AFI Custom Search

SEARCH by topic, keyword or phrase. Type in Custom Search box
Use this Custom Search toole.g. "IBM Eclipse Foundation" or "racketeering"

Monday, July 24, 2017

LEADER TECHNOLOGIES FILES TRILLION DOLLAR BOND LIEN ON THE U.S. GOVERNMENT

President Trump is asked to compensate Leader for the theft of their inventions by the Deep State shadow government

Leader’s social networking invention was stolen by Clinton’s spy master James P. Chandler in 2000 in order to hijack the Internet

Deep State lawyer notes actually called it a "coup"

Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Jul. 24, 2016, Updated Jul. 25, 2017 | PDF
The Deep State shadow government has perfected the crony capitalist art of 'public-private' partnership
Fig. 1 – Leader Technologies filed a Miller Act Notice. The real inventor of social networking, Leader Technologies and Michael McKibben, asked President Trump to force technology companies who provide services to the U.S. Deep State intelligence services running rogue operations out of the National Security Staff (NSS), National Infrastructure Advisory Council (NIAC) and the IBM Eclipse Foundation, to pay inventor Leader for the confiscation of their social networking invention since 2000. Bill Clinton's intelligence advisor, James P. Chandler, first learned about Leader invention in Feb. 2002, according to the Miller Act Notice. See Figs. 2, 3 below.
Graphic: Deep State News.

(Jul. 24, 2017)—Citing bombshell lawyer notes of a private conversation, U.S. intelligence insiders called their plan to use stolen social networking technology to take over the Internet a “coup.” Leader Technologies and its founder and inventor, Michael McKibben, served the federal equivalent of a lien on the US government today.

Michael T. McKibben
Fig. 2: Michael McKibben.
Photo: NBC4 WCMH-TV.

Leader CEO McKibben is the true inventor of social networking, as the timeline in the White House notice shows. See Fig. 2 below.

Leader filed a “Miller Act Notice” on the White House at 1600 Pennsylvania Avenue this morning. The Miller Act, 40 USC 3131, requires prime contractors on government contracts to post bonds guaranteeing payment to suppliers. Leader has proven breach of contract and argues that technology suppliers to the the Deep State have benefited from Leader's inventions since 2000 without compensating Leader for those benefits. All this is explained in the Miller Act Notice. Likewise, when your builder doesn't pay the subcontractors, the subs can file a mechanic's lien. The Miller Act is similar, except that the federal government is exempt from having to sell its property to cover outstanding obligations. In lieu of a mechanic's lien, federal contracts require surety bonds.

The timeline also reveals disturbing long-time collusion of Leader’s former patent attorney, James P. Chandler, with the White House ever since Bill Clinton's presidency, right through George Bush and Barack Obama. It also shows his collusion with rogue intelligence operatives in the NSA, CIA, FBI and with IBM, among others. Perhaps this is why former executives from these agencies are speaking out against President Trump right now? They are attempting to hide this collusion?

Leader Technologies Miller Act Notice for Federal Works Projects 40 USC Sec. 3131 et seq. timeline
Fig. 2—MILLER ACT NOTICE TIMELINE contained in Leader Technologies' Miller Act Notice served on the White House on Jul. 24, 2017.

Leader shows how the U.S. government stole its social networking inventions through Chandler, who was also Bill Clinton’s intelligence advisor. The timeline also reveals a disturbing pattern of collusion among rogue elements of the FBI, NSA and CIA with private industry that included former director Robert Mueller. Mueller is now leading the ever-expanding Donald Trump Russia collusion witch hunt.

Leader demands payment for 17 years of government theft

Leader says the damages are valued at least $40 billion for historical damages, which they say is not actually close to the real number, and $184 billion per year in ongoing annual license fees. It appears that these amounts will be paid by the surety bond holders who supply the federal government's intelligence apparatus, companies like IBM, Microsoft, Xerox, etc. This puts the payout in the coming years at well over one trillion dollars. The claim is after taxes, which means the government may generate $20 billion or more per year in taxes from this claim as the bond holders pay out.

Former defense secretary Robert M. Gates said in his book Duty that this rogue White House National Security Staff operation had already engulfed the White House during his tenure. He said it had grown from 50 under Clinton to 350 under Obama—a 700% increase. It appears that the primary goal of this surveillance is blackmail. National security has only ever been the excuse to consolidate the Deep State shadow government’s power.

Leader’s lead inventor, Michael McKibben, said “many investigators from around the country have been working on this notice for a long time. He also said that "numerous prominent whistleblowers have helped fill in the pieces of the puzzle.”

McKibben said he will be making a statement in the next few days. He emphasized that President Trump had nothing to do with the theft of social networking, but his predecessors Clinton, Bush and Obama did.

“On behalf of myself and my shareholders, I ask President Trump to correct the injustices we have suffered at the hands of an un-elected, rogue shadow government that has evidently hijacked the Internet to try and maintain their power.” McKibben said all he has ever wanted was a level playing field as promised in the U.S Constitution. Instead, he has encountered only crony capitalism where the winners and losers are predetermined and the courts are rigged. “In our experience, 'Deep State shadow government' is an accurate description for what we have uncovered,” he said. “I am asking the President to finally do right by me, my investors, private property rights, the U.S. Constitution and the Rule of Law.”

Leader Technologies Miller Act Notice for Federal Works Projects 40 USC Sec. 3131 et seq. timeline
Fig. 3—JAMES P. CHANDLER, IIII, BILL CLINTON SPY MASTER first learned about Leader/McKibben's social networking designs in early 2000. By this meeting on Jun. 8, 2000 he was studying every detail. Chandler is pictured here seated in the white shirt against the wall on the right side of this photo with his legal assistant Kelley E. Clements to the viewer's right. Co-inventor Michael McKibben and Jeffrey Lamb are picture standing in the back left of the photo. Photo: Leader Technologies, Inc.

Regarding the current Russian narrative, McKibben has a unique perspective.

Russian collusion—Yes! Proven for Hillary, Bill, Podesta, Google, Intel and cisco

See the facts:

McKibben said, “It is too easy for Americans to simply yell 'The Russians!' because relatively few Americans go there, much less fly to the Crimea, for example, and verify the stories. So, it is safe to make up lies and never get caught. By the way, I have actually been to the Crimea. I have met families who lost their loved ones in Stalin's mass starvation of up to 10 million Ukrainian Christian farmers (as much as 25% of the population) who were resisting Communism in 1932-33 (Holodomor)."

McKibben continued, "several PROVABLE RUSSIAN FACTS are that Bill Clinton was paid $500,000 for a Renaissance Capital speech in Moscow on Jun. 29, 2010, according to Hillary Clinton 2010 financial disclosure. Another proven fact from the Massachusetts Secretary of State corporate filings is that John Podesta was a director of Joule Unlimited in Boston when Putin’s company Rusnano invested $35 million.” See below:

Bookmark: #real-clinton-podesta-deep-state-russian-collusion

Real Clinton, Podesta, Deep State Russian Collusion

Hillary Clinton. (May 15, 2011). Form 278 Financial Disclosure, 2010, p. 8, item 3. Office of Government Ethics.
Fig. 4 – Hillary Clinton's 2010 Financial Disclosure, page 8, item 3, discloses Bill's $500,000 Renaissance Capital speech in Moscow. Click here to see Page 8 of Hillary's OGE Form 278 Financial Disclosure for 2010.
Joule Unlimited. (Dec. 31, 2011). Annual Report for Joule Unlimited Technologies Inc., John Podesta, Director. Fed. EIN 000960688MA. Secretary of the Commonwealth of Massachusetts.
Fig. 5 – Joule Unlimited. (Dec. 31, 2011). Annual Report for Joule Unlimited Technologies Inc., John Podesta, Director. Fed. EIN 000960688. Secretary for the Commonwealth of Massachusetts. Click here to see Page 2 of the Joule Unlimited 2010 Annual Report to the Secretary for the Commonwealth of Massachusetss.

“Those engagements clearly broke U.S. law and showed the Russians that American values are equally as corrupt as theirs. It is utterly immoral that Obama, Clinton and their Deep State cohorts allowed this to go on with no accountabilty or consequence.”

McKibben believes that the shadow government elitists who stole his social networking inventions are projecting their sins onto Donald Trump as a smoke screen. He says, "it's a red herring, in my opinion."

In the 70's and early 80's, McKibben, a civil engineer and former professonal musician, took contemporary Gospel music groups named Living Sound into Poland and the Soviet Union at the height of the Cold War. He said, "while Leonid Brezhnev was still ruling, honest Soviet citizens sacrificed greatly to achieve some unprecedented results from that work, including organizing our Gospel music performance on national Soviet TV, our music being included on the official 1980 Moscow Summer Olympics film, and the distribution of up to one million Living Sound EPs in 1981."

McKibben says he may have even encountered a young KGB officer named Vladimir Putin at a Leningrad airport security checkpoint where he was body searched after meeting with a Christian activist in Estonia whose sole crime was the anti-Soviet organizing of Christian concerts, and had just been released from prison. Putin was in charge of monitoring foreigners in Leningrad then.

McKibben said in recent years Vladimir Putin says he has come to embrace the Christian faith that he once persecuted. "I hope and pray that is true," said McKibben, who counts John Paul II (now sainted) among his friends and patrons from his work in Poland. "In 1995, I met the late Russian Patriarch Alexy and the current Patriarch Kirill. I also participated in one of the first Church processions allowed in the streets of Moscow since 1917. It was a moving event. We stopped at Lubyanka Square (the former KGB headquarters—infamously known as the "Gateway to the Gulag" through which millions of citizens were sent to their deaths), just after the mass murderer Dzerzhinsky's statue had been toppled and a rough-hewn cross had been strapped to its base. We sang the Orthodox Christian funeral hymn 'Memory Eternal' remembering the martyrs of the Gulag. I will never forget it."

"Mr. Putin's conduct appears contradictory, but such contradictions are not unique to Russians! The closet Muslim Barack Hussein Obama told us before the 2008 election that he was a Christian too. That was evidently a heinous lie. Time will tell regarding Mr. Putin. Jesus said you will know people's real values by the fruits of their actions, not their words."

“Do I blame the Russian government for trying to engage Clinton and Podesta? No. Everyone has known for decades that is what they do. But, to demonize the whole country of Russia is absolutely ridiculous. I know scores of honest, ethical Russians. I watched some of my Russian friends serve prison terms in the U.S.S.R. for standing up for truth and against the lies in their communist society. The grandfather of one friend came out of the Gulag with tuberculosis after suffering for over five years in 10 Soviet prisons and camps. His grandpa died at age 34 from that tuberculosis. What was his grandpa's crime? Befriending American soldiers from the 69th Infantry Division who took him in off the streets after he was liberated from a German slave labor camp.”

"America was called by God to set a higher ethical example for the world. We desperately need to get back to our roots."

"Do I blame Clinton and Podesta for cutting secret deals with the Russians while she was Secretary of State in order to enrich The Clinton Foundation and their globalist agenda? Yes—absolutely!"

Rogue Spy Blackmail Scheme

“Even the FBI admitted recently that not a single terrorist has been stopped by the illegal dragnet surveillance that they set up using our social networking inventions. But it stands to reason that these bad guys have used this data for blackmail, as many whistleblowers now affirm. They evidently have the dirt on many in Congress and the Courts. We need some sort of truth and reconciliation commission to sort out this rogue spy blackmail scheme.”

“God gave us a reprieve with the election of Donald J. Trump. With the funds we are demanding we will finally have an opportunity to introduce our social networking invention in the right way—a way that keeps what everyone likes about social networking, and also respects our Fourth Amendment rights to privacy from unlawful government intrusion,” McKibben concluded. "We fought a revolution over this issue! Why would we give it up now?"

Click here to download a copy of Leader/McKibben’s Miller Act Notice just served on the White House.

* * *

Notices: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself. Photos used are for educational purposes only and were obtained from public sources. No claims whatsoever are made to any photo.

Comment

Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to amer4innov@gmail.com and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.

Friday, June 30, 2017

CISCO IS A KEY ENABLER OF THE DEEP STATE SHADOW GOVERNMENT

Cisco CEO John Chambers built back doors into his I nternet routers, donated $5 million to The Clinton Foundation, and paid $1 billion into the Obama/Hillary "Russian Reset"

Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Jun. 30, 2016, Updated Jul. 25, 2017 | PDF
John T. Chambers, CEO, Cisco, speaking at the Clinton Global Initiative (CGI) on Sep. 25, 2013
Fig. 1 – John T. Chambers, CEO, Cisco Systems. Chambers is emerging as a central organizing figure in the rogue C.I.A. Deep State shadow government's takeover of the American Republic. Here he is as special guest of Bill and Hillary Clinton at the Clinton Global Initiative (CGI) on Sep. 25, 2013. Chambers donated up to $5 million to the Clintons and donated $1 billion to the Hillary/Obama "Russian Reset" to promote Russian technology.
Photo: Hollywood Reporter.
Bookmark: #deep-state-goldstein
Andrew D. Goldstein
Andrew D. Goldstein
Assistant U.S. Attorney; Mueller Russia probe appointee; JPMorgan attorney; failed to prosecute any Wall Street executives
Breaking News! Jul. 03, 2017: New Mueller counsel tied to $13 billion Obama JPMorgan "slush fund"
Robert S. Mueller's appointment of Assistant U.S. Attorney Andrew D. Goldstein (Yale Law, Reg. No. 4585675, formerly Paul Weiss LLP,[*] now Jeh Johnson's law firm) must be rescinded due to Goldstein's personal DOJ conflicts of interest. Goldstein also worked for U.S. Attorney Preetinder Bharara who was recently fired by President Trump. On Oct. 28, 2008, JPMorgan recieved a $25 billion TARP bailout from the U.S. Treasury, managed by Larry H. Summers under Barack Obama. On Mar. 09, 2009, five months later, Goldstein represented JPMorgan Chase and Ford Motor Company against a small NY brokerage firm involving a $20 million transaction. In 2010, Goldstein then joined Preet Bharara's U.S. Attorney's office. On Nov. 19, 2013, JPMorgan settled with Attorney General Eric Holder for $13 billion with no prosecutions of JPMorgan executives by either Bharara or Goldstein. Some experts called this JPMorgan settlement money an Obama political "slush fund." JPMorgan CEO Jamie Dimon had met secretly with Attorney General Eric Holder before the settlement. These close Deep State associations unmistakably tie Goldstein to Clinton-Obama Deep State collusion, and should disqualify him. This is more evidence that Rod Rosenstein and Mueller are organizing a hit job on President Trump. See previous post.

[*] Goldstein's work history at Paul Weiss LLP before 2010 is very evidently censored.

ORIGINAL POST

(Jun. 30, 2017)On Jun. 19, 2017, President Trump hosted a roundtable of technology and academic elitists. Perhaps unknown to President Trump and his agency heads is the fact that these companies have been working for decades to undermine the American Republic in favor of a globalist New World Order run by unelected bureaucrats and multi-national corporations.

Fig. 2: President Trump hosts an American Technology Roundtable as the White House on Jun. 19, 2017. https://youtu.be/v6kB7gO0Ejk | Raw *.mp4 video file | VIDEO TRANSCRIPT

The original authority for this Deep State shadow government Internet collusion is Executive Order 13231 which has been renewed six times by Presidents Bush and Obama. It is due for another renewal on Sep. 30, 2017 as Executive Order 13708.

If Executive Order 13708 is not renewed by Sep. 30, 2017, these Deep State conspirators will be officially rogue—having lost their dubious legal authority to support the White House's National Security Staff (NSS). These devious individuals have hidden their collusion in a mountain of government intelligence legalese that promotes "public-private partnerships"—in the name of national security, of course. Their collusion has been cleverly hidden from Congress and the public by stamping "classified" on almost everything they have done since Bill Clinton came to power in 1993. According to former Defense Secretary Robert Gates in his book Duty (2014), the NSS staff ballooned from 50 in 1993 to over 350 in 2016 under Obama. That is a lot of spies running around in the White House! Are they doing The People's business? That is doubtful.

The question is, for whom have they been spying? The answer is evident: Deep State globalists working for a U.N. New World Order run by the very multinational corporations, academics, intelligence agencies and media who comprise this "public-private partnership" of elitist spies.

The NSS is a rogue C.I.A. spy operation run out of the White House without Congressional oversight to which the 17 other intelligence operations, including the NSA and FBI, are subservient.

The NSS has numerous tentacles into policy, funding, intelligence, media, academia, judicial, research and development—all sustained by a long string of dubious "national security" executive orders from Bill Clinton through George Bush and Barack Obama. Note: AFI researchers interviewed a very prominent member of the judicial community in preparation for this post. He had no awareness of this unConstitutional exploitation of intelligence executive orders. Therefore, spread the word.

  1. Policy & Funding—National Infrastructure Assurance / Advisory Council (NIAC) and the “safe harbor” concept to get around the Fourth Amendment, which prohibits unreasonable searches and seizures. It requires governmental searches and seizures to be conducted only upon issuance of a warrant, judicially sanctioned by probable cause.
  2. R&D—The IBM Eclipse Foundation and theft of social networking invention from Leader Technologies to get around the Fifth Amendment, which protects personal property from confiscation by the government without fair compensation.
  3. Funding—Wall Street, offshore money laundering & drugs. See HSBC / SwissLeaks / Comey / Mueller. See also The Panama Papers.
  4. Media— NPR, New York Times, CNN, Washington Post hide behind the First Amendment to disguise their role as Deep State propagandists. See backdoor keys.
  5. Blackmail—C.I.A., FBI, NSA, use of pedophilia & ritual child sacrifice
  6. AcademiaHarvard, Yale, Stanford, Columbia, GWU, Ohio State M.O.O.C. (Massive Open Online Course—Deep State takeover of universities), Carnegie Mellon
  7. Judicial—Secret FISA Court exploitation and the “safe harbor” mutual fund concept for hiding bribery of judges and getting around judicial ethics prohibitions against the 'appearance of impropriety'

The White House roundtable participants gather regularly around the world in various forums (likely seditious) to further their anti-American globalist agenda in places like Bilderberg, Davos, Tri-lateral Commission, In-Q-Tel, IBM Eclipse, NIAC, NVCA (National Venture Capital Association), World Bank, IMF, Federal Reserve, Council on Foreign Relations (CFR) and the Brookings Institution.

"Ok, Houston, we've had a problem here"

This was the message that Apollo 13 Command Module Pilot Jack Swigert radioed to earth after an explosion in their spacecraft.

This Roundtable group almost universally backed Hillary Clinton for President. A president Hillary would have renewed Executive Order 13708 by Sep. 30, 2017.

However, without that renewal, the decades of digital sedition that has hidden under these executive orders will officially go rogue. The roundtable group members will have no legal authority to operate their warrantless surveillance of Americans and their unConstitutional theft of our privacy.

Said another way, the decades of collusion that have led us to the cliff of The New American Surveillance State will have no legal legitimacy whatsoever come Sep. 30, 2017.

Indeed, like Apollo 13, these conspirators just heard an explosion inside their own “command module.” They have a serious problem.

After September 30, 2017, unless President Trump offers them some sort of amnesty these people will be in trouble. They will need to disclose anyone who is 'blackmailing' them, or their Deep State collusion will likely land substantial numbers of the technology world in prison for treason and sedition. Indeed, former C.I.A. leader turned whistleblower Robert David Steele recommends that President Trump implement such a "truth and reconciliation" program to help fix the rampant rogue spy-generated blackmail that has overtaken our public institutions.

Officially criminals after Sep. 30, 2017

On Sep. 30, 2017, all of the companies and individuals who have colluded with the rogue C.I.A. / NSA / FBI and NSS in the White House to spy illegally on the American people will be officially criminals because they will no longer have the dubious executive order protections they have relied on since 1999 when these shadow government executive orders were instituted. (The first version of the NIAC, Executive Order 13130 was implemented by Bill Clinton on Jul. 14, 1999.)

How bad is it?

President Trump asked each Roundtable participant to introduce himself or herself. AFI researchers have compared that list of attendees to various other collusion membership lists compiled for the AFI TIMELINE:

People you trusted are now hijacking the Internet.

What emerged is a list that we have named the “Deep State Hive Mind Index.” "Hive mind" as in "groupthink." We have hard evidence of this groupthink, in which the desire for harmony or conformity in the group results in an irrational or dysfunctional decision-making outcome. We believe this explains the globalist New World Order elitist drive to seize power and control, at all costs.

The Deep State Hive Mind Index

We coined the term “Deep State Hive Mind Index” as a way to determine the relative contributions of the various actors involved in this massive collusion. Clearly, some of these players are more central to this hive mind than others.

Membership in the following Deep State shadow government activities were each given a “1” value, and Clinton speaking fees were given a “1” for each speech. Ohio State's Trustee President Jeffrey Wadsworth manages numerous intelligence units as CEO of Battelle Institute and therefore classifies Ohio State as a C.I.A. agent.

Ohio State is also the network hub for M.O.O.C. (Massive Open Online Course)—an evident agent of the Deep State shadow government to steal university research data and brainwash students using advanced C.I.A. MKUltra mind control techniques like virtue signaling and trolling. MKUltra never stopped despite Congress' order to shut it down. "Conspiracy theory!" you say? Open your eyes. Such reactions have been effective in hiding this diabolical program in plain sight. This is not 'conspiracy theory' if it is true. See FBI superstar Agent In Charge Ted L. Gunderson whistleblower revelations.

Criteria for the creation of the Index below:

  1. Policy & Funding: National Infrastructure Assurance / Advisory Council (NIAC), the “safe harbor” concept to circumvent 4th Amendment privacy protections; safe harbor protections will expire on Sep. 30, 2017 which will likely and immediately expose all NIAC contributors to treason and sedition charges
  2. FBI backdoor: On Jun. 07, 1993, Podesta and James Chandler sponsored CRYPTO 1993 to give the FBI a backdoor key to the Internet
  3. Judicial bribery: the “safe harbor” mutual fund concept
  4. R&D: IBM Eclipse Foundation and the theft of Leader Technologies’ social networking invention
  5. NSA backdoor encryption: NIST registration of backdoor keys. See also Dell ships backdoor keys
  6. Financing: In-Q-Tel / C.I.A. / Wall Street / Silicon Valley
  7. Gov’t contracting: using procurement to enforce conformity to the rogue agenda
  8. Blackmail data collection: Warrantless Surveillance (Snowden)
  9. Blackmail exploitation: Obama donors and  insiders. See Feb. 17, 2011 and Mar. 02, 2015.
  10. Blackmail exploitation: Clinton Foundation donors and insiders. See also The Clinton Chronicles
No. WH Roundtable Participants
Jun. 19, 2017
Deep State Hive Mind Rating
1 [Cisco] (conspicuously absent, see below) [15]
2 Oracle 11
3 Facebook, Clarion, Palantir / CIA 10
4 IBM / CIA 10
5 Microsoft 10
6 Amazon, Washington Post / CIA 8
7 Apple 8
8 Google, Alphabet 8
9 Kleiner Perkins / CIA 8
10 Ohio State / Battelle / CIA 8
11 Palantir, NSA, In-Q-Tel / CIA 8
12 Qualcomm 8
13 Carnegie Mellon U, Hoover Institution, Stanford 7
14 Intel 7
15 MIT 7
16 VMWare, Dell, EMC 7
17 Accenture 6
18 Akamai 6
19 MasterCard / AOL 6
20 SAP 6
21 Adobe 5
22 OpenGov 5
23 UNC 5
Table 1: White House Technology Roundtable Participants (Jun. 19, 2017).

What is the Deep State Hive Mind?

Is the adoption of the “Eclipse” symbolism merely coincidental? Or, is it intentionally selected Islamic symbolism signaling the unholy alliance between the globalist New World Order has and jihadi Islamic extremists?

One notable trend among these collaborators is their near universal involvement in the IBM Eclipse Foundation started on Nov. 29, 2001. This foundation distributed the social networking invention of Columbus innovator Leader Technologies at no charge to the entire tech community. Of course, embedded in that code were Deep State requirements for backdoor keys and quid pro quo data sharing.

Sacrificed morals for power and money

Evidently, these people sacrificed their morals and ethics to establish this unconstitutional and depersonalized “Internet of Things” to spy on you and steal all your best ideas to exploit among the hive mind elitists.

These people are like a hive of drone bees buzzing around their corrupt Queen Hillary.

Tellingly, Barack Obama even promoted the “Internet of Things” in his Executive Order 13718. They probably thought no one was paying attention.

Misprision of a Felony: Did the roundtable participants commit a felony by not disclosing their Deep State collusion to the President?

The law is clear. It is a felony to have knowledge of fraudulent activity involving a contract with the federal government and not disclose it.

18 U.S. Code § 4 - Misprision of felony

“Whoever, having knowledge of the actual commission of a felony cognizable by a court of the United States, conceals and does not as soon as possible make known the same to some judge or other person in civil or military authority [including the President and his agency chiefs] under the United States, shall be fined under this title or imprisoned not more than three years, or both.”

Each of these Deep State participants has contracts with the federal government.

By remaining silent about their decades of fraud and crony capitalist collusion, is not each person who introduced himself or herself to President Trump guilty of misprision of a felony? In the opinion of our legal experts, yes.

Why was the Deep State digital kingpin Cisco absent? Good Question.

Conspicuously absent from the White House meeting is one of the Deep State kingpins—Cisco and its chairman John T. Chambers.

Peter A. Thiel
Peter A. Thiel
Facebook director & major shareholder, funded Zuckerberg's first $500,000 in 2004, founder of PayPal, co-founder of Palantir NSA / C.I.A. spy software

We digress for just a moment to give readers more context for the insidious Washington, D.C. corruption machine. Also missing the roundtable was Facebook's Zuckerberg or Sandberg. However, since Peter A. Thiel is a director and major shareholder of Facebook, they were present, even if not introduced. This does not even consider that all or nearly all of the companies who did attend collude with Facebook. See Jim Cramer's CNBC rant about Peter Thiel's unethical sale of Facebook IPO stock on May 22, 2012. Also present were former Goldman Sachs executives who were the primary underwriters for the Facebook stock offering that substantially funded the Deep State.

The Facebook initial public offering provided hundreds of billions of dollars for the Deep State's campaign of bribery and collusion. For example, all of the Leader v. Facebook judges cashed in.

Remember, the real purpose of Facebook and Google is to be a rogue C.I.A. global spy data collection system for the Deep State shadow government to manipulate and control you—the wolf—who comes into your home dressed in the sheep's clothing of coupons, titillation and baby pictures—very devilish, insidious and effective. Isn't that right Alexa? (The voice of Google Home.)

Bookmark: #nsa-strategic-partnerships
News Update! Jul. 09, 2017: Snowden NSA documents prove Cisco, IBM, Google, Facebook helped lead the Deep State takeover

Greenwald. (May 14, 2014). Snowden NSA archive Documents from No Place to Hide, PDF page 12. Glenn Greenwald / MacMillian. (Glenn Greenwald, p. 102: "NSA Strategic Partners, Alliances with over 80 Major Global Corporations Supporting both Missions: Telecommunications & Network Service Providers, Network Infrastructure, Hardware Platforms Desktop/Servers, Operating Systems, Applications Software, Securty Hardware & Software, System Integrators: AT&T, CISCO, EDS, H-P [HP, Hewlett-Packard], IBM, Intel, Oracle, Qualcomm, Microsoft, Motorola, Verizon").
Fig. 3Glenn Greenwald. (May 14, 2014). Snowden NSA archive Documents from No Place to Hide, PDF page 15. Glenn Greenwald / MacMillian. (Glenn Greenwald, p. 102: "NSA Strategic Partners, Alliances with over 80 Major Global Corporations Supporting both Missions: Telecommunications & Network Service Providers, Network Infrastructure, Hardware Platforms Desktop/Servers, Operating Systems, Applications Software, Securty Hardware & Software, System Integrators: AT&T, CISCO, EDS, H-P [HP, Hewlett-Packard], IBM, Intel, Oracle, Qualcomm, Microsoft, Motorola, Verizon").
Bookmark: #nsa-strategic-partnerships
Cisco updated switch software to fix rogue NSA problems

Greenwald. (May 14, 2014). Edward Snowden NSA archive Documents from No Place to Hide, PDF page 64. Glenn Greenwald / MacMillian. (Glenn Greenwald, p. 150: Cisco provided software to fix NSA problems
Fig. 4Glenn Greenwald. (May 14, 2014). Edward Snowden NSA archive Documents from No Place to Hide, PDF page 15. Glenn Greenwald / MacMillian (Glenn Greenwald, p. 150: Cisco provided software to fix NSA problems).
Bookmark: #nsa-social-collusion
Deep State social spy net: social providers agreed to share their user data in exchange for profits

Edward Snowden. (Jun. 06, 2013). On Jun. 06, 2013, thanks to NSA Whistleblower Edward Snowden, we learned that all the large online 'social' hardware, software and telecommunications providers were creations and certainly tools of their U.S. government spy state cronies. This strategy was hatched during the Clinton administration by his spy master advisor, Harvard law professor James P. Chandler, later Leader Technologies' patent attorney. AT&T played too.
Fig. 5Edward Snowden. (Jun. 06, 2013). On Jun. 06, 2013, thanks to NSA Whistleblower Edward Snowden, we learned that all the large online "social" hardware, software and telecommunications providers were creations rogue C.I.A. This strategy was hatched during the Clinton administration by his spy master advisor, Harvard law professor James P. Chandler, III, later Leader Technologies' patent attorney. The companies revealed are Microsoft (9/11/07), Yahoo (3/12/08), Google (1/14/09), Facebook (6/3/09), PalTalk (12/7/09), YouTube (9/24/10), Skype (2/6/11), AOL (3/31/11), Apple (added Oct, 2012—one year after Steve Jobs died, replaced by former IBMer Timothy D. Cooke. AT&T also participated, see Fig. 3 above.
Bookmark: #nsa-cia-exploit-it-all
Rogue C.I.A. / NSA Lawless Admission: "Exploit it All"

Greenwald. (May 14, 2014). Snowden NSA archive Documents from No Place to Hide, PDF page 5. Glenn Greenwald / MacMillian. (Greenwald, p. 97: "New Collection Posture: Sniff it All. Know it All. Collect it All. Process it All. Exploit it All. Partner it All").
Fig. 6Glenn Greenwald. (May 14, 2014). Snowden NSA archive Documents from No Place to Hide, PDF page 5. Glenn Greenwald / MacMillian. (Greenwald, p. 97: "New Collection Posture: Sniff it All. Know it All. Collect it All. Process it All. Exploit it All. Partner it All").
Bookmark: #deep-state-admits-racketeering
Deep State colluders admit racketeering: "a lot of money being made by U.S. entities"
Greenwald. (May 14, 2014). Snowden NSA archive Documents from No Place to Hide, PDF page 96. Glenn Greenwald / MacMillian. (Glenn Greenwald, p. 167b: NSA admission: "Let's by blunt—the Western World (especially the US) gained influence and made a lot of money via the drafting of earlier standards.  –The US was the major player in shaping today's Internet. This resulted in pervasive exportation of American culture as well as technology. It also resulted in a lot of money being made by US entities.").
Fig. 7Glenn Greenwald. (May 14, 2014). Snowden NSA archive Documents from No Place to Hide, PDF page 96. Glenn Greenwald / MacMillian. (Glenn Greenwald, p. 167b: NSA admission: "Let's by blunt—the Western World (especially the US) gained influence and made a lot of money via the drafting of earlier standards. –The US was the major player in shaping today's Internet. This resulted in pervasive exportation of American culture as well as technology. It also resulted in a lot of money being made by US entities.").

See TIMELINE for more Snowden proofs of government collusion with the private sector -- unConstitutional crony capitalism at its zenith. (Please be patient! The Jun. 06, 2016 bookmarked timeline entry for Edward Snowden will load automatically.)

Cisco has helped lead the Deep State technology collusion

John T. Chambers
John T. Chambers

From 2002-2006 Cisco’s CEO John T. Chambers was vice chair of the National Infrastructure Assurance Council (NIAC) started under Bill Clinton as the main policy arm of the rogue C.I.A.’s takeover of the Internet. It was during this period that IBM and Cisco conspired with the rest of the technology world to steal Leader Technologies’ social networking invention and convert it to a global spying platform.

These were also the formative years following the Deep State’s rogue C.I.A. orchestration of the 9/11 false flag and The Patriot Act. This council was established under Clinton/Podesta in 1999 and tasked to set policy for the Deep State shadow government's “Internet of Things” global spy grid.

Cisco’s timeline shows that they were helping lead the development of the rogue C.I.A. surveillance system—almost completely outside the oversight of Congress and the American People. It also shows that Cisco has been a central figure in the Clinton-Obama-Soros-Russia axis:

Bookmark: #chambers-cisco-treason-sedition
Cisco/Chambers score the highest—15 on the Deep State Hive Mind Index (see Table 1)
1993 Steven Wolff (later Cisco) collaborated with the Clintons, Podesta, Summers, Sandberg, Albright, Milner and World Bank to give the FBI a backdoor encryption key to all digital traffic and content; media attending were: NPR, New York Times, Washington Post
1997 Chambers/Cisco teamed with IBM, Microsoft, Intel and Wind River to build backdoors into all hardware and firmware for the "Internet of Things" offshore, in Italy, via Eurotech, Ltd.
1999 (Jul 14) Chambers/Cisco secret member of NIAC, v. 1
(Executive Order 13130, under Clinton)
2001 (Oct 16) Chambers/Cisco, secret member, NIAC, v. 2
(Executive Order 13231, under Bush)
2001 (Nov 29) Chambers/Cisco, secret member, IBM Eclipse Foundation
2002-2006 Chambers/Cisco, appointed vice chairman of NIAC (under Bush)
2005 (Sep. 02) Bill Clinton broker the UrAsia uranium mining rights in Kazakhstan for friend Frank Giustra
2006 (May 18) Chambers/Cisco paid Bill Clinton $150,000 for speech in Monterey, CA
2006 (Aug 17) Chambers/Cisco paid Bill Clinton $150,000 for speech in Las Vegas, NV
2007 (Feb 12) Bill Clinton's friend Frank Giustra sold UrAsia uranimum mining to Uranium One for $3.1 billion
2007 (Mar 29) Chambers/Cisco paid Bill Clinton $100,000 for speech in Kiawah Isl., SC 
2008 (Sep 09) Chambers/Cisco, public member, IBM Eclipse Foundation
2009 (Sep 22) Chambers/Cisco donated up to $5,000,000 in Clinton Foundation. See donor list (fn. 320)
2010 (Dec 29) Hillary identified Cisco in stonewalled emails on her illegal private server along with other Deep State Hive Mind conspirators Yahoo, Ebay, Semantec, MicroTech, FCC, Ford Foundation, Microsoft, Apple, Safaricom, Ushahidi, Twitter, Square, Google, Mobile Accord, Carlos Slim, HowCast, Mo Ibrahim Foundation, Mextel, NYU, Harvard. The notes of this speech were redacted as CLASSIFIED by the State Department
2010 (Jun 27) Chambers/Cisco committed $1,000,000,000 (one billion) in Skolkovo, Russia to Obama/Hillary’s 'Russian Reset' along with other funds from IBM, Google and Intel—now this is REAL RUSSIAN COLLUSION!
2010 (Jun 29) Renaissance Capital, Moscow, Russia, Uranium One underwriter with close Kremlin ties, paid Bill Clinton $500,000 for a speech.
2010 (Dec 17) Secretary of State Hillary Rodham Clinton presented Cisco with the Secretary of State’s 2010 Award for Corporate Excellence (ACE). 
2011 (Feb 17) Chambers/Cisco guest of Barack Obama at an excluse Silicon Valley elitist dinner
2011 (Apr 10) Vladimir Putin's Rusnano company, Moscow, Russia, invested $35 million in Joule Unlimited where John Podesta was a director
2013 (May 29) Chambers/Cisco bought Joulex, Thomas E. Noonan, CEO; also long-time IBM shadow executive, and founding member of NIAC
2014 (Aug 28) Chambers/Cisco paid Hillary Clinton $325,000 for speech in Las Vegas, NV.
2016 (Jan 14) Chambers/Cisco given special access to Hillary Clinton at the State Department; admitted NSA penetration; pretended they were not partnered with the NSA
2016 (Aug 16) Chambers/Cisco admitted to building in C.I.A. / NSA / FBI encryption backdoors in Internet switches for many years
2017 (Mar 21) Chambers/Cisco admitted "critical bug" in 318 Internet switches to hide their decades of Deep State collusion with the NSA / C.I.A. / FBI shadow government; fails to admit these were features built in for the rogue C.I.A., not bugs.
Table 2: John T. Chambers, Chairman & CEO, Cisco Systems collusion with Barack Obama, Bill and Hillary Clinton and New World Order Deep State shadow government globalists.
Bookmark: #niac-power-abuse

How do we know the Deep State abused their bureaucratic power?

The NIAC’s own internal PowerPoint said that’s what they were doing—by design. They clearly state that they will essentially bribe vendors with government contracts to get compliance with the plan:

NIAC. (Nov. 21, 2013). National Infrastructure Advisory Council. Business Meeting Agenda, p. 117. Held at the U.S. Patent Office. DHS.
Fig. 8: PowerPoint Slide (page 117) proves that the NIAC colludes with its public-private partners to muscle technology vendors into compliance with their "Internet of Things." NIAC p. 117 from Nov. 21, 2013 | NIAC 126 pgs. Nov. 21, 2013 Meeting Minutes (4.5 MB)

ZIPPED archive of NIAC Quarterly Business Meeting Minutes from Nov. 26, 2002 to Sep. 16, 2016 (last accessed Jun. 28, 2017) (24.7 MB).

This circumstance is EXACTLY what President Dwight D. Eisenhower warned about in his farewell address to the nation on Jan. 17, 1961.

The military-industrial complex hive members have become New American Tyrants

Bookmark: #eisenhower-warning
President Dwight D. Eisenhower's warning about the rise of a corrupt military-industrial complex
Click video to watch 2 min. 30 secs. of President Dwight D. Eisenhower's farewell address on Jan. 17, 1961
Fig. 9: On Jan. 17, 1961, President Dwight D. Eisenhower warned the world about the dangers for tyranny arising from a military-industrial complex. As the AFI investigation has uncovered, that day came on Sep. 29, 1999 when the C.I.A. began investing in hardware and software companies, thus essentially nationalizing, largely in secret, America's emerging digital infrastructure. This gave the C.I.A. an unprecedented and unaccountable ability to spy on everyone without a warrant. https://youtu.be/orEurY6HdXU | Raw *.mp4 video

These criminals control the mainstream media as their propaganda arm, as Roger Stone so clearly describes in this video just released yesterday.

Bookmark: #roger-stone-on-free-speech
Fig. 10 Roger Stone breaks down key principles of American Free Speech and the First Amendment.

Conclusion

We the People must reassert our power over these criminals who have hijacked so much of our country in their stealth.

Bookmark: #roger-stone-the-three-amigos
In lawyers we trust?
Click the image to read Roger Stone's in depth analysis: "Mueller, Rosenstein, and Comey: The Tree Amigos from the Deep State"
Roger Stone. (Jun. 22, 2017). Mueller, Rosenstein, and Comey: The Tree Amigos from the Deep State. StoneColdTruth.com.
Fig. 11: Roger Stone. (Jun. 22, 2017). Mueller, Rosenstein, and Comey: The Three Amigos from the Deep State. StoneColdTruth.com.

Notices: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself. Photos used are for educational purposes only and were obtained from public sources. No claims whatsoever are made to any photo.

Comment

Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to amer4innov@gmail.com and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.