure evil.
Bookmark: #ibm-cia-nazi-internet-of-things | https://tinyurl.com/y7pyst7e

Warning: C.I.A. Deep State with IBM are close to a full takeover

https://vimeo.com/232999832 | Raw *.mp4 video file
Fig. 12 – IBM FIRST CENTRALIZED DATA ON CITIZENS FOR NAZI, GERMANY STARTING IN 1933. Today, IBM and the C.I.A. have continued that goal with different packaging, calling it IBM "The Internet of Things." The illegal mass surveillance of Americans has been bad at stopping terrorists, but it has been good at collecting all information about a person (work history, bank accounts, education, political beliefs, spirituality, opinions, relationships, health history, etc.)—the real goal of the program—to develop a highly accurate mathematical profile. Author Edwin Black shows how this is exactly what IBM achieved for Adolf Hitler that made his "Final Solution" against the Jews so effective. The Nazis had embraced the teaching of American eugenicist Margaret Sanger (Planned Parenthood) in their beliefs about race and genetic superiority. Those same goals have been repackaged with cute emogis to lull citizens to sleep while their civil liberties are destroyed . . . in the name of safety and counter-terrorism.
Video: Infowars.
IBM, C.I.A. Internet of Things is a continuation of the Nazi Germany 1933 'Final Solution'
Mainstream Media creates false flag events in attempts to discredit President Donald Trump, his supporters and to undermine our Republican form of democracy

Notices: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself. Photos used are for educational purposes only and were obtained from public sources. No claims whatsoever are made to any photo.

Comment

Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to amer4innov@gmail.com and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.